- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
RAX120 Firmware Version 1.0.1.108
New Features and Enhancements:
•Supports the Tx Beamforming option under Advanced > Wireless Settings to improve legacy wireless client support.
Bug Fixes:
•Wireless disconnection when WiFi password authentication failed.
•Internet and Wireless menu links under the Basic tab do not work properly.
•The attached device list in the Nighthawk app does not display any devices.
•Fixes minor web UI issues.
https://community.netgear.com/t5/forums/postpage/board-id/en-home-routers-nighthawk-wifi-ax6
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Any issues with the new firmware?
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Yes, I had the RAX120 with 1.0.1.108 freeze up on me when attempting to connect via wireless with my MacBook 15". I powered off, turned off AX and connected back ok. Was working all day without issue up until that point. All devices lost connection when I attempted with the laptop. Never had any issues like that previously.
After flashing 1.0.1.108 I did a hard reset before I started using it this morning. AX was on and OFDMA was on for 5GHz network that the laptop was connecting to.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
@nighthawkr wrote:Yes, I had the RAX120 with 1.0.1.108 freeze up on me when attempting to connect via wireless with my MacBook 15". I powered off, turned off AX and connected back ok. Was working all day without issue up until that point. All devices lost connection when I attempted with the laptop. Never had any issues like that previously.
After flashing 1.0.1.108 I did a hard reset before I started using it this morning. AX was on and OFDMA was on for 5GHz network that the laptop was connecting to.
See any updated Driver for your Wireless Network Card? I didn't experience any issue so far...
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
macOS is up to date on my 2018 MacBook 15" with Catalina. It started that I could not authenticate with wireless password (even though it hadn't changed) and then the whole network stopped working. Could not connect via wired from my other device (PC) to 10.0.0.1 to check on the device status, so had to reset.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Update: Currently working with MacBook now on 5GHz with AX enabled, OFDMA enabled on both bands (prev only 5GHz), disable PMF checked. No logs unfortunately. Will see how it goes.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Just shows off line have I missed something
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
@Daveblade93 wrote:
Please see this pic hope this can help
Did you do hard reset after FW update?
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Since the update is anyone seeing a flood of SYN/ACK DoS attacks from 148.251.48.231?
I have had hundreds atarting last week, pretty much when the firmware was released and I updated. According to my ISP its something the router is calling out for, or its a vulnerabilty in the new firmware. That seems a bit dramatic but then again this amount of scans is not fun and its a cut down version.
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:34
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:25
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:52:16
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:51:37
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December 02, 2019 12:51:28
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Monday, December
01, 2019 21:59:43
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:27:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:14:36
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 21:01:22
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:55:03
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:49:09
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:03:35
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 20:03:23
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:58:15
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:44:19
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:22:53
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 19:03:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:52:41
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:41:47
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 18:11:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:53:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:37:44
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 17:00:48
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 16:42:37
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 16:37:45
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 15:51:01
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 15:27:52
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:55:31
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:52:55
[DoS Attack: SYN/ACK Scan] from source: 148.251.48.231, port 50002, Sunday, December 01, 2019 13:41:14
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
Hello avtella while I totally agree about Netgear logs this particular site is known for not being a good actor I had a message from a few people pointing to a couple of sites that show Hetzner as being an abusive IP address, and they're going for a really odd port which is 50002 which is generally used for some software I've never heard of which is PPoiP I've had literally hundreds well actually into the thousands now since I've booted the router from that IP even when cold booting with no devices attached or Wi-Fi device is turned on so literally it's just the route of sitting there and it starts almost instantly the router boots ieven before it gets the time from the NTP server it starts getting attacked, there is another conversation on these forums with people with Orbi devices RBK50s I think which are having similar issues.
It's just odd that they're both had recent firmware updates for these routers and they're both Qualcomm devices also it's happening in America the UK Australia all over the world tbh and something just doesn't feel right if that makes sense about this, and my ISP said they think it's the router calling for something from this IP or there is possibly a security issue that people are not aware of, I don't see it being the latter because the router is stopping it but it is odd that it just started with the update, of course that could just be coincidence. If you do happen to see logs from this particular IP and believe me they I have as I said have thousands within 24 hours I've never seen so many I'm wondering if it's something in the latest firmware, or of course someone could've see accessed one of the servers at Hetzner and are just being a bad actor.
https://www.abuseipdb.com/check/148.251.48.231
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
I contacted Hetzner the company behind the IP address and informed them of what is happening, as not all large server farms are aware that the maybe they've lost control of one of there devices. They've replied to me stating the following;
'We have received your information regarding spam and/or abuse and we shall follow up on this matter.
The person responsible has been sent the following instructions:
- Solve the issue
- Send us a response'
so hopefully this quite large-scale scan attack will cease and desist within the next day also.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
I don't see any dos entries in my recent logs, but I'm watching now.
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 06:34:27
[admin login] from source 10.0.0.5, Monday, January 13, 2020 06:34:25
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:54:25
[DoS Attack: SYN/ACK Scan] from source: 164.68.120.93, port 80, Monday, January 13, 2020 04:52:53
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:49:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 04:45:30
[DoS Attack: ACK Scan] from source: 162.125.19.131, port 443, Monday, January 13, 2020 04:45:15
[DoS Attack: ACK Scan] from source: 162.125.19.131, port 443, Monday, January 13, 2020 04:44:44
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:44:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 04:44:16
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 04:24:25
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53849, Monday, January 13, 2020 04:22:02
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53694, Monday, January 13, 2020 04:20:57
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53691, Monday, January 13, 2020 04:20:57
[DoS Attack: RST Scan] from source: 113.164.66.16, port 53690, Monday, January 13, 2020 04:20:57
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 03:29:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 03:24:28
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 03:14:25
[DHCP IP: 10.0.0.14] to MAC address d4:4d:a4:49:d9:b6, Monday, January 13, 2020 03:13:17
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:44:25
[DoS Attack: SYN/ACK Scan] from source: 43.228.64.68, port 2287, Monday, January 13, 2020 02:41:50
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:29:25
[DoS Attack: SYN/ACK Scan] from source: 198.13.104.177, port 80, Monday, January 13, 2020 02:24:33
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 02:19:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 02:16:42
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 01:49:25
[DHCP IP: 10.0.0.11] to MAC address 3c:f0:11:da:c3:d9, Monday, January 13, 2020 01:44:35
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 01:19:25
[DHCP IP: 10.0.0.5] to MAC address c6:f3:9b:c6:b7:4f, Monday, January 13, 2020 01:17:17
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:34:23
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:25
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:29:23
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:13
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:07
[DoS Attack: RST Scan] from source: 109.72.202.24, port 19596, Monday, January 13, 2020 00:29:04
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:19:23
[DoS Attack: SYN/ACK Scan] from source: 52.220.131.108, port 443, Monday, January 13, 2020 00:17:00
[Internet connected] IP address: 76.248.233.9, Monday, January 13, 2020 00:09:23
[DHCP IP: 10.0.0.4] to MAC address dc:54:d7:0e:86:a9, Monday, January 13, 2020 00:09:13
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 23:39:22
[DoS Attack: Ascend Kill] from source: 89.248.168.217, port 34653, Sunday, January 12, 2020 23:37:22
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:29:19
[DoS Attack: SYN/ACK Scan] from source: 23.213.96.39, port 443, Sunday, January 12, 2020 22:25:00
[DoS Attack: SYN/ACK Scan] from source: 23.213.96.39, port 443, Sunday, January 12, 2020 22:24:44
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:24:19
[Access Control] Device GALAXYWATCHACTIVE2-CE68 with MAC address C0:DC:DA:E3:9E:69 is allowed, Sunday, January 12, 2020 22:23:39
[DHCP IP: 10.0.0.10] to MAC address c0:dc:da:e3:9e:69, Sunday, January 12, 2020 22:23:39
[Internet connected] IP address: 76.248.233.9, Sunday, January 12, 2020 22:19:19
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
- Mark as New
- Bookmark
- Subscribe
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Re: RAX120 Firmware Version 1.0.1.108
• Introducing NETGEAR WiFi 7 Orbi 770 Series and Nighthawk RS300
• What is the difference between WiFi 6 and WiFi 7?
• Yes! WiFi 7 is backwards compatible with other Wifi devices? Learn more