NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
dos
7 TopicsLogs full of DoS attacks
My logs are full of this: Attack: SYN/ACK Scan] from source: 113.17.185.222, port 18783, Friday, July 14, 2017 06:39:35 [DoS Attack: RST Scan] from source: 104.232.163.26, port 11730, Friday, July 14, 2017 06:33:26 [DoS Attack: SYN/ACK Scan] from source: 213.238.35.69, port 21, Friday, July 14, 2017 06:23:27 [DoS Attack: SYN/ACK Scan] from source: 136.243.61.77, port 80, Friday, July 14, 2017 05:59:15 [DoS Attack: SYN/ACK Scan] from source: 136.243.61.77, port 80, Friday, July 14, 2017 05:21:26 [DoS Attack: SYN/ACK Scan] from source: 80.248.168.81, port 443, Friday, July 14, 2017 04:47:18 [DoS Attack: TCP/UDP Echo] from source: 141.212.121.206, port 43516, Friday, July 14, 2017 04:44:30 [DoS Attack: SYN/ACK Scan] from source: 119.167.137.231, port 8085, Friday, July 14, 2017 04:31:55 [DoS Attack: SYN/ACK Scan] from source: 13.75.119.99, port 11783, Friday, July 14, 2017 04:20:23 [DoS Attack: SYN/ACK Scan] from source: 13.94.40.78, port 23674, Friday, July 14, 2017 03:59:14 What am I suppose to do about this?My DNS servers of my internet provider are being seen as dos attacks!? I am running a C7000
My internet providers DNS servers are being seen as DOS attacks. Not just a few times but litterally hundreds per day! It is affecting my routers efficiency! It makes no sense what so ever, Here is two that just happened, Any help would be greatfully appreciated, I never had these issues with my linksys. The 50.27.189.xxx:xxxxx is my web and mail server [DoS attack: TCP- or UDP-based Port Scan] from 208.180.42.100, port 53 1 Wed Jun 08 23:24:27 2016 50.27.189.xx:xxxxx 208.180.42.100:53 [DoS attack: TCP- or UDP-based Port Scan] from 208.180.42.68, port 53 1 Wed Jun 08 23:13:19 2016 50.27.189.xx:xxxxx 208.180.42.68:53 firmware V1.01.155.1KViews1like6Comments