Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all,
Vanilla are planning an update to the site on April 24th (next Wednesday). It is a major PHP8 update which is expected to boost performance across the site. The site will be down from 7pm and it is expected to take about an hour to complete. We appreciate your patience during the update.
Thanks all.

UPC "Drop-outs" of late, going insane

Options
2456712

Comments

  • Registered Users Posts: 34 Fizzix


    Guess what.. I'm having the exact same problem as you right down to the last symptom. Just check my router logs for today:

    Illegal TCP header 939 Mon Jan 07 00:15:48 2013 192.168.1.18:0 190.178.149.82:0


    The IP Whois is RIPE..something fishy is going on.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Now that is suspicious.


  • Registered Users Posts: 34 Fizzix


    So it seems this is a Dos attack, and its ongoing as we speak. I wonder who we pissed off.


  • Registered Users Posts: 21,418 ✭✭✭✭Alun


    RIPE is an internet registrar just like InterNIC, APNIC and ARIN that cover different regions, nothing suspicious about that at all.

    Looks like you may have ended up with an IP address of someone that pissed off somebody, and they're attempting to DOS you.


  • Registered Users Posts: 34 Fizzix


    How long is UPCs DHCP lease ?


  • Advertisement
  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    2422775213.png

    Just did it again in the last ten minutes. Going to reboot now and then I'll check the logs.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    [admin login] from source 192.168.2.3, Tuesday, January 08,2013 22:27:53
    [LAN access from remote]
    [UPnP set event: add_nat_rule] from source 192.168.2.6, Tuesday, January 08,2013 22:22:01
    [LAN access from remote] 
    [UPnP set event: add_nat_rule] from source 192.168.2.3, Tuesday, January 08,2013 22:21:46
    [Internet connected] IP address: 46.7.xx.xx, Tuesday, January 08,2013 22:21:04
    [Internet connected] IP address: 192.168.100.10, Tuesday, January 08,2013 22:19:48
    [DoS Attack: RST Scan] from source: 108.162.203.29, port 80, Tuesday, January 08,2013 22:16:38
    [LAN access from remote]
    [DoS Attack: RST Scan] from source: 108.162.203.29, port 80, Tuesday, January 08,2013 22:07:58
    [LAN access from remote]
    [DHCP IP: 192.168.2.18] to MAC address 00:26:08:1a:63:80, Tuesday, January 08,2013 22:03:18
    [DoS Attack: RST Scan] from source: 69.244.75.173, port 57853, Tuesday, January 08,2013 22:02:18
    [LAN access from remote]
    [DoS Attack: RST Scan] from source: 69.244.75.173, port 56987, Tuesday, January 08,2013 21:57:30
    [DHCP IP: 192.168.2.7] to MAC address d0:66:7b:65:ea:4e, Tuesday, January 08,2013 21:56:20
    [LAN access from remote] 
    [DHCP IP: 192.168.2.4] to MAC address 6c:62:6d:7f:bb:55, Tuesday, January 08,2013 21:55:44
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 59783, Tuesday, January 08,2013 21:52:00
    [DoS Attack: RST Scan] from source: 74.160.162.81, port 58380, Tuesday, January 08,2013 21:49:06
    [LAN access from remote] 
    [LAN access from remote]
    [LAN access from remote]
    [DHCP IP: 192.168.2.2] to MAC address 00:90:a9:23:3c:77, Tuesday, January 08,2013 21:48:04
    [LAN access from remote] 
    [LAN access from remote] 
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 57664, Tuesday, January 08,2013 21:44:04
    [LAN access from remote] 
    [DoS Attack: RST Scan] from source: 74.160.162.81, port 57941, Tuesday, January 08,2013 21:40:50
    [DoS Attack: RST Scan] from source: 71.174.186.109, port 50989, Tuesday, January 08,2013 21:40:36
    [LAN access from remote] 
    [DoS Attack: RST Scan] from source: 80.233.23.106, port 31022, Tuesday, January 08,2013 21:37:03
    [LAN access from remote] 
    [LAN access from remote]
    [DoS Attack: RST Scan] from source: 24.92.144.206, port 39111, Tuesday, January 08,2013 21:29:04
    [DoS Attack: RST Scan] from source: 199.185.132.4, port 63121, Tuesday, January 08,2013 21:28:42
    [DoS Attack: RST Scan] from source: 199.185.133.5, port 65317, Tuesday, January 08,2013 21:28:32
    [LAN access from remote]
    [DoS Attack: RST Scan] from source: 24.92.144.206, port 39111, Tuesday, January 08,2013 21:22:32
    [DoS Attack: RST Scan] from source: 80.233.23.106, port 28710, Tuesday, January 08,2013 21:20:52
    [UPnP set event: del_nat_rule] from source 192.168.2.6, Tuesday, January 08,2013 21:20:07
    [LAN access from remote] 
    [LAN access from remote]
    [LAN access from remote] 
    
    [LAN access from remote] 
    [LAN access from remote] 
    [LAN access from remote] 
    [LAN access from remote] 
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60726, Tuesday, January 08,2013 21:14:47
    [LAN access from remote] 
    [LAN access from remote] 
    
    [LAN access from remote] 
    [LAN access from remote] 
    [DoS Attack: ACK Scan] from source: 87.69.142.248, port 1962, Tuesday, January 08,2013 21:13:52
    [LAN access from remote] 
    [LAN access from remote] 
    
    [LAN access from remote] 
    [LAN access from remote] 
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62657, Tuesday, January 08,2013 21:12:57
    [LAN access from remote] 
    [LAN access from remote] 
    
    [LAN access from remote] 
    


    uqfxT.png


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Dropped for 60 seconds just there :mad:


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Died again.


  • Registered Users Posts: 3,212 ✭✭✭DECEiFER


    What are your SNR numbers like these days?

    Have you tried connecting your computer directly to the EPC while in Bridge mode to see if that helps?

    If you're going to nuke Spyware, I recommend (as I feel it's an under-rated app) Spybot S&D. It really does a great job. I never turn on real-time scanning. I run an on-demand scan every now and again to get rid of some nasty parasites. Hell, if you've ever been completely infected to the point where some parasites completely take over your machine (where you couldn't even get into Control Panel or into Default or Add/Remove Programs to uninstall anything in the OS), running Spybot S&D in Safe Mode saved many PCs I scanned completely (many friends back in the Windows XP days were often not careful about what they were downloading and after running Spyboy S&D their OSs were back to normal after one scan with no more popups and no more access restrictions).


  • Advertisement
  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Downstream Channels	 	 
     	Power Level:	Signal to Noise Ratio:
    Channel 1:	 3.2 dBmV	39.9 dB
    Channel 2:	 3.5 dBmV	40.5 dB
    Channel 3:	 3.2 dBmV	39.9 dB
    Channel 4:	 2.8 dBmV	39.9 dB
    Channel 5:	 1.9 dBmV	40.9 dB
    Channel 6:	 2.0 dBmV	41.4 dB
    Channel 7:	 2.0 dBmV	41.4 dB
    Channel 8:	 2.0 dBmV	40.2 dB
    
     		
    Upstream Channels	 	 
     	Power Level:
    Channel 1:	45.9 dBmV
    Channel 2:	 0.0 dBmV
    Channel 3:	 0.0 dBmV
    Channel 4:	 0.0 dBmV
    

    Kaspersky RD 10 does a similar job :)


  • Registered Users Posts: 3,212 ✭✭✭DECEiFER


    ED E wrote: »
    Downstream Channels	 	 
     	Power Level:	Signal to Noise Ratio:
    Channel 1:	 3.2 dBmV	39.9 dB
    Channel 2:	 3.5 dBmV	40.5 dB
    Channel 3:	 3.2 dBmV	39.9 dB
    Channel 4:	 2.8 dBmV	39.9 dB
    Channel 5:	 1.9 dBmV	40.9 dB
    Channel 6:	 2.0 dBmV	41.4 dB
    Channel 7:	 2.0 dBmV	41.4 dB
    Channel 8:	 2.0 dBmV	40.2 dB
    
     		
    Upstream Channels	 	 
     	Power Level:
    Channel 1:	45.9 dBmV
    Channel 2:	 0.0 dBmV
    Channel 3:	 0.0 dBmV
    Channel 4:	 0.0 dBmV
    

    Kaspersky RD 10 does a similar job :)
    Don't get me wrong. Do that, too. Give 'em both a lash! :)

    Also, your stats are fine (which I know you know :P), better than mine, even, and I'm not facing issues anything like yours. I guess that's not the problem.


    EDIT: Fyi, here's my stats. They're not terrible (better than before I did some re-cabling downstairs in late 2012) but clearly yours are better.
    Downstream Channels	 	 
     	Power Level:	Signal to Noise Ratio:
    Channel 1:	 -5.9 dBmV	39.5 dB
    Channel 2:	 -5.7 dBmV	39.6 dB
    Channel 3:	 -5.3 dBmV	39.8 dB
    Channel 4:	 -5.9 dBmV	39.0 dB
    Channel 5:	 -6.9 dBmV	38.7 dB
    Channel 6:	 -5.6 dBmV	39.5 dB
    Channel 7:	 -5.5 dBmV	39.6 dB
    Channel 8:	 -6.6 dBmV	38.6 dB
    
     		
    Upstream Channels	 	 
     	Power Level:
    Channel 1:	49.2 dBmV
    Channel 2:	 0.0 dBmV
    Channel 3:	 0.0 dBmV
    Channel 4:	 0.0 dBmV
    


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    MAC spoofed. New external IP leased. SIP and Strict NAT still in full effect.

    Will report back when we've ran with this for a few days, or when it dies again.

    Thanks for the suggestions DECEiFER.


  • Registered Users Posts: 3,212 ✭✭✭DECEiFER


    No problem! Best of luck with it...

    Also, does this happen in Router mode? If you faux bridged your WNDR3800 to it like the good ol' days, would that help? I know if you were being DoS'd, it wouldn't matter one bit, so assuming that's not the issue and it's completely down to the EPC3925, it might be worth trying again over a decent period of time.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    DECEiFER wrote: »
    No problem! Best of luck with it...

    Also, does this happen in Router mode? If you faux bridged your WNDR3800 to it like the good ol' days, would that help? I know if you were being DoS'd, it wouldn't matter one bit, so assuming that's not the issue and it's completely down to the EPC3925, it might be worth trying again over a decent period of time.

    Thats next. For a while after the change though it was fine, so I'm leaning towards it being something else.


  • Registered Users Posts: 3,212 ✭✭✭DECEiFER


    ED E wrote: »
    Thats next. For a while after the change though it was fine, so I'm leaning towards it being something else.
    The firmware went through an update a while after we all started bridging our routers and wasn't that one of the things people like you with the drop-out problem were blaming primarily? But it doesn't stack up when you consider that I and others aren't experiencing issues, and you are. It's a bit bizarre. I hope UPC will nevertheless look into the firmware being a possibility, at least just to rule it out, and make an announcement on their "Talk" forum.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Saw somebody using the EPC on its own and having identical symptoms. Not sure which thread.


    If its bridging related we wont get any help from UPC :|


  • Registered Users Posts: 3,212 ✭✭✭DECEiFER


    ED E wrote: »
    Saw somebody using the EPC on its own and having identical symptoms. Not sure which thread.


    If its bridging related we wont get any help from UPC :|

    Coincidentally I'm reading that very thread right now! I saw your post on page 3 asking for an explanation as to why they won't support it.

    I can understand them not supporting it as far as whatever router you're bridging it with but the EPC should always be supported. In-fact, by enabling the bridging option since late last year, it definitely should be supported. But the thing is, we all know that UPC's tech support aren't very knowledgeable (didn't someone say that UPC told them the the SNR figures pertained to WiFi?) and when they say that they won't support bridge mode, it could mean any number of things and they might not have one clue where to draw the line and where not to.


  • Registered Users Posts: 34 Fizzix


    I'm having these issues again tonight speed keeps dropping right down and ping is not consistent.These are the sort off speed tests I'm getting 25mb line :

    Last Result:
    Download Speed: 1264 kbps (158 KB/sec transfer rate)
    Upload Speed: 567 kbps (70.9 KB/sec transfer rate)
    Latency: 23 ms
    Thu Jan 10 2013 00:18:58 GMT+0000 (GMT Standard Time)

    Last Result:
    Download Speed: 886 kbps (110.8 KB/sec transfer rate)
    Upload Speed: 883 kbps (110.4 KB/sec transfer rate)
    Latency: 17 ms
    Thu Jan 10 2013 00:22:18 GMT+0000 (GMT Standard Time)

    Last Result:
    Download Speed: 886 kbps (110.8 KB/sec transfer rate)
    Upload Speed: 883 kbps (110.4 KB/sec transfer rate)
    Latency: 17 ms
    Thu Jan 10 2013 00:22:18 GMT+0000 (GMT Standard Time)

    Really should be getting better speeds at this hour of the night.



    www.speedtest.net/result/2425412368.png < best one yet cant link picture because of my postcount


  • Registered Users Posts: 70 ✭✭DublinC


    Ah, so I'm not the only one. I've had this issue on-going now for over a week or two, it's really beginning to piss me off. The connection will be fine after rebooting, but after a while it seems to degrade and go slow again. Considering I'm paying for ~125mb/s and it's dropping to 2mb/s and lower, it's a disgrace.


  • Advertisement
  • Registered Users Posts: 70 ✭✭DublinC


    E6LU7.png
    IqJa0.png

    I don't believe these are real attacks. While I do partake in somewhat-competitive gaming where DDoS'ing occurs, I wasn't online at these times bar the latest "attack". I've also only taken my EPC3925 out of Bridged mode thus changing my IP last week. I haven't been on Skype (Rules out Skype "IP Grabbing"), and I haven't visited any unknown sites.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    I'd guess that its being over zealous and freaking itself out.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Wanna export the logs so I can get some kind of analysis of how things are going(seems ok last couple days, dropped once but picked up again before I got back). Problem is I cant export a full conversation from gmail or my backup(WLM).


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    So, processed these logs. Its a workaround, and not a pretty one...

    1. Email converstaion to self
    2. Download zip of attachments
    3. Convert them(.eml) to a text file
    4. Filter for DOS, remove email addy
    5. Filter for duplicates
    6. Manually divide and post.

    Cant just find and replace as the IPs all change, as do the timestamps. So Im using two command line tools and a notepad++ plugin. But it works, sorta.

    JAN 14:
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62030, Monday, January 14,2013 13:33:08
    [DoS Attack: RST Scan] from source: 112.208.11.173, port 10015, Monday, January 14,2013 13:18:44
    JAN 13
    [DoS Attack: RST Scan] from source: 70.80.143.190, port 23894, Sunday, January 13,2013 02:24:30
    [DoS Attack: RST Scan] from source: 70.80.143.190, port 23759, Sunday, January 13,2013 02:23:30
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62299, Sunday, January 13,2013 02:20:45
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Sunday, January 13,2013 01:32:05
    [DoS Attack: RST Scan] from source: 74.90.130.80, port 57246, Sunday, January 13,2013 01:12:25
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Sunday, January 13,2013 00:56:30
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Sunday, January 13,2013 00:51:50
    [DoS Attack: RST Scan] from source: 68.36.193.61, port 44184, Sunday, January 13,2013 00:17:15
    JAN 12
    [DoS Attack: RST Scan] from source: 68.228.240.227, port 22286, Saturday, January 12,2013 23:31:05
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Saturday, January 12,2013 22:22:44
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 24519, Saturday, January 12,2013 22:22:30
    [DoS Attack: ACK Scan] from source: 76.74.170.212, port 80, Saturday, January 12,2013 20:22:49
    [DoS Attack: RST Scan] from source: 107.10.168.27, port 11310, Saturday, January 12,2013 19:25:09
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Saturday, January 12,2013 19:11:05
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Saturday, January 12,2013 18:54:35
    [DoS Attack: ACK Scan] from source: 24.36.76.62, port 35682, Saturday, January 12,2013 18:45:05
    [DoS Attack: ACK Scan] from source: 207.255.188.153, port 6959, Saturday, January 12,2013 18:08:15
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 24519, Saturday, January 12,2013 18:01:11
    [DoS Attack: RST Scan] from source: 24.4.211.93, port 18042, Saturday, January 12,2013 17:15:06
    [DoS Attack: ACK Scan] from source: 67.81.83.232, port 52204, Saturday, January 12,2013 16:56:05
    [COLOR="Red"][DoS Attack: WinNuke Attack] from source: 64.56.224.149, port 45452, Saturday, January 12,2013 16:02:40[/COLOR]
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Saturday, January 12,2013 15:50:50
    **[DoS Attack: RST Scan] from source: 24.69.58.217, port 63912, Monday, January 14,2013 09:14:04
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61518, Saturday, January 12,2013 14:44:59
    **[DoS Attack: ACK Scan] from source: 122.177.185.161, port 15679, Monday, January 14,2013 08:46:29
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62243, Saturday, January 12,2013 11:30:26
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61725, Saturday, January 12,2013 11:26:30
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Saturday, January 12,2013 08:39:50
    **[DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Monday, January 14,2013 08:33:08
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Saturday, January 12,2013 08:14:39
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62232, Saturday, January 12,2013 05:41:59
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62231, Saturday, January 12,2013 05:22:28
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62230, Saturday, January 12,2013 05:19:25
    [DoS Attack: RST Scan] from source: 69.244.197.87, port 53047, Saturday, January 12,2013 04:18:46
    [DoS Attack: ACK Scan] from source: 182.239.181.34, port 2532, Saturday, January 12,2013 03:54:10
    [DoS Attack: RST Scan] from source: 213.35.230.50, port 19525, Saturday, January 12,2013 03:44:46
    [DoS Attack: ACK Scan] from source: 178.140.136.37, port 15489, Saturday, January 12,2013 03:29:11
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:28:24
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:25:46
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:24:39
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:23:24
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:21:31
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:20:54
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:20:27
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:19:23
    JAN 11
    [DoS Attack: RST Scan] from source: 209.193.56.235, port 61490, Friday, January 11,2013 23:33:17
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Monday, January 14,2013 07:31:09
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:56:27
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:55:23
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:54:19
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:53:47
    [DoS Attack: RST Scan] from source: 72.218.245.44, port 2180, Friday, January 11,2013 19:30:47
    [DoS Attack: RST Scan] from source: 201.52.68.206, port 53314, Friday, January 11,2013 15:45:09
    [DoS Attack: RST Scan] from source: 201.52.68.206, port 52957, Friday, January 11,2013 15:43:25
    [DoS Attack: RST Scan] from source: 112.208.11.173, port 10015, Monday, January 14,2013 13:11:53
    [DoS Attack: RST Scan] from source: 209.193.56.235, port 59921, Friday, January 11,2013 13:10:27
    [DoS Attack: RST Scan] from source: 63.229.75.128, port 12760, Friday, January 11,2013 12:59:22
    [DoS Attack: RST Scan] from source: 66.45.236.66, port 80, Friday, January 11,2013 12:48:03
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Friday, January 11,2013 12:45:32
    [DoS Attack: RST Scan] from source: 124.104.75.243, port 21784, Monday, January 14,2013 06:46:19
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61025, Monday, January 14,2013 06:41:53
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Friday, January 11,2013 09:47:02
    [DoS Attack: ACK Scan] from source: 41.182.30.197, port 1511, Friday, January 11,2013 08:39:17
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 07:13:53
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 06:42:12
    [DoS Attack: RST Scan] from source: 74.73.230.15, port 60357, Friday, January 11,2013 06:31:17
    [DoS Attack: ACK Scan] from source: 74.73.230.15, port 60008, Friday, January 11,2013 06:16:19
    [DoS Attack: RST Scan] from source: 68.226.230.195, port 6881, Friday, January 11,2013 05:32:57
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 05:11:37
    [DoS Attack: ACK Scan] from source: 24.253.53.83, port 2418, Friday, January 11,2013 04:34:07
    [DoS Attack: ACK Scan] from source: 116.37.43.200, port 1888, Friday, January 11,2013 03:57:42
    [DoS Attack: RST Scan] from source: 86.41.28.35, port 16270, Friday, January 11,2013 02:45:33
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Friday, January 11,2013 02:33:02
    [DoS Attack: RST Scan] from source: 98.183.92.124, port 32258, Friday, January 11,2013 01:59:32
    [DoS Attack: RST Scan] from source: 62.45.126.19, port 64103, Friday, January 11,2013 01:33:58
    [DoS Attack: RST Scan] from source: 86.41.28.35, port 29689, Friday, January 11,2013 01:03:37
    [DoS Attack: ACK Scan] from source: 174.7.226.18, port 57525, Friday, January 11,2013 00:37:27
    [DoS Attack: RST Scan] from source: 173.93.234.140, port 6881, Friday, January 11,2013 00:32:22
    JAN 10
    [DoS Attack: RST Scan] from source: 50.137.87.167, port 17962, Thursday, January 10,2013 23:29:43
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 22:10:49
    [DoS Attack: ACK Scan] from source: 80.101.51.154, port 63423, Thursday, January 10,2013 21:50:34
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 21:41:24
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62714, Thursday, January 10,2013 20:26:18
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 63358, Thursday, January 10,2013 19:47:13
    [DoS Attack: ACK Scan] from source: 24.1.5.75, port 62518, Thursday, January 10,2013 17:10:50
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 15:46:48
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60369, Thursday, January 10,2013 15:36:24
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Thursday, January 10,2013 15:27:44
    [DoS Attack: RST Scan] from source: 70.176.171.214, port 58750, Thursday, January 10,2013 15:07:20
    [DoS Attack: RST Scan] from source: 71.10.172.13, port 45913, Monday, January 14,2013 04:49:03
    [DoS Attack: ACK Scan] from source: 207.46.101.8, port 443, Monday, January 14,2013 04:48:58
    [DoS Attack: ACK Scan] from source: 50.30.98.82, port 62636, Thursday, January 10,2013 12:51:33
    [DoS Attack: RST Scan] from source: 75.66.207.238, port 32766, Thursday, January 10,2013 10:33:03
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 09:57:24
    [DoS Attack: RST Scan] from source: 94.64.102.75, port 18238, Thursday, January 10,2013 08:40:24
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 08:27:13
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Thursday, January 10,2013 08:25:30
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60298, Monday, January 14,2013 04:05:28
    [DoS Attack: ACK Scan] from source: 210.98.151.10, port 5912, Thursday, January 10,2013 07:26:48
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 06:58:59
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Thursday, January 10,2013 06:35:23
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 06:28:34
    [DoS Attack: RST Scan] from source: 67.42.33.111, port 14980, Thursday, January 10,2013 06:26:35
    [DoS Attack: RST Scan] from source: 75.66.207.238, port 32766, Thursday, January 10,2013 06:07:19
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60706, Thursday, January 10,2013 05:55:24
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54974, Thursday, January 10,2013 05:14:25
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 05:01:35
    [DoS Attack: ACK Scan] from source: 116.37.43.200, port 4700, Thursday, January 10,2013 05:00:33
    [DoS Attack: RST Scan] from source: 174.53.129.146, port 55345, Thursday, January 10,2013 04:56:15
    **[DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Monday, January 14,2013 03:40:55
    [DoS Attack: RST Scan] from source: 76.87.50.178, port 44860, Monday, January 14,2013 03:39:45
    [DoS Attack: RST Scan] from source: 203.177.14.211, port 33435, Thursday, January 10,2013 04:05:53
    [DoS Attack: RST Scan] from source: 24.224.181.69, port 61794, Thursday, January 10,2013 03:51:03
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 03:30:00
    [DoS Attack: RST Scan] from source: 174.93.210.218, port 51997, Thursday, January 10,2013 00:37:08
    [DoS Attack: ACK Scan] from source: 24.222.239.63, port 60837, Thursday, January 10,2013 00:25:43
    [DoS Attack: RST Scan] from source: 69.197.38.153, port 7171, Thursday, January 10,2013 00:06:48
    JAN 9
    [DoS Attack: RST Scan] from source: 98.251.48.248, port 40980, Wednesday, January 09,2013 23:42:28
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62337, Wednesday, January 09,2013 23:37:58
    [DoS Attack: RST Scan] from source: 65.190.37.195, port 54656, Wednesday, January 09,2013 23:19:08
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 40543, Wednesday, January 09,2013 23:16:04
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 40097, Wednesday, January 09,2013 23:15:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 39938, Wednesday, January 09,2013 23:15:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 39506, Wednesday, January 09,2013 23:15:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 38524, Wednesday, January 09,2013 23:15:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 38609, Wednesday, January 09,2013 23:15:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 37763, Wednesday, January 09,2013 23:15:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36505, Wednesday, January 09,2013 23:15:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36796, Wednesday, January 09,2013 23:15:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36426, Wednesday, January 09,2013 23:15:04
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 35748, Wednesday, January 09,2013 23:14:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34854, Wednesday, January 09,2013 23:14:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 35170, Wednesday, January 09,2013 23:14:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34334, Wednesday, January 09,2013 23:14:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34411, Wednesday, January 09,2013 23:14:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34256, Wednesday, January 09,2013 23:14:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33856, Wednesday, January 09,2013 23:14:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33477, Wednesday, January 09,2013 23:14:24
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33101, Wednesday, January 09,2013 23:14:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 32787, Wednesday, January 09,2013 23:14:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 59499, Wednesday, January 09,2013 23:13:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 58367, Wednesday, January 09,2013 23:13:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 58474, Wednesday, January 09,2013 23:13:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 57964, Wednesday, January 09,2013 23:13:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 57234, Wednesday, January 09,2013 23:13:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 56052, Wednesday, January 09,2013 23:13:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 54824, Wednesday, January 09,2013 23:13:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 54549, Wednesday, January 09,2013 23:13:06
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 53886, Wednesday, January 09,2013 23:12:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 53309, Wednesday, January 09,2013 23:12:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 52362, Wednesday, January 09,2013 23:12:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 52736, Wednesday, January 09,2013 23:12:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 51386, Wednesday, January 09,2013 23:12:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 51286, Wednesday, January 09,2013 23:12:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 50582, Wednesday, January 09,2013 23:12:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 49781, Wednesday, January 09,2013 23:12:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 48690, Wednesday, January 09,2013 23:11:58
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 49201, Wednesday, January 09,2013 23:11:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 48564, Wednesday, January 09,2013 23:11:48
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 47779, Wednesday, January 09,2013 23:11:44
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 47513, Wednesday, January 09,2013 23:11:38
    [COLOR="Lime"]NEW IP LEASED[/COLOR]
    [DoS Attack: RST Scan] from source: 76.69.189.241, port 37544, Wednesday, January 09,2013 22:16:15
    [COLOR="red"][DoS Attack: WinNuke Attack] from source: 213.157.218.54, port 0, Wednesday, January 09,2013 21:42:00[/COLOR]
    [DoS Attack: ACK Scan] from source: 157.181.100.176, port 23636, Wednesday, January 09,2013 21:11:31
    [DoS Attack: ACK Scan] from source: 74.125.97.56, port 80, Wednesday, January 09,2013 21:03:23
    [DoS Attack: ACK Scan] from source: 74.125.97.56, port 80, Wednesday, January 09,2013 21:02:38
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Monday, January 14,2013 02:16:54
    [DoS Attack: RST Scan] from source: 76.107.23.202, port 26708, Wednesday, January 09,2013 18:00:33
    [DoS Attack: RST Scan] from source: 76.107.23.202, port 26708, Wednesday, January 09,2013 16:49:08
    [DoS Attack: RST Scan] from source: 87.6.173.206, port 17499, Wednesday, January 09,2013 16:46:08
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60332, Wednesday, January 09,2013 16:41:28
    [DoS Attack: RST Scan] from source: 76.69.189.241, port 37544, Wednesday, January 09,2013 15:55:28
    [DoS Attack: RST Scan] from source: 70.36.54.220, port 60894, Wednesday, January 09,2013 15:32:43
    [DoS Attack: RST Scan] from source: 49.145.85.64, port 11209, Wednesday, January 09,2013 14:46:38
    [DoS Attack: RST Scan] from source: 174.117.28.246, port 17014, Wednesday, January 09,2013 14:29:57
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 14:22:38
    [DoS Attack: RST Scan] from source: 64.228.156.102, port 61457, Monday, January 14,2013 01:22:30
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:51:13
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Wednesday, January 09,2013 13:37:30
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:36:38
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Wednesday, January 09,2013 13:31:22
    [DoS Attack: RST Scan] from source: 49.145.85.64, port 25088, Wednesday, January 09,2013 13:29:19
    [DoS Attack: RST Scan] from source: 99.246.111.0, port 63582, Wednesday, January 09,2013 13:12:49
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:07:29
    [DoS Attack: RST Scan] from source: 109.92.221.234, port 10669, Wednesday, January 09,2013 12:11:08
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Wednesday, January 09,2013 11:13:08
    [DoS Attack: RST Scan] from source: 99.246.111.0, port 60964, Wednesday, January 09,2013 10:54:38
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Wednesday, January 09,2013 10:32:18
    [DoS Attack: RST Scan] from source: 76.26.188.108, port 46986, Wednesday, January 09,2013 10:00:59
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:44:39
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:43:18
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:42:13
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:41:03
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:39:58
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:38:53
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:37:59
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:37:38
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:34:18
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:30:52
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:30:15
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:29:48
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:28:48
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:26:28
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:50
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:28
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:12
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:45
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:24
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:13
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:02
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Sunday, January 13,2013 23:53:14
    [DoS Attack: RST Scan] from source: 76.87.50.178, port 44860, Sunday, January 13,2013 23:22:08
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 12199, Wednesday, January 09,2013 03:00:25
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Sunday, January 13,2013 23:10:55
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 18983, Wednesday, January 09,2013 02:32:05
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 24378, Wednesday, January 09,2013 02:04:59
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 02:03:36
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:40:21
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:35:29
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:33:41
    [DoS Attack: RST Scan] from source: 24.9.42.197, port 51090, Wednesday, January 09,2013 00:24:08
    JAN 8
    [DoS Attack: RST Scan] from source: 70.120.178.210, port 12733, Tuesday, January 08,2013 21:05:56
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 62716, Tuesday, January 08,2013 19:38:47
    [DoS Attack: RST Scan] from source: 75.109.217.60, port 6881, Tuesday, January 08,2013 19:02:26
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 60137, Tuesday, January 08,2013 18:40:42
    [DoS Attack: RST Scan] from source: 94.64.102.75, port 14079, Tuesday, January 08,2013 16:59:56
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54982, Tuesday, January 08,2013 16:29:21
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54945, Tuesday, January 08,2013 16:26:16
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 60027, Tuesday, January 08,2013 16:25:48
    [DoS Attack: RST Scan] from source: 107.10.168.27, port 11310, Tuesday, January 08,2013 16:21:36
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Tuesday, January 08,2013 15:37:17
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Tuesday, January 08,2013 15:36:16
    [DoS Attack: RST Scan] from source: 86.41.37.49, port 27545, Tuesday, January 08,2013 15:02:57
    [DoS Attack: RST Scan] from source: 86.41.37.49, port 24924, Tuesday, January 08,2013 14:10:44
    [DoS Attack: ACK Scan] from source: 117.200.218.7, port 64978, Tuesday, January 08,2013 14:08:25
    [DoS Attack: RST Scan] from source: 85.252.252.130, port 10139, Tuesday, January 08,2013 12:14:23
    [DoS Attack: ACK Scan] from source: 77.126.27.181, port 62603, Tuesday, January 08,2013 11:52:03
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Tuesday, January 08,2013 10:30:49
    [DoS Attack: ACK Scan] from source: 80.83.238.87, port 46872, Tuesday, January 08,2013 10:27:21
    [DoS Attack: ACK Scan] from source: 80.83.238.87, port 46872, Tuesday, January 08,2013 10:24:44
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 10830, Tuesday, January 08,2013 07:06:33
    [DoS Attack: ACK Scan] from source: 27.48.69.42, port 11584, Tuesday, January 08,2013 05:16:33
    **[DoS Attack: RST Scan] from source: 68.49.103.12, port 60615, Sunday, January 13,2013 21:09:49
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Tuesday, January 08,2013 04:51:14
    [DoS Attack: ACK Scan] from source: 66.37.97.18, port 51413, Tuesday, January 08,2013 04:45:33
    [DoS Attack: RST Scan] from source: 190.213.211.145, port 42941, Tuesday, January 08,2013 04:02:44
    [DoS Attack: ACK Scan] from source: 81.108.214.251, port 32282, Tuesday, January 08,2013 02:28:23
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 19071, Tuesday, January 08,2013 02:26:56
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 13759, Tuesday, January 08,2013 02:15:45
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 13591, Tuesday, January 08,2013 02:15:24
    [DoS Attack: RST Scan] from source: 95.135.72.191, port 2892, Tuesday, January 08,2013 01:34:22
    [DoS Attack: RST Scan] from source: 84.212.22.238, port 29225, Tuesday, January 08,2013 01:32:24
    [DoS Attack: RST Scan] from source: 190.213.211.145, port 61136, Tuesday, January 08,2013 01:23:48
    [DoS Attack: RST Scan] from source: 178.122.30.149, port 21765, Tuesday, January 08,2013 00:15:19
    JAN 7
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 25326, Monday, January 07,2013 23:48:08
    [DoS Attack: RST Scan] from source: 94.196.189.250, port 56241, Monday, January 07,2013 22:59:16
    [DoS Attack: RST Scan] from source: 89.204.176.151, port 53500, Monday, January 07,2013 22:18:24
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 12990, Monday, January 07,2013 20:48:45
    [DoS Attack: RST Scan] from source: 178.217.186.19, port 7172, Monday, January 07,2013 19:19:57
    [DoS Attack: RST Scan] from source: 82.168.3.226, port 18455, Monday, January 07,2013 17:04:27
    [DoS Attack: RST Scan] from source: 31.192.202.212, port 15103, Monday, January 07,2013 16:58:54
    [DoS Attack: RST Scan] from source: 72.218.220.46, port 60967, Monday, January 07,2013 16:40:11
    [DoS Attack: RST Scan] from source: 72.218.220.46, port 59934, Monday, January 07,2013 16:33:39
    [DoS Attack: RST Scan] from source: 80.213.184.67, port 16525, Monday, January 07,2013 16:29:00
    [DoS Attack: RST Scan] from source: 80.213.184.67, port 14735, Monday, January 07,2013 16:24:27
    [DoS Attack: RST Scan] from source: 210.23.84.203, port 52273, Monday, January 07,2013 12:39:07
    [DoS Attack: ACK Scan] from source: 89.207.56.133, port 1935, Monday, January 07,2013 11:48:57
    [DoS Attack: ACK Scan] from source: 89.207.56.133, port 1935, Monday, January 07,2013 11:41:56
    [DoS Attack: ACK Scan] from source: 90.192.238.74, port 61880, Sunday, January 13,2013 20:14:00
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:48:58
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:44:27
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:42:51
    [DoS Attack: RST Scan] from source: 65.9.208.146, port 56767, Monday, January 07,2013 03:20:34Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 95.0.90.130, port 15779, Monday, January 07,2013 02:40:32
    JAN 6
    [DoS Attack: RST Scan] from source: 67.246.44.110, port 50627, Sunday, January 06,2013 23:54:14
    [DoS Attack: RST Scan] from source: 67.246.44.110, port 50286, Sunday, January 06,2013 23:49:42
    **[DoS Attack: RST Scan] from source: 99.177.248.151, port 65363, Sunday, January 13,2013 19:29:05
    **[DoS Attack: ACK Scan] from source: 68.56.191.28, port 60482, Sunday, January 13,2013 19:28:50
    **[DoS Attack: RST Scan] from source: 41.98.152.137, port 22266, Sunday, January 13,2013 19:16:09
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 13013, Sunday, January 06,2013 20:31:29Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 10403, Sunday, January 06,2013 19:39:53
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 58646, Sunday, January 06,2013 17:40:28
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 56107, Sunday, January 06,2013 17:29:44
    [DoS Attack: ACK Scan] from source: 90.215.123.146, port 61984, Sunday, January 06,2013 15:58:42
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 54178, Sunday, January 06,2013 12:58:21
    [DoS Attack: RST Scan] from source: 24.148.79.145, port 18350, Sunday, January 06,2013 12:46:34
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Sunday, January 06,2013 11:43:15
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60487, Sunday, January 06,2013 10:56:03
    [DoS Attack: RST Scan] from source: 68.105.7.165, port 64323, Sunday, January 06,2013 10:54:51
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60212, Sunday, January 06,2013 10:49:28
    [DoS Attack: ACK Scan] from source: 24.1.5.75, port 62874, Sunday, January 06,2013 10:49:17
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Sunday, January 06,2013 09:48:41
    [DoS Attack: ACK Scan] from source: 61.42.85.214, port 150, Sunday, January 06,2013 09:39:22
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 07:57:42
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 07:54:45
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 06:53:58
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:57:09
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:44:12
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:38:34
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 03:53:34
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 03:38:37
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:46:20
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:42:15
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:38:21
    [DoS Attack: RST Scan] from source: 110.168.19.213, port 19024, Sunday, January 06,2013 01:44:01
    [DoS Attack: RST Scan] from source: 110.168.19.213, port 18642, Sunday, January 06,2013 01:42:18
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:38:24
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51827, Sunday, January 06,2013 01:25:13
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:24:34
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51764, Sunday, January 06,2013 01:18:13
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 57950, Sunday, January 06,2013 01:11:25
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51188, Sunday, January 06,2013 01:06:20
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 56195, Sunday, January 06,2013 01:04:45
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51178, Sunday, January 06,2013 01:04:31
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:00:39Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 00:49:38
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 06,2013 00:39:17
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 00:38:22
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 06,2013 00:37:45
    JAN 5
    [DoS Attack: RST Scan] from source: 76.29.122.181, port 46659, Saturday, January 05,2013 23:51:59
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 59191, Saturday, January 05,2013 23:39:53
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61496, Saturday, January 05,2013 22:57:26
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61086, Saturday, January 05,2013 22:50:26
    [DoS Attack: RST Scan] from source: 83.222.109.39, port 27076, Saturday, January 05,2013 16:59:11
    [DoS Attack: RST Scan] from source: 76.105.140.233, port 13275, Saturday, January 05,2013 10:53:10
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 10:53:04
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 10:51:25
    [DoS Attack: RST Scan] from source: 76.105.140.233, port 13275, Saturday, January 05,2013 10:47:06
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 07:50:06
    JAN 4
    [DoS Attack: RST Scan] from source: 114.245.222.112, port 62447, Friday, January 04,2013 23:50:54
    [DoS Attack: RST Scan] from source: 74.73.110.114, port 56968, Friday, January 04,2013 22:48:08
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 60089, Friday, January 04,2013 22:43:40
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 60088, Friday, January 04,2013 22:43:36
    [DoS Attack: RST Scan] from source: 83.108.43.143, port 24224, Friday, January 04,2013 20:44:08
    [DoS Attack: RST Scan] from source: 151.29.5.193, port 11397, Friday, January 04,2013 19:56:09
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 57013, Friday, January 04,2013 18:43:46
    [DoS Attack: RST Scan] from source: 24.18.228.201, port 8713, Friday, January 04,2013 18:37:12
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 56055, Friday, January 04,2013 18:18:48
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 57808, Friday, January 04,2013 18:15:36
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 32827, Friday, January 04,2013 18:13:24
    [DoS Attack: RST Scan] from source: 63.229.74.111, port 14183, Friday, January 04,2013 18:05:26
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 52475, Friday, January 04,2013 11:52:49
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 51591, Friday, January 04,2013 11:47:54
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 50634, Friday, January 04,2013 11:41:09
    [DoS Attack: RST Scan] from source: 59.44.121.218, port 12335, Friday, January 04,2013 09:40:04
    [DoS Attack: RST Scan] from source: 187.246.86.154, port 22936, Friday, January 04,2013 07:52:44
    [DoS Attack: RST Scan] from source: 187.246.86.154, port 22936, Friday, January 04,2013 07:39:29
    
    Mix of 13 and 14???
    [DoS Attack: ACK Scan] from source: 59.161.133.24, port 50665, Sunday, January 13,2013 15:54:45
    [DoS Attack: ACK Scan] from source: 122.148.195.34, port 53652, Monday, January 14,2013 11:26:53
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Sunday, January 13,2013 13:59:04
    [DoS Attack: RST Scan] from source: 68.49.103.12, port 60012, Sunday, January 13,2013 13:49:30
    [DoS Attack: RST Scan] from source: 24.79.205.176, port 62511, Monday, January 14,2013 11:11:33
    [DoS Attack: RST Scan] from source: 62.165.204.35, port 7659, Monday, January 14,2013 10:57:43
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 13,2013 10:32:00
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 64031, Sunday, January 13,2013 09:31:39
    [DoS Attack: RST Scan] from source: 109.163.226.89, port 80, Sunday, January 13,2013 09:00:25
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62468, Sunday, January 13,2013 07:53:44
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60887, Sunday, January 13,2013 07:34:54
    [DoS Attack: RST Scan] from source: 108.183.204.48, port 6881, Sunday, January 13,2013 07:02:30
    [DoS Attack: ACK Scan] from source: 96.20.123.149, port 60871, Sunday, January 13,2013 06:49:50
    [DoS Attack: ACK Scan] from source: 118.128.229.40, port 61342, Sunday, January 13,2013 06:18:19
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Sunday, January 13,2013 06:14:35
    [DoS Attack: RST Scan] from source: 67.42.47.173, port 13766, Sunday, January 13,2013 06:07:45
    [DoS Attack: RST Scan] from source: 112.203.92.223, port 50383, Sunday, January 13,2013 05:53:20
    [DoS Attack: ACK Scan] from source: 173.2.190.165, port 6976, Sunday, January 13,2013 05:16:20
    
    
    

    So yeah, 9th was a busy day. Other than that, nothing conclusive. And new attack types on the cards.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Just rebooted at the very end of a game of league of legends right as we turned it around. Fuming.

    MTU reduced to 1492 to see if that has any effect.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Appears to be less frequent in the last week, but still happening.


  • Registered Users Posts: 1,666 ✭✭✭charlie_says


    You really should contact UPC. I would email your logs and concerns to abuse@upc.ie and also raise a ticket with their support department, as someone maybe attacking their network.

    Also there is no harm in PMing the UPC representatives here on boards in their forum in the biz talk to forum.


  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    I've come to the conclusion they're false positives.

    Found out the other night a friend living in the same area(half a mile away) is experiencing similar issues with instability.

    UPC know of this, but as we're bridging they couldnt give a rats arse.


  • Registered Users Posts: 70 ✭✭DublinC


    Hi ED_E,

    I removed my modem from bridged mode the other day and allowed it to run its regular router functions - still experienced the issues. I called them today and a support agent was more than willing to help. He said the information on his end looked right, he tinkered with some settings and said he'd call back later to see if the issue was still there.

    It was, and now a tech is scheduled for Monday. Just give them a call.


  • Advertisement
  • Registered Users Posts: 36,164 ✭✭✭✭ED E


    Been through all that already :pac:


Advertisement