I was experiencing major drops in my performance 2 weeks ago, contacted my ISP & they advised it was resolved.
One week ago, the connection suddenly dropped completely & this happened several times consistently for the following days - checked the security logs & found the following.
Please let me know what you think it might be as the ISP can't help me.
Nearly every single source IP is malicious as <Mod Edit >all getout, using online tools to search them up you'll find the same thing, people reporting them for mass port scanning and attempting to gain access. You might look at this and think it's a plain and obvious, apologies if this seems dragged out or dramatised.
I personally believe it's a botnet or something like that - i'm just interested to see how this operates and what it is tbh
Important details:
Reset router several times to factory default
Updated router software accordingly and in-line with most recent updates
Thoroughly checked all connected devices to the network for malware
Router is a Zyxel VMG8825-T50
These scans have been consistent for days now, every few minutes another scan/attack is activated
One week ago, the connection suddenly dropped completely & this happened several times consistently for the following days - checked the security logs & found the following.
Please let me know what you think it might be as the ISP can't help me.
6 | Sep 14 12:53:38 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=223.16.182.68 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=57430 PROTO=TCP SPT=29211 DPT=56984 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=41404 |
7 | Sep 14 12:07:23 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=65.49.136.67 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=55816 PROTO=TCP SPT=60724 DPT=34797 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=65462 |
8 | Sep 14 11:52:42 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=71.187.201.219 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=55 ID=31988 PROTO=TCP SPT=42173 DPT=27002 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=6043 |
9 | Sep 14 11:02:39 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=113.197.177.216 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=28456 PROTO=TCP SPT=42296 DPT=25019 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=38816 |
10 | Sep 14 10:05:39 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=157.14.229.204 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=47547 PROTO=TCP SPT=42525 DPT=48455 WINDOW=0 RES=0x00 URGP=0 |
11 | Sep 14 09:53:15 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=223.16.182.68 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=29586 PROTO=TCP SPT=11487 DPT=16375 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=36848 |
12 | Sep 14 09:41:44 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=46.214.76.245 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=16218 PROTO=TCP SPT=33936 DPT=28742 WINDOW=0 RES=0x00 URGP=0 |
13 | Sep 14 08:27:54 | kern | alert | attack | kernel: UDP_FLOODING ATTACK:IN=ppp2 OUT= MAC= SRC=5.189.160.241 DST=myip LEN=440 TOS=0x00 PREC=0x00 TTL=57 ID=15247 PROTO=UDP SPT=5113 DPT=5063 LEN=420 |
14 | Sep 14 07:49:53 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=112.118.87.136 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=53 ID=1915 PROTO=TCP SPT=15208 DPT=54551 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=22641 |
15 | Sep 14 07:21:57 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=59.149.106.163 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=10894 PROTO=TCP SPT=56295 DPT=50755 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=64421 |
16 | Sep 14 06:47:47 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=136.143.148.173 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=51 ID=53185 PROTO=TCP SPT=65229 DPT=27124 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=26407 |
17 | Sep 14 06:33:10 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=86.98.62.46 DST= myip LEN=60 TOS=0x00 PREC=0x00 TTL=56 ID=20228 PROTO=TCP SPT=49971 DPT=53532 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=14270 |
18 | Sep 14 06:33:01 | kern | alert | attack | kernel: TCP PORT SCAN ATTACK:IN=ppp2 OUT= MAC= SRC=223.16.47.176 DST=myip LEN=60 TOS=0x00 PREC=0x00 TTL=50 ID=11087 PROTO=TCP SPT=29072 DPT=46834 WINDOW=0 RES=0x00 URG ACK PSH RST SYN FIN URGP=57895 |
Nearly every single source IP is malicious as <Mod Edit >all getout, using online tools to search them up you'll find the same thing, people reporting them for mass port scanning and attempting to gain access. You might look at this and think it's a plain and obvious, apologies if this seems dragged out or dramatised.
I personally believe it's a botnet or something like that - i'm just interested to see how this operates and what it is tbh
Important details:
Reset router several times to factory default
Updated router software accordingly and in-line with most recent updates
Thoroughly checked all connected devices to the network for malware
Router is a Zyxel VMG8825-T50
These scans have been consistent for days now, every few minutes another scan/attack is activated
Last edited by a moderator: