Vraag

Ddos aanval kpn netwerk thuis

  • 18 March 2019
  • 1 reactie
  • 187 keer bekeken

Ik heb een probleem en vraag hulp.

Ik krijg deze melding wat zich blijft herhalen waardoor me internet sloom kan zijn.

03/18/2019 19:12:27 sending ACK to 192.168.2.17
03/18/2019 19:12:27 sending ACK to 192.168.2.17
03/18/2019 19:08:14 192.168.2.14 login success
03/18/2019 19:08:11 192.168.2.14 login fail
03/18/2019 19:01:53 sending ACK to 192.168.2.14
03/18/2019 18:54:33 Wireless 50:5B:C2:DE:1A:37 released
03/18/2019 18:45:46 sending ACK to 192.168.2.6
03/18/2019 18:45:34 sending ACK to 192.168.2.2
03/18/2019 18:30:46 sending ACK to 192.168.2.14
03/18/2019 18:30:12 Wireless 50:5B:C2:DE:1A:37 released
03/18/2019 18:29:48 sending ACK to 192.168.2.14
03/18/2019 18:29:32 Wireless 50:5B:C2:DE:1A:37 released
03/18/2019 18:29:05 **ICMP TimeStamp request** 86.243.201.84->> 86.81.133.143, Type:13, Code:0 (from PPPoE1 Inbound)
03/18/2019 18:26:32 Wireless 80:1F:02:9E:3C:88 released
03/18/2019 18:25:53 sending ACK to 192.168.2.14
03/18/2019 18:09:00 sending OFFER to 192.168.2.15
03/18/2019 18:09:00 sending OFFER to 192.168.2.15
03/18/2019 18:09:00 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:08:18 sending OFFER to 192.168.2.15
03/18/2019 18:06:54 sending OFFER to 192.168.2.15
03/18/2019 18:06:54 sending OFFER to 192.168.2.15
03/18/2019 18:06:54 sending OFFER to 192.168.2.15
03/18/2019 18:06:48 sending OFFER to 192.168.2.15
03/18/2019 18:06:48 sending OFFER to 192.168.2.15
03/18/2019 18:06:48 sending OFFER to 192.168.2.15
03/18/2019 18:06:47 sending ACK to 192.168.2.15
03/18/2019 18:06:41 sending ACK to 192.168.2.15
03/18/2019 18:06:41 sending OFFER to 192.168.2.15
03/18/2019 18:06:36 sending OFFER to 192.168.2.15
03/18/2019 18:06:14 **Vecna Scan** 192.168.2.25, 55863->> 37.252.172.40, 443 (from PPPoE1 Outbound)
03/18/2019 18:06:14 **Vecna Scan** 192.168.2.25, 55920->> 148.251.87.142, 443 (from PPPoE1 Outbound)
03/18/2019 18:06:14 **Vecna Scan** 192.168.2.25, 55907->> 205.185.216.42, 443 (from PPPoE1 Outbound)
03/18/2019 18:06:14 **Vecna Scan** 192.168.2.25, 55885->> 34.250.41.215, 443 (from PPPoE1 Outbound)
03/18/2019 18:06:13 **Vecna Scan** 192.168.2.25, 55827->> 17.252.43.246, 443 (from PPPoE1 Outbound)
03/18/2019 18:06:13 **Vecna Scan** 192.168.2.25, 55883->> 185.86.137.32, 443 (from PPPoE1 Outbound)
03/18/2019 18:04:32 Wireless D8:5D:E2:98:FD:E3 released
03/18/2019 17:37:52 Wireless 50:5B:C2:DE:1A:37 released
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58627->> 52.218.48.156, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 50316->> 185.33.223.200, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 50308->> 185.33.223.203, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58646->> 46.228.164.11, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 50265->> 52.29.212.156, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58812->> 8.41.222.150, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 50248->> 18.153.11.20, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58659->> 34.239.73.114, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58564->> 46.137.100.137, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58572->> 107.23.98.143, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58796->> 185.86.137.43, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58582->> 95.101.194.150, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58581->> 63.215.202.140, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58626->> 84.22.111.17, 443 (from PPPoE1 Outbound)
03/18/2019 17:35:35 **TCP FIN Scan** 192.168.2.14, 58637->> 202.241.208.54, 443 (from PPPoE1 Outbound)
03/18/2019 17:28:48 sending ACK to 192.168.2.14
03/18/2019 17:17:33 sending ACK to 192.168.2.14
03/18/2019 17:11:58 sending ACK to 192.168.2.18
03/18/2019 17:11:54 sending ACK to 192.168.2.18
03/18/2019 17:11:52 sending ACK to 192.168.2.18
03/18/2019 17:11:50 sending ACK to 192.168.2.18
03/18/2019 17:11:49 sending ACK to 192.168.2.18
03/18/2019 16:50:11 Wireless 50:5B:C2:DE:1A:37 released
03/18/2019 16:30:31 sending ACK to 192.168.2.14
03/18/2019 16:29:40 sending ACK to 192.168.2.19
03/18/2019 16:29:39 sending ACK to 192.168.2.19
03/18/2019 16:29:38 sending OFFER to 192.168.2.19
03/18/2019 16:29:36 sending OFFER to 192.168.2.19
03/18/2019 16:29:32 sending ACK to 192.168.2.19
03/18/2019 16:29:30 sending ACK to 192.168.2.19
03/18/2019 16:29:28 sending ACK to 192.168.2.19

Kan iemand mij ondersteunen hoe ik dit kan bestrijden,

MvG

Wilco

Dit topic is gesloten. Staat je antwoord hier niet bij, gebruik dan de zoekfunctie van de Community of stel je vraag in een nieuw topic.

1 reactie

Staan er in je modem aanvallen geregistreerd?