Gynko 0 Posted ... These last month, i am experiencing problem almost everytime i use airvpn.Everything was ok until now, and i have been a airvpn customer since more than a year. My config did not change really, apart from installing the last client i guess. What happens:I start airvpn, i start downloading stuff. Some time after, i lose the connection. I have then to restart my router, or reboot, or both. I don't know where to look for the fault.Point is this does not happen when i don't use airvpn. Now the funny things is that i recommended airvpn to my sister, so she bought it and started using it.She just told me she started having the same losses of connection as me, so i am wondering if all this could be related? thanks in advance Quote Share this post Link to post
zhang888 1066 Posted ... Hello,You can only get meaningful help if you submit your OpenVPN logs, and optionally router system logs. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
Gynko 0 Posted ... Thank you for your answer.I found where to get logs on my netgear wnr2000v3, though which are the relevant items to provide?here is what i have:Attempted access to allowed sitesAttempted access to blocked sites and servicesConnections to the Web-based interface of this RouterRouter operation (startup, get time etc)Known DoS attacks and Port ScansPort Forwarding / Port TriggeringWireless accessTurn off wireless signal by schedule Quote Share this post Link to post
go558a83nk 364 Posted ... are you using your router as the openvpn client? Quote Share this post Link to post
Gynko 0 Posted ... hem, I use the Windows 8.1 airvpn software on my 2 machines to connect to the vpn servers.Not sure if that answers your question ^^ Quote Share this post Link to post
go558a83nk 364 Posted ... hem, I use the Windows 8.1 airvpn software on my 2 machines to connect to the vpn servers.Not sure if that answers your question ^^ well, then it would be important to see the logs from the eddie application. Quote Share this post Link to post
Gynko 0 Posted ... So i connect to a server, and at some point i lose the connection: I 2015.06.21 22:01:39 - AirVPN client version: 2.9.2, System: Windows, Name: Microsoft Windows NT 6.2.9200.0, Architecture: x64. 2015.06.21 22:01:39 - Reading options from C:\Program Files\AirVPN\AirVPN.xml. 2015.06.21 22:01:39 - Data Path: C:\Program Files\AirVPN. 2015.06.21 22:01:39 - App Path: C:\Program Files\AirVPN. 2015.06.21 22:01:39 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2015.06.21 22:01:39 - Command line arguments (0):. 2015.06.21 22:01:39 - Operating System: Microsoft Windows NT 6.2.9200.0. 2015.06.21 22:01:39 - Updating systems & servers data .... 2015.06.21 22:01:40 - Systems & servers data update completedI 2015.06.21 22:01:41 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2015.06.21 22:01:41 - OpenVPN - Version: OpenVPN 2.3.6 (C:\Program Files\AirVPN\openvpn.exe)I 2015.06.21 22:01:41 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2015.06.21 22:01:41 - SSL - Version: stunnel 5.09 (C:\Program Files\AirVPN\stunnel.exe)! 2015.06.21 22:01:41 - ReadyI 2015.06.21 22:01:53 - Session starting.I 2015.06.21 22:01:53 - IPv6 disabled.I 2015.06.21 22:01:53 - Checking authorization ...! 2015.06.21 22:01:54 - Connecting to Gienah (Netherlands, Alblasserdam). 2015.06.21 22:01:54 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015. 2015.06.21 22:01:54 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.06.21 22:01:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.06.21 22:01:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.06.21 22:01:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.06.21 22:01:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.06.21 22:01:54 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]. 2015.06.21 22:01:54 - OpenVPN > UDPv4 link local: [undef]. 2015.06.21 22:01:54 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443. 2015.06.21 22:01:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=2b815692 aebb4d6b. 2015.06.21 22:01:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.06.21 22:01:55 - OpenVPN > Validating certificate key usage. 2015.06.21 22:01:55 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.06.21 22:01:55 - OpenVPN > VERIFY KU OK. 2015.06.21 22:01:55 - OpenVPN > Validating certificate extended key usage. 2015.06.21 22:01:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.06.21 22:01:55 - OpenVPN > VERIFY EKU OK. 2015.06.21 22:01:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.06.21 22:01:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.06.21 22:01:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.06.21 22:01:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.06.21 22:01:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.06.21 22:01:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.06.21 22:01:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443. 2015.06.21 22:01:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.06.21 22:02:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.141 255.255.0.0'. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.06.21 22:02:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.06.21 22:02:01 - OpenVPN > open_tun, tt->ipv6=0. 2015.06.21 22:02:01 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4D01F80D-684C-4FED-A2E8-977B00B8BAAD}.tap. 2015.06.21 22:02:01 - OpenVPN > TAP-Windows Driver Version 9.21. 2015.06.21 22:02:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.141/255.255.0.0 [sUCCEEDED]. 2015.06.21 22:02:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.141/255.255.0.0 on interface {4D01F80D-684C-4FED-A2E8-977B00B8BAAD} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2015.06.21 22:02:01 - OpenVPN > Successful ARP Flush on interface [10] {4D01F80D-684C-4FED-A2E8-977B00B8BAAD}. 2015.06.21 22:02:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.93 MASK 255.255.255.255 192.168.1.1. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 6. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.06.21 22:02:06 - Starting Management Interface. 2015.06.21 22:02:06 - OpenVPN > Initialization Sequence CompletedI 2015.06.21 22:02:06 - DNS of a network adapter forced (Realtek 8821AE Wireless LAN 802.11ac PCI-E NIC)I 2015.06.21 22:02:06 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2015.06.21 22:02:06 - Flushing DNSI 2015.06.21 22:02:06 - Checking routeI 2015.06.21 22:02:10 - Checking DNS! 2015.06.21 22:02:15 - Connected.. 2015.06.21 22:02:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2015.06.21 22:02:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2015.06.21 22:07:31 - OpenVPN > Authenticate/Decrypt packet error: packet HMAC authentication failed Quote Share this post Link to post
zhang888 1066 Posted ... The log doesn't include anything that can be directly related to OpenVPN or anything else.Just an initiation of a normal connection. Did you lose the internet connection after 22:07 without any other log?A little Googling indicates that the embeded DoS attack/Port scan setting on wnr2000v3 can cause ahigh amount of false positives,https://www.google.com/search?q=wnr2000v3+dos Try to disable them and try again. This will not have a negative effect on your security. Quote Hide zhang888's signature Hide all signatures Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees. Share this post Link to post
Gynko 0 Posted ... I have indeed quite a number of them. I will try to find the way to deactivate it . Thanks ![DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Monday, June 22, 2015 07:01:16[DoS Attack: ACK Scan] from source: 107.179.62.125, port 4390, Monday, June 22, 2015 06:02:35[DoS Attack: ACK Scan] from source: 206.188.193.142, port 80, Monday, June 22, 2015 02:03:17[DoS Attack: TCP/UDP Chargen] from source: 173.242.127.147, port 51937, Monday, June 22, 2015 01:12:37[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 46363, Monday, June 22, 2015 01:06:02[DoS Attack: RST Scan] from source: 167.114.153.73, port 28787, Sunday, June 21, 2015 23:46:32[DoS Attack: ACK Scan] from source: 222.92.76.210, port 58664, Sunday, June 21, 2015 21:57:16[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Sunday, June 21, 2015 20:21:52[DoS Attack: ACK Scan] from source: 65.54.187.18, port 80, Sunday, June 21, 2015 20:01:55[DoS Attack: ACK Scan] from source: 64.4.16.209, port 80, Sunday, June 21, 2015 19:02:31[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.22, port 48782, Sunday, June 21, 2015 18:46:24[DoS Attack: ACK Scan] from source: 107.179.62.114, port 4390, Sunday, June 21, 2015 16:34:20[DoS Attack: TCP/UDP Chargen] from source: 199.101.51.51, port 37297, Sunday, June 21, 2015 14:12:26[DoS Attack: TCP/UDP Chargen] from source: 167.114.210.233, port 40363, Sunday, June 21, 2015 13:44:14[DoS Attack: ACK Scan] from source: 220.243.255.13, port 9009, Sunday, June 21, 2015 13:17:12[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 12:15:39[DoS Attack: TCP/UDP Chargen] from source: 104.255.64.116, port 50973, Sunday, June 21, 2015 12:08:10[DoS Attack: ACK Scan] from source: 220.243.255.10, port 9009, Sunday, June 21, 2015 11:31:20[DoS Attack: ACK Scan] from source: 176.57.81.3, port 80, Sunday, June 21, 2015 10:46:15[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 10:31:52[DoS Attack: RST Scan] from source: 93.158.221.132, port 4390, Sunday, June 21, 2015 10:23:51[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 10:23:10[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 09:48:38[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 09:38:41[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Sunday, June 21, 2015 08:56:00[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.21, port 41933, Sunday, June 21, 2015 07:56:18[DoS Attack: ACK Scan] from source: 208.64.121.138, port 10110, Sunday, June 21, 2015 06:56:44[DoS Attack: RST Scan] from source: 192.99.74.196, port 25565, Sunday, June 21, 2015 00:52:46[DoS Attack: TCP/UDP Chargen] from source: 104.255.64.116, port 45683, Saturday, June 20, 2015 22:26:22[DoS Attack: RST Scan] from source: 198.27.68.153, port 80, Saturday, June 20, 2015 21:24:35[DoS Attack: ACK Scan] from source: 65.52.108.205, port 443, Saturday, June 20, 2015 18:55:34[DoS Attack: ACK Scan] from source: 207.46.26.11, port 80, Saturday, June 20, 2015 18:50:18[DoS Attack: RST Scan] from source: 219.158.69.69, port 51242, Saturday, June 20, 2015 18:41:53[DoS Attack: TCP/UDP Chargen] from source: 91.205.173.59, port 50016, Saturday, June 20, 2015 13:32:54[DoS Attack: ACK Scan] from source: 107.179.62.125, port 4390, Saturday, June 20, 2015 10:49:52[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 56815, Saturday, June 20, 2015 09:55:01[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.37, port 36179, Saturday, June 20, 2015 08:44:08[DoS Attack: TCP/UDP Chargen] from source: 104.255.71.251, port 46689, Saturday, June 20, 2015 06:31:09[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Saturday, June 20, 2015 05:37:16[DoS Attack: TCP/UDP Chargen] from source: 173.242.127.147, port 53250, Saturday, June 20, 2015 04:43:44[DoS Attack: ACK Scan] from source: 66.150.54.19, port 7171, Saturday, June 20, 2015 04:14:59[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.17, port 43836, Saturday, June 20, 2015 03:15:55[DoS Attack: ACK Scan] from source: 212.224.120.25, port 12080, Friday, June 19, 2015 19:26:53[DoS Attack: ACK Scan] from source: 65.54.187.17, port 80, Friday, June 19, 2015 18:27:33[DoS Attack: RST Scan] from source: 5.196.92.174, port 22, Friday, June 19, 2015 16:24:21[DoS Attack: RST Scan] from source: 37.187.137.195, port 80, Friday, June 19, 2015 15:18:26[DoS Attack: TCP/UDP Chargen] from source: 104.255.69.6, port 38642, Friday, June 19, 2015 15:13:34[DoS Attack: ACK Scan] from source: 220.243.255.9, port 9010, Friday, June 19, 2015 14:07:03[DoS Attack: RST Scan] from source: 198.50.162.9, port 24351, Friday, June 19, 2015 10:28:19[DoS Attack: RST Scan] from source: 5.135.9.44, port 19587, Friday, June 19, 2015 05:24:46[DoS Attack: TCP/UDP Chargen] from source: 178.239.62.104, port 55407, Thursday, June 18, 2015 23:35:31[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 23:11:22[DoS Attack: TCP/UDP Chargen] from source: 5.135.6.27, port 48353, Thursday, June 18, 2015 23:02:38[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 20:11:17[DoS Attack: ACK Scan] from source: 194.132.198.227, port 4070, Thursday, June 18, 2015 19:22:36[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 18:44:10[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 46152, Thursday, June 18, 2015 18:36:25[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 18:31:17[DoS Attack: ACK Scan] from source: 65.54.187.18, port 80, Thursday, June 18, 2015 18:05:42[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 17:14:47[DoS Attack: ACK Scan] from source: 107.179.62.111, port 3297, Thursday, June 18, 2015 16:51:51[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 16:40:03[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 14:57:56[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 13:37:11[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 11:30:59[DoS Attack: ACK Scan] from source: 65.55.54.39, port 80, Thursday, June 18, 2015 10:53:04[DoS Attack: ACK Scan] from source: 27.125.204.53, port 22, Thursday, June 18, 2015 10:46:15[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 10:39:41[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Thursday, June 18, 2015 09:58:51[DoS Attack: RST Scan] from source: 188.27.226.78, port 30810, Thursday, June 18, 2015 09:55:30[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 09:22:39[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.49, port 36081, Thursday, June 18, 2015 08:45:28[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Thursday, June 18, 2015 08:22:39[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Thursday, June 18, 2015 08:00:06[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 07:55:40[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 05:47:23[DoS Attack: TCP/UDP Echo] from source: 95.213.131.236, port 80, Thursday, June 18, 2015 05:44:13[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 02:22:57[DoS Attack: ACK Scan] from source: 207.46.26.10, port 80, Wednesday, June 17, 2015 17:54:07[DoS Attack: ACK Scan] from source: 107.179.62.111, port 3297, Wednesday, June 17, 2015 10:45:38[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Wednesday, June 17, 2015 10:00:39[DoS Attack: ACK Scan] from source: 157.55.44.107, port 443, Wednesday, June 17, 2015 10:00:34[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Wednesday, June 17, 2015 10:00:08[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Wednesday, June 17, 2015 09:25:54[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.5, port 36543, Wednesday, June 17, 2015 09:21:31[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Wednesday, June 17, 2015 08:27:43[DoS Attack: ACK Scan] from source: 107.179.62.111, port 4390, Wednesday, June 17, 2015 08:07:16[DoS Attack: RST Scan] from source: 108.160.173.162, port 443, Wednesday, June 17, 2015 08:02:55[DoS Attack: RST Scan] from source: 104.28.8.47, port 80, Wednesday, June 17, 2015 07:50:04[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Wednesday, June 17, 2015 07:05:47[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Wednesday, June 17, 2015 06:51:08[DoS Attack: RST Scan] from source: 108.160.172.193, port 443, Wednesday, June 17, 2015 06:47:47[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.22, port 35302, Wednesday, June 17, 2015 00:14:46[DoS Attack: RST Scan] from source: 151.80.140.213, port 411, Tuesday, June 16, 2015 23:24:07[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 53413, Tuesday, June 16, 2015 21:53:51[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 20:34:19[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 19:44:35[DoS Attack: RST Scan] from source: 104.28.28.85, port 80, Tuesday, June 16, 2015 18:59:55[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 18:53:25[DoS Attack: RST Scan] from source: 45.58.74.1, port 443, Tuesday, June 16, 2015 18:38:43[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 17:59:05[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Tuesday, June 16, 2015 17:36:48[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 17:27:54[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 17:01:13[DoS Attack: TCP/UDP Chargen] from source: 5.135.6.27, port 39855, Tuesday, June 16, 2015 16:47:41[DoS Attack: ACK Scan] from source: 65.55.54.39, port 80, Tuesday, June 16, 2015 16:18:27[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 16:15:36[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Tuesday, June 16, 2015 16:12:52 Quote Share this post Link to post