Jump to content
Not connected, Your IP: 18.190.219.65

Recommended Posts

These last month, i am experiencing problem almost everytime i use airvpn.

Everything was ok until now, and i have been a airvpn customer since more than a year.

 

My config did not change really, apart from installing the last client i guess.

 

What happens:

I start airvpn, i start downloading stuff. Some time after, i lose the connection. I have then to restart my router, or reboot, or both. I don't know where to look for the fault.

Point is this does not happen when i don't use airvpn.

 

Now the funny things is that i recommended airvpn to my sister, so she bought it and started using it.

She just told me she started having the same losses of connection as me, so i am wondering if all this could be related?

 

thanks in advance

Share this post


Link to post

Thank you for your answer.

I found where to get logs on my netgear wnr2000v3, though which are the relevant items to provide?

here is what i have:

Attempted access to allowed sites

Attempted access to blocked sites and services

Connections to the Web-based interface of this Router

Router operation (startup, get time etc)

Known DoS attacks and Port Scans

Port Forwarding / Port Triggering

Wireless access

Turn off wireless signal by schedule

Share this post


Link to post

hem, I use the Windows 8.1 airvpn software on my 2 machines to connect to the vpn servers.

Not sure if that answers your question ^^

Share this post


Link to post

hem, I use the Windows 8.1 airvpn software on my 2 machines to connect to the vpn servers.

Not sure if that answers your question ^^

 

well, then it would be important to see the logs from the eddie application.

Share this post


Link to post
So i connect to a server, and at some point i lose the connection:

 

I 2015.06.21 22:01:39 - AirVPN client version: 2.9.2, System: Windows, Name: Microsoft Windows NT 6.2.9200.0, Architecture: x64

. 2015.06.21 22:01:39 - Reading options from C:\Program Files\AirVPN\AirVPN.xml

. 2015.06.21 22:01:39 - Data Path: C:\Program Files\AirVPN

. 2015.06.21 22:01:39 - App Path: C:\Program Files\AirVPN

. 2015.06.21 22:01:39 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe

. 2015.06.21 22:01:39 - Command line arguments (0):

. 2015.06.21 22:01:39 - Operating System: Microsoft Windows NT 6.2.9200.0

. 2015.06.21 22:01:39 - Updating systems & servers data ...

. 2015.06.21 22:01:40 - Systems & servers data update completed

I 2015.06.21 22:01:41 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1

I 2015.06.21 22:01:41 - OpenVPN - Version: OpenVPN 2.3.6 (C:\Program Files\AirVPN\openvpn.exe)

I 2015.06.21 22:01:41 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)

I 2015.06.21 22:01:41 - SSL - Version: stunnel 5.09 (C:\Program Files\AirVPN\stunnel.exe)

! 2015.06.21 22:01:41 - Ready

I 2015.06.21 22:01:53 - Session starting.

I 2015.06.21 22:01:53 - IPv6 disabled.

I 2015.06.21 22:01:53 - Checking authorization ...

! 2015.06.21 22:01:54 - Connecting to Gienah (Netherlands, Alblasserdam)

. 2015.06.21 22:01:54 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015

. 2015.06.21 22:01:54 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08

. 2015.06.21 22:01:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2015.06.21 22:01:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2015.06.21 22:01:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.06.21 22:01:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.06.21 22:01:54 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]

. 2015.06.21 22:01:54 - OpenVPN > UDPv4 link local: [undef]

. 2015.06.21 22:01:54 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.93:443

. 2015.06.21 22:01:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.93:443, sid=2b815692 aebb4d6b

. 2015.06.21 22:01:55 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2015.06.21 22:01:55 - OpenVPN > Validating certificate key usage

. 2015.06.21 22:01:55 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2015.06.21 22:01:55 - OpenVPN > VERIFY KU OK

. 2015.06.21 22:01:55 - OpenVPN > Validating certificate extended key usage

. 2015.06.21 22:01:55 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2015.06.21 22:01:55 - OpenVPN > VERIFY EKU OK

. 2015.06.21 22:01:55 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2015.06.21 22:01:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.06.21 22:01:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.06.21 22:01:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.06.21 22:01:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.06.21 22:01:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2015.06.21 22:01:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.93:443

. 2015.06.21 22:01:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2015.06.21 22:02:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.2.141 255.255.0.0'

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: route options modified

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: route-related options modified

. 2015.06.21 22:02:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2015.06.21 22:02:01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2015.06.21 22:02:01 - OpenVPN > open_tun, tt->ipv6=0

. 2015.06.21 22:02:01 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{4D01F80D-684C-4FED-A2E8-977B00B8BAAD}.tap

. 2015.06.21 22:02:01 - OpenVPN > TAP-Windows Driver Version 9.21

. 2015.06.21 22:02:01 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.2.141/255.255.0.0 [sUCCEEDED]

. 2015.06.21 22:02:01 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.2.141/255.255.0.0 on interface {4D01F80D-684C-4FED-A2E8-977B00B8BAAD} [DHCP-serv: 10.4.255.254, lease-time: 31536000]

. 2015.06.21 22:02:01 - OpenVPN > Successful ARP Flush on interface [10] {4D01F80D-684C-4FED-A2E8-977B00B8BAAD}

. 2015.06.21 22:02:06 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up

. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.93 MASK 255.255.255.255 192.168.1.1

. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 6

. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.06.21 22:02:06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1

. 2015.06.21 22:02:06 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2015.06.21 22:02:06 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.06.21 22:02:06 - Starting Management Interface

. 2015.06.21 22:02:06 - OpenVPN > Initialization Sequence Completed

I 2015.06.21 22:02:06 - DNS of a network adapter forced (Realtek 8821AE Wireless LAN 802.11ac PCI-E NIC)

I 2015.06.21 22:02:06 - DNS of a network adapter forced (TAP-Windows Adapter V9)

I 2015.06.21 22:02:06 - Flushing DNS

I 2015.06.21 22:02:06 - Checking route

I 2015.06.21 22:02:10 - Checking DNS

! 2015.06.21 22:02:15 - Connected.

. 2015.06.21 22:02:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2015.06.21 22:02:15 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2015.06.21 22:07:31 - OpenVPN > Authenticate/Decrypt packet error: packet HMAC authentication failed

Share this post


Link to post

The log doesn't include anything that can be directly related to OpenVPN or anything else.

Just an initiation of a normal connection.

 

Did you lose the internet connection after 22:07 without any other log?

A little Googling indicates that the embeded DoS attack/Port scan setting on wnr2000v3 can cause a

high amount of false positives,

https://www.google.com/search?q=wnr2000v3+dos

 

Try to disable them and try again. This will not have a negative effect on your security.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

I have indeed quite a number of them. I will try to find the way to deactivate it . Thanks !

[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Monday, June 22, 2015 07:01:16
[DoS Attack: ACK Scan] from source: 107.179.62.125, port 4390, Monday, June 22, 2015 06:02:35
[DoS Attack: ACK Scan] from source: 206.188.193.142, port 80, Monday, June 22, 2015 02:03:17
[DoS Attack: TCP/UDP Chargen] from source: 173.242.127.147, port 51937, Monday, June 22, 2015 01:12:37
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 46363, Monday, June 22, 2015 01:06:02
[DoS Attack: RST Scan] from source: 167.114.153.73, port 28787, Sunday, June 21, 2015 23:46:32
[DoS Attack: ACK Scan] from source: 222.92.76.210, port 58664, Sunday, June 21, 2015 21:57:16
[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Sunday, June 21, 2015 20:21:52
[DoS Attack: ACK Scan] from source: 65.54.187.18, port 80, Sunday, June 21, 2015 20:01:55
[DoS Attack: ACK Scan] from source: 64.4.16.209, port 80, Sunday, June 21, 2015 19:02:31
[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.22, port 48782, Sunday, June 21, 2015 18:46:24
[DoS Attack: ACK Scan] from source: 107.179.62.114, port 4390, Sunday, June 21, 2015 16:34:20
[DoS Attack: TCP/UDP Chargen] from source: 199.101.51.51, port 37297, Sunday, June 21, 2015 14:12:26
[DoS Attack: TCP/UDP Chargen] from source: 167.114.210.233, port 40363, Sunday, June 21, 2015 13:44:14
[DoS Attack: ACK Scan] from source: 220.243.255.13, port 9009, Sunday, June 21, 2015 13:17:12
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 12:15:39
[DoS Attack: TCP/UDP Chargen] from source: 104.255.64.116, port 50973, Sunday, June 21, 2015 12:08:10
[DoS Attack: ACK Scan] from source: 220.243.255.10, port 9009, Sunday, June 21, 2015 11:31:20
[DoS Attack: ACK Scan] from source: 176.57.81.3, port 80, Sunday, June 21, 2015 10:46:15
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 10:31:52
[DoS Attack: RST Scan] from source: 93.158.221.132, port 4390, Sunday, June 21, 2015 10:23:51
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 10:23:10
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 09:48:38
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Sunday, June 21, 2015 09:38:41
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Sunday, June 21, 2015 08:56:00
[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.21, port 41933, Sunday, June 21, 2015 07:56:18
[DoS Attack: ACK Scan] from source: 208.64.121.138, port 10110, Sunday, June 21, 2015 06:56:44
[DoS Attack: RST Scan] from source: 192.99.74.196, port 25565, Sunday, June 21, 2015 00:52:46
[DoS Attack: TCP/UDP Chargen] from source: 104.255.64.116, port 45683, Saturday, June 20, 2015 22:26:22
[DoS Attack: RST Scan] from source: 198.27.68.153, port 80, Saturday, June 20, 2015 21:24:35
[DoS Attack: ACK Scan] from source: 65.52.108.205, port 443, Saturday, June 20, 2015 18:55:34
[DoS Attack: ACK Scan] from source: 207.46.26.11, port 80, Saturday, June 20, 2015 18:50:18
[DoS Attack: RST Scan] from source: 219.158.69.69, port 51242, Saturday, June 20, 2015 18:41:53
[DoS Attack: TCP/UDP Chargen] from source: 91.205.173.59, port 50016, Saturday, June 20, 2015 13:32:54
[DoS Attack: ACK Scan] from source: 107.179.62.125, port 4390, Saturday, June 20, 2015 10:49:52
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 56815, Saturday, June 20, 2015 09:55:01
[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.37, port 36179, Saturday, June 20, 2015 08:44:08
[DoS Attack: TCP/UDP Chargen] from source: 104.255.71.251, port 46689, Saturday, June 20, 2015 06:31:09
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Saturday, June 20, 2015 05:37:16
[DoS Attack: TCP/UDP Chargen] from source: 173.242.127.147, port 53250, Saturday, June 20, 2015 04:43:44
[DoS Attack: ACK Scan] from source: 66.150.54.19, port 7171, Saturday, June 20, 2015 04:14:59
[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.17, port 43836, Saturday, June 20, 2015 03:15:55
[DoS Attack: ACK Scan] from source: 212.224.120.25, port 12080, Friday, June 19, 2015 19:26:53
[DoS Attack: ACK Scan] from source: 65.54.187.17, port 80, Friday, June 19, 2015 18:27:33
[DoS Attack: RST Scan] from source: 5.196.92.174, port 22, Friday, June 19, 2015 16:24:21
[DoS Attack: RST Scan] from source: 37.187.137.195, port 80, Friday, June 19, 2015 15:18:26
[DoS Attack: TCP/UDP Chargen] from source: 104.255.69.6, port 38642, Friday, June 19, 2015 15:13:34
[DoS Attack: ACK Scan] from source: 220.243.255.9, port 9010, Friday, June 19, 2015 14:07:03
[DoS Attack: RST Scan] from source: 198.50.162.9, port 24351, Friday, June 19, 2015 10:28:19
[DoS Attack: RST Scan] from source: 5.135.9.44, port 19587, Friday, June 19, 2015 05:24:46
[DoS Attack: TCP/UDP Chargen] from source: 178.239.62.104, port 55407, Thursday, June 18, 2015 23:35:31
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 23:11:22
[DoS Attack: TCP/UDP Chargen] from source: 5.135.6.27, port 48353, Thursday, June 18, 2015 23:02:38
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 20:11:17
[DoS Attack: ACK Scan] from source: 194.132.198.227, port 4070, Thursday, June 18, 2015 19:22:36
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 18:44:10
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 46152, Thursday, June 18, 2015 18:36:25
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 18:31:17
[DoS Attack: ACK Scan] from source: 65.54.187.18, port 80, Thursday, June 18, 2015 18:05:42
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 17:14:47
[DoS Attack: ACK Scan] from source: 107.179.62.111, port 3297, Thursday, June 18, 2015 16:51:51
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 16:40:03
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 14:57:56
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 13:37:11
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 11:30:59
[DoS Attack: ACK Scan] from source: 65.55.54.39, port 80, Thursday, June 18, 2015 10:53:04
[DoS Attack: ACK Scan] from source: 27.125.204.53, port 22, Thursday, June 18, 2015 10:46:15
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 10:39:41
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Thursday, June 18, 2015 09:58:51
[DoS Attack: RST Scan] from source: 188.27.226.78, port 30810, Thursday, June 18, 2015 09:55:30
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 09:22:39
[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.49, port 36081, Thursday, June 18, 2015 08:45:28
[DoS Attack: ACK Scan] from source: 65.55.113.7, port 80, Thursday, June 18, 2015 08:22:39
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Thursday, June 18, 2015 08:00:06
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 07:55:40
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 05:47:23
[DoS Attack: TCP/UDP Echo] from source: 95.213.131.236, port 80, Thursday, June 18, 2015 05:44:13
[DoS Attack: ACK Scan] from source: 178.20.228.44, port 80, Thursday, June 18, 2015 02:22:57
[DoS Attack: ACK Scan] from source: 207.46.26.10, port 80, Wednesday, June 17, 2015 17:54:07
[DoS Attack: ACK Scan] from source: 107.179.62.111, port 3297, Wednesday, June 17, 2015 10:45:38
[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Wednesday, June 17, 2015 10:00:39
[DoS Attack: ACK Scan] from source: 157.55.44.107, port 443, Wednesday, June 17, 2015 10:00:34
[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Wednesday, June 17, 2015 10:00:08
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Wednesday, June 17, 2015 09:25:54
[DoS Attack: TCP/UDP Chargen] from source: 74.82.47.5, port 36543, Wednesday, June 17, 2015 09:21:31
[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Wednesday, June 17, 2015 08:27:43
[DoS Attack: ACK Scan] from source: 107.179.62.111, port 4390, Wednesday, June 17, 2015 08:07:16
[DoS Attack: RST Scan] from source: 108.160.173.162, port 443, Wednesday, June 17, 2015 08:02:55
[DoS Attack: RST Scan] from source: 104.28.8.47, port 80, Wednesday, June 17, 2015 07:50:04
[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Wednesday, June 17, 2015 07:05:47
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Wednesday, June 17, 2015 06:51:08
[DoS Attack: RST Scan] from source: 108.160.172.193, port 443, Wednesday, June 17, 2015 06:47:47
[DoS Attack: TCP/UDP Chargen] from source: 198.27.124.22, port 35302, Wednesday, June 17, 2015 00:14:46
[DoS Attack: RST Scan] from source: 151.80.140.213, port 411, Tuesday, June 16, 2015 23:24:07
[DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 53413, Tuesday, June 16, 2015 21:53:51
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 20:34:19
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 19:44:35
[DoS Attack: RST Scan] from source: 104.28.28.85, port 80, Tuesday, June 16, 2015 18:59:55
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 18:53:25
[DoS Attack: RST Scan] from source: 45.58.74.1, port 443, Tuesday, June 16, 2015 18:38:43
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 17:59:05
[DoS Attack: ACK Scan] from source: 31.13.93.3, port 443, Tuesday, June 16, 2015 17:36:48
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 17:27:54
[DoS Attack: RST Scan] from source: 108.160.172.236, port 443, Tuesday, June 16, 2015 17:01:13
[DoS Attack: TCP/UDP Chargen] from source: 5.135.6.27, port 39855, Tuesday, June 16, 2015 16:47:41
[DoS Attack: ACK Scan] from source: 65.55.54.39, port 80, Tuesday, June 16, 2015 16:18:27
[DoS Attack: RST Scan] from source: 108.160.172.204, port 443, Tuesday, June 16, 2015 16:15:36
[DoS Attack: RST Scan] from source: 108.160.172.225, port 443, Tuesday, June 16, 2015 16:12:52

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...