Jump to content

Keith

NPG Early Access
  • Posts

    73
  • Joined

  • Last visited

About Keith

Basic Info

  • Gender
    Male
  • Location
    West Michigan
  • DumaOS Routers Owned
    Netduma R1
    EE WiFi Enhancer

Recent Profile Visitors

4,160 profile views
  1. I am having download speed issues as well. I pay for 1100/200 Mbps and I'm only getting 150/??. Set-up: Xfinity XB7-T with R3 (.41) in DMZ. PS5 to R3, wired and in DMZ. Will start speedtest on both R3 and PS5. On R3 the speed rolls to 200Mbps then throttles to 150 and persists thereafter. Same while monitoring network traffic while downloading file on PS5. I disabled Smartboost and same results. I disabled Smartboost and Ping Optimizer/Steady Ping and the PS5 os speedtest showed 830Mbps and 11.5 Better, but that upload is not great. Any suggestions?
  2. Thanks for the info! Where do I locate the firmware, apologies if I overlooked it.
  3. Been lurking. I am having issues with servers being allowed outside of my polygon sets in the geofilter. Can I have the firmware that might fix this issue?
  4. Thanks for the feedback! @Netduma Fraser Please actually sleep too!
  5. Hi! I am wondering what the ETA is for the VPN support on the R3? I haven't opened my R3 yet, I am waiting on more stable firmware and the VPN support too.
  6. Thanks for the suggestions Fraser. I do not have the block traffic enabled. Waiting for the connection to stabilize has been my go-to solution, but last night it was constantly doing disconnects after the initial 1st one with and without power cycling the ps5 and router. That is why I did a factory reset.
  7. Sorry Fraser, but the times in the vpn log are not using the appropriate time zone, but these were all this morning with 3 disconnects
  8. The issue has been happening for a while now, but last night it was constantly happening, not just the one time then fine. Not sure where the vpn logs are located
  9. [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 11:21:44 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 11:21:44 [admin login] from source 192.168.88.100, Friday, May 06, 2022 11:20:22 [admin login] from source 192.168.88.100, Friday, May 06, 2022 11:20:13 [admin login] from source 192.168.88.100, Friday, May 06, 2022 11:20:10 [DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 58636, Friday, May 06, 2022 11:10:44 [admin login] from source 192.168.88.100, Friday, May 06, 2022 11:08:10 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 11:07:45 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 11:07:45 [DumaOS] DHCP lease change., Friday, May 06, 2022 11:03:21 [DumaOS] DHCP new event., Friday, May 06, 2022 11:03:21 [DHCP IP: 192.168.88.102] to MAC address 8c:ea:48:31:7c:f0, Friday, May 06, 2022 11:03:21 [DumaOS] DHCP lease change., Friday, May 06, 2022 11:03:20 [DHCP IP: 192.168.88.102] to MAC address 8c:ea:48:31:7c:f0, Friday, May 06, 2022 11:03:20 [DoS Attack: TCP/UDP Chargen] from source: 128.14.141.45, port 56706, Friday, May 06, 2022 10:49:32 [DoS Attack: TCP/UDP Echo] from source: 128.14.141.45, port 57773, Friday, May 06, 2022 10:47:27 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 10:23:19 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 10:23:19 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 10:03:41 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 10:03:41 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 09:50:18 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 09:50:18 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 09:37:55 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 09:37:55 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 09:37:55 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 09:37:55 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 09:29:34 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 09:29:34 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 08:42:13 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 08:42:13 [Time synchronized with NTP server] Friday, May 06, 2022 08:26:31 [admin login] from source 192.168.88.100, Friday, May 06, 2022 08:20:38 [DoS Attack: ACK Scan] from source: 52.96.191.226, port 443, Friday, May 06, 2022 08:11:44 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:45 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:44 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:43 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:42 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:41 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:40 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:39 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:38 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:37 [DoS Attack: ACK Scan] from source: 155.133.253.50, port 27030, Friday, May 06, 2022 08:05:36 [DumaOS] DHCP lease change., Friday, May 06, 2022 08:04:04 [DumaOS] DHCP new event., Friday, May 06, 2022 08:04:04 [DHCP IP: 192.168.88.100] to MAC address e8:9e:b4:23:dd:e3, Friday, May 06, 2022 08:04:04 [DoS Attack: ACK Scan] from source: 3.219.43.118, port 443, Friday, May 06, 2022 08:03:04 [DoS Attack: ACK Scan] from source: 3.219.43.118, port 443, Friday, May 06, 2022 08:02:29 [DoS Attack: ACK Scan] from source: 3.219.43.118, port 443, Friday, May 06, 2022 08:02:12 [DoS Attack: ACK Scan] from source: 52.96.190.226, port 443, Friday, May 06, 2022 08:02:08 [DoS Attack: ACK Scan] from source: 52.96.164.146, port 443, Friday, May 06, 2022 07:50:07 [DoS Attack: ACK Scan] from source: 52.96.164.146, port 443, Friday, May 06, 2022 07:50:07 [DoS Attack: ACK Scan] from source: 104.244.42.2, port 443, Friday, May 06, 2022 07:41:34 [DoS Attack: ACK Scan] from source: 209.237.200.128, port 443, Friday, May 06, 2022 07:41:33 [DoS Attack: ACK Scan] from source: 104.244.42.2, port 443, Friday, May 06, 2022 07:41:02 [DoS Attack: ACK Scan] from source: 209.237.200.128, port 443, Friday, May 06, 2022 07:41:02 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 07:37:26 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 07:37:26 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 07:33:52 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 07:33:52 [DumaOS] The selected theme does not exist: 'default', Friday, May 06, 2022 07:27:39 [DumaOS] Theme path does match manifest 'default', Friday, May 06, 2022 07:27:39 [DumaOS] Cloudsync Themes result 'false','All mirrors are down', Friday, May 06, 2022 07:27:39 [DumaOS] Cloudsync DPI result 'nil','failed to sync', Friday, May 06, 2022 07:27:38 [DumaOS] Cloudsync DPI 'skipping mirror', Friday, May 06, 2022 07:27:38 [DumaOS] Cloudsync DPI 'HTTP sync failed', Friday, May 06, 2022 07:27:38 [DumaOS] HTTP download failed with code '404', Friday, May 06, 2022 07:27:38 [Internet connected] IP address: 192.168.1.15, Friday, May 06, 2022 07:27:21 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 07:09:58 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 07:09:58
  10. Is this some shady stuff? Only VPN PS5
  11. [DoS Attack: TCP/UDP Chargen] from source: 185.94.111.1, port 58636, Friday, May 06, 2022 11:10:44 [admin login] from source 192.168.88.100, Friday, May 06, 2022 11:08:10 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 11:07:45 [DoS Attack: ACK Scan] from source: 185.151.107.102, port 443, Friday, May 06, 2022 11:07:45 [DumaOS] DHCP lease change., Friday, May 06, 2022 11:03:21 [DumaOS] DHCP new event., Friday, May 06, 2022 11:03:21 [DHCP IP: 192.168.88.102] to MAC address 8c:ea:48:31:7c:f0, Friday, May 06, 2022 11:03:21 [DumaOS] DHCP lease change., Friday, May 06, 2022 11:03:20 [DHCP IP: 192.168.88.102] to MAC address 8c:ea:48:31:7c:f0, Friday, May 06, 2022 11:03:20 [DoS Attack: TCP/UDP Chargen] from source: 128.14.141.45, port 56706, Friday, May 06, 2022 10:49:32 [DoS Attack: TCP/UDP Echo] from source: 128.14.141.45, port 57773, Friday, May 06, 2022 10:47:27 [DoS Attack: ACK Scan] from source: 185.151.107.101, port 443, Friday, May 06, 2022 10:23:19
×
×
  • Create New...