Jump to content

Zaroo

Members
  • Content Count

    58
  • Joined

  • Last visited

About Zaroo

  • Rank
    Apprentice

Recent Profile Visitors

148 profile views
  1. I have one ping plotter test pic to nytimes.com above conducted on my labtop, but other devices were connected, if I remember correctly. Gaming on my PS4 is my priority though.
  2. Does it matter which device? If it’s okay to test any device, I would like to test my PS4. On ping plotter, it says if it has do with gaming then test a dedi. So, should I load up the game copy ip of a dedicated server and paste it on ping plotter, which is on my labtop or would that be considered two devices on the line..everything is connected wirelessly. To make sure I get this right, if I test the dedicated server ip, should I just play the game while it’s running? And should I leave it on auto or do a test run of a period of time. I apologize about all the questions. Just Want to get it right. Thanks
  3. Okay, @Netduma Jack.. I guess it just me and you. Where do I start .. what do I need to do? I guess I should start with ping plotter. Post the results to identify potential issues On what devices.. my pc connected to New York Times as I live in the US with what settings in QOS and what devices connected to the network? My PS4, connect to server ip in the game on ping plotter? I seen the guide. Do I need to run 2 tests. My head hurts. Feeling a little helpless at this point.
  4. @Killhippie If I could elect this man leader. I would. You’re feedback is outstanding and I feel like I can believe I’m what your saying afterwards. So, thanks. I’ll ignore them for now and focus on my other questions and concerns I have in in another thread. Something about my setup is just not right as it is. But I’ll see if I can get some help in my other thread. Thanks, again. You the man!
  5. I commented on a users posts pertaining Skiped spike rtt .. I’m receiving 10-20 skiped spike rtt’s at a time. As I commented in his post, I received 2 DOS Attack SYN/ACK Scans from the same sources mentioned above.
  6. I’m not sure if it’s rude or not to comment on someone elses post when you’re having a very similar issue or if I should create my own thread bc it could deflect the focus from the post creator or interfere with thier problem being fully resolved. So, please let me know now!? 😬 just trying to be kosher.. here. But these skiped spike rtt’s, I’m getting 10-20 at time here. After a laggy local game, I was checking everything out to see if a type of dos attack was presented, and my log was flooded with these. I haven’t ever noticed these or seen them until today and as Im typing this a “dos attack: syn/ack scan from the same source that’s been popping up a lot here lately just appeared. So, I’m guessing just another developer thing? But, obviously that’s not what I’m thinking.. please assist me in the right direction Edit: I posted this in my thread as it may pertain to the DOS attack thread I created here DOS attacks .. I was initially looking for feedback about the spikes until the DOS Attack appeared.
  7. The above is just partial. I had to reset everything a few times but have a few logs saved.
  8. @Netduma Jack All of my internet services just got disconnected and shut down. The ip's from the "Attacks" were a lot of the same.. I am confused now and worried. Below are right before it happened. @Killhippie [DoS Attack: SYN/ACK Scan] from source: 38.21.226.137, port 55552, Friday, March 01, 2019 12:22:05 [DumaOS] config write 'com.netdumsoftware.geofilter.settings', Friday, March 01, 2019 12:27:10 [DumaOS] config write 'com.netdumsoftware.geofilter.settings', Friday, March 01, 2019 12:27:22 [DumaOS] Cloudsync Themes result 'false','All mirrors are down', Friday, March 01, 2019 12:29:00 [DumaOS] config write 'com.netdumsoftware.geofilter.settings', Friday, March 01, 2019 12:31:14 [Time synchronized with NTP server] Friday, March 01, 2019 12:31:32 [DoS Attack: TCP/UDP Chargen] from source: 164.52.24.181, port 47876, Friday, March 01, 2019 12:38:11 [DoS Attack: TCP/UDP Chargen] from source: 164.52.24.181, port 47877, Friday, March 01, 2019 12:38:11 [DoS Attack: SYN/ACK Scan] from source: 38.21.226.137, port 55552, Friday, March 01, 2019 12:39:56 [DoS Attack: SYN/ACK Scan] from source: 38.21.226.137, port 55552, Friday, March 01, 2019 13:03:42 A little earlier [DoS Attack: RST Scan] from source: 62.201.225.242, port 47688, Friday, March 01, 2019 13:54:59 [DoS Attack: SYN/ACK Scan] from source: 31.214.129.73, port 80, Friday, March 01, 2019 14:30:51 [DoS Attack: SYN/ACK Scan] from source: 31.214.129.73, port 80, Friday, March 01, 2019 14:30:54 [DoS Attack: SYN/ACK Scan] from source: 31.214.129.73, port 80, Friday, March 01, 2019 14:31:00 [DoS Attack: SYN/ACK Scan] from source: 5.39.105.64, port 80, Friday, March 01, 2019 14:44:23 [DoS Attack: SYN/ACK Scan] from source: 38.21.226.137, port 55552, Friday, March 01, 2019 15:00:53
  9. @Killhippie thank you so much! The only thing was causing me this outside concern besides the malicious software I tried utilizing.. was the fact that I would google the ips and would read negative information from others relating to methods of hacking coupled with malicious info from data files etc, I found stored on my pc after utilizing that software. I feel comfortable now lol.
  10. Okay. I can try that if it’s aboustly needed as far as connecting my console wired to my router with a speed tests, but does that explain why it’s so low? Reguarding, my concern to of strict mode and autopinging. Why am I autopinging peers into matches in strict mode when my location is forced? This actually happens while I have my location forced locally. I’m actually in a match now where I tested this out. Could this be due to a dedicated server or something I have on my allow list? Hold up, I’m rereading your reply and thanks btw. So, you are saying if I reduce my to cover one server when I am forcing my location, this will prevent peers being auto pinged in the match that’s outside of my radius! Also, does the selecting Destiny profile have any influence on any of this? Another quick question, but I know you guys can handle these questions. If my radius was set to the very minimum that it could possibly be with my location forced with my ping assist set to 0. What the outcome of my matches probably be?
  11. Thanks man!!! I seen something on port 80 as well. I tested this port before and it coming up as blocked. As of the last couple days, I’ve started seeing syn/ack on it. Im going to try to ignore it. It’s I wasn’t getting this much activity until I tried using a program. Lord, knows I need to focus on one thing at at a time and not this.
  12. Should this be igorned? The IP comes back as.. Source: whois.apnic.net IP Address: 118.26.141.212 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html % Information related to '118.26.141.0 - 118.26.141.255' % Abuse contact for '118.26.141.0 - 118.26.141.255' is '[email protected]' inetnum: 118.26.141.0 - 118.26.141.255 netname: TEDAIDC descr: E-teda Technology Industrial Co.Ltd descr: tianda science and technology garden D1 Tianjin descr: economic-technologyical development area country: CN admin-c: ZD833-AP tech-c: PT486-AP mnt-by: MAINT-AP-CNISP mnt-irt: IRT-CNISP-CN status: ASSIGNED NON-PORTABLE last-modified: 2014-08-13T01:46:47Z source: APNIC irt: IRT-CNISP-CN address: Beijing CNISP Technology Co., Ltd e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CM2275-AP tech-c: CM2275-AP auth: # Filtered mnt-by: MAINT-AP-CNISP last-modified: 2017-05-03T07:08:38Z source: APNIC person: Peng Tao nic-hdl: PT486-AP e-mail: [email protected] address: tianda science and technology garden D1 Tianjin address: economic-technologyical development area phone: +86-22-66211199 country: CN mnt-by: MAINT-AP-CNISP last-modified: 2014-08-07T02:18:45Z source: APNIC person: Zhang Di nic-hdl: ZD833-AP e-mail: [email protected] address: tianda science and technology garden D1 Tianjin address: economic-technologyical development area phone: +86-22-66211199 country: CN mnt-by: MAINT-AP-CNISP last-modified: 2014-08-07T02:18:45Z source: APNIC https://www.ultratools.com/tools/ipWhoisLookupResult
  13. Their thinking is the "TCP/UDP Echo from source: 212.69.40.23, port 53" might be classified as DoS  I’m getting similar, Dos attack: TCP/UDP Echo from source 118.26.141.212, port 3363 I should just rules those out?
  14. Okay. Thanks for the early assessment, but I understand that developers or what have you, do network testing and and they show up as DOS attacks. These are non threating. I’m aware of these and I maybe protected. However, I downloaded a portforwarding program through a bad source, which required me to login to my router. As it was connected, it displayed all of my network information such as ips, Mac addresses etc, etc. Same info found in the dumaos GUI. I quit after running into some problems. Afterwards, I onslaught of DOS attacks began to poor in, different in nature, ever couple of hours. I eventually disconnected everything. Received a new ip from isp and they are still coming in strong. Looked some of them up on the internet. Didn’t like what I seen. Could you prove to me otherwise, please? I’m frightened.
  15. What do you do in situations like this? I started getting these attacks yesterday and thier only getting worse. I dont know how it’s gonna eventually effect me. Since, I’m exposed, will my router become useless to me? Do I stop using the internet? Do I turn off everything and sit in a dark room? It’s freaking me out. Do I move lol. I changed my isp changed my ip and still getting hit all of these attacks. I have no clue what do.
×
×
  • Create New...