Jump to content

[LAN access from remote]


Guest
 Share

Recommended Posts

Why am I seeing several entries to my ps4's LAN IP as remote access from all these different countries?  Is this something that needs to be looked into?

Link to comment
Share on other sites

  • Netduma Staff
4 hours ago, stalker4hire- said:

Why am I seeing several entries to my ps4's LAN IP as remote access from all these different countries?  Is this something that needs to be looked into?

What precisely do you mean by 'entries'? I'm guessing it's in the log files - don't worry about it, this kind of activity happens on any router. It's background Internet noise - if you had an issue, it would present itself on the front-end.

Link to comment
Share on other sites

Maybe it should be labeled differently in logs.

Makes me a bit nervous to see an entry for remote LAN access from China, Japan, and Russia when I'm in the US. 

Link to comment
Share on other sites

  • Netduma Staff
5 hours ago, stalker4hire- said:

No I don't. I have in the past but it's been awhile.

Yeh it's totally understandable. We can't start editing the logs really, but we'll one day re-locate the log files to somewhere less nerve-wracking. They take up a lot of room on System Info at the minute, it feels like they're more important than they are!

As far as I know it's displaying pure factual information - it's not inaccurate. But bear in mind that the router has its own firewall, and all this traffic is blocked by it. It's nothing to worry about, and happens on any network :)

Link to comment
Share on other sites

  • 10 months later...
On 3/28/2019 at 12:32 PM, Netduma Jack said:

Yeh it's totally understandable. We can't start editing the logs really, but we'll one day re-locate the log files to somewhere less nerve-wracking. They take up a lot of room on System Info at the minute, it feels like they're more important than they are!

As far as I know it's displaying pure factual information - it's not inaccurate. But bear in mind that the router has its own firewall, and all this traffic is blocked by it. It's nothing to worry about, and happens on any network :)

I have added playstation in DMZ in XR500 also I have such entries, if I have to worry @Netduma Jack

Link to comment
Share on other sites

 

3 hours ago, Netduma Fraser said:

I'm assuming the entry showed that is was blocked though? In that case I wouldn't worry too much.

just shows like that

[LAN access from remote] from 195.54.166.33:8080 to 10.0.0.100:2952, Tuesday, February 25, 2020 22:53:20

 


[LAN access from remote] from 124.91.5.17:35030 to 10.0.0.100:2323, Tuesday, February 25, 2020 22:53:16
[LAN access from remote] from 185.137.234.155:48845 to 10.0.0.100:3330, Tuesday, February 25, 2020 22:52:50
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:60, Tuesday, February 25, 2020 22:52:39
[LAN access from remote] from 71.6.146.130:16655 to 10.0.0.100:3388, Tuesday, February 25, 2020 22:52:03
[LAN access from remote] from 185.209.0.32:40662 to 10.0.0.100:13389, Tuesday, February 25, 2020 22:51:59
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3360, Tuesday, February 25, 2020 22:51:50
[LAN access from remote] from 51.89.21.206:5107 to 10.0.0.100:5060, Tuesday, February 25, 2020 22:51:28
[LAN access from remote] from 192.210.198.178:44920 to 10.0.0.100:3746, Tuesday, February 25, 2020 22:51:27
[LAN access from remote] from 185.176.27.102:52080 to 10.0.0.100:17792, Tuesday, February 25, 2020 22:51:08
[LAN access from remote] from 178.46.209.92:6405 to 10.0.0.100:23, Tuesday, February 25, 2020 22:51:07
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:1716, Tuesday, February 25, 2020 22:50:58
[LAN access from remote] from 89.248.172.85:52901 to 10.0.0.100:3333, Tuesday, February 25, 2020 22:50:40
[LAN access from remote] from 61.219.11.153:64181 to 10.0.0.100:8080, Tuesday, February 25, 2020 22:50:32
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3343, Tuesday, February 25, 2020 22:50:18
[LAN access from remote] from 45.136.109.251:53933 to 10.0.0.100:34292, Tuesday, February 25, 2020 22:50:07
[LAN access from remote] from 192.241.227.56:51823 to 10.0.0.100:6667, Tuesday, February 25, 2020 22:50:06
[LAN access from remote] from 117.50.116.67:54423 to 10.0.0.100:1433, Tuesday, February 25, 2020 22:50:04
[LAN access from remote] from 219.155.231.222:39342 to 10.0.0.100:23, Tuesday, February 25, 2020 22:50:00
[LAN access from remote] from 123.234.159.161:33131 to 10.0.0.100:80, Tuesday, February 25, 2020 22:49:38
[LAN access from remote] from 95.168.178.245:50963 to 10.0.0.100:4022, Tuesday, February 25, 2020 22:49:26
[LAN access from remote] from 92.154.95.236:57333 to 10.0.0.100:1864, Tuesday, February 25, 2020 22:49:22
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3383, Tuesday, February 25, 2020 22:49:20
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:5544, Tuesday, February 25, 2020 22:49:12
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2726, Tuesday, February 25, 2020 22:48:28
[LAN access from remote] from 220.134.130.90:25619 to 10.0.0.100:26, Tuesday, February 25, 2020 22:48:22
[LAN access from remote] from 45.136.109.251:53933 to 10.0.0.100:1805, Tuesday, February 25, 2020 22:48:21
[LAN access from remote] from 89.248.172.85:52901 to 10.0.0.100:1983, Tuesday, February 25, 2020 22:48:09
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2883, Tuesday, February 25, 2020 22:48:01
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2998, Tuesday, February 25, 2020 22:47:54
[LAN access from remote] from 92.118.37.61:50103 to 10.0.0.100:3391, Tuesday, February 25, 2020 22:47:32
[LAN access from remote] from 185.232.30.130:41486 to 10.0.0.100:33904, Tuesday, February 25, 2020 22:47:11
[LAN access from remote] from 192.3.137.98:44780 to 10.0.0.100:1215, Tuesday, February 25, 2020 22:47:06
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2846, Tuesday, February 25, 2020 22:46:38
[LAN access from remote] from 45.134.179.63:43589 to 10.0.0.100:48384, Tuesday, February 25, 2020 22:46:31
[LAN access from remote] from 89.248.172.85:52901 to 10.0.0.100:2005, Tuesday, February 25, 2020 22:46:27
[LAN access from remote] from 94.61.227.48:33416 to 10.0.0.100:23, Tuesday, February 25, 2020 22:46:16
[LAN access from remote] from 185.209.0.90:58047 to 10.0.0.100:24000, Tuesday, February 25, 2020 22:46:12
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:488, Tuesday, February 25, 2020 22:45:50
[LAN access from remote] from 185.53.88.130:5077 to 10.0.0.100:5060, Tuesday, February 25, 2020 22:45:38
[LAN access from remote] from 185.176.27.162:55021 to 10.0.0.100:5151, Tuesday, February 25, 2020 22:45:32
[LAN access from remote] from 124.91.5.17:35030 to 10.0.0.100:2323, Tuesday, February 25, 2020 22:45:29
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:2086, Tuesday, February 25, 2020 22:45:17
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:5005, Tuesday, February 25, 2020 22:45:14
[LAN access from remote] from 83.97.20.49:39965 to 10.0.0.100:113, Tuesday, February 25, 2020 22:45:12
[LAN access from remote] from 23.95.12.242:44849 to 10.0.0.100:1107, Tuesday, February 25, 2020 22:44:54
[LAN access from remote] from 98.126.214.6:40676 to 10.0.0.100:123, Tuesday, February 25, 2020 22:44:44
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:789, Tuesday, February 25, 2020 22:44:42
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3014, Tuesday, February 25, 2020 22:44:28
[LAN access from remote] from 182.61.104.33:38948 to 10.0.0.100:6379, Tuesday, February 25, 2020 22:44:06
[LAN access from remote] from 185.176.27.2:54356 to 10.0.0.100:3380, Tuesday, February 25, 2020 22:43:42
[LAN access from remote] from 45.136.109.251:53933 to 10.0.0.100:61566, Tuesday, February 25, 2020 22:43:42
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3093, Tuesday, February 25, 2020 22:43:33
[LAN access from remote] from 45.143.220.213:22070 to 10.0.0.100:5060, Tuesday, February 25, 2020 22:42:59
[LAN access from remote] from 45.134.179.63:43589 to 10.0.0.100:490, Tuesday, February 25, 2020 22:42:48
[LAN access from remote] from 88.225.213.104:15509 to 10.0.0.100:23, Tuesday, February 25, 2020 22:42:45
[LAN access from remote] from 45.134.179.63:43589 to 10.0.0.100:62628, Tuesday, February 25, 2020 22:42:41
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:40300, Tuesday, February 25, 2020 22:42:38
[LAN access from remote] from 200.150.69.26:60000 to 10.0.0.100:3022, Tuesday, February 25, 2020 22:42:35
[LAN access from remote] from 115.72.162.124:22999 to 10.0.0.100:23, Tuesday, February 25, 2020 22:42:13
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:2041, Tuesday, February 25, 2020 22:42:13
[LAN access from remote] from 192.3.137.98:44780 to 10.0.0.100:2435, Tuesday, February 25, 2020 22:42:08
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2699, Tuesday, February 25, 2020 22:41:56
[LAN access from remote] from 112.74.106.49:53025 to 10.0.0.100:445, Tuesday, February 25, 2020 22:41:49
[LAN access from remote] from 202.62.226.26:51341 to 10.0.0.100:1433, Tuesday, February 25, 2020 22:41:47
[LAN access from remote] from 193.32.161.12:45058 to 10.0.0.100:24072, Tuesday, February 25, 2020 22:41:40
[LAN access from remote] from 79.124.62.46:49540 to 10.0.0.100:37000, Tuesday, February 25, 2020 22:41:25
[LAN access from remote] from 185.209.0.92:46075 to 10.0.0.100:3876, Tuesday, February 25, 2020 22:41:08
[LAN access from remote] from 167.71.200.175:32767 to 10.0.0.100:8545, Tuesday, February 25, 2020 22:41:07
[LAN access from remote] from 159.89.160.91:43998 to 10.0.0.100:3993, Tuesday, February 25, 2020 22:39:46
[DumaOS] config write 'com.netdumasoftware.qos.settings', Tuesday, February 25, 2020 22:39:16
[DumaOS] applying qos for zone lan, Tuesday, February 25, 2020 22:39:15
[DumaOS] applying qos for zone wan, Tuesday, February 25, 2020 22:39:14
[DumaOS] config write 'com.netdumasoftware.qos.settings', Tuesday, February 25, 2020 22:39:14
[DumaOS] applying qos for zone lan, Tuesday, February 25, 2020 22:39:10
[DumaOS] applying qos for zone wan, Tuesday, February 25, 2020 22:39:09
[DumaOS] config write 'com.netdumasoftware.qos.settings', Tuesday, February 25, 2020 22:39:08
[DumaOS] config write 'com.netdumasoftware.qos.settings', Tuesday, February 25, 2020 22:39:08
[LAN access from remote] from 194.26.29.128:53046 to 10.0.0.100:54579, Tuesday, February 25, 2020 22:39:05
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2811, Tuesday, February 25, 2020 22:38:52
[LAN access from remote] from 185.232.30.130:41486 to 10.0.0.100:33992, Tuesday, February 25, 2020 22:37:47
[LAN access from remote] from 195.54.166.33:8080 to 10.0.0.100:7479, Tuesday, February 25, 2020 22:37:38
[LAN access from remote] from 185.153.199.242:41765 to 10.0.0.100:3283, Tuesday, February 25, 2020 22:37:36
[LAN access from remote] from 104.168.65.186:42819 to 10.0.0.100:9681, Tuesday, February 25, 2020 22:37:34
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3322, Tuesday, February 25, 2020 22:37:31
[LAN access from remote] from 79.124.62.42:49126 to 10.0.0.100:2302, Tuesday, February 25, 2020 22:37:12
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:1331, Tuesday, February 25, 2020 22:36:57
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3306, Tuesday, February 25, 2020 22:36:47
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:49498, Tuesday, February 25, 2020 22:36:46
[LAN access from remote] from 79.124.62.46:49540 to 10.0.0.100:61916, Tuesday, February 25, 2020 22:36:24
[LAN access from remote] from 185.176.27.2:54356 to 10.0.0.100:3385, Tuesday, February 25, 2020 22:36:16
[LAN access from remote] from 51.161.12.231:32767 to 10.0.0.100:8545, Tuesday, February 25, 2020 22:36:10
[LAN access from remote] from 45.136.109.251:53933 to 10.0.0.100:7114, Tuesday, February 25, 2020 22:35:40
[LAN access from remote] from 79.124.62.46:49540 to 10.0.0.100:61216, Tuesday, February 25, 2020 22:35:37
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:668, Tuesday, February 25, 2020 22:35:27
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:2912, Tuesday, February 25, 2020 22:34:59
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:775, Tuesday, February 25, 2020 22:34:57
[LAN access from remote] from 185.209.0.89:46898 to 10.0.0.100:19500, Tuesday, February 25, 2020 22:34:33
[LAN access from remote] from 192.3.34.26:44761 to 10.0.0.100:14941, Tuesday, February 25, 2020 22:34:33
[LAN access from remote] from 59.7.155.141:53461 to 10.0.0.100:23, Tuesday, February 25, 2020 22:34:07
[LAN access from remote] from 122.228.19.79:39943 to 10.0.0.100:4040, Tuesday, February 25, 2020 22:34:03
[LAN access from remote] from 192.241.209.30:47865 to 10.0.0.100:47808, Tuesday, February 25, 2020 22:34:03
[LAN access from remote] from 194.26.29.130:59963 to 10.0.0.100:5723, Tuesday, February 25, 2020 22:33:22
[LAN access from remote] from 51.178.78.154:57937 to 10.0.0.100:9051, Tuesday, February 25, 2020 22:32:56
[LAN access from remote] from 193.32.161.60:43739 to 10.0.0.100:57000, Tuesday, February 25, 2020 22:32:49
[LAN access from remote] from 92.118.160.53:59065 to 10.0.0.100:21, Tuesday, February 25, 2020 22:32:47
[LAN access from remote] from 45.136.110.25:43362 to 10.0.0.100:3205, Tuesday, February 25, 2020 22:32:16
[LAN access from remote] from 185.209.0.32:40662 to 10.0.0.100:3342, Tuesday, February 25, 2020 22:31:58
[LAN access from remote] from 45.134.179.52:49462 to 10.0.0.100:36666, Tuesday, February 25, 2020 22:31:55

Link to comment
Share on other sites

@Netduma Fraser I do believe this would be normal to see entries like that if one has there PS4 in DMZ. Isn't it true if one has there PS4 or Xbox in the DMZ it basically has all ports open? And bypasses the firewall of the router? I think once one does that that's why you see those type of log entries. This also would go for port forwarding or port triggering. Ive tested both port forwarding and port triggering and get remote access entries like that. The only difference is I have control on what ports I allow open or trigger. And my log entries show this. There should be no firewall involved by the router if a device is in its DMZ. The only thing the router is doing is showing the connections that are being made by the device in the DMZ of the router.. Which is actually nice to see.

Zippy.

Link to comment
Share on other sites

12 hours ago, Netduma Fraser said:

Do you have remote access ticked? If not then it shouldn't be anything to worry about but if you do I would suggest disabling it and changing your interface password.

which is all right, I don't have remote access set up, thank you Fraser,I will add that games work very well for me, no free efect, hit detection is perfect, I checked APEX and cod bo 4

Link to comment
Share on other sites

  • Administrators
17 hours ago, Zippy said:

@Netduma Fraser I do believe this would be normal to see entries like that if one has there PS4 in DMZ. Isn't it true if one has there PS4 or Xbox in the DMZ it basically has all ports open? And bypasses the firewall of the router? I think once one does that that's why you see those type of log entries. This also would go for port forwarding or port triggering. Ive tested both port forwarding and port triggering and get remote access entries like that. The only difference is I have control on what ports I allow open or trigger. And my log entries show this. There should be no firewall involved by the router if a device is in its DMZ. The only thing the router is doing is showing the connections that are being made by the device in the DMZ of the router.. Which is actually nice to see.

Zippy.

Yeah that's right, thanks for the information. Usually DoS Attacks are shown for connections that are made so it's a bit confusing they both do the same thing. I think they've been named unfortunately, LAN Access from remote sounds to me like someone is attempting to access the router interface but you're right they are just showing normal connections.

Link to comment
Share on other sites

1 hour ago, Netduma Fraser said:

Yeah that's right, thanks for the information. Usually DoS Attacks are shown for connections that are made so it's a bit confusing they both do the same thing. I think they've been named unfortunately, LAN Access from remote sounds to me like someone is attempting to access the router interface but you're right they are just showing normal connections.

Your welcome Fraser, I just wanted to share what I had discovered. By using port triggering my gameplay is a lot better. And I do receive those entries Lan Access From Remote.. But those entries are being made by MS. Which would make sense because I am on the XboxOne X. And im also the one who has allowed those connections to be made through port triggering.. Im still amazed at that UpNp doesn't log anything for me at all and my gameplay is very poor. But ever sense ive shut UpNp off and used port triggering things are much better and connections are being made. Don't know why UpNp works for some and not others though.. Seems strange tbh.. Ive used this setup for well over a month now. Also on another note my Device Manager is still showing proper devices online and off. That has nothing to do with the port triggering but something I have shared with you recently..

An off topic question for you though and not related to anything here. But ive got this one ip address that keeps saying Dos Attack.. Its not being allowed and I know this is normal for one to see this in our router logs. But its just this same one over and over.. 148.251.48.231  Could you look that ip up for me and tell me where it is located? I want to see if its showing the same location for you as it is for me. If you have the time that is..

Thanks!

Zippy.

Link to comment
Share on other sites

  • Administrators
8 minutes ago, Zippy said:

An off topic question for you though and not related to anything here. But ive got this one ip address that keeps saying Dos Attack.. Its not being allowed and I know this is normal for one to see this in our router logs. But its just this same one over and over.. 148.251.48.231  Could you look that ip up for me and tell me where it is located? I want to see if its showing the same location for you as it is for me. If you have the time that is..

Thanks!

Zippy.

I'm showing Germany - Hetzner Online AG/GmbH

Link to comment
Share on other sites

1 minute ago, Netduma Fraser said:

I'm showing Germany - Hetzner Online AG/GmbH

Thank you Fraser.. That's the same thing I got as well.. Thanks for taking the time to look that up for me.  Do you see any threat and or reason for this?  I may try something and block this completely by using a Static Route.. 

Zippy.

Link to comment
Share on other sites

  • Administrators
9 minutes ago, Zippy said:

Thank you Fraser.. That's the same thing I got as well.. Thanks for taking the time to look that up for me.  Do you see any threat and or reason for this?  I may try something and block this completely by using a Static Route.. 

Zippy.

No worries, according to their website/wikipedia - "Hetzner Online GmbH is an Internet hosting company and data center operator based in Gunzenhausen, Germany" so I'd say it's perfectly normal :)

Link to comment
Share on other sites

2 minutes ago, Netduma Fraser said:

No worries, according to their website/wikipedia - "Hetzner Online GmbH is an Internet hosting company and data center operator based in Gunzenhausen, Germany" so I'd say it's perfectly normal :)

Okay thanks Fraser! I appreciate your help and input!  All things normal here then.. 👍

Zippy.

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

×
×
  • Create New...