кто виноват провайдер или роутер?
Создана: 17 Августа 2010 Втр 15:11:15.
Раздел: "Интернет-провайдеры, телерадиовещание"
Сообщений в теме: 15, просмотров: 6470
-
такая вот проблема: с завидной периодичностью рвется связь в аське, то он-лайн, то офф-лайн и так по кругу. Как понять кто виноват, роутер, который линию не держит или провайдер? Провайдер Новые технологии, в течение первого месяца со дня подключения к этому провайдеру было все урч, но вот теперь уже бесит. Подскажите плиз?
-
-
Дык эта, меня бомбит кто-то
Jan 1 19:45:30 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:45:26 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:45:24 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:40:12 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 19:40:12 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 19:35:20 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:35:16 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:35:14 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:32:53 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:32:53 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:32:50 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:32:50 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:30:12 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 19:30:12 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 19:24:35 Drop PING request from WAN (ip:109.120.14.87).
Jan 1 19:24:20 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:24:16 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:24:14 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:20:12 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 19:20:12 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 19:14:13 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:14:13 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:14:07 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:14:07 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:14:02 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:14:00 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:13:58 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:58 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:53 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:53 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:45 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:45 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:32 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:32 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:26 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:26 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:21 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:21 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:16 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:16 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:10 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:10 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:13:03 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:13:03 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:12:57 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:12:57 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:10:12 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 19:10:12 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 19:07:46 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:42 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:40 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:19 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:15 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:13 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:06 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:03 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:07:03 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:07:02 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:07:00 PING-FLOODING flooding attack from WAN (ip:188.186.174.103) detected.
Jan 1 19:06:58 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:06:58 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:02:21 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:02:17 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:02:15 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 19:01:22 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:01:22 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:01:16 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 19:01:16 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 19:00:12 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 19:00:12 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 18:57:52 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 18:57:52 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 18:56:37 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 18:56:37 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 18:56:32 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 18:56:32 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 18:51:59 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:51:55 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:51:53 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:50:57 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 18:50:57 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 18:50:52 DHCP: Server sending ACK to 192.168.0.102. (Lease time = 86400)
Jan 1 18:50:52 DHCP: Server receive REQUEST from 00:22:43:1c:96:25.
Jan 1 18:50:13 DHCP: Server sending ACK to 192.168.0.101. (Lease time = 86400)
Jan 1 18:50:13 DHCP: Server receive REQUEST from 00:18:41:36:21:f9.
Jan 1 18:41:49 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:41:45 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:41:43 PING-FLOODING flooding attack from WAN (ip:188.186.204.226) detected.
Jan 1 18:41:27 Drop TCP packet from WAN (src:220.150.184.243:1809, dst:109.120.16.22:80) by default rule.
Jan 1 18:41:21 Drop TCP packet from WAN (src:220.150.184.243:1809, dst:109.120.16.22:80) by default rule. -
че делать то? атака за атакой, да еще и с разных адресов.. чего они хотят от меня?
Aug 19 18:16:26 PING-FLOODING flooding attack from WAN (ip:81.200.24.216) detected.
Aug 19 18:16:21 PING-FLOODING flooding attack from WAN (ip:213.171.38.193) detected.
Aug 19 18:16:14 PING-FLOODING flooding attack from WAN (ip:81.200.24.216) detected.
Aug 19 18:16:09 PING-FLOODING flooding attack from WAN (ip:213.171.38.193) detected.
Aug 19 18:16:02 PING-FLOODING flooding attack from WAN (ip:81.200.24.216) detected.
Aug 19 18:15:56 PING-FLOODING flooding attack from WAN (ip:217.25.208.15) detected.
Aug 19 18:15:50 PING-FLOODING flooding attack from WAN (ip:81.200.24.216) detected.
Aug 19 18:15:44 PING-FLOODING flooding attack from WAN (ip:194.146.197.4) detected.
Aug 19 18:15:38 PING-FLOODING flooding attack from WAN (ip:81.200.24.216) detected.
Aug 19 18:15:32 PING-FLOODING flooding attack from WAN (ip:213.156.208.189) detected. -
-
-
-
-
Какой-то истеричный у тебя роутер. Чуть что сразу отключается от сети, его прям будто в институте благородных девиц собирали.naddv писал : че делать то? атака за атакой, да еще и с разных адресов.. чего они хотят от меня?
Aug 19 18:15:32 PING-FLOODING flooding attack from WAN (ip:213.156.208.189) detected.
Отключи в нем нахрен детектор атак и живи щаслива, все равно тебя за роутером не достанут, а если ты сам протащишь себе виря-трояна, то и роутер не поможет. -
-
-
Я сейчас на вскидку не вспомню )) Гугль в тебе помощь.
Если у тебя машина одна так попробуй подключить её напрямую к инету. Если две и более так поставь вторую сетевуху на "инетную" машину и раздавай инет с неё.
Dlink-и вообще редкостное г..но