Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi all! We have been experiencing an issue on site where threads have been missing the latest postings. The platform host Vanilla are working on this issue. A workaround that has been used by some is to navigate back from 1 to 10+ pages to re-sync the thread and this will then show the latest posts. Thanks, Mike.
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

UPC "Drop-outs" of late, going insane

24567

Comments

  • Registered Users Posts: 70 ✭✭DublinC


    E6LU7.png
    IqJa0.png

    I don't believe these are real attacks. While I do partake in somewhat-competitive gaming where DDoS'ing occurs, I wasn't online at these times bar the latest "attack". I've also only taken my EPC3925 out of Bridged mode thus changing my IP last week. I haven't been on Skype (Rules out Skype "IP Grabbing"), and I haven't visited any unknown sites.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    I'd guess that its being over zealous and freaking itself out.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Wanna export the logs so I can get some kind of analysis of how things are going(seems ok last couple days, dropped once but picked up again before I got back). Problem is I cant export a full conversation from gmail or my backup(WLM).


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    So, processed these logs. Its a workaround, and not a pretty one...

    1. Email converstaion to self
    2. Download zip of attachments
    3. Convert them(.eml) to a text file
    4. Filter for DOS, remove email addy
    5. Filter for duplicates
    6. Manually divide and post.

    Cant just find and replace as the IPs all change, as do the timestamps. So Im using two command line tools and a notepad++ plugin. But it works, sorta.

    JAN 14:
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62030, Monday, January 14,2013 13:33:08
    [DoS Attack: RST Scan] from source: 112.208.11.173, port 10015, Monday, January 14,2013 13:18:44
    JAN 13
    [DoS Attack: RST Scan] from source: 70.80.143.190, port 23894, Sunday, January 13,2013 02:24:30
    [DoS Attack: RST Scan] from source: 70.80.143.190, port 23759, Sunday, January 13,2013 02:23:30
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62299, Sunday, January 13,2013 02:20:45
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Sunday, January 13,2013 01:32:05
    [DoS Attack: RST Scan] from source: 74.90.130.80, port 57246, Sunday, January 13,2013 01:12:25
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Sunday, January 13,2013 00:56:30
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Sunday, January 13,2013 00:51:50
    [DoS Attack: RST Scan] from source: 68.36.193.61, port 44184, Sunday, January 13,2013 00:17:15
    JAN 12
    [DoS Attack: RST Scan] from source: 68.228.240.227, port 22286, Saturday, January 12,2013 23:31:05
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Saturday, January 12,2013 22:22:44
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 24519, Saturday, January 12,2013 22:22:30
    [DoS Attack: ACK Scan] from source: 76.74.170.212, port 80, Saturday, January 12,2013 20:22:49
    [DoS Attack: RST Scan] from source: 107.10.168.27, port 11310, Saturday, January 12,2013 19:25:09
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Saturday, January 12,2013 19:11:05
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Saturday, January 12,2013 18:54:35
    [DoS Attack: ACK Scan] from source: 24.36.76.62, port 35682, Saturday, January 12,2013 18:45:05
    [DoS Attack: ACK Scan] from source: 207.255.188.153, port 6959, Saturday, January 12,2013 18:08:15
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 24519, Saturday, January 12,2013 18:01:11
    [DoS Attack: RST Scan] from source: 24.4.211.93, port 18042, Saturday, January 12,2013 17:15:06
    [DoS Attack: ACK Scan] from source: 67.81.83.232, port 52204, Saturday, January 12,2013 16:56:05
    [COLOR="Red"][DoS Attack: WinNuke Attack] from source: 64.56.224.149, port 45452, Saturday, January 12,2013 16:02:40[/COLOR]
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Saturday, January 12,2013 15:50:50
    **[DoS Attack: RST Scan] from source: 24.69.58.217, port 63912, Monday, January 14,2013 09:14:04
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61518, Saturday, January 12,2013 14:44:59
    **[DoS Attack: ACK Scan] from source: 122.177.185.161, port 15679, Monday, January 14,2013 08:46:29
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62243, Saturday, January 12,2013 11:30:26
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61725, Saturday, January 12,2013 11:26:30
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Saturday, January 12,2013 08:39:50
    **[DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Monday, January 14,2013 08:33:08
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Saturday, January 12,2013 08:14:39
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62232, Saturday, January 12,2013 05:41:59
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62231, Saturday, January 12,2013 05:22:28
    [DoS Attack: ACK Scan] from source: 173.178.163.146, port 62230, Saturday, January 12,2013 05:19:25
    [DoS Attack: RST Scan] from source: 69.244.197.87, port 53047, Saturday, January 12,2013 04:18:46
    [DoS Attack: ACK Scan] from source: 182.239.181.34, port 2532, Saturday, January 12,2013 03:54:10
    [DoS Attack: RST Scan] from source: 213.35.230.50, port 19525, Saturday, January 12,2013 03:44:46
    [DoS Attack: ACK Scan] from source: 178.140.136.37, port 15489, Saturday, January 12,2013 03:29:11
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:28:24
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:25:46
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:24:39
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:23:24
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:21:31
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:20:54
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:20:27
    [DoS Attack: ACK Scan] from source: 87.248.210.254, port 80, Saturday, January 12,2013 00:19:23
    JAN 11
    [DoS Attack: RST Scan] from source: 209.193.56.235, port 61490, Friday, January 11,2013 23:33:17
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Monday, January 14,2013 07:31:09
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:56:27
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:55:23
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:54:19
    [DoS Attack: ACK Scan] from source: 63.149.195.12, port 80, Friday, January 11,2013 19:53:47
    [DoS Attack: RST Scan] from source: 72.218.245.44, port 2180, Friday, January 11,2013 19:30:47
    [DoS Attack: RST Scan] from source: 201.52.68.206, port 53314, Friday, January 11,2013 15:45:09
    [DoS Attack: RST Scan] from source: 201.52.68.206, port 52957, Friday, January 11,2013 15:43:25
    [DoS Attack: RST Scan] from source: 112.208.11.173, port 10015, Monday, January 14,2013 13:11:53
    [DoS Attack: RST Scan] from source: 209.193.56.235, port 59921, Friday, January 11,2013 13:10:27
    [DoS Attack: RST Scan] from source: 63.229.75.128, port 12760, Friday, January 11,2013 12:59:22
    [DoS Attack: RST Scan] from source: 66.45.236.66, port 80, Friday, January 11,2013 12:48:03
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Friday, January 11,2013 12:45:32
    [DoS Attack: RST Scan] from source: 124.104.75.243, port 21784, Monday, January 14,2013 06:46:19
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61025, Monday, January 14,2013 06:41:53
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Friday, January 11,2013 09:47:02
    [DoS Attack: ACK Scan] from source: 41.182.30.197, port 1511, Friday, January 11,2013 08:39:17
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 07:13:53
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 06:42:12
    [DoS Attack: RST Scan] from source: 74.73.230.15, port 60357, Friday, January 11,2013 06:31:17
    [DoS Attack: ACK Scan] from source: 74.73.230.15, port 60008, Friday, January 11,2013 06:16:19
    [DoS Attack: RST Scan] from source: 68.226.230.195, port 6881, Friday, January 11,2013 05:32:57
    [DoS Attack: RST Scan] from source: 74.77.21.251, port 12378, Friday, January 11,2013 05:11:37
    [DoS Attack: ACK Scan] from source: 24.253.53.83, port 2418, Friday, January 11,2013 04:34:07
    [DoS Attack: ACK Scan] from source: 116.37.43.200, port 1888, Friday, January 11,2013 03:57:42
    [DoS Attack: RST Scan] from source: 86.41.28.35, port 16270, Friday, January 11,2013 02:45:33
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Friday, January 11,2013 02:33:02
    [DoS Attack: RST Scan] from source: 98.183.92.124, port 32258, Friday, January 11,2013 01:59:32
    [DoS Attack: RST Scan] from source: 62.45.126.19, port 64103, Friday, January 11,2013 01:33:58
    [DoS Attack: RST Scan] from source: 86.41.28.35, port 29689, Friday, January 11,2013 01:03:37
    [DoS Attack: ACK Scan] from source: 174.7.226.18, port 57525, Friday, January 11,2013 00:37:27
    [DoS Attack: RST Scan] from source: 173.93.234.140, port 6881, Friday, January 11,2013 00:32:22
    JAN 10
    [DoS Attack: RST Scan] from source: 50.137.87.167, port 17962, Thursday, January 10,2013 23:29:43
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 22:10:49
    [DoS Attack: ACK Scan] from source: 80.101.51.154, port 63423, Thursday, January 10,2013 21:50:34
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 21:41:24
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62714, Thursday, January 10,2013 20:26:18
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 63358, Thursday, January 10,2013 19:47:13
    [DoS Attack: ACK Scan] from source: 24.1.5.75, port 62518, Thursday, January 10,2013 17:10:50
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 15:46:48
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60369, Thursday, January 10,2013 15:36:24
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Thursday, January 10,2013 15:27:44
    [DoS Attack: RST Scan] from source: 70.176.171.214, port 58750, Thursday, January 10,2013 15:07:20
    [DoS Attack: RST Scan] from source: 71.10.172.13, port 45913, Monday, January 14,2013 04:49:03
    [DoS Attack: ACK Scan] from source: 207.46.101.8, port 443, Monday, January 14,2013 04:48:58
    [DoS Attack: ACK Scan] from source: 50.30.98.82, port 62636, Thursday, January 10,2013 12:51:33
    [DoS Attack: RST Scan] from source: 75.66.207.238, port 32766, Thursday, January 10,2013 10:33:03
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 09:57:24
    [DoS Attack: RST Scan] from source: 94.64.102.75, port 18238, Thursday, January 10,2013 08:40:24
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 08:27:13
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Thursday, January 10,2013 08:25:30
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60298, Monday, January 14,2013 04:05:28
    [DoS Attack: ACK Scan] from source: 210.98.151.10, port 5912, Thursday, January 10,2013 07:26:48
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 06:58:59
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Thursday, January 10,2013 06:35:23
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 06:28:34
    [DoS Attack: RST Scan] from source: 67.42.33.111, port 14980, Thursday, January 10,2013 06:26:35
    [DoS Attack: RST Scan] from source: 75.66.207.238, port 32766, Thursday, January 10,2013 06:07:19
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60706, Thursday, January 10,2013 05:55:24
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54974, Thursday, January 10,2013 05:14:25
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 05:01:35
    [DoS Attack: ACK Scan] from source: 116.37.43.200, port 4700, Thursday, January 10,2013 05:00:33
    [DoS Attack: RST Scan] from source: 174.53.129.146, port 55345, Thursday, January 10,2013 04:56:15
    **[DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Monday, January 14,2013 03:40:55
    [DoS Attack: RST Scan] from source: 76.87.50.178, port 44860, Monday, January 14,2013 03:39:45
    [DoS Attack: RST Scan] from source: 203.177.14.211, port 33435, Thursday, January 10,2013 04:05:53
    [DoS Attack: RST Scan] from source: 24.224.181.69, port 61794, Thursday, January 10,2013 03:51:03
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Thursday, January 10,2013 03:30:00
    [DoS Attack: RST Scan] from source: 174.93.210.218, port 51997, Thursday, January 10,2013 00:37:08
    [DoS Attack: ACK Scan] from source: 24.222.239.63, port 60837, Thursday, January 10,2013 00:25:43
    [DoS Attack: RST Scan] from source: 69.197.38.153, port 7171, Thursday, January 10,2013 00:06:48
    JAN 9
    [DoS Attack: RST Scan] from source: 98.251.48.248, port 40980, Wednesday, January 09,2013 23:42:28
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62337, Wednesday, January 09,2013 23:37:58
    [DoS Attack: RST Scan] from source: 65.190.37.195, port 54656, Wednesday, January 09,2013 23:19:08
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 40543, Wednesday, January 09,2013 23:16:04
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 40097, Wednesday, January 09,2013 23:15:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 39938, Wednesday, January 09,2013 23:15:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 39506, Wednesday, January 09,2013 23:15:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 38524, Wednesday, January 09,2013 23:15:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 38609, Wednesday, January 09,2013 23:15:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 37763, Wednesday, January 09,2013 23:15:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36505, Wednesday, January 09,2013 23:15:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36796, Wednesday, January 09,2013 23:15:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 36426, Wednesday, January 09,2013 23:15:04
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 35748, Wednesday, January 09,2013 23:14:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34854, Wednesday, January 09,2013 23:14:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 35170, Wednesday, January 09,2013 23:14:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34334, Wednesday, January 09,2013 23:14:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34411, Wednesday, January 09,2013 23:14:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 34256, Wednesday, January 09,2013 23:14:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33856, Wednesday, January 09,2013 23:14:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33477, Wednesday, January 09,2013 23:14:24
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 33101, Wednesday, January 09,2013 23:14:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 32787, Wednesday, January 09,2013 23:14:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 59499, Wednesday, January 09,2013 23:13:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 58367, Wednesday, January 09,2013 23:13:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 58474, Wednesday, January 09,2013 23:13:49
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 57964, Wednesday, January 09,2013 23:13:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 57234, Wednesday, January 09,2013 23:13:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 56052, Wednesday, January 09,2013 23:13:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 54824, Wednesday, January 09,2013 23:13:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 54549, Wednesday, January 09,2013 23:13:06
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 53886, Wednesday, January 09,2013 23:12:59
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 53309, Wednesday, January 09,2013 23:12:44
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 52362, Wednesday, January 09,2013 23:12:39
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 52736, Wednesday, January 09,2013 23:12:34
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 51386, Wednesday, January 09,2013 23:12:29
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 51286, Wednesday, January 09,2013 23:12:19
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 50582, Wednesday, January 09,2013 23:12:14
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 49781, Wednesday, January 09,2013 23:12:09
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 48690, Wednesday, January 09,2013 23:11:58
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 49201, Wednesday, January 09,2013 23:11:54
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 48564, Wednesday, January 09,2013 23:11:48
    [DoS Attack: SYN Flood] from source: 46.105.126.221, port 47779, Wednesday, January 09,2013 23:11:44
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 47513, Wednesday, January 09,2013 23:11:38
    [COLOR="Lime"]NEW IP LEASED[/COLOR]
    [DoS Attack: RST Scan] from source: 76.69.189.241, port 37544, Wednesday, January 09,2013 22:16:15
    [COLOR="red"][DoS Attack: WinNuke Attack] from source: 213.157.218.54, port 0, Wednesday, January 09,2013 21:42:00[/COLOR]
    [DoS Attack: ACK Scan] from source: 157.181.100.176, port 23636, Wednesday, January 09,2013 21:11:31
    [DoS Attack: ACK Scan] from source: 74.125.97.56, port 80, Wednesday, January 09,2013 21:03:23
    [DoS Attack: ACK Scan] from source: 74.125.97.56, port 80, Wednesday, January 09,2013 21:02:38
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Monday, January 14,2013 02:16:54
    [DoS Attack: RST Scan] from source: 76.107.23.202, port 26708, Wednesday, January 09,2013 18:00:33
    [DoS Attack: RST Scan] from source: 76.107.23.202, port 26708, Wednesday, January 09,2013 16:49:08
    [DoS Attack: RST Scan] from source: 87.6.173.206, port 17499, Wednesday, January 09,2013 16:46:08
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60332, Wednesday, January 09,2013 16:41:28
    [DoS Attack: RST Scan] from source: 76.69.189.241, port 37544, Wednesday, January 09,2013 15:55:28
    [DoS Attack: RST Scan] from source: 70.36.54.220, port 60894, Wednesday, January 09,2013 15:32:43
    [DoS Attack: RST Scan] from source: 49.145.85.64, port 11209, Wednesday, January 09,2013 14:46:38
    [DoS Attack: RST Scan] from source: 174.117.28.246, port 17014, Wednesday, January 09,2013 14:29:57
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 14:22:38
    [DoS Attack: RST Scan] from source: 64.228.156.102, port 61457, Monday, January 14,2013 01:22:30
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:51:13
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Wednesday, January 09,2013 13:37:30
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:36:38
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Wednesday, January 09,2013 13:31:22
    [DoS Attack: RST Scan] from source: 49.145.85.64, port 25088, Wednesday, January 09,2013 13:29:19
    [DoS Attack: RST Scan] from source: 99.246.111.0, port 63582, Wednesday, January 09,2013 13:12:49
    [DoS Attack: RST Scan] from source: 71.63.190.145, port 30002, Wednesday, January 09,2013 13:07:29
    [DoS Attack: RST Scan] from source: 109.92.221.234, port 10669, Wednesday, January 09,2013 12:11:08
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Wednesday, January 09,2013 11:13:08
    [DoS Attack: RST Scan] from source: 99.246.111.0, port 60964, Wednesday, January 09,2013 10:54:38
    [DoS Attack: RST Scan] from source: 88.203.81.146, port 45851, Wednesday, January 09,2013 10:32:18
    [DoS Attack: RST Scan] from source: 76.26.188.108, port 46986, Wednesday, January 09,2013 10:00:59
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:44:39
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:43:18
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:42:13
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:41:03
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:39:58
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:38:53
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:37:59
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:37:38
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:34:18
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:30:52
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:30:15
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:29:48
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:28:48
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:26:28
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:50
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:28
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:25:12
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:45
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:24
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:13
    [DoS Attack: ACK Scan] from source: 91.178.139.165, port 53776, Wednesday, January 09,2013 06:24:02
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Sunday, January 13,2013 23:53:14
    [DoS Attack: RST Scan] from source: 76.87.50.178, port 44860, Sunday, January 13,2013 23:22:08
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 12199, Wednesday, January 09,2013 03:00:25
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Sunday, January 13,2013 23:10:55
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 18983, Wednesday, January 09,2013 02:32:05
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 24378, Wednesday, January 09,2013 02:04:59
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 02:03:36
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:40:21
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:35:29
    [DoS Attack: RST Scan] from source: 98.254.134.90, port 21281, Wednesday, January 09,2013 01:33:41
    [DoS Attack: RST Scan] from source: 24.9.42.197, port 51090, Wednesday, January 09,2013 00:24:08
    JAN 8
    [DoS Attack: RST Scan] from source: 70.120.178.210, port 12733, Tuesday, January 08,2013 21:05:56
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 62716, Tuesday, January 08,2013 19:38:47
    [DoS Attack: RST Scan] from source: 75.109.217.60, port 6881, Tuesday, January 08,2013 19:02:26
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 60137, Tuesday, January 08,2013 18:40:42
    [DoS Attack: RST Scan] from source: 94.64.102.75, port 14079, Tuesday, January 08,2013 16:59:56
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54982, Tuesday, January 08,2013 16:29:21
    [DoS Attack: ACK Scan] from source: 72.187.68.94, port 54945, Tuesday, January 08,2013 16:26:16
    [DoS Attack: RST Scan] from source: 98.100.20.139, port 60027, Tuesday, January 08,2013 16:25:48
    [DoS Attack: RST Scan] from source: 107.10.168.27, port 11310, Tuesday, January 08,2013 16:21:36
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Tuesday, January 08,2013 15:37:17
    [DoS Attack: ACK Scan] from source: 46.105.126.221, port 443, Tuesday, January 08,2013 15:36:16
    [DoS Attack: RST Scan] from source: 86.41.37.49, port 27545, Tuesday, January 08,2013 15:02:57
    [DoS Attack: RST Scan] from source: 86.41.37.49, port 24924, Tuesday, January 08,2013 14:10:44
    [DoS Attack: ACK Scan] from source: 117.200.218.7, port 64978, Tuesday, January 08,2013 14:08:25
    [DoS Attack: RST Scan] from source: 85.252.252.130, port 10139, Tuesday, January 08,2013 12:14:23
    [DoS Attack: ACK Scan] from source: 77.126.27.181, port 62603, Tuesday, January 08,2013 11:52:03
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Tuesday, January 08,2013 10:30:49
    [DoS Attack: ACK Scan] from source: 80.83.238.87, port 46872, Tuesday, January 08,2013 10:27:21
    [DoS Attack: ACK Scan] from source: 80.83.238.87, port 46872, Tuesday, January 08,2013 10:24:44
    [DoS Attack: RST Scan] from source: 101.51.14.182, port 10830, Tuesday, January 08,2013 07:06:33
    [DoS Attack: ACK Scan] from source: 27.48.69.42, port 11584, Tuesday, January 08,2013 05:16:33
    **[DoS Attack: RST Scan] from source: 68.49.103.12, port 60615, Sunday, January 13,2013 21:09:49
    [DoS Attack: RST Scan] from source: 75.72.40.225, port 12345, Tuesday, January 08,2013 04:51:14
    [DoS Attack: ACK Scan] from source: 66.37.97.18, port 51413, Tuesday, January 08,2013 04:45:33
    [DoS Attack: RST Scan] from source: 190.213.211.145, port 42941, Tuesday, January 08,2013 04:02:44
    [DoS Attack: ACK Scan] from source: 81.108.214.251, port 32282, Tuesday, January 08,2013 02:28:23
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 19071, Tuesday, January 08,2013 02:26:56
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 13759, Tuesday, January 08,2013 02:15:45
    [DoS Attack: RST Scan] from source: 101.51.14.65, port 13591, Tuesday, January 08,2013 02:15:24
    [DoS Attack: RST Scan] from source: 95.135.72.191, port 2892, Tuesday, January 08,2013 01:34:22
    [DoS Attack: RST Scan] from source: 84.212.22.238, port 29225, Tuesday, January 08,2013 01:32:24
    [DoS Attack: RST Scan] from source: 190.213.211.145, port 61136, Tuesday, January 08,2013 01:23:48
    [DoS Attack: RST Scan] from source: 178.122.30.149, port 21765, Tuesday, January 08,2013 00:15:19
    JAN 7
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 25326, Monday, January 07,2013 23:48:08
    [DoS Attack: RST Scan] from source: 94.196.189.250, port 56241, Monday, January 07,2013 22:59:16
    [DoS Attack: RST Scan] from source: 89.204.176.151, port 53500, Monday, January 07,2013 22:18:24
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 12990, Monday, January 07,2013 20:48:45
    [DoS Attack: RST Scan] from source: 178.217.186.19, port 7172, Monday, January 07,2013 19:19:57
    [DoS Attack: RST Scan] from source: 82.168.3.226, port 18455, Monday, January 07,2013 17:04:27
    [DoS Attack: RST Scan] from source: 31.192.202.212, port 15103, Monday, January 07,2013 16:58:54
    [DoS Attack: RST Scan] from source: 72.218.220.46, port 60967, Monday, January 07,2013 16:40:11
    [DoS Attack: RST Scan] from source: 72.218.220.46, port 59934, Monday, January 07,2013 16:33:39
    [DoS Attack: RST Scan] from source: 80.213.184.67, port 16525, Monday, January 07,2013 16:29:00
    [DoS Attack: RST Scan] from source: 80.213.184.67, port 14735, Monday, January 07,2013 16:24:27
    [DoS Attack: RST Scan] from source: 210.23.84.203, port 52273, Monday, January 07,2013 12:39:07
    [DoS Attack: ACK Scan] from source: 89.207.56.133, port 1935, Monday, January 07,2013 11:48:57
    [DoS Attack: ACK Scan] from source: 89.207.56.133, port 1935, Monday, January 07,2013 11:41:56
    [DoS Attack: ACK Scan] from source: 90.192.238.74, port 61880, Sunday, January 13,2013 20:14:00
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:48:58
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:44:27
    [DoS Attack: RST Scan] from source: 75.137.20.235, port 41757, Monday, January 07,2013 05:42:51
    [DoS Attack: RST Scan] from source: 65.9.208.146, port 56767, Monday, January 07,2013 03:20:34Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 95.0.90.130, port 15779, Monday, January 07,2013 02:40:32
    JAN 6
    [DoS Attack: RST Scan] from source: 67.246.44.110, port 50627, Sunday, January 06,2013 23:54:14
    [DoS Attack: RST Scan] from source: 67.246.44.110, port 50286, Sunday, January 06,2013 23:49:42
    **[DoS Attack: RST Scan] from source: 99.177.248.151, port 65363, Sunday, January 13,2013 19:29:05
    **[DoS Attack: ACK Scan] from source: 68.56.191.28, port 60482, Sunday, January 13,2013 19:28:50
    **[DoS Attack: RST Scan] from source: 41.98.152.137, port 22266, Sunday, January 13,2013 19:16:09
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 13013, Sunday, January 06,2013 20:31:29Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 5.153.114.8, port 10403, Sunday, January 06,2013 19:39:53
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 58646, Sunday, January 06,2013 17:40:28
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 56107, Sunday, January 06,2013 17:29:44
    [DoS Attack: ACK Scan] from source: 90.215.123.146, port 61984, Sunday, January 06,2013 15:58:42
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 54178, Sunday, January 06,2013 12:58:21
    [DoS Attack: RST Scan] from source: 24.148.79.145, port 18350, Sunday, January 06,2013 12:46:34
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Sunday, January 06,2013 11:43:15
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60487, Sunday, January 06,2013 10:56:03
    [DoS Attack: RST Scan] from source: 68.105.7.165, port 64323, Sunday, January 06,2013 10:54:51
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60212, Sunday, January 06,2013 10:49:28
    [DoS Attack: ACK Scan] from source: 24.1.5.75, port 62874, Sunday, January 06,2013 10:49:17
    [DoS Attack: RST Scan] from source: 69.165.209.9, port 15709, Sunday, January 06,2013 09:48:41
    [DoS Attack: ACK Scan] from source: 61.42.85.214, port 150, Sunday, January 06,2013 09:39:22
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 07:57:42
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 07:54:45
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 06:53:58
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:57:09
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:44:12
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 05:38:34
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 03:53:34
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 03:38:37
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:46:20
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:42:15
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 02:38:21
    [DoS Attack: RST Scan] from source: 110.168.19.213, port 19024, Sunday, January 06,2013 01:44:01
    [DoS Attack: RST Scan] from source: 110.168.19.213, port 18642, Sunday, January 06,2013 01:42:18
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:38:24
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51827, Sunday, January 06,2013 01:25:13
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:24:34
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51764, Sunday, January 06,2013 01:18:13
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 57950, Sunday, January 06,2013 01:11:25
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51188, Sunday, January 06,2013 01:06:20
    [DoS Attack: RST Scan] from source: 66.230.80.186, port 56195, Sunday, January 06,2013 01:04:45
    [DoS Attack: RST Scan] from source: 186.14.120.174, port 51178, Sunday, January 06,2013 01:04:31
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 01:00:39Delivered-To: MyEmailAddy
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 00:49:38
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 06,2013 00:39:17
    [DoS Attack: RST Scan] from source: 94.242.214.225, port 27073, Sunday, January 06,2013 00:38:22
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 06,2013 00:37:45
    JAN 5
    [DoS Attack: RST Scan] from source: 76.29.122.181, port 46659, Saturday, January 05,2013 23:51:59
    [DoS Attack: RST Scan] from source: 174.71.101.245, port 59191, Saturday, January 05,2013 23:39:53
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61496, Saturday, January 05,2013 22:57:26
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 61086, Saturday, January 05,2013 22:50:26
    [DoS Attack: RST Scan] from source: 83.222.109.39, port 27076, Saturday, January 05,2013 16:59:11
    [DoS Attack: RST Scan] from source: 76.105.140.233, port 13275, Saturday, January 05,2013 10:53:10
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 10:53:04
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 10:51:25
    [DoS Attack: RST Scan] from source: 76.105.140.233, port 13275, Saturday, January 05,2013 10:47:06
    [DoS Attack: RST Scan] from source: 212.187.68.101, port 45958, Saturday, January 05,2013 07:50:06
    JAN 4
    [DoS Attack: RST Scan] from source: 114.245.222.112, port 62447, Friday, January 04,2013 23:50:54
    [DoS Attack: RST Scan] from source: 74.73.110.114, port 56968, Friday, January 04,2013 22:48:08
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 60089, Friday, January 04,2013 22:43:40
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 60088, Friday, January 04,2013 22:43:36
    [DoS Attack: RST Scan] from source: 83.108.43.143, port 24224, Friday, January 04,2013 20:44:08
    [DoS Attack: RST Scan] from source: 151.29.5.193, port 11397, Friday, January 04,2013 19:56:09
    [DoS Attack: RST Scan] from source: 98.212.124.27, port 57013, Friday, January 04,2013 18:43:46
    [DoS Attack: RST Scan] from source: 24.18.228.201, port 8713, Friday, January 04,2013 18:37:12
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 56055, Friday, January 04,2013 18:18:48
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 57808, Friday, January 04,2013 18:15:36
    [DoS Attack: RST Scan] from source: 186.23.19.110, port 32827, Friday, January 04,2013 18:13:24
    [DoS Attack: RST Scan] from source: 63.229.74.111, port 14183, Friday, January 04,2013 18:05:26
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 52475, Friday, January 04,2013 11:52:49
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 51591, Friday, January 04,2013 11:47:54
    [DoS Attack: ACK Scan] from source: 186.176.129.157, port 50634, Friday, January 04,2013 11:41:09
    [DoS Attack: RST Scan] from source: 59.44.121.218, port 12335, Friday, January 04,2013 09:40:04
    [DoS Attack: RST Scan] from source: 187.246.86.154, port 22936, Friday, January 04,2013 07:52:44
    [DoS Attack: RST Scan] from source: 187.246.86.154, port 22936, Friday, January 04,2013 07:39:29
    
    Mix of 13 and 14???
    [DoS Attack: ACK Scan] from source: 59.161.133.24, port 50665, Sunday, January 13,2013 15:54:45
    [DoS Attack: ACK Scan] from source: 122.148.195.34, port 53652, Monday, January 14,2013 11:26:53
    [DoS Attack: RST Scan] from source: 174.63.72.41, port 62132, Sunday, January 13,2013 13:59:04
    [DoS Attack: RST Scan] from source: 68.49.103.12, port 60012, Sunday, January 13,2013 13:49:30
    [DoS Attack: RST Scan] from source: 24.79.205.176, port 62511, Monday, January 14,2013 11:11:33
    [DoS Attack: RST Scan] from source: 62.165.204.35, port 7659, Monday, January 14,2013 10:57:43
    [DoS Attack: RST Scan] from source: 66.31.11.13, port 21671, Sunday, January 13,2013 10:32:00
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 64031, Sunday, January 13,2013 09:31:39
    [DoS Attack: RST Scan] from source: 109.163.226.89, port 80, Sunday, January 13,2013 09:00:25
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 62468, Sunday, January 13,2013 07:53:44
    [DoS Attack: RST Scan] from source: 24.69.58.217, port 60887, Sunday, January 13,2013 07:34:54
    [DoS Attack: RST Scan] from source: 108.183.204.48, port 6881, Sunday, January 13,2013 07:02:30
    [DoS Attack: ACK Scan] from source: 96.20.123.149, port 60871, Sunday, January 13,2013 06:49:50
    [DoS Attack: ACK Scan] from source: 118.128.229.40, port 61342, Sunday, January 13,2013 06:18:19
    [DoS Attack: RST Scan] from source: 216.115.133.183, port 11154, Sunday, January 13,2013 06:14:35
    [DoS Attack: RST Scan] from source: 67.42.47.173, port 13766, Sunday, January 13,2013 06:07:45
    [DoS Attack: RST Scan] from source: 112.203.92.223, port 50383, Sunday, January 13,2013 05:53:20
    [DoS Attack: ACK Scan] from source: 173.2.190.165, port 6976, Sunday, January 13,2013 05:16:20
    
    
    

    So yeah, 9th was a busy day. Other than that, nothing conclusive. And new attack types on the cards.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Just rebooted at the very end of a game of league of legends right as we turned it around. Fuming.

    MTU reduced to 1492 to see if that has any effect.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Appears to be less frequent in the last week, but still happening.


  • Registered Users, Registered Users 2 Posts: 1,666 ✭✭✭charlie_says


    You really should contact UPC. I would email your logs and concerns to abuse@upc.ie and also raise a ticket with their support department, as someone maybe attacking their network.

    Also there is no harm in PMing the UPC representatives here on boards in their forum in the biz talk to forum.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    I've come to the conclusion they're false positives.

    Found out the other night a friend living in the same area(half a mile away) is experiencing similar issues with instability.

    UPC know of this, but as we're bridging they couldnt give a rats arse.


  • Registered Users Posts: 70 ✭✭DublinC


    Hi ED_E,

    I removed my modem from bridged mode the other day and allowed it to run its regular router functions - still experienced the issues. I called them today and a support agent was more than willing to help. He said the information on his end looked right, he tinkered with some settings and said he'd call back later to see if the issue was still there.

    It was, and now a tech is scheduled for Monday. Just give them a call.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Been through all that already :pac:


  • Registered Users, Registered Users 2 Posts: 3,242 ✭✭✭DECEiFER


    ED E wrote: »
    Been through all that already :pac:
    If you have one of their "rented" TV boxes, send them a picture of you holding a gun to it and tell them if they don't sort your issues out, the Pace gets it!


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Ah we only have one of the terrible old SD units, doubt they'd care much :S


  • Registered Users, Registered Users 2 Posts: 3,242 ✭✭✭DECEiFER


    Ah, too bad. That's me out of ideas!


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Interested to see if its possible to lease multiple IPs like in your bridging thread, would be interesting if we could.


  • Registered Users, Registered Users 2 Posts: 3,242 ✭✭✭DECEiFER


    ED E wrote: »
    Interested to see if its possible to lease multiple IPs like in your bridging thread, would be interesting if we could.
    I believe it's possible. I *think* I tried it once but I'm fu*ked if I can remember completely. Others have said it does work in the thread so I'm mostly going on that information.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Game of League of legends almost ruined by it freaking just now :S


  • Registered Users Posts: 70 ✭✭DublinC


    Tech on Monday was able to confirm it was probably a network issue causing the drop outs. Another tech came out Thursday and switched out the modem, confident that would resolve it if they replaced it with a Thompson. Apparently the Cisco has an issue that's only become apparent in the past month or so, whereby speeds drop to 1mb/s and disconnect if you're running the higher (100+ I assume) speeds. Even with the Thompson the disconnects continued, phoned them up today and a tech will be out Monday to hopefully resolve it at last.

    Perhaps your issue is a network one, too.


  • Registered Users, Registered Users 2 Posts: 6,116 ✭✭✭starviewadams


    Experiencing drop outs here in D22 all night,have the white Thomson router,very annoying when trying to watch stuff on Netflix!

    When the router does reboot itself it spends about 10 minutes in 'local connection only' before a minute or two of full access before another reboot.First time I've had sn issue with UPC BB.


  • Registered Users, Registered Users 2 Posts: 1,232 ✭✭✭ferrigan101


    Have only had the Cisco EPC3925 for a few days now and experiencing speed drops, full on connection drop outs and random router restarts. Much the same as everyone else in this thread. Will get on to them first thing Monday morning and see what they have to say.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    DublinC wrote: »
    Tech on Monday was able to confirm it was probably a network issue causing the drop outs. Another tech came out Thursday and switched out the modem, confident that would resolve it if they replaced it with a Thompson. Apparently the Cisco has an issue that's only become apparent in the past month or so, whereby speeds drop to 1mb/s and disconnect if you're running the higher (100+ I assume) speeds. Even with the Thompson the disconnects continued, phoned them up today and a tech will be out Monday to hopefully resolve it at last.

    Perhaps your issue is a network one, too.

    32Mb but same symptoms.


  • Advertisement
  • Registered Users Posts: 70 ✭✭DublinC


    So yours too could be the network issue, as I'm on 120mb/s. The tech on Thursday said it would definitely be the modem causing it, but quite clearly he was wrong. A nice chap, though. They were able to confirm what I was saying when they viewed a graph on the connection and found it was dropping. The tech on Monday had the customer support agent check the connections for houses on the street who also use UPC, and found a similar pattern of disconnects.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    DublinC wrote: »
    So yours too could be the network issue, as I'm on 120mb/s. The tech on Thursday said it would definitely be the modem causing it, but quite clearly he was wrong. A nice chap, though. They were able to confirm what I was saying when they viewed a graph on the connection and found it was dropping. The tech on Monday had the customer support agent check the connections for houses on the street who also use UPC, and found a similar pattern of disconnects.

    Very interesting. A modem change didnt do it for us either.

    Would you mind PMing me the street you are on(in strict confidence) so I can talk to UPC and say we're having the same issues as your area. Would be good to have some ammo to throw at them.


  • Registered Users, Registered Users 2 Posts: 17,968 ✭✭✭✭Thargor


    Just posting to subscribe to this thread, nothing to offer really, for the last month or so our internet has been behaving like this aswell, turning on/off the router restores it to about 60 mb/sec for half an hour or so but then it drops off again to varying back and forth between Youtube videos loading instantly and torrents going at 2 mb/sec+ to not even being able to check my email, its driving me mad.

    The worst is early evening 17:30 to 20:00 pm, that's when I want RTE, TV3, BBC, CH4 players etc to catch up on programmes while we cook and eat but I haven't been able to do that in a month, they just refuse to stream, or else they work perfectly for 15 minutes then die.

    Completely headwrecking so if you get a solution OP or anyone else please keep this thread updated, thanks.


  • Registered Users, Registered Users 2 Posts: 1,935 ✭✭✭Anita Blow


    Happened to me intermittently yesterday and today it's just completely gone. Using my phone now. Very annoying


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Its been behaving for me for the last ~week.


  • Registered Users, Registered Users 2 Posts: 536 ✭✭✭Evil Sausage


    Have the same problems as everyone else on here. Poor quality service using the EPC2425, need to give the router a kick to get it back to expected speeds.

    Contacted UPC over the weekend, mailed them the details of the problem and pointed them towards this thread to say Im not the only one experiencing problems. Will see what they say when they get back to me.


  • Registered Users, Registered Users 2 Posts: 1,935 ✭✭✭Anita Blow


    Completely down in north dublin since 12. Customer rep says not back up til 5:30


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Mate down the road says his has been behaving too.

    I've pushed ours a fair bit and no sign of failure :eek: Might actually be fixed (I just jinxed it didint I).


  • Registered Users, Registered Users 2 Posts: 3,242 ✭✭✭DECEiFER


    I was told by my mother that she has made an appointment this week with UPC to fix drop-outs on her connection. She's using the Scientific Atlanta modem. I wonder if this really is an EPC3925 issue or something else now...?


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Mate had a tech in at the time but he wasnt home at the time so I dont know what was done.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 17,968 ✭✭✭✭Thargor


    Dead in Bray for the last couple of hours, tethering my phone with 3 AGAIN.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Thargor wrote: »
    Dead in Bray for the last couple of hours, tethering my phone with 3 AGAIN.

    If rebooting doesnt help then thats probably a different issue. We never had full downtime per say.


  • Registered Users, Registered Users 2 Posts: 17,968 ✭✭✭✭Thargor


    Well I have that issue aswell but I get 2-3 2 hour complete drops a week aswell, assumed they were part of the same thing, a reboot seems to have fixed this one anyway.


  • Registered Users, Registered Users 2 Posts: 2,624 ✭✭✭Thor


    My box(Cisco) reboots every night near around the same time(give to take a few hours) and even during the day at random times. It's starting to get annoying, but to be honest, having to contact UPC over yet another issue would just annoy me more. Although I don't see anything else I can do as it doesn't look like they are going to fix it themselves since I told them last.

    Since September their services have been off balance at best. before then, I had little to no issues with speed or connection stability, then I started getting serious speed issues which took over a month to sort out(I believe other people had/have the same issue). Then there was multiple billing issues that took ages to resolve(actually just this month).

    Not really sure what UPC are playing at lately, but it seems they are getting sloppy and lazy when it comes to connection/speed issues. The sad part is that there isn't much competition for them, so they have no incentive to fix the problems people are having, or at least fix them quickly.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Thor wrote: »

    Since September their services have been off balance at best. before then, I had little to no issues with speed or connection stability, then I started getting serious speed issues which took over a month to sort out(I believe other people had/have the same issue). Then there was multiple billing issues that took ages to resolve(actually just this month).

    Fits the timeline.


  • Registered Users Posts: 14 JockESpollix


    I had speed issues last week and now I'm getting constant disconnects with the 3925.
    I only have 1 PC connected by Ethernet at the moment and even sitting watching TV with the PC switched off, the router loses connection and the usual light show begins. It always gets as far as the 3rd light and stalls.
    Takes 6 or 7 power cycles before I get a connection.

    So far today it disconnected at 10:14 - 14:09 and 14:24 (didn't get it back until 14:56).

    I'm tech savvy and the problem is not on my end. It's a pathetic service to be paying for.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    I had speed issues last week and now I'm getting constant disconnects with the 3925.
    I only have 1 PC connected by Ethernet at the moment and even sitting watching TV with the PC switched off, the router loses connection and the usual light show begins. It always gets as far as the 3rd light and stalls.
    Takes 6 or 7 power cycles before I get a connection.

    So far today it disconnected at 10:14 - 14:09 and 14:24 (didn't get it back until 14:56).

    I'm tech savvy and the problem is not on my end. It's a pathetic service to be paying for.

    What are your line stats? You shouldnt have to cycle so many times, that sounds like a dodgy line.


  • Registered Users, Registered Users 2 Posts: 12,478 ✭✭✭✭gnfnrhead


    Dont know if its the same issue or even cause but mine acts up every couple of days. Have to open network and sharing and click the connection on the map at the top. Runs a troubleshoot and resets the connection. It'll be fine then for another few days when I have to do the same.

    Used to have to plug the whole lot out and wait a minute or two so this is much better but still annoying.


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    gnfnrhead wrote: »
    Dont know if its the same issue or even cause but mine acts up every couple of days. Have to open network and sharing and click the connection on the map at the top. Runs a troubleshoot and resets the connection. It'll be fine then for another few days when I have to do the same.

    Used to have to plug the whole lot out and wait a minute or two so this is much better but still annoying.

    Thats your computer not releasing, nothing to do with the router or UPC.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 12,478 ✭✭✭✭gnfnrhead


    ED E wrote: »
    Thats your computer not releasing, nothing to do with the router or UPC.

    It happens on both the laptop and pc. If it was one or the other, fair enough. But the exact same thing on both?


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    Do a firmware reset on the EPC (button on the back). Somethings up if its not renewing everyone properly.


  • Banned (with Prison Access) Posts: 514 ✭✭✭RUSTEDCORE


    Same problem
    random disconnects like DOS attacks {ive been DOS attacked before}
    Speeds at like .2 mb /150 mb at times

    Im not getting a log though.

    FYI those IP,s could be DOS through proxy server


  • Registered Users, Registered Users 2 Posts: 17,968 ✭✭✭✭Thargor


    Didnt realise DOS attacks were so common against random individuals.


  • Banned (with Prison Access) Posts: 514 ✭✭✭RUSTEDCORE


    Thargor wrote: »
    Didnt realise DOS attacks were so common against random individuals.

    Ive known xbox gamers to add someone to an hourly auto DOS list for slightly annoying them.

    I know a guy who does it to his friends so they lose and cant get a better rank...its all over kids getting competitive on GB


  • Registered Users, Registered Users 2 Posts: 15,369 ✭✭✭✭Oat23


    Dropped out on me 3 times last night, first time was for 3 minutes, second for around 10 and the third was for over 30 before I went to bed. Thought it would be fixed this morning, but my speeds are shocking. Not even getting 1MB on the UPC speedtest, can't even load speedtest.net.

    First problems I've had with the Cisco router since I got it a few months ago.

    Checked the logs and I'm not getting attacked.

    Edit: I've reset my router 3 times and each time I have been assigned a new IP address. Before it started with 79. and my latest one starts with 89.
    Is that normal? I never knew you could get a new IP on UPC by simply resetting the router! I know you can in the UK with Virgin.


  • Advertisement
  • Registered Users, Registered Users 2 Posts: 1,476 ✭✭✭sarkozy


    Mine has gone insane the last few days. I can't do anything anymore. Even writing this took 20 minutes. I'm on Mac and the connection just drops ALL THE TIME.

    This seems like a wider problem?


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    sarkozy wrote: »
    Mine has gone insane the last few days. I can't do anything anymore. Even writing this took 20 minutes. I'm on Mac and the connection just drops ALL THE TIME.

    This seems like a wider problem?

    Yeah, I'm leaning towards overall network mismanagement. They may have gone to far with the last package upgrade(30-50 and so on).


  • Banned (with Prison Access) Posts: 514 ✭✭✭RUSTEDCORE


    could this be related to the recent issues with microsoft?
    I have always expected their fix may be a dodgy workaround and mine can be fine then 5 minutes on the 360 and it drops.

    Any of you accessing microsoft servers before dropouts?


  • Registered Users, Registered Users 2 Posts: 36,169 ✭✭✭✭ED E


    RUSTEDCORE wrote: »
    could this be related to the recent issues with microsoft?
    I have always expected their fix may be a dodgy workaround and mine can be fine then 5 minutes on the 360 and it drops.

    Any of you accessing microsoft servers before dropouts?

    Anyone running windows could be at any time...


  • Banned (with Prison Access) Posts: 514 ✭✭✭RUSTEDCORE


    ED E wrote: »
    Anyone running windows could be at any time...

    I was more talking about the servers which couldnt be accessed before such as xbox and certain websites...not their updates etc I dont think they matter.


  • Advertisement
Advertisement