Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.
Trending News
My internet has gone really slow lately, is it because of [DoS] Attacks.?
I have been getting slow internet, I looked into my router settings and found this in Security Logs:
[DoS attack]from source:85.241.54.113, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=48 ID=25785 DF PROTO=TCP SPT:64371 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:32
[DoS attack]from source:92.18.22.86, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=9333 DF PROTO=TCP SPT:64666 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:33
[DoS attack]from source:69.143.244.234, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=30477 DF PROTO=TCP SPT:56963 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:41
[DoS attack]from source:176.14.96.206, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=18935 DF PROTO=TCP SPT:2432 DPT:56521 WINDOW=64380 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:41
[DoS attack]from source:174.134.232.13, destination source:192.168.0.5 LEN=64 TOS=0x00 PREC=0x00 TTL=46 ID=33135 DF PROTO=TCP SPT:59944 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:41
[DoS attack]from source:96.56.1.122, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=106 ID=9120 DF PROTO=TCP SPT:49814 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:41
[DoS attack]from source:174.134.232.13, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=46 ID=33126 DF PROTO=TCP SPT:59944 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:47
[DoS attack]from source:189.106.183.102, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=8390 DF PROTO=TCP SPT:39284 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:47
[DoS attack]from source:88.218.90.158, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=40423 DF PROTO=TCP SPT:3493 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:47
[DoS attack]from source:78.84.172.206, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=115 ID=28976 DF PROTO=TCP SPT:54813 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:47
[DoS attack]from source:82.9.207.41, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=16425 DF PROTO=TCP SPT:52078 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:48
[DoS attack]from source:207.191.252.26, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=112 ID=7410 DF PROTO=TCP SPT:53061 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:48
[DoS attack]from source:84.215.240.37, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=4433 DF PROTO=TCP SPT:50115 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:49
[DoS attack]from source:174.134.232.13, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=46 ID=1313 DF PROTO=TCP SPT:59944 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:51
[DoS attack]from source:82.9.207.41, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=118 ID=16540 DF PROTO=TCP SPT:52078 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:51
[DoS attack]from source:78.84.172.206, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=115 ID=30427 DF PROTO=TCP SPT:54813 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:53
[DoS attack]from source:89.176.215.182, destination source:192.168.0.5 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=29393 DF PROTO=TCP SPT:60419 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:53
[DoS attack]from source:86.161.185.128, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=108 ID=27330 DF PROTO=TCP SPT:4904 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:55
[DoS attack]from source:189.106.183.102, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=112 ID=8624 DF PROTO=TCP SPT:39284 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:56
[DoS attack]from source:24.90.39.186, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=540 DF PROTO=TCP SPT:3229 DPT:56521 WINDOW=65535 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:56
[DoS attack]from source:78.72.170.236, destination source:192.168.0.5 LEN=56 TOS=0x00 PREC=0x00 TTL=113 ID=1198 DF PROTO=TCP SPT:61826 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:56
[DoS attack]from source:93.139.181.18, destination source:192.168.0.5 LEN=48 TOS=0x00 PREC=0x00 TTL=19 ID=3536 DF PROTO=TCP SPT:51194 DPT:56521 WINDOW=8192 RES=0x00 SYN URGP=0 - Sun, 2011-11-06 14:02:56
There are more but I will run out of characters.
Is there anything I can do to prevent this:
Virginmedia 10MB/s connection.
Please help, do I have a virus, how can I troubleshoot?
3 Answers
- 4 years ago
easily a small team of human beings can gain this. Why? via fact they are in a position to and get their jollies from screwing human beings up. it works like this. shall we take objective (AOL internet messenger). final 3 hundred and sixty 5 days a malicious software pipeline.W32 became into pointed out which used a loophole and time-honored itself on machines. It became into curiously organising an extremely state-of-the-paintings bot internet. It allowed specific ips to take over administration of the contaminated laptop and use it for its very own purposes. probably DOS assaults. The administration ip can take administration and use all the contaminated computers to concurrently link to the objective web site. this is the time-honored approach of the form of ingredient. it would, theoretically in basic terms take one guy or woman to start it.
- Anonymous10 years ago
Yes... seems like Denial of Service. Run a virus scan.If it doesn't pick up on anything, run another virus scan by installing a different one (and installing the original virus scan). Eventully a viru scan will pick it up