路由器被 Dos 攻击,该怎么解决?

2014-12-27 22:50:54 +08:00
 qazzaqqazzaq

宿舍的路由,近期网络经常被干扰,很多网页都打开很慢。该怎么解决?重启只能暂时解决。
部分路由日记:
[remote login] from source 192.168.1.1, Saturday, December 27, 2014 22:45:49
[DoS Attack: ACK Scan] from source: 106.185.34.168, port 53063, Saturday, December 27, 2014 22:19:05
[DHCP IP: 192.168.1.12] to MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 22:07:54
[DHCP IP: 192.168.1.15] to MAC address 28:d2:44:58:eb:de, Saturday, December 27, 2014 22:05:19
[DoS Attack: ACK Scan] from source: 123.151.10.169, port 80, Saturday, December 27, 2014 21:58:30
[DHCP IP: 192.168.1.36] to MAC address b8:88:e3:7b:b9:9e, Saturday, December 27, 2014 21:52:26
[DoS Attack: ACK Scan] from source: 221.204.7.221, port 80, Saturday, December 27, 2014 21:50:45
[DoS Attack: ACK Scan] from source: 101.227.15.3, port 80, Saturday, December 27, 2014 21:49:52
[DoS Attack: ACK Scan] from source: 101.227.15.35, port 80, Saturday, December 27, 2014 21:49:46
[DoS Attack: ACK Scan] from source: 101.227.15.3, port 80, Saturday, December 27, 2014 21:48:36
[DoS Attack: ACK Scan] from source: 101.226.167.18, port 80, Saturday, December 27, 2014 21:48:28
[DoS Attack: ACK Scan] from source: 183.136.133.11, port 80, Saturday, December 27, 2014 21:48:08
[DoS Attack: ACK Scan] from source: 101.226.167.18, port 80, Saturday, December 27, 2014 21:47:39
[DoS Attack: ACK Scan] from source: 183.136.133.11, port 80, Saturday, December 27, 2014 21:46:56
[DoS Attack: ACK Scan] from source: 125.90.204.122, port 443, Saturday, December 27, 2014 21:40:45
[DHCP IP: 192.168.1.140] to MAC address 30:85:a9:06:51:df, Saturday, December 27, 2014 21:39:26
[DHCP IP: 192.168.1.36] to MAC address b8:88:e3:7b:b9:9e, Saturday, December 27, 2014 21:38:06
[DoS Attack: ACK Scan] from source: 125.90.204.122, port 443, Saturday, December 27, 2014 21:33:16
[DHCP IP: 192.168.1.32] to MAC address b8:88:e3:74:3b:9e, Saturday, December 27, 2014 21:28:59
[DHCP IP: 192.168.1.173] to MAC address 10:bf:48:15:8d:0d, Saturday, December 27, 2014 20:13:32
[DHCP IP: 192.168.1.23] to MAC address 78:92:9c:9c:bd:a0, Saturday, December 27, 2014 20:13:31
[DoS Attack: RST Scan] from source: 149.126.72.217, port 80, Saturday, December 27, 2014 19:01:33
[DoS Attack: ACK Scan] from source: 220.181.91.193, port 80, Saturday, December 27, 2014 18:41:43
[DHCP IP: 192.168.1.36] to MAC address b8:88:e3:7b:b9:9e, Saturday, December 27, 2014 18:39:37
[DoS Attack: ACK Scan] from source: 218.30.118.112, port 80, Saturday, December 27, 2014 18:08:54
[DoS Attack: ACK Scan] from source: 218.30.118.108, port 80, Saturday, December 27, 2014 18:08:41
[DoS Attack: ACK Scan] from source: 218.30.118.112, port 80, Saturday, December 27, 2014 18:08:09
[DoS Attack: ACK Scan] from source: 218.30.118.108, port 80, Saturday, December 27, 2014 18:08:04
[DoS Attack: ACK Scan] from source: 218.30.118.112, port 80, Saturday, December 27, 2014 18:07:46
[DHCP IP: 192.168.1.12] to MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:54:10
[DoS Attack: ACK Scan] from source: 58.221.75.172, port 80, Saturday, December 27, 2014 17:24:10
[WLAN access rejected: incorrect security] from MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:22:34
[DoS Attack: ACK Scan] from source: 182.118.46.143, port 80, Saturday, December 27, 2014 17:20:40
[WLAN access rejected: incorrect security] from MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:20:37
[DoS Attack: ACK Scan] from source: 182.118.46.143, port 80, Saturday, December 27, 2014 17:20:00
[DoS Attack: ACK Scan] from source: 42.62.3.175, port 80, Saturday, December 27, 2014 17:19:54
[WLAN access rejected: incorrect security] from MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:19:50
[DoS Attack: ACK Scan] from source: 42.62.3.175, port 80, Saturday, December 27, 2014 17:19:22
[WLAN access rejected: incorrect security] from MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:17:25
[DHCP IP: 192.168.1.12] to MAC address 38:bc:1a:32:52:e1, Saturday, December 27, 2014 17:08:17
[DoS Attack: ACK Scan] from source: 183.95.152.119, port 80, Saturday, December 27, 2014 16:51:10
[DHCP IP: 192.168.1.15] to MAC address 28:d2:44:58:eb:de, Saturday, December 27, 2014 16:25:21
[UPnP set event: del_nat_rule] from source 192.168.1.36, Saturday, December 27, 2014 16:23:33
[LAN access from remote] from 58.208.135.151:46727 to 192.168.1.36:10703, Saturday, December 27, 2014 16:23:24
[LAN access from remote] from 211.162.57.221:12312 to 192.168.1.36:10703, Saturday, December 27, 2014 16:23:22
[LAN access from remote] from 211.162.57.221:13467 to 192.168.1.36:10703, Saturday, December 27, 2014 16:23:22
[LAN access from remote] from 58.67.136.210:8702 to 192.168.1.36:10703, Saturday, December 27, 2014 16:23:22
[LAN access from remote] from 113.109.42.163:1520 to 192.168.1.36:10703, Saturday, December 27, 2014 16:23:21

11048 次点击
所在节点    问与答
7 条回复
halczy
2014-12-27 22:59:17 +08:00
路由是什么牌子/系统? 如果是动态IP重拨一下就是了.
qazzaqqazzaq
2014-12-27 23:14:59 +08:00
@halczy 网件的。是动态IP的,但最近一直被Dos攻击,不知得罪了谁。
kqz901002
2014-12-27 23:40:55 +08:00
@qazzaqqazzaq 开启防火墙?netgear的板子应该能抗ddns吧
halczy
2014-12-27 23:41:08 +08:00
@qazzaqqazzaq 查了一下, 你没有被DOS, NETGEAR误报而已.
kqz901002
2014-12-27 23:41:26 +08:00
@qazzaqqazzaq 开启防火墙?netgear的板子应该能抗dos吧
qazzaqqazzaq
2014-12-28 00:05:42 +08:00
@halczy 不过最近的网络也变得很糟糕,广州,长宽。以前打开类似知乎、cnbeta、v2ex等都很快,但是现在都要缓三五秒钟才能加载,所以觉得可能是路由出现问题了。
xieyudi1990
2014-12-28 05:28:38 +08:00
以前总有逗逼把路由器的LAN口接到校园网上, 又不关DHCP, ...
碰到这种我用2台机器每台100M不间断SYN, 高火力反制.

这是一个专为移动设备优化的页面(即为了让你能够在 Google 搜索结果里秒开这个页面),如果你希望参与 V2EX 社区的讨论,你可以继续到 V2EX 上打开本讨论主题的完整版本。

https://www.v2ex.com/t/157234

V2EX 是创意工作者们的社区,是一个分享自己正在做的有趣事物、交流想法,可以遇见新朋友甚至新机会的地方。

V2EX is a community of developers, designers and creative people.

© 2021 V2EX