En los últimos días, me he dado cuenta de que el registro de mi enrutador inalámbrico muestra un ataque de ACK de varias direcciones IP. Yo uso un D-Link DIR-600L. He buscado a través de Internet, también a través de esta pregunta. Pero no puedo llegar a ninguna solución. Mi ISP me recomendó cambiar las direcciones IP de DNS e ingresarlas manualmente. Al hacerlo todavía no mejoraron los resultados. De hecho, ahora algunos sitios web no se abren y obtengo HTTP Error 404
al iniciar sesión en Facebook desde Chrome, no en otros navegadores. Se borró todo el historial también, nada cambió. MalwareBytes Anti Malware mostró que mi sistema es claro. Restablecer el enrutador a los valores predeterminados de fábrica solo resuelve el problema por un período de tiempo. Utilizo una conexión PPPoE, donde un cable del ISP se conecta al enrutador y, desde allí, un cable de Ethernet a mi computadora.
Aquí hay una parte del archivo de registro que almacené recientemente en la computadora:
Mar 03 22:50:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:50:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:49:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:49:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:48:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:48:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:47:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:47:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:46:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 22:46:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:46:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:45:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 22:45:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:45:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:42:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:41:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:41:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:40:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:40:12 DHCP lease IP 192.168.0.101 to Ayush-PC 90-94-e4-81-d5-69<br>
Mar 03 22:36:40 Per-source UDP Flood Attack Detect Packet Dropped<br>
Mar 03 22:36:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:35:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 22:35:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:13:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:12:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:08:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:00:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 22:00:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:59:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:58:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:51:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:50:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:50:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:49:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:49:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:48:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:48:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:47:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 21:47:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:47:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:46:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:46:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:45:40 Per-source UDP Flood Attack Detect Packet Dropped<br>
Mar 03 21:45:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:45:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:44:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:43:40 Per-source UDP Flood Attack Detect Packet Dropped<br>
Mar 03 21:43:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:41:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 21:41:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:41:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:41:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:40:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:38:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:37:18 DHCP lease IP 192.168.0.101 to Ayush-PC 90-94-e4-81-d5-69<br>
Mar 03 21:30:24 DHCP lease IP 192.168.0.103 to android-8b858b6c6689a266 94-01-c2-23-e9-e1<br>
Mar 03 21:30:24 Authentication Success 94-01-c2-23-e9-e1<br>
Mar 03 21:30:24 Authenticating...... 94-01-c2-23-e9-e1<br>
Mar 03 21:28:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:27:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:26:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:26:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:25:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:24:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:23:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:19:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:18:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:18:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:15:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:15:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:11:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:08:40 Whole System UDP Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:06:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:06:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:04:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 21:04:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:04:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:03:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:01:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:01:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 21:00:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 21:00:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 21:00:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:59:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 20:59:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:56:40 Whole System SYN Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:32:19 DHCP lease IP 192.168.0.103 to android-8b858b6c6689a266 94-01-c2-23-e9-e1<br>
Mar 03 20:32:18 Authentication Success 94-01-c2-23-e9-e1<br>
Mar 03 20:32:18 Authenticating...... 94-01-c2-23-e9-e1<br>
Mar 03 20:30:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:29:06 DHCP lease IP 192.168.0.103 to android-8b858b6c6689a266 94-01-c2-23-e9-e1<br>
Mar 03 20:29:05 Authentication Success 94-01-c2-23-e9-e1<br>
Mar 03 20:29:05 Authenticating...... 94-01-c2-23-e9-e1<br>
Mar 03 20:26:16 DHCP lease IP 192.168.0.103 to android-8b858b6c6689a266 94-01-c2-23-e9-e1<br>
Mar 03 20:26:15 Authentication Success 94-01-c2-23-e9-e1<br>
Mar 03 20:26:15 Authenticating...... 94-01-c2-23-e9-e1<br>
Mar 03 20:03:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 20:03:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:02:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 20:02:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:01:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 20:01:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 20:00:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 20:00:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:59:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:59:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:55:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:42:53 DHCP lease IP 192.168.0.103 to android-8b858b6c6689a266 94-01-c2-23-e9-e1<br>
Mar 03 19:42:49 Authentication Success 94-01-c2-23-e9-e1<br>
Mar 03 19:42:49 Authenticating...... 94-01-c2-23-e9-e1<br>
Mar 03 19:35:38 Remote management is disabled. <br>
Mar 03 19:35:38 Anti-spoofing enabled. <br>
Mar 03 19:35:38 Block WAN PING enabled. <br>
Mar 03 19:35:37 URL Blocking disabled. <br>
Mar 03 19:35:37 RTSP ALG enabled. <br>
Mar 03 19:35:37 VPN (IPsec) Pass-Through enabled. <br>
Mar 03 19:35:37 VPN (PPTP) Pass-Through enabled. <br>
Mar 03 19:35:37 VPN (L2TP) Pass-Through enabled. <br>
Mar 03 14:05:35 PPPoE line connected <br>
Mar 03 19:35:33 CHAP authentication succeeded <br>
Mar 03 19:35:30 PPPoE: Receive PADS <br>
Mar 03 19:35:30 PPPoE: Sending PADR <br>
Mar 03 19:35:30 WAN Dialup Try to establish PPPoE line<br>
Mar 03 19:35:30 PPPoE: Sending PADI <br>
Mar 03 19:34:31 Manual Hangup Disconnect PPPoE line<br>
Mar 03 19:34:30 CHAP authentication failed <br>
Mar 03 19:34:25 PPPoE: Receive PADS <br>
Mar 03 19:34:25 PPPoE: Sending PADR <br>
Mar 03 19:34:25 WAN Dialup Try to establish PPPoE line<br>
Mar 03 19:34:25 PPPoE: Sending PADI <br>
Mar 03 19:32:57 Manual Hangup Disconnect PPPoE line<br>
Mar 03 19:30:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 19:30:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:30:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:29:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:29:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:28:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:28:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:27:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:27:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:26:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:26:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:25:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:25:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:24:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:24:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:23:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:23:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:22:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 19:22:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:22:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:21:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 19:21:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:21:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:20:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:20:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:19:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:19:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:19:40 Whole System ICMP Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:18:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:18:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:17:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:17:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:16:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:16:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:15:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:15:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:14:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:14:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:13:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 19:13:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:13:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:12:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:12:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 13:41:20 Remote management is disabled. <br>
Mar 03 13:41:20 Anti-spoofing enabled. <br>
Mar 03 13:41:20 Block WAN PING enabled. <br>
Mar 03 13:41:20 URL Blocking disabled. <br>
Mar 03 13:41:20 RTSP ALG enabled. <br>
Mar 03 13:41:20 VPN (IPsec) Pass-Through enabled. <br>
Mar 03 13:41:20 VPN (PPTP) Pass-Through enabled. <br>
Mar 03 13:41:20 VPN (L2TP) Pass-Through enabled. <br>
Mar 03 13:41:18 PPPoE line connected <br>
Mar 03 19:11:16 CHAP authentication succeeded <br>
Mar 03 19:11:13 PPPoE: Receive PADS <br>
Mar 03 19:11:13 PPPoE: Sending PADR <br>
Mar 03 19:11:08 PPPoE: Sending PADR <br>
Mar 03 19:11:08 WAN Dialup Try to establish PPPoE line<br>
Mar 03 19:11:08 PPPoE: Sending PADI <br>
Mar 03 19:10:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:10:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:10:11 Manual Hangup Disconnect PPPoE line<br>
Mar 03 19:09:40 Port Scan Attack Detect Packet Dropped<br>
Mar 03 19:09:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:09:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:08:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:08:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:07:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Mar 03 19:07:40 Whole System ACK Flood Attack from WAN Rule:Default deny<br>
Mar 03 19:06:40 Per-source ACK Flood Attack Detect Packet Dropped<br>
Es interesante que casi todos los ataques se producen a intervalos de 1 minuto
ha estado ralentizando mi internet. ¿Cómo lo prevengo?
Editar : tengo la siguiente configuración en mi enrutador
- Comprobación contra la falsificación: ENCENDIDO
- Cortafuegos: DESACTIVADO
- DMZ: DESACTIVADO
- WPS: OFF
- Inalámbrico mejorado: DESACTIVADO
- Preámbulo: Corto
- Selección de canal: Auto
- Modo: 802.11 mixto (n / g / b)
- ancho de banda: automático
- 20 / 40Mhz coexisten: OFF
- Guardia Corta: ENCENDIDO
- UPnP: ON
- Secuencia de multidifusión: ENCENDIDO
- DNS Relay: ON