SketchUP
Utente Attivo
- Messaggi
- 874
- Reazioni
- 24
- Punteggio
- 46
Ciao a tutti.
Oggi, casualmente, a causa di un'anomalo aumento di ping in Battlefield 4 (che sta durando da tutta la giornata) sono entrato nel pannello di amministrazione del ruoter e ho trovato scritto parecchie volte DoS attack.
Mi sono giustamente preoccupato non intendendomene e non vorrei che il ping di Battlefield 4 sia determinato da ciò (prima non superavo i 100, stavo sui 40-50-70; ora sui 250-300).
Un amico mi ha detto che durante il download tramite torrent, alcune persone, rintracciando il mio IP potrebbero inviare degli attacchi DoS per aumentare la loro velocità di download (se non ho capito male le sue parole).
Comunque, vorrei sapere se è una cosa normale e se è questo che influisce sul Ping in gioco. Eventualmente qualche opinione su come risolvere questo problema.
Grazie!
p.s.: non sono collegati altri dispositivi al router.
Oggi, casualmente, a causa di un'anomalo aumento di ping in Battlefield 4 (che sta durando da tutta la giornata) sono entrato nel pannello di amministrazione del ruoter e ho trovato scritto parecchie volte DoS attack.
Mi sono giustamente preoccupato non intendendomene e non vorrei che il ping di Battlefield 4 sia determinato da ciò (prima non superavo i 100, stavo sui 40-50-70; ora sui 250-300).
Un amico mi ha detto che durante il download tramite torrent, alcune persone, rintracciando il mio IP potrebbero inviare degli attacchi DoS per aumentare la loro velocità di download (se non ho capito male le sue parole).
Comunque, vorrei sapere se è una cosa normale e se è questo che influisce sul Ping in gioco. Eventualmente qualche opinione su come risolvere questo problema.
Grazie!
p.s.: non sono collegati altri dispositivi al router.
[admin login] from source 192.168.0.2, Friday, January 31,2014 16:15:19
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 16:14:54
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 16:14:40
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 16:14:11
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 16:05:51
[DoS attack: RST Scan] from source: 54.235.168.25:80, Friday, January 31,2014 16:05:33
[DoS attack: RST Scan] from source: 23.23.225.232:80, Friday, January 31,2014 15:59:33
[DoS attack: RST Scan] from source: 107.22.244.238:80, Friday, January 31,2014 15:56:34
[DoS attack: RST Scan] from source: 23.23.225.232:80, Friday, January 31,2014 15:55:33
[DoS attack: RST Scan] from source: 23.21.150.254:80, Friday, January 31,2014 15:54:33
[DoS attack: RST Scan] from source: 23.21.150.254:80, Friday, January 31,2014 15:53:33
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:43:33
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:42:33
[DoS attack: ACK Scan] from source: 173.194.70.95:443, Friday, January 31,2014 15:33:35
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:33:33
[DoS attack: ACK Scan] from source: 173.194.70.95:443, Friday, January 31,2014 15:33:15
[DoS attack: RST Scan] from source: 207.198.117.143:80, Friday, January 31,2014 15:29:16
[admin login] from source 192.168.0.2, Friday, January 31,2014 15:24:10
[DoS attack: ACK Scan] from source: 192.204.3.80:80, Friday, January 31,2014 15:21:41
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:21:07
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:20:19
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:19:55
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 15:17:19
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:12:34
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:04:32
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:03:32
[DoS attack: ACK Scan] from source: 173.194.116.10:443, Friday, January 31,2014 14:58:47
[DoS attack: ACK Scan] from source: 50.116.198.94:8000, Friday, January 31,2014 14:55:47
[DoS attack: ACK Scan] from source: 50.116.198.94:8000, Friday, January 31,2014 14:55:21
[Time synchronized with NTP server time-g.netgear.com] Friday, January 31,2014 14:53:25
[Internet connected] IP address: 87.0.254.68, Friday, January 31,2014 14:51:28
[DSL: Up] Friday, January 31,2014 14:51:23
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 14:50:46
[Initialized, firmware version: V1.1.00.23_1.00.23 ] Friday, January 31,2014 14:50:31
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 16:14:54
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 16:14:40
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 16:14:11
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 16:05:51
[DoS attack: RST Scan] from source: 54.235.168.25:80, Friday, January 31,2014 16:05:33
[DoS attack: RST Scan] from source: 23.23.225.232:80, Friday, January 31,2014 15:59:33
[DoS attack: RST Scan] from source: 107.22.244.238:80, Friday, January 31,2014 15:56:34
[DoS attack: RST Scan] from source: 23.23.225.232:80, Friday, January 31,2014 15:55:33
[DoS attack: RST Scan] from source: 23.21.150.254:80, Friday, January 31,2014 15:54:33
[DoS attack: RST Scan] from source: 23.21.150.254:80, Friday, January 31,2014 15:53:33
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:43:33
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:42:33
[DoS attack: ACK Scan] from source: 173.194.70.95:443, Friday, January 31,2014 15:33:35
[DoS attack: RST Scan] from source: 23.21.239.206:80, Friday, January 31,2014 15:33:33
[DoS attack: ACK Scan] from source: 173.194.70.95:443, Friday, January 31,2014 15:33:15
[DoS attack: RST Scan] from source: 207.198.117.143:80, Friday, January 31,2014 15:29:16
[admin login] from source 192.168.0.2, Friday, January 31,2014 15:24:10
[DoS attack: ACK Scan] from source: 192.204.3.80:80, Friday, January 31,2014 15:21:41
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:21:07
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:20:19
[DoS attack: ACK Scan] from source: 209.197.27.38:80, Friday, January 31,2014 15:19:55
[UPnP set event:AddPortMapping] from source 192.168.0.2, Friday, January 31,2014 15:17:19
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:12:34
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:04:32
[DoS attack: RST Scan] from source: 23.23.102.148:80, Friday, January 31,2014 15:03:32
[DoS attack: ACK Scan] from source: 173.194.116.10:443, Friday, January 31,2014 14:58:47
[DoS attack: ACK Scan] from source: 50.116.198.94:8000, Friday, January 31,2014 14:55:47
[DoS attack: ACK Scan] from source: 50.116.198.94:8000, Friday, January 31,2014 14:55:21
[Time synchronized with NTP server time-g.netgear.com] Friday, January 31,2014 14:53:25
[Internet connected] IP address: 87.0.254.68, Friday, January 31,2014 14:51:28
[DSL: Up] Friday, January 31,2014 14:51:23
[DHCP IP: (192.168.0.2)] to MAC address 10:BF:48:E1:10:CA, Friday, January 31,2014 14:50:46
[Initialized, firmware version: V1.1.00.23_1.00.23 ] Friday, January 31,2014 14:50:31