iNtensimilla Skrevet 25. mars 2009 Del Skrevet 25. mars 2009 Hei. Her om dagen(lørdag) skulle jeg finne hjemmesiden til UKCS for å spille på deres CSS servere. Jeg husket feil, og trodde det het UKCSS, og søkte på dette på google. Jeg UKCS er jo britisk, så jeg prøvde å gå inn på en side som het www.UKCSS.co.uk, her fikk jeg en melding om at denne siden ikke var sikker, men jeg trodde dette var den samme gamle UKCS siden, og ignorerte advarselen. Det skulle jeg ikke gjort. På siden poppet det opp masse "Antivirus" greier, så jeg måtte spamme ALT-F4 for å komme meg ut. Jeg trodde det hadde gått greit, siden jeg ikke hadde fått noen varsler fra Avast eller noen andre programmer. I går skrudde jeg på PCen igjen for første gang siden det skjedde, og jeg hadde ikke noe internett, så jeg regnet med at det var et virus som hindret meg å komme meg på nettet. Så jeg sjekket loggen til ruteren, og der sto det masse [DoS attack: RTS scan] osv nedover hele, fra forskjellige adresser igjennom flere porter, mange var 80 porter, og mange var 4060-4069 porter. Jeg kjørte med en gang scan fra Avast og Windows Defender, kjørte CCleaner, og sperret alle IP adresser igjennom 4060-4069. Hverken Avast eller Windows Defender fant noenting, og etter hvert ble angrepet mer skadelig, den begynte å fylle opp det fysiske minnet, og maskinen ble treig, til helt ubrukelig. Jeg ga til slutt opp og skrudde av PCen, jeg har ikke peiling på hva jeg kan gjøre med dette. Noen som kan hjelpe meg med dette? Blir jeg nødt til å formatere PCen og flashe ruteren? Går det igjennom nettet, så jeg bør ikke logge på med andre maskiner på nettet? Kan det legge seg på eksterne enheter, USB penner og USB harddisken? Har ikke lyst til å formatere, da mister jeg mye lagret data, da jeg bare har en intern harddisk og en full ekstern harddisk.. Mvh, Eirik. Lenke til kommentar
kjeLL// Skrevet 25. mars 2009 Del Skrevet 25. mars 2009 instaler windows på ny. om du har mye greier på hardisken, så kan du starte ubuntu eller lignene, og hente ut det du vill ha fra hardisken. kan være lurt å skaffe seg en ny internett ip også. Lenke til kommentar
snippsat Skrevet 25. mars 2009 Del Skrevet 25. mars 2009 Kjør igjennom Veiledningen loggene poster du her i tråden din. Lenke til kommentar
iNtensimilla Skrevet 25. mars 2009 Forfatter Del Skrevet 25. mars 2009 Hva med å prøve å finne en brannmur som klarer å blokkere dette, så fjerne alle spor(legger DoS seg på maskinen?), så få ISP til å blokkere disse adressene og gi meg en ny IP adresse? Lenke til kommentar
snippsat Skrevet 25. mars 2009 Del Skrevet 25. mars 2009 Kontakt ISP og få dem til og hjelpe deg. Det og sette opp gratis brannmur som comodo eller online armor kan hjelpe. Er angrepet stort nok må du nok ha hjelp av ISP. Det kan være en fordel og kjøre veiledningen,så er vi helt sikker at du ikke har noe maleware som kan kontaktes. Lenke til kommentar
iNtensimilla Skrevet 2. april 2009 Forfatter Del Skrevet 2. april 2009 Nå har jeg fått fjernet en Hijack.Desktop(ettellerannet, hvor finner jeg loggen til MBAM?), og har fått ISP til å skifte IP'en min, så ATM har jeg internett forbindelse, men er redd for at det fortsatt ligger noe på pcen min som hackerene kan spore opp.. Her er loggen fra Hijackthis søket: Klikk for å se/fjerne innholdet nedenfor Logfile of Trend Micro HijackThis v2.0.2Scan saved at 18:00:25, on 02.04.2009 Platform: Windows Vista SP1 (WinNT 6.00.1905) MSIE: Internet Explorer v7.00 (7.00.6001.18000) Boot mode: Normal Running processes: C:\Program Files (x86)\Common Files\Nero\Lib\NMBgMonitor.exe C:\Program Files (x86)\Kerio\WinRoute Firewall\wrctrl.exe C:\Program Files (x86)\iTunes\iTunesHelper.exe C:\Program Files (x86)\Java\jre6\bin\jusched.exe C:\Program Files (x86)\Adobe\Acrobat 9.0\Acrobat\acrotray.exe C:\Program Files\Alwil Software\Avast4\ashDisp.exe C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe C:\Program Files (x86)\MSI\DualCoreCenter\DualCoreCenter.exe C:\Program Files (x86)\Common Files\Nero\Lib\NMIndexStoreSvr.exe C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE C:\Program Files (x86)\Microsoft\Office Live\OfficeLiveSignIn.exe C:\Users\Eirik\Desktop\Fucking DoS attack\HiJackThis.exe R1 - HKCU\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKCU\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896 R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896 R0 - HKLM\Software\Microsoft\Internet Explorer\Main,Start Page = http://go.microsoft.com/fwlink/?LinkId=69157 R0 - HKLM\Software\Microsoft\Internet Explorer\Search,SearchAssistant = R0 - HKLM\Software\Microsoft\Internet Explorer\Search,CustomizeSearch = R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = O1 - Hosts: ::1 localhost O2 - BHO: ContributeBHO Class - {074C1DC5-9320-4A9A-947D-C042949C6216} - C:\Program Files (x86)\Adobe\/Adobe Contribute CS4/contributeieplugin.dll O2 - BHO: AcroIEHelperStub - {18DF081C-E8AD-4283-A596-FA578C2EBDC3} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEHelperShim.dll O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file) O2 - BHO: Groove GFS Browser Helper - {72853161-30C5-4D22-B7F9-0BBC1D38A37E} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveShellExtensions.dll O2 - BHO: Java Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files (x86)\Java\jre6\bin\ssv.dll O2 - BHO: Påloggingshjelp for Windows Live - {9030D464-4C02-4ABF-8ECC-5164760863C6} - C:\Program Files (x86)\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll O2 - BHO: Adobe PDF Conversion Toolbar Helper - {AE7CD045-E861-484f-8273-0445EE161910} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll O2 - BHO: Java Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files (x86)\Java\jre6\bin\jp2ssv.dll O2 - BHO: SmartSelect - {F4971EE7-DAA0-4053-9964-665D8EE6A077} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll O3 - Toolbar: Adobe PDF - {47833539-D0C5-4125-9FA8-0819E2EAAC93} - C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll O3 - Toolbar: Contribute Toolbar - {517BDDE4-E3A7-4570-B21E-2B52B6139FC7} - C:\Program Files (x86)\Adobe\/Adobe Contribute CS4/contributeieplugin.dll O4 - HKLM\..\Run: [QuickTime Task] "C:\Program Files (x86)\QuickTime\QTTask.exe" -atboottime O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files (x86)\iTunes\iTunesHelper.exe" O4 - HKLM\..\Run: [sunJavaUpdateSched] "C:\Program Files (x86)\Java\jre6\bin\jusched.exe" O4 - HKLM\..\Run: [AdobeCS4ServiceManager] "C:\Program Files (x86)\Common Files\Adobe\CS4ServiceManager\CS4ServiceManager.exe" -launchedbylogin O4 - HKLM\..\Run: [Adobe Acrobat Speed Launcher] "C:\Program Files (x86)\Adobe\Acrobat 9.0\Acrobat\Acrobat_sl.exe" O4 - HKLM\..\Run: [Acrobat Assistant 8.0] "C:\Program Files (x86)\Adobe\Acrobat 9.0\Acrobat\Acrotray.exe" O4 - HKLM\..\Run: [Adobe_ID0ENQBO] C:\PROGRA~2\COMMON~1\Adobe\ADOBEV~1\Server\bin\VERSIO~2.EXE O4 - HKLM\..\Run: [NBKeyScan] "C:\Program Files (x86)\Nero\Nero8\Nero BackItUp\NBKeyScan.exe" O4 - HKLM\..\Run: [GrooveMonitor] "C:\Program Files (x86)\Microsoft Office\Office12\GrooveMonitor.exe" O4 - HKLM\..\Run: [DelReg] "C:\Program Files (x86)\MSI\DualCoreCenter\DelReg.exe" O4 - HKLM\..\Run: [startCCC] "C:\Program Files (x86)\ATI Technologies\ATI.ACE\Core-Static\CLIStart.exe" MSRun O4 - HKLM\..\Run: [avast!] C:\PROGRA~1\ALWILS~1\Avast4\ashDisp.exe O4 - HKLM\..\Run: [VirtualCloneDrive] "C:\Program Files (x86)\Elaborate Bytes\VirtualCloneDrive\VCDDaemon.exe" /s O4 - HKLM\..\Run: [smcService] C:\PROGRA~2\Sygate\SPF\smc.exe -startgui O4 - HKLM\..\RunOnce: [Malwarebytes Anti-Malware (reboot)] "C:\Program Files (x86)\Malwarebytes' Anti-Malware\mbam.exe" /runcleanupscript O4 - HKCU\..\Run: [sidebar] C:\Program Files\Windows Sidebar\sidebar.exe /autoRun O4 - HKCU\..\Run: [ehTray.exe] C:\Windows\ehome\ehTray.exe O4 - HKCU\..\Run: [AlcoholAutomount] "C:\Program Files (x86)\Alcohol Soft\Alcohol 120\axcmd.exe" /automount O4 - HKCU\..\Run: [bgMonitor_{79662E04-7C6C-4d9f-84C7-88D8A56B10AA}] "C:\Program Files (x86)\Common Files\Nero\Lib\NMBgMonitor.exe" O4 - HKCU\..\Run: [WrCtrl] "C:\Program Files (x86)\Kerio\WinRoute Firewall\wrctrl.exe" O4 - HKUS\S-1-5-19\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'LOCAL SERVICE') O4 - HKUS\S-1-5-19\..\Run: [WindowsWelcomeCenter] rundll32.exe oobefldr.dll,ShowWelcomeCenter (User 'LOCAL SERVICE') O4 - HKUS\S-1-5-20\..\Run: [sidebar] %ProgramFiles%\Windows Sidebar\Sidebar.exe /detectMem (User 'NETWORK SERVICE') O4 - Global Startup: DualCoreCenter.lnk = C:\Program Files (x86)\MSI\DualCoreCenter\StartUpDualCoreCenter.exe O8 - Extra context menu item: Append Link Target to Existing PDF - res://C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppendSelLinks.html O8 - Extra context menu item: Append to Existing PDF - res://C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIEAppend.html O8 - Extra context menu item: Convert Link Target to Adobe PDF - res://C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECaptureSelLinks.html O8 - Extra context menu item: Convert to Adobe PDF - res://C:\Program Files (x86)\Common Files\Adobe\Acrobat\ActiveX\AcroIEFavClient.dll/AcroIECapture.html O8 - Extra context menu item: E&ksporter til Microsoft Excel - res://C:\PROGRA~2\MICROS~1\Office12\EXCEL.EXE/3000 O9 - Extra button: Send til OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll O9 - Extra 'Tools' menuitem: S&end til OneNote - {2670000A-7350-4f3c-8081-5663EE0C6C49} - C:\PROGRA~2\MICROS~1\Office12\ONBttnIE.dll O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~2\MICROS~1\Office12\REFIEBAR.DLL O13 - Gopher Prefix: O18 - Protocol: grooveLocalGWS - {88FED34C-F0CA-4636-A375-3CB6248B04CD} - C:\Program Files (x86)\Microsoft Office\Office12\GrooveSystemServices.dll O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file) O23 - Service: Adobe Version Cue CS4 - Adobe Systems Incorporated - C:\Program Files (x86)\Common Files\Adobe\Adobe Version Cue CS4\Server\bin\VersionCueCS4.exe O23 - Service: @%SystemRoot%\system32\Alg.exe,-112 (ALG) - Unknown owner - C:\Windows\System32\alg.exe (file missing) O23 - Service: Apple Mobile Device - Apple Inc. - C:\Program Files (x86)\Common Files\Apple\Mobile Device Support\bin\AppleMobileDeviceService.exe O23 - Service: avast! iAVS4 Control Service (aswUpdSv) - ALWIL Software - C:\Program Files\Alwil Software\Avast4\aswUpdSv.exe O23 - Service: Ati External Event Utility - Unknown owner - C:\Windows\system32\Ati2evxx.exe (file missing) O23 - Service: avast! Antivirus - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashServ.exe O23 - Service: avast! Mail Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashMaiSv.exe O23 - Service: avast! Web Scanner - ALWIL Software - C:\Program Files\Alwil Software\Avast4\ashWebSv.exe O23 - Service: AVG Free8 E-mail Scanner (avg8emc) - AVG Technologies CZ, s.r.o. - C:\PROGRA~2\AVG\AVG8\avgemc.exe O23 - Service: AVG Free8 WatchDog (avg8wd) - AVG Technologies CZ, s.r.o. - C:\PROGRA~2\AVG\AVG8\avgwdsvc.exe O23 - Service: Bonjour-tjeneste (Bonjour Service) - Apple Inc. - C:\Program Files (x86)\Bonjour\mDNSResponder.exe O23 - Service: @dfsrres.dll,-101 (DFSR) - Unknown owner - C:\Windows\system32\DFSR.exe (file missing) O23 - Service: @%systemroot%\system32\fxsresm.dll,-118 (Fax) - Unknown owner - C:\Windows\system32\fxssvc.exe (file missing) O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files (x86)\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe O23 - Service: FLEXnet Licensing Service 64 - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService64.exe O23 - Service: iPod-tjeneste (iPod Service) - Apple Inc. - C:\Program Files (x86)\iPod\bin\iPodService.exe O23 - Service: @keyiso.dll,-100 (KeyIso) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @comres.dll,-2797 (MSDTC) - Unknown owner - C:\Windows\System32\msdtc.exe (file missing) O23 - Service: Nero BackItUp Scheduler 3 - Nero AG - C:\Program Files (x86)\Nero\Nero8\Nero BackItUp\NBService.exe O23 - Service: @%SystemRoot%\System32\netlogon.dll,-102 (Netlogon) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: NMIndexingService - Nero AG - C:\Program Files (x86)\Common Files\Nero\Lib\NMIndexingService.exe O23 - Service: PnkBstrA - Unknown owner - C:\Windows\system32\PnkBstrA.exe O23 - Service: @%systemroot%\system32\psbase.dll,-300 (ProtectedStorage) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%systemroot%\system32\Locator.exe,-2 (RpcLocator) - Unknown owner - C:\Windows\system32\locator.exe (file missing) O23 - Service: @%SystemRoot%\system32\samsrv.dll,-1 (SamSs) - Unknown owner - C:\Windows\system32\lsass.exe (file missing) O23 - Service: @%SystemRoot%\system32\SLsvc.exe,-101 (slsvc) - Unknown owner - C:\Windows\system32\SLsvc.exe (file missing) O23 - Service: Sygate Personal Firewall (SmcService) - Sygate Technologies, Inc. - C:\Program Files (x86)\Sygate\SPF\smc.exe O23 - Service: @%SystemRoot%\system32\snmptrap.exe,-3 (SNMPTRAP) - Unknown owner - C:\Windows\System32\snmptrap.exe (file missing) O23 - Service: @%systemroot%\system32\spoolsv.exe,-1 (Spooler) - Unknown owner - C:\Windows\System32\spoolsv.exe (file missing) O23 - Service: StarWind AE Service (StarWindServiceAE) - Rocket Division Software - C:\Program Files (x86)\Alcohol Soft\Alcohol 120\StarWind\StarWindServiceAE.exe O23 - Service: Steam Client Service - Valve Corporation - C:\Program Files (x86)\Common Files\Steam\SteamService.exe O23 - Service: @%SystemRoot%\system32\ui0detect.exe,-101 (UI0Detect) - Unknown owner - C:\Windows\system32\UI0Detect.exe (file missing) O23 - Service: @%SystemRoot%\system32\vds.exe,-100 (vds) - Unknown owner - C:\Windows\System32\vds.exe (file missing) O23 - Service: @%systemroot%\system32\vssvc.exe,-102 (VSS) - Unknown owner - C:\Windows\system32\vssvc.exe (file missing) O23 - Service: @%systemroot%\system32\wbengine.exe,-104 (wbengine) - Unknown owner - C:\Windows\system32\wbengine.exe (file missing) O23 - Service: Stardock WindowBlinds (WindowBlinds) - Stardock Corporation - C:\Program Files (x86)\Stardock\MyColors\VistaSrv.exe O23 - Service: Kerio WinRoute Firewall (WinRoute) - Kerio Technologies - C:\Program Files (x86)\Kerio\WinRoute Firewall\winroute.exe O23 - Service: @%Systemroot%\system32\wbem\wmiapsrv.exe,-110 (wmiApSrv) - Unknown owner - C:\Windows\system32\wbem\WmiApSrv.exe (file missing) O23 - Service: @%ProgramFiles%\Windows Media Player\wmpnetwk.exe,-101 (WMPNetworkSvc) - Unknown owner - C:\Program Files (x86)\Windows Media Player\wmpnetwk.exe (file missing) -- End of file - 12286 bytes Noen som ser noe som kan være DoS scan dritt? ^^ Lenke til kommentar
iNtensimilla Skrevet 2. april 2009 Forfatter Del Skrevet 2. april 2009 Logg fra ruteren fra her om dagen: Klikk for å se/fjerne innholdet nedenfor [DoS Attack: ACK Scan] from source: 74.55.74.102, port 80, Tuesday, March 24,2009 14:54:28 [admin login] from source 192.168.1.2, Tuesday, March 24,2009 14:53:04 [DoS Attack: ACK Scan] from source: 74.54.24.226, port 80, Tuesday, March 24,2009 14:44:12 [DoS Attack: ACK Scan] from source: 78.31.8.18, port 4068, Tuesday, March 24,2009 14:42:15 [DoS Attack: ACK Scan] from source: 78.31.8.16, port 4065, Tuesday, March 24,2009 14:41:54 [DoS Attack: ACK Scan] from source: 74.125.79.165, port 80, Tuesday, March 24,2009 14:36:24 [DoS Attack: ACK Scan] from source: 78.31.8.17, port 4063, Tuesday, March 24,2009 14:32:30 [DoS Attack: ACK Scan] from source: 67.15.103.138, port 80, Tuesday, March 24,2009 14:31:52 [DoS Attack: RST Scan] from source: 208.117.236.75, port 80, Tuesday, March 24,2009 14:25:13 [DoS Attack: ACK Scan] from source: 78.31.8.17, port 4066, Tuesday, March 24,2009 14:22:32 [DoS Attack: ACK Scan] from source: 87.238.51.24, port 80, Tuesday, March 24,2009 14:22:26 [DoS Attack: ACK Scan] from source: 78.31.8.18, port 4068, Tuesday, March 24,2009 14:19:09 [uPnP set event: add_nat_rule] from source 192.168.1.2, Tuesday, March 24,2009 14:16:59 [DHCP IP: 192.168.1.2] to MAC address 00:0e:e8:f0:de:b3, Tuesday, March 24,2009 14:11:29 [internet connected] IP address: 193.90.54.212, Tuesday, March 24,2009 11:09:14 [DHCP IP: 192.168.1.15] to MAC address 00:22:41:72:de:8c, Tuesday, March 24,2009 06:39:54 [DoS Attack: RST Scan] from source: 89.20.239.61, port 12248, Tuesday, March 24,2009 03:11:11 [Time synchronized with NTP server] Monday, March 23,2009 23:39:18 [internet connected] IP address: 193.90.54.212, Monday, March 23,2009 23:09:12 [DoS Attack: RST Scan] from source: 193.253.198.203, port 10961, Monday, March 23,2009 22:19:42 [DoS Attack: RST Scan] from source: 85.232.37.150, port 80, Monday, March 23,2009 21:28:05 [DoS Attack: ACK Scan] from source: 80.91.37.209, port 80, Monday, March 23,2009 19:46:59 [DHCP IP: 192.168.1.6] to MAC address 00:16:6f:9c:d4:cb, Monday, March 23,2009 19:33:03 [DoS Attack: RST Scan] from source: 89.20.239.61, port 18609, Monday, March 23,2009 19:31:33 [DHCP IP: 192.168.1.2] to MAC address 00:0e:e8:f0:de:b3, Monday, March 23,2009 19:13:45 [internet connected] IP address: 193.90.54.212, Monday, March 23,2009 11:09:11 [DoS Attack: RST Scan] from source: 89.20.239.61, port 10257, Monday, March 23,2009 10:55:28 [DHCP IP: 192.168.1.15] to MAC address 00:22:41:72:de:8c, Monday, March 23,2009 06:42:52 [DHCP IP: 192.168.1.10] to MAC address 00:22:41:72:de:8c, Monday, March 23,2009 06:41:42 [DoS Attack: RST Scan] from source: 89.20.239.61, port 27779, Monday, March 23,2009 00:20:35 [Time synchronized with NTP server] Sunday, March 22,2009 23:39:17 [internet connected] IP address: 193.90.54.212, Sunday, March 22,2009 23:09:09 [DoS Attack: RST Scan] from source: 213.199.141.141, port 80, Sunday, March 22,2009 21:20:20 [DoS Attack: ACK Scan] from source: 74.6.157.9, port 8888, Sunday, March 22,2009 21:02:48 [DHCP IP: 192.168.1.6] to MAC address 00:16:6f:9c:d4:cb, Sunday, March 22,2009 19:37:40 [DoS Attack: RST Scan] from source: 84.202.99.21, port 49862, Sunday, March 22,2009 16:13:45 [DoS Attack: RST Scan] from source: 77.97.49.222, port 51416, Sunday, March 22,2009 16:07:39 [DoS Attack: RST Scan] from source: 81.235.185.54, port 16808, Sunday, March 22,2009 15:52:41 [DoS Attack: RST Scan] from source: 80.212.93.118, port 20753, Sunday, March 22,2009 15:49:30 [DoS Attack: RST Scan] from source: 77.102.117.50, port 1737, Sunday, March 22,2009 15:47:29 [DoS Attack: RST Scan] from source: 195.67.240.142, port 23667, Sunday, March 22,2009 15:44:07 [DoS Attack: RST Scan] from source: 85.89.23.4, port 55624, Sunday, March 22,2009 15:42:14 [DoS Attack: RST Scan] from source: 77.102.117.50, port 1705, Sunday, March 22,2009 15:33:05 [DoS Attack: RST Scan] from source: 77.102.117.50, port 1685, Sunday, March 22,2009 15:32:30 [DoS Attack: RST Scan] from source: 88.115.67.50, port 24964, Sunday, March 22,2009 15:13:00 [DoS Attack: RST Scan] from source: 88.115.67.50, port 24312, Sunday, March 22,2009 15:02:08 [DoS Attack: RST Scan] from source: 90.230.228.62, port 19289, Sunday, March 22,2009 14:59:52 [DoS Attack: RST Scan] from source: 81.235.185.54, port 16320, Sunday, March 22,2009 14:57:57 [DoS Attack: RST Scan] from source: 208.117.236.76, port 80, Sunday, March 22,2009 14:48:15 [DoS Attack: RST Scan] from source: 88.195.254.106, port 19264, Sunday, March 22,2009 14:30:38 [DoS Attack: RST Scan] from source: 88.195.254.106, port 19176, Sunday, March 22,2009 14:15:54 [DoS Attack: RST Scan] from source: 88.195.254.106, port 19153, Sunday, March 22,2009 14:15:26 [DoS Attack: RST Scan] from source: 81.235.185.54, port 15352, Sunday, March 22,2009 13:53:37 [uPnP set event: add_nat_rule] from source 192.168.1.2, Sunday, March 22,2009 13:51:23 [DoS Attack: RST Scan] from source: 81.231.243.250, port 50045, Sunday, March 22,2009 13:48:06 [DoS Attack: RST Scan] from source: 195.198.161.216, port 24913, Sunday, March 22,2009 13:33:01 [DoS Attack: RST Scan] from source: 195.198.161.216, port 24571, Sunday, March 22,2009 13:29:13 [DoS Attack: RST Scan] from source: 195.198.161.216, port 24566, Sunday, March 22,2009 13:28:45 [DoS Attack: RST Scan] from source: 81.8.181.213, port 14859, Sunday, March 22,2009 13:18:04 [DoS Attack: RST Scan] from source: 81.110.170.119, port 33722, Sunday, March 22,2009 13:11:41 [DoS Attack: RST Scan] from source: 213.185.1.21, port 13149, Sunday, March 22,2009 13:10:03 [DoS Attack: RST Scan] from source: 82.35.71.84, port 49594, Sunday, March 22,2009 13:07:11 [DoS Attack: RST Scan] from source: 212.251.164.70, port 20956, Sunday, March 22,2009 12:38:39 [DoS Attack: RST Scan] from source: 92.235.35.2, port 4006, Sunday, March 22,2009 12:27:00 [DoS Attack: RST Scan] from source: 81.232.102.180, port 11290, Sunday, March 22,2009 12:24:10 [DoS Attack: RST Scan] from source: 62.50.172.253, port 23481, Sunday, March 22,2009 12:05:36 [DoS Attack: RST Scan] from source: 85.229.114.156, port 52755, Sunday, March 22,2009 11:57:42 [DoS Attack: RST Scan] from source: 81.229.210.79, port 10453, Sunday, March 22,2009 11:49:56 [DHCP IP: 192.168.1.2] to MAC address 00:0e:e8:f0:de:b3, Sunday, March 22,2009 11:35:22 [DoS Attack: RST Scan] from source: 83.255.166.200, port 49631, Sunday, March 22,2009 11:27:14 [DoS Attack: ACK Scan] from source: 85.77.195.21, port 1820, Sunday, March 22,2009 11:16:51 [internet connected] IP address: 193.90.54.212, Sunday, March 22,2009 11:09:09 [DoS Attack: ACK Scan] from source: 91.109.118.170, port 18501, Sunday, March 22,2009 11:04:40 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Sunday, March 22,2009 10:00:05 [DoS Attack: RST Scan] from source: 62.50.172.253, port 12710, Sunday, March 22,2009 09:52:28 [DoS Attack: ACK Scan] from source: 194.80.33.193, port 40521, Sunday, March 22,2009 06:03:10 [DoS Attack: RST Scan] from source: 89.20.239.61, port 25046, Sunday, March 22,2009 03:23:23 [Time synchronized with NTP server] Saturday, March 21,2009 23:39:16 [DoS Attack: ACK Scan] from source: 85.165.159.27, port 64518, Saturday, March 21,2009 23:35:23 [DHCP IP: 192.168.1.2] to MAC address 00:0e:e8:f0:de:b3, Saturday, March 21,2009 23:35:18 [internet connected] IP address: 193.90.54.212, Saturday, March 21,2009 23:09:08 [DoS Attack: RST Scan] from source: 81.166.10.218, port 14909, Saturday, March 21,2009 22:28:46 [DoS Attack: RST Scan] from source: 77.101.112.75, port 30455, Saturday, March 21,2009 22:07:02 [DoS Attack: ACK Scan] from source: 85.165.84.164, port 49540, Saturday, March 21,2009 21:20:26 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 21:01:35 [DoS Attack: ACK Scan] from source: 85.226.189.47, port 2150, Saturday, March 21,2009 20:55:18 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 20:15:24 [uPnP set event: add_nat_rule] from source 192.168.1.2, Saturday, March 21,2009 20:09:28 [uPnP set event: del_nat_rule] from source 192.168.1.2, Saturday, March 21,2009 20:09:28 [DoS Attack: RST Scan] from source: 208.117.236.76, port 80, Saturday, March 21,2009 20:03:56 [DoS Attack: RST Scan] from source: 83.108.15.127, port 49500, Saturday, March 21,2009 20:01:33 [DoS Attack: RST Scan] from source: 84.215.26.187, port 38774, Saturday, March 21,2009 20:01:08 [DoS Attack: RST Scan] from source: 84.105.124.83, port 59654, Saturday, March 21,2009 20:01:05 [DoS Attack: RST Scan] from source: 84.105.124.83, port 59615, Saturday, March 21,2009 20:00:13 [DoS Attack: RST Scan] from source: 83.108.15.127, port 49399, Saturday, March 21,2009 19:59:54 [DoS Attack: RST Scan] from source: 84.215.26.187, port 38712, Saturday, March 21,2009 19:59:36 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 19:58:35 [DoS Attack: RST Scan] from source: 84.105.124.83, port 59438, Saturday, March 21,2009 19:57:17 [DoS Attack: RST Scan] from source: 24.6.175.181, port 53148, Saturday, March 21,2009 19:57:14 [DoS Attack: RST Scan] from source: 84.105.124.83, port 59383, Saturday, March 21,2009 19:55:54 [DoS Attack: RST Scan] from source: 84.202.99.245, port 42427, Saturday, March 21,2009 19:53:57 [DoS Attack: RST Scan] from source: 24.6.175.181, port 52619, Saturday, March 21,2009 19:53:38 [DoS Attack: RST Scan] from source: 84.215.26.187, port 38382, Saturday, March 21,2009 19:53:12 [DoS Attack: RST Scan] from source: 83.108.15.127, port 65338, Saturday, March 21,2009 19:53:01 [DoS Attack: RST Scan] from source: 84.202.99.245, port 42035, Saturday, March 21,2009 19:50:41 [DoS Attack: RST Scan] from source: 83.108.15.127, port 2322, Saturday, March 21,2009 19:50:21 [DoS Attack: RST Scan] from source: 84.215.26.187, port 38190, Saturday, March 21,2009 19:50:20 [DoS Attack: RST Scan] from source: 24.6.175.181, port 52094, Saturday, March 21,2009 19:49:50 [DoS Attack: RST Scan] from source: 84.105.124.83, port 59017, Saturday, March 21,2009 19:49:18 [DoS Attack: RST Scan] from source: 83.108.15.127, port 65119, Saturday, March 21,2009 19:49:13 [DoS Attack: RST Scan] from source: 84.215.26.187, port 38103, Saturday, March 21,2009 19:49:04 [DoS Attack: RST Scan] from source: 84.105.124.83, port 58341, Saturday, March 21,2009 19:46:26 [DoS Attack: RST Scan] from source: 84.105.124.83, port 58297, Saturday, March 21,2009 19:44:57 [DoS Attack: RST Scan] from source: 83.108.15.127, port 64826, Saturday, March 21,2009 19:44:42 [DoS Attack: RST Scan] from source: 24.6.175.181, port 51300, Saturday, March 21,2009 19:44:38 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37862, Saturday, March 21,2009 19:44:36 [DoS Attack: RST Scan] from source: 84.202.99.245, port 40785, Saturday, March 21,2009 19:44:05 [DoS Attack: ACK Scan] from source: 85.165.243.103, port 59387, Saturday, March 21,2009 19:43:58 [DoS Attack: RST Scan] from source: 83.108.15.127, port 64727, Saturday, March 21,2009 19:43:01 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37791, Saturday, March 21,2009 19:42:48 [DoS Attack: RST Scan] from source: 83.108.15.127, port 64659, Saturday, March 21,2009 19:41:53 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37738, Saturday, March 21,2009 19:41:40 [DoS Attack: RST Scan] from source: 24.6.175.181, port 50582, Saturday, March 21,2009 19:40:34 [DoS Attack: RST Scan] from source: 84.105.124.83, port 58038, Saturday, March 21,2009 19:40:21 [DoS Attack: RST Scan] from source: 83.108.15.127, port 64446, Saturday, March 21,2009 19:39:29 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37627, Saturday, March 21,2009 19:39:16 [DoS Attack: RST Scan] from source: 24.6.175.181, port 50385, Saturday, March 21,2009 19:39:10 [DoS Attack: RST Scan] from source: 84.105.124.83, port 57873, Saturday, March 21,2009 19:38:46 [DoS Attack: RST Scan] from source: 83.108.15.127, port 64324, Saturday, March 21,2009 19:37:45 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37544, Saturday, March 21,2009 19:37:40 [DoS Attack: RST Scan] from source: 84.105.124.83, port 57819, Saturday, March 21,2009 19:37:26 [DoS Attack: RST Scan] from source: 24.6.175.181, port 49732, Saturday, March 21,2009 19:34:46 [DoS Attack: RST Scan] from source: 84.105.124.83, port 57719, Saturday, March 21,2009 19:34:38 [DoS Attack: RST Scan] from source: 84.105.124.83, port 57093, Saturday, March 21,2009 19:32:53 [DoS Attack: RST Scan] from source: 24.6.175.181, port 49212, Saturday, March 21,2009 19:31:26 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63954, Saturday, March 21,2009 19:31:21 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37185, Saturday, March 21,2009 19:30:48 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63768, Saturday, March 21,2009 19:28:29 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37068, Saturday, March 21,2009 19:28:28 [DoS Attack: RST Scan] from source: 84.215.26.187, port 37016, Saturday, March 21,2009 19:27:28 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63691, Saturday, March 21,2009 19:27:13 [DoS Attack: RST Scan] from source: 84.105.124.83, port 56747, Saturday, March 21,2009 19:26:09 [DoS Attack: RST Scan] from source: 24.6.175.181, port 64725, Saturday, March 21,2009 19:24:30 [DoS Attack: RST Scan] from source: 84.105.124.83, port 56642, Saturday, March 21,2009 19:23:29 [DoS Attack: RST Scan] from source: 84.202.99.245, port 38576, Saturday, March 21,2009 19:23:25 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36770, Saturday, March 21,2009 19:22:48 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63389, Saturday, March 21,2009 19:22:41 [DoS Attack: RST Scan] from source: 84.105.124.83, port 56588, Saturday, March 21,2009 19:21:58 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36677, Saturday, March 21,2009 19:21:12 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63290, Saturday, March 21,2009 19:21:05 [DoS Attack: RST Scan] from source: 84.202.99.245, port 38249, Saturday, March 21,2009 19:20:25 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36624, Saturday, March 21,2009 19:20:20 [DoS Attack: RST Scan] from source: 24.6.175.181, port 23297, Saturday, March 21,2009 19:20:14 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63217, Saturday, March 21,2009 19:19:53 [DoS Attack: RST Scan] from source: 24.6.175.181, port 63879, Saturday, March 21,2009 19:18:50 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36470, Saturday, March 21,2009 19:17:44 [DoS Attack: RST Scan] from source: 83.108.15.127, port 63001, Saturday, March 21,2009 19:17:25 [DoS Attack: RST Scan] from source: 84.105.124.83, port 55890, Saturday, March 21,2009 19:17:18 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36373, Saturday, March 21,2009 19:16:08 [DoS Attack: RST Scan] from source: 83.108.15.127, port 62867, Saturday, March 21,2009 19:15:57 [DoS Attack: RST Scan] from source: 84.105.124.83, port 55736, Saturday, March 21,2009 19:15:42 [DoS Attack: RST Scan] from source: 84.105.124.83, port 55658, Saturday, March 21,2009 19:14:42 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 19:14:23 [DoS Attack: RST Scan] from source: 84.105.124.83, port 55545, Saturday, March 21,2009 19:11:50 [DoS Attack: RST Scan] from source: 24.6.175.181, port 62845, Saturday, March 21,2009 19:11:42 [DoS Attack: RST Scan] from source: 84.202.99.245, port 37108, Saturday, March 21,2009 19:10:53 [DoS Attack: RST Scan] from source: 84.105.124.83, port 55474, Saturday, March 21,2009 19:10:01 [DoS Attack: RST Scan] from source: 24.6.175.181, port 62548, Saturday, March 21,2009 19:09:34 [DoS Attack: RST Scan] from source: 84.215.26.187, port 36068, Saturday, March 21,2009 19:09:16 [DoS Attack: RST Scan] from source: 83.108.15.127, port 62238, Saturday, March 21,2009 19:09:05 [DoS Attack: RST Scan] from source: 84.208.74.229, port 58898, Saturday, March 21,2009 19:08:29 [DoS Attack: RST Scan] from source: 24.6.175.181, port 62355, Saturday, March 21,2009 19:08:14 [DoS Attack: RST Scan] from source: 84.208.74.229, port 58734, Saturday, March 21,2009 19:06:45 [DoS Attack: RST Scan] from source: 84.215.26.187, port 35943, Saturday, March 21,2009 19:06:36 [DoS Attack: RST Scan] from source: 83.108.15.127, port 61953, Saturday, March 21,2009 19:06:17 [DoS Attack: RST Scan] from source: 83.108.15.127, port 61882, Saturday, March 21,2009 19:05:25 [DoS Attack: RST Scan] from source: 84.215.26.187, port 35844, Saturday, March 21,2009 19:05:24 [DoS Attack: RST Scan] from source: 84.208.74.229, port 58490, Saturday, March 21,2009 19:04:29 [DoS Attack: RST Scan] from source: 84.105.124.83, port 54841, Saturday, March 21,2009 19:03:13 [DoS Attack: RST Scan] from source: 84.208.74.229, port 58199, Saturday, March 21,2009 19:01:53 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 18:57:33 [DoS Attack: ACK Scan] from source: 217.132.111.90, port 60670, Saturday, March 21,2009 18:55:57 [DoS Attack: ACK Scan] from source: 84.202.43.126, port 3214, Saturday, March 21,2009 18:54:22 [DoS Attack: ACK Scan] from source: 76.168.70.155, port 58536, Saturday, March 21,2009 18:51:39 [uPnP set event: del_nat_rule] from source 192.168.1.2, Saturday, March 21,2009 18:51:37 [DoS Attack: ACK Scan] from source: 91.104.54.181, port 38860, Saturday, March 21,2009 18:44:26 [DoS Attack: ACK Scan] from source: 84.211.48.48, port 63313, Saturday, March 21,2009 18:35:21 [DoS Attack: ACK Scan] from source: 89.8.67.239, port 3884, Saturday, March 21,2009 18:24:49 [DoS Attack: ACK Scan] from source: 84.211.48.48, port 61805, Saturday, March 21,2009 18:20:04 [DoS Attack: ACK Scan] from source: 41.212.221.38, port 28986, Saturday, March 21,2009 18:13:12 [DoS Attack: ACK Scan] from source: 84.209.11.207, port 60763, Saturday, March 21,2009 18:08:24 [DoS Attack: ACK Scan] from source: 201.8.245.62, port 1460, Saturday, March 21,2009 18:07:48 [DoS Attack: ACK Scan] from source: 200.140.65.36, port 50985, Saturday, March 21,2009 18:07:27 [uPnP set event: add_nat_rule] from source 192.168.1.2, Saturday, March 21,2009 18:04:26 [DoS Attack: ACK Scan] from source: 84.211.25.173, port 2640, Saturday, March 21,2009 17:39:25 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 17:22:55 [DoS Attack: ACK Scan] from source: 84.52.244.7, port 61822, Saturday, March 21,2009 17:07:10 [DoS Attack: ACK Scan] from source: 84.52.244.7, port 61790, Saturday, March 21,2009 17:07:04 [DoS Attack: ACK Scan] from source: 88.89.35.28, port 55393, Saturday, March 21,2009 17:02:47 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 16:45:17 [DoS Attack: RST Scan] from source: 213.199.141.139, port 80, Saturday, March 21,2009 15:51:24 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:44:35 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:44:34 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:37:26 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:37:26 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:37:25 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:37:25 [uPnP set event: add_nat_rule] from source 192.168.1.2, Saturday, March 21,2009 15:11:38 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 15:05:08 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:04:19 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:04:19 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:04:19 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:04:19 [DoS Attack: RST Scan] from source: 213.199.141.139, port 80, Saturday, March 21,2009 15:03:28 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 15:03:02 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:01:37 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:01:36 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:01:36 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 15:01:36 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:58:31 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:58:30 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:57:35 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:57:19 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:57:19 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:57:00 [DoS Attack: ACK Scan] from source: 85.167.206.25, port 25857, Saturday, March 21,2009 14:55:54 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 14:50:31 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:42:01 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:42:01 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:42:01 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:41:56 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:34:20 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:34:20 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 14:34:20 [DoS Attack: ACK Scan] from source: 90.149.240.2, port 49653, Saturday, March 21,2009 14:21:27 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 14:08:49 [DoS Attack: RST Scan] from source: 213.199.141.139, port 80, Saturday, March 21,2009 14:07:10 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:04:16 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:04:16 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:04:16 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:04:16 [uPnP set event: del_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:01:46 [uPnP set event: add_nat_rule] from source 192.168.1.11, Saturday, March 21,2009 14:01:46 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:49:45 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:49:12 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:49:12 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:41:19 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:41:18 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:41:18 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 13:39:36 [DHCP IP: 192.168.1.10] to MAC address 00:22:41:72:de:8c, Saturday, March 21,2009 13:35:10 [DoS Attack: RST Scan] from source: 213.199.141.140, port 80, Saturday, March 21,2009 13:31:16 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:25:33 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:25:32 [uPnP set event: add_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:25:32 [uPnP set event: del_nat_rule] from source 192.168.1.14, Saturday, March 21,2009 13:24:18 Fra etter: Klikk for å se/fjerne innholdet nedenfor [admin login] from source 192.168.1.2, Thursday, April 02,2009 17:19:28 [DoS Attack: RST Scan] from source: 88.91.44.123, port 28975, Thursday, April 02,2009 17:12:55 [DoS Attack: RST Scan] from source: 84.215.253.121, port 50504, Thursday, April 02,2009 17:10:16 [admin login] from source 192.168.1.2, Thursday, April 02,2009 17:07:30 [DoS Attack: RST Scan] from source: 217.207.136.53, port 12847, Thursday, April 02,2009 17:05:31 [DoS Attack: RST Scan] from source: 81.226.245.185, port 23234, Thursday, April 02,2009 17:00:32 [admin login] from source 192.168.1.2, Thursday, April 02,2009 16:55:13 [uPnP set event: add_nat_rule] from source 192.168.1.3, Thursday, April 02,2009 16:43:00 [uPnP set event: del_nat_rule] from source 192.168.1.3, Thursday, April 02,2009 16:43:00 [DHCP IP: 192.168.1.3] to MAC address 00:17:fa:c4:8e:50, Thursday, April 02,2009 16:42:44 [uPnP set event: add_nat_rule] from source 192.168.1.3, Thursday, April 02,2009 16:42:18 [uPnP set event: del_nat_rule] from source 192.168.1.3, Thursday, April 02,2009 16:42:17 [uPnP set event: add_nat_rule] from source 192.168.1.3, Thursday, April 02,2009 16:42:16 [DHCP IP: 192.168.1.3] to MAC address 00:17:fa:c4:8e:50, Thursday, April 02,2009 16:42:06 [uPnP set event: add_nat_rule] from source 192.168.1.2, Thursday, April 02,2009 16:39:43 [admin login] from source 192.168.1.2, Thursday, April 02,2009 16:37:53 [Time synchronized with NTP server] Thursday, April 02,2009 16:26:30 [initialized, firmware version: V1.0.6_1.0.6] Thursday, April 02,2009 16:26:30 Lenke til kommentar
snippsat Skrevet 2. april 2009 Del Skrevet 2. april 2009 Start HijackThis "scan" finn disse linjene merk dem,så trykk fix checked. O2 - BHO: WormRadar.com IESiteBlocker.NavFilter - {3CA2F312-6F6E-4B53-A66E-4E65E497C8C0} - (no file) O18 - Protocol: linkscanner - {F274614C-63F8-47D5-A4D1-FBDDE494F8D1} - (no file) Ser bra bra ut. Scanner du nå med MBAM og den ikke finner er det greit. Logger fra MBAM ligger under fane loggfiler. Lenke til kommentar
Anbefalte innlegg
Opprett en konto eller logg inn for å kommentere
Du må være et medlem for å kunne skrive en kommentar
Opprett konto
Det er enkelt å melde seg inn for å starte en ny konto!
Start en kontoLogg inn
Har du allerede en konto? Logg inn her.
Logg inn nå