Skip to main content

Na een wat rommelige start als nieuwe terug kerende klant kom ik nog wat vreemds tegen.
Wanneer ik een speedtest uitvoer op https://kpn-itns.speedtestcustom.com/ valt het internet weg.
Internet lampje van de v10 modem is uit. Deze moet dan uit en weer aangezet worden voordat de verbinding hersteld word. Dit is nu ineens. Vorige week had ik dit nog niet.

Ter info: 1 van de 2 VDSL Pairs op mijn lijn niet aangesloten in de verdeelkast, waardoor ik de helft van mijn verbinding heb en mijn KPN producten blijven hangen. Zijn ze mee bezig, maar lijkt me dat dat los staat van dit probleem.
De v10 modem staat in de meterkast. Wifi uit, tv boxen zitten direct op de modem en 1 cat6 UTP gaat naar mijn eigen Netgear orbi pro router en vanuit daar weer verder. 
Zoals uitgelegd op 


Het is niet zo dat ik elk uur een speedtest uitvoer, maar wel vreemd dat de modem hierop tript.

Nog een ding.
Voorheen met ziggo had ik 300Mbit down/30Mbit up.
Wifi Orbi pro na de router. 260Mbit.

Nu een andere modem. Dus de halve 200Mbit (1 lijn). Wifi blijft steken op 60Mbit. 
Zou toch verwachten dat de wifi makkelijk ook die 100Mbit moet halen.
Setup is nog exact hetzelfde.

Ping google.nl

Gisteren is mijn 2e VDSL lijn aangesloten. En mijn product geactiveerd.
Alles werkt zou je denken.

Maar het is nu al twee keer voorgekomen dat de modem raar gaat doen. En is mijn verbinding onstabiel.
Herstart werkt niet en alleen een reset zorgt ervoor dat het weer werkt.
Elke dag de modem resetten zie ik niet zitten..


[DoS Attack: ACK Scan] from source: 157.240.201.34, port 443, Wednesday, July 27, 2022 10:50:38
[DoS Attack: ACK Scan] from source: 157.240.201.34, port 443, Wednesday, July 27, 2022 10:48:35
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:44:49
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:44:49
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:44:42
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:44:41
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:44:31
[DoS Attack: ACK Scan] from source: 157.240.201.34, port 443, Wednesday, July 27, 2022 10:44:29
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:44:27
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:44:20
[DoS Attack: ACK Scan] from source: 8.211.49.181, port 50920, Wednesday, July 27, 2022 10:44:17
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:43:11
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:43:08
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:42:39
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:41:15
[DoS Attack: ACK Scan] from source: 18.195.122.69, port 443, Wednesday, July 27, 2022 10:40:32
[DoS Attack: SYN/ACK Scan] from source: 52.57.38.165, port 8886, Wednesday, July 27, 2022 10:40:32
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:30
[DoS Attack: ACK Scan] from source: 47.254.153.93, port 50920, Wednesday, July 27, 2022 10:40:27
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:26
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:19
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:40:15
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:11
[DoS Attack: ACK Scan] from source: 142.93.81.166, port 443, Wednesday, July 27, 2022 10:40:11
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:08
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:40:00
[DoS Attack: ACK Scan] from source: 52.114.77.128, port 443, Wednesday, July 27, 2022 10:39:59
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:39:58
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:49
[DoS Attack: ACK Scan] from source: 52.114.77.128, port 443, Wednesday, July 27, 2022 10:39:47
[DoS Attack: ACK Scan] from source: 52.114.77.128, port 443, Wednesday, July 27, 2022 10:39:47
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:35
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:39:32
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:31
[DoS Attack: ACK Scan] from source: 18.195.122.69, port 443, Wednesday, July 27, 2022 10:39:31
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:20
[DoS Attack: ACK Scan] from source: 52.112.120.10, port 443, Wednesday, July 27, 2022 10:39:19
[DoS Attack: ACK Scan] from source: 52.112.120.10, port 443, Wednesday, July 27, 2022 10:39:18
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:09
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:39:08
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:39:06
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:39:05
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:55
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:38:54
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:38:52
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:40
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:38:39
[DoS Attack: ACK Scan] from source: 52.112.120.15, port 443, Wednesday, July 27, 2022 10:38:38
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:29
[DoS Attack: ACK Scan] from source: 52.112.120.15, port 443, Wednesday, July 27, 2022 10:38:26
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:15
[DoS Attack: ACK Scan] from source: 47.254.153.93, port 50920, Wednesday, July 27, 2022 10:38:14
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:07
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:04
[DoS Attack: RST Scan] from source: 204.79.197.222, port 443, Wednesday, July 27, 2022 10:38:02
[DoS Attack: SYN/ACK Scan] from source: 204.79.197.222, port 443, Wednesday, July 27, 2022 10:38:01
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:38:00
[DoS Attack: ACK Scan] from source: 18.195.122.69, port 443, Wednesday, July 27, 2022 10:37:58
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:57
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:54
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:42
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:42
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:38
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:38
[DoS Attack: SYN/ACK Scan] from source: 192.168.2.254, port 80, Wednesday, July 27, 2022 10:37:35
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:31
[DoS Attack: ACK Scan] from source: 18.195.122.69, port 443, Wednesday, July 27, 2022 10:37:28
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:28
[DoS Attack: ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:26
[DoS Attack: SYN/ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:25
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:24
[DoS Attack: SYN/ACK Scan] from source: 213.232.87.202, port 90, Wednesday, July 27, 2022 10:37:21
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:13
[DoS Attack: ACK Scan] from source: 157.240.201.34, port 443, Wednesday, July 27, 2022 10:37:11
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:09
[DoS Attack: ACK Scan] from source: 47.254.153.93, port 50920, Wednesday, July 27, 2022 10:37:09
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:37:06
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:58
[DoS Attack: ACK Scan] from source: 157.240.201.34, port 443, Wednesday, July 27, 2022 10:36:57
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:47
[DoS Attack: ACK Scan] from source: 34.76.193.158, port 443, Wednesday, July 27, 2022 10:36:46
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:33
[DoS Attack: ACK Scan] from source: 34.158.0.131, port 4070, Wednesday, July 27, 2022 10:36:30
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:29
[DoS Attack: ACK Scan] from source: 18.195.122.69, port 443, Wednesday, July 27, 2022 10:36:26
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:22
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:18
[Internet connected] IP address: 192.168.2.199, Wednesday, July 27, 2022 10:36:15
[DoS Attack: ACK Scan] from source: 34.253.127.4, port 443, Wednesday, July 27, 2022 10:36:11

Hoort de v10 dit soort aanvallen niet tegen te houden ondanks de DMZ forward?


Beste @deFrys, welkom! Wat rot dat het internet steeds wegvalt! Dat zou niet zo moeten zijn natuurlijk. Ik heb voor jouw vragen een ticket aangemaakt en er wordt binnen een paar werkdagen contact met je opgenomen! Laat je nog even weten wat eruit komt?


Beste @deFrys, welkom! Wat rot dat het internet steeds wegvalt! Dat zou niet zo moeten zijn natuurlijk. Ik heb voor jouw vragen een ticket aangemaakt en er wordt binnen een paar werkdagen contact met je opgenomen! Laat je nog even weten wat eruit komt?

Hallo Marcia,

Het speedtest probleem lijkt op gelost te zijn. Wellicht lag dat aan dat mijn VDSL nog niet volledig was.
De Dos meldingen uit mijn netgear orbi pro zijn nog wel aanwezig. Ik heb ergens gelezen dat de Dos bescherming erg gevoelig is bij netgear. 
Deze heb ik uit geschakeld. Het is even afwachten of dat het probleem oplost.


Er zijn geen problemen meer dus dat is goed!

Een kleine wijziging die ik nog gedaan heb ik geen statisch IP toekennen aan de Netgear ORBI. De orbi die gaat na 24 uur een nieuwe leasetijd opvragen en dat gaat fout door de statische instelling van de v10. Ook overbodig eigenlijk omdat de DMZ op mac adres is gekoppeld.

Ik denk dat dit het gehele probleem was.


Heel fijn om te lezen! Dank ook voor de terugkoppeling: wellicht help je hier ook toekomstige klanten mee!