找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 660|回复: 0

局域网内有下载AX86U占用100%导致网络很卡,请问是什么原因

[复制链接]
发表于 2022-6-7 18:16 | 显示全部楼层 |阅读模式
Jun  7 18:11:19 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=106.39.170.211 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=56119 DF PROTO=TCP SPT=42660 DPT=443 SEQ=3743924779 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT (020405AC0402080A18CD191C0000000001030307)
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=193.23.250.191 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=52 ID=26665 PROTO=UDP SPT=51160 DPT=1024 LEN=112 MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=88.203.176.243 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=116 ID=21213 DF PROTO=TCP SPT=64177 DPT=1 SEQ=2545955962 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405840103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=194.71.217.78 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=27841 DF PROTO=TCP SPT=57142 DPT=52000 SEQ=2798677010 ACK=0 WINDOW=64860 RES=0x00 SYN URGP=0 OPT (020405640103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=221.236.21.3 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=28794 DF PROTO=TCP SPT=50696 DPT=443 SEQ=2960288196 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT (020405AC0402080A18CD19BE0000000001030307)
Jun  7 18:11:19 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=106.39.171.84 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=19931 DF PROTO=TCP SPT=57396 DPT=443 SEQ=4286207854 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT (020405AC0402080A18CD1AB50000000001030307)
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=177.82.222.230 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=108 ID=19345 PROTO=UDP SPT=64245 DPT=52000 LEN=112 MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=121.227.146.227 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=14542 DF PROTO=TCP SPT=8090 DPT=52000 SEQ=1155850950 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=27.17.107.149 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=36201 DF PROTO=TCP SPT=60935 DPT=1024 SEQ=3581622955 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405840103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=27.17.107.149 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=36202 DF PROTO=TCP SPT=61070 DPT=52000 SEQ=702741335 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405840103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=5.150.197.2 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=111 ID=61178 DF PROTO=TCP SPT=49924 DPT=52000 SEQ=561393120 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402) MARK=0x8000000
Jun  7 18:11:19 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:02:11:32:20:a6:fd:08:00 SRC=192.168.50.128 DST=142.251.42.234 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=59444 DF PROTO=TCP SPT=58211 DPT=443 SEQ=2870451683 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=101.224.65.124 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=120 ID=2232 DF PROTO=TCP SPT=7585 DPT=52000 SEQ=4069859277 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405780103030801010402) MARK=0x8000000
Jun  7 18:11:20 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=125.90.50.203 LEN=132 TOS=0x04 PREC=0x00 TTL=62 ID=47133 PROTO=UDP SPT=1024 DPT=15000 LEN=112
Jun  7 18:11:20 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=5.189.188.23 LEN=132 TOS=0x04 PREC=0x00 TTL=62 ID=53354 PROTO=UDP SPT=1024 DPT=6882 LEN=112
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=66.115.142.85 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=46 ID=5012 PROTO=UDP SPT=48064 DPT=52000 LEN=112 MARK=0x8000000
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=216.183.145.214 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=40 ID=37395 PROTO=UDP SPT=1025 DPT=52000 LEN=112 MARK=0x8000000
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=216.183.145.214 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=40 ID=58477 PROTO=UDP SPT=35347 DPT=52000 LEN=112 MARK=0x8000000
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=181.214.138.165 DST=125.71.135.25 LEN=52 TOS=0x00 PREC=0x00 TTL=114 ID=4396 DF PROTO=TCP SPT=56640 DPT=52000 SEQ=2135533295 ACK=0 WINDOW=64578 RES=0x00 SYN URGP=0 OPT (0204055E0103030801010402) MARK=0x8000000
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=112.206.104.38 DST=125.71.135.25 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=44883 PROTO=UDP SPT=19295 DPT=52000 LEN=28 MARK=0x8000000
Jun  7 18:11:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=216.131.72.107 DST=125.71.135.25 LEN=132 TOS=0x00 PREC=0x00 TTL=110 ID=115 PROTO=UDP SPT=62203 DPT=52000 LEN=112 MARK=0x8000000
Jun  7 18:11:20 kernel: ACCEPT IN=br0 OUT=ppp0 MAC=fc:34:97:39:27:a8:2c:fd:a1:73:11:7c:08:00 SRC=192.168.50.201 DST=106.39.171.84 LEN=60 TOS=0x00 PREC=0x00 TTL=62 ID=49383 DF PROTO=TCP SPT=57398 DPT=443 SEQ=202170273 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 OPT (020405AC0402080A18CD1F460000000001030307)
这是路由器日志,请问是不是被攻击了?

只谈技术、莫论政事!(点击见详情) | 恩山无线论坛欢迎您的来访,请互相尊重、友善交流,建议保持一颗平常心看待网友的评论,切勿过度反应。
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

关闭

欢迎大家光临恩山无线论坛上一条 /1 下一条

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-10-4 02:24

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表