Home page vanished from Google Search [duplicate]

Since about 20 years, I have had a personal home page, which has for the past 12–14 years or so. For the last 10 years or so, I have not touched the content at all. For many years, it was listed very highly for some search terms related to the contents (in particular for my name, or for the Dutch term “Syndroom van Asperger”). Recently I have noticed that it is no longer indexed at all by Google Search. No matter what combination of search terms I use, it does not show up. I am certain it was still listed July 2019¹.

I’m aware that Google delists some pages if requested to do so by law, and that website owners can request for content to be delisted. Google states it does not comment on individual reasons a site may be removed. Can inaction on my side lead to delisting? Does Google delist pages for inactivity (not updated for ≥10 years)? Are there some things I can check that would disqualify my site, even if it didn’t disqualify it as little as one year ago?


¹ In July 2019, someone used an email address only advertised on my site to contact me; they simply googled my name. Yesterday, someone told me I am hard to locate on the internet. Thus I found out that googling my name no longer yields my personal home page.

What do people mean when they talk about “hackers gaining access to our network” (at home)?

Have I fundamentally missed something between the time when I sat with my 486 IBM PC in the house, fully offline, and today? Do normal people actually set up complex local networks in their homes where they have some kind of “trust anyone with an internal IP address” security scheme going on?

What exactly do they mean by this? I get the feeling that either I am extremely ignorant and somehow have not understood basic concepts of networking in spite of dealing with this (and hating it) for 25 years, or they have no idea what they are talking about and have learned everything they know about computers from Hollywood blockbuster movies and crappy TV series…

What does “gaining access” to a home network mean? Is that, like, exploiting the NAT router (if such a thing is used, which has not always been the case for me)? Even if they exploit the router, that doesn’t magically give them any “access” to the “network” (meaning PCs connected to the router)? At best, they can maybe read plaintext traffic, but how much such is there these days? I shall hope 0% of all traffic.

And again, for a long time, I didn’t even have any device “in between” the ISP and my single PC. It was a very “stupid” cable modem or ADSL modem which had no control panel or any NAT features etc. Right now, I’m using a Mikrotik NAT router which I update maybe once a year at best, because it has the most user-hostile, idiotic mechanism for enabling “auto updates”, which you’d think would be not only dead-simply, but enabled by default. Nope. You have to follow their cryptic news and decide when to manually SSH into it (or use the extremely confusing and messy web interface) to apply updates. I guarantee that 99.99% of all people (including “geeks”) have no idea that they even need to do this, let alone actually bother to.

So what do people mean when they talk about “gaining access”? No updated version of Windows has ever just allowed somebody to randomly connect remotely to “gain access”, regardless of the presence/absence of a router/switch/whatever in between. Or, if it has, that’s some kind of “0-day” exploit or unknown-to-the-public exploit. The so-called “hackers” that people talk about more than likely never “gain access” like that at all; I bet it’s 100% social engineering and tricking them into running coolgame.exe as sent to them in an e-mail attachment and things like that.

Since apparently I always sound rude, I should point out that my intention with this question is to understand people and the world, and not an attempt to somehow sound “superior”. I’m genuinely wondering about this since not a day goes by without me feeling extremely paranoid about security and privacy, especially knowing how incredibly naive and stupid I used to be, and how naive and stupid people in general seem to perpetually be about these things.

MitM Attack Fails on Home Wireless Router

I am currently trying to perform a MitM attack on my home wireless network to get a better understanding on how this attack works. I can successfully perform this attack on a NAT network on some virtual machines but it will not work on my home wireless network with an external WiFi adapter. More specifically, the target devices are not able to load webpages even while still connected to the WiFi. However, I can still view the packets sent from the device to the gateway.

I have used Bettercap, Ettercap and arpspoof to try and accomplish this and it all fails with the same result. I’m positive that the target IP and the gateway is specified for each tool and I made sure that I enabled portforwarding with echo 1 > /proc/sys/net/ipv4/ip_forward.

My only logical conclusion is that it is somehow not successfully redirecting the packets from the target machine to the gateway and vice versa.

Is anyone able to suggest any fixes? Are some routers able to prevent MitM attacks? Any insight would be greatly appreciated.

(I am using an Alfa AC1200 wireless adapter and running Kali on a VM. I also have a Bell HomeHub 3000 which is from what I believe exclusive to Canada and manufactured by Sagecom.)

Private Home Tutor In Bangalore

Looking for an experienced home tutor in Bangalore? Genext can help you in finding the best home tutor according to your needs. We recruit the best teachers in the market. The teachers hired are recruited on by holding several interviews and a thorough background check for individual teachers is done to make sure that he or she does not hold any kind of bad reports. 

So what would I be able to do to make the 30 feet of demiplane into a true home base? [duplicate]

This question is an exact duplicate of:

  • What permanent spells would I be able to cast to make an extraplanar structure? [closed]

So this character is a lvl 20 hexblade warlock in this situation and I have my 8th level mystic arcanum as demiplane. The dm will probably let us learn any spell regardless of class as long as its not too op. We have a absolute massive amount of money so that wont be a problem. The thing I plan to use the “Base” for is a living space, storage for magic items storage for our mech suits (dont ask, a library since we are dumb and need it, all the other normal house things. It could also be like a war bunker. I am thinking something similar to Mordenkainen’s Magnificent Mansion but permanent. Is there anything I could do other than building it to accomplish this?

[ Law Enforcement & Police ] Open Question : In real life, could a burglar use the Home Alone method to rob houses?

In the original movie, Joe Pesci played a burglar who disguised himself as a police officer, and had the following conversation with Macaulay Culkin’s on screen father: Joe Pesci: “I’d like a word with you sir.” Mr. McCallister: “Am I under arrest or something?” Joe Pesci: “Oh no not at all sir, it’s Christmas time, there are always a lot of burglars around the holidays, and we’re just making sure everyones taking the proper precautions, that’s all.” Mr. McCallister: “Oh yes, well we have automatic timers for our lights, dead bolts for our doors, we can’t be too careful if we’re spending the holidays in Paris.” Joe Pesci: “Ah, you’re taking a trip to Paris?” Mr. McCallister: “Yes, we plan to leave tomarrow morning.” Joe Pesci: “Well don’t worry about your home, it’s in good hands.” *Flashes his shady gold tooth smile* Then he knew exactly when the house would be vacant, he knew exactly what they’d be up against when they enter the house, and he knew that none of the neighbors would spot him, because he already had the same conversation with those neighbors who told him of their own holiday travel plans. As long as the burglars don’t run into a crafty kid with a tarantula, could burglars use this method in real life? Dress up as a police officer and get all the information right from the horses mouth?

Am I under attack? – Home Network Security Related

I don’t know much about internet security, but my connection has been intermediate for the last few weeks. Today, just on a whim, I took a look at my router log and this is what came up.

[UPnP set event: AddPortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:04:19 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:04:01 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:02:56 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:01:59 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:00:54 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 07:00:37 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 52678, Wed, Nov 27, 2019 06:59:31 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:59:12 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:58:06 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:57:50 [admin login] from source 192.168.0.102, Wed, Nov 27, 2019 06:57:05 [admin login] from source 192.168.0.102, Wed, Nov 27, 2019 06:56:09 [admin login] from source 192.168.0.102, Wed, Nov 27, 2019 06:44:26 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:33:33 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:33:15 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:06:49 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 06:06:29 [DoS attack: Sync flood] from source: 23.246.13.158, port 443, Wed, Nov 27, 2019 05:48:28 [DoS attack: Sync flood] from source: 173.194.17.168, port 443, Wed, Nov 27, 2019 05:11:39 [DoS attack: Ascend Kill attack] from source: 89.248.168.217, port 60957, Wed, Nov 27, 2019 04:46:25 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Wed, Nov 27, 2019 04:20:58 [DHCP IP: (192.168.0.111)] to MAC address 00:ce:39:b5:98:92, Wed, Nov 27, 2019 04:20:20 [UPnP set event: DeletePortMapping] from source 192.168.0.11, port 30880, Wed, Nov 27, 2019 04:18:59 [DoS attack: ICMP Ping flood] from source: 27.75.219.3, Wed, Nov 27, 2019 04:08:34 [DoS attack: Sync flood] from source: 103.82.162.94, port 33387, Wed, Nov 27, 2019 04:03:59 [DoS attack: ICMP Ping flood] from source: 36.79.233.78, Wed, Nov 27, 2019 03:37:34 [DoS attack: UDP Scan] from source: 223.71.167.155, port 53824, Wed, Nov 27, 2019 03:25:20 [DoS attack: UDP Scan] from source: 45.143.220.87, port 44864, Wed, Nov 27, 2019 03:08:03 [DoS attack: ICMP Ping flood] from source: 45.248.78.196, Wed, Nov 27, 2019 03:07:11 [UPnP set event: AddPortMapping] from source 192.168.0.11, port 30880, Wed, Nov 27, 2019 03:07:03 [DoS attack: Sync flood] from source: 58.245.142.106, port 64178, Wed, Nov 27, 2019 03:01:32 [UPnP set event: DeletePortMapping] from source 192.168.0.11, port 30880, Wed, Nov 27, 2019 03:01:22 [DoS attack: Sync flood] from source: 13.225.48.135, port 80, Wed, Nov 27, 2019 01:16:38 [DoS attack: Sync flood] from source: 36.224.209.216, port 53337, Wed, Nov 27, 2019 00:34:11 [DHCP IP: (192.168.0.112)] to MAC address 7c:d1:c3:8e:41:90, Wed, Nov 27, 2019 00:26:31 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Wed, Nov 27, 2019 00:25:21 [DoS attack: Sync flood] from source: 24.231.96.148, port 56238, Wed, Nov 27, 2019 00:25:17 [DHCP IP: (192.168.0.107)] to MAC address 3c:9b:d6:00:75:7c, Wed, Nov 27, 2019 00:25:11 [DHCP IP: (192.168.0.108)] to MAC address 38:8c:50:d4:7a:cd, Wed, Nov 27, 2019 00:25:10 [DoS attack: UDP Scan] from source: 223.71.167.155, port 54458, Wed, Nov 27, 2019 00:20:14 [DHCP IP: (192.168.0.102)] to MAC address 64:6e:69:f6:06:e9, Wed, Nov 27, 2019 00:07:17 [DHCP IP: (192.168.0.100)] to MAC address 5c:f6:dc:65:80:11, Wed, Nov 27, 2019 00:06:05 [DoS attack: Echo char gen] from source: 173.255.234.194, port 59355, Wed, Nov 27, 2019 00:00:28 [DoS attack: ICMP Ping flood] from source: 77.50.80.43, Wed, Nov 27, 2019 00:00:07 [UPnP set event: AddPortMapping] from source 192.168.0.11, port 30880, Wed, Nov 27, 2019 00:00:06 [DHCP IP: (192.168.0.104)] to MAC address 60:6b:ff:ae:ff:6c, Tue, Nov 26, 2019 23:30:35 [DHCP IP: (192.168.0.106)] to MAC address f8:95:ea:70:98:a2, Tue, Nov 26, 2019 23:27:55 [DoS attack: UDP Scan] from source: 146.88.240.4, port 44029, Tue, Nov 26, 2019 23:10:16 [DHCP IP: (192.168.0.103)] to MAC address fc:6b:f0:33:ec:06, Tue, Nov 26, 2019 23:06:24 [DHCP IP: (192.168.0.105)] to MAC address 64:1c:b0:1b:4e:ec, Tue, Nov 26, 2019 23:05:40 [DHCP IP: (192.168.0.101)] to MAC address 98:9c:57:08:27:66, Tue, Nov 26, 2019 23:05:27 [Time synchronized with NTP server] Tue, Nov 26, 2019 23:05:25 [Internet connected] IP address: **.***.***.***, Wed, Dec 31, 1969 18:01:02 [DHCP IP: (192.168.0.109)] to MAC address 54:33:cb:60:3e:a9, Wed, Dec 31, 1969 18:01:01 [Initialized, firmware version: V3.01.43] Thu, Jan 01, 1970 00:00:07 [DoS attack: UDP Scan] from source: 185.94.111.1, port 53516, Tue, Nov 26, 2019 22:42:11 [DoS attack: Echo char gen] from source: 185.164.72.60, port 48699, Tue, Nov 26, 2019 20:25:17 [DoS attack: UDP Scan] from source: 223.71.167.62, port 44119, Tue, Nov 26, 2019 19:05:34 [DoS attack: Echo char gen] from source: 146.88.240.4, port 43504, Tue, Nov 26, 2019 18:16:38 [DoS attack: UDP Scan] from source: 142.93.97.100, port 12326, Tue, Nov 26, 2019 16:48:10 [DoS attack: Echo char gen] from source: 45.67.15.69, port 31989, Tue, Nov 26, 2019 15:29:15 [wireless signal schedule] The 5GHz wireless signal is ON, Tue, Nov 26, 2019 15:00:03 [DoS attack: UDP Scan] from source: 223.71.167.62, port 63926, Tue, Nov 26, 2019 13:05:29 [DoS attack: UDP Scan] from source: 223.71.167.155, port 9980, Tue, Nov 26, 2019 12:39:26 [DoS attack: UDP Scan] from source: 223.71.167.62, port 40459, Tue, Nov 26, 2019 12:21:58 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Tue, Nov 26, 2019 10:07:58 [DoS attack: Sync flood] from source: 180.35.103.2, port 50263, Tue, Nov 26, 2019 10:06:49 [UPnP set event: DeletePortMapping] from source 192.168.0.11, port 30880, Tue, Nov 26, 2019 10:06:02 [DoS attack: UDP Scan] from source: 223.71.167.155, port 59420, Tue, Nov 26, 2019 09:47:37 [DoS attack: Sync flood] from source: 114.27.10.168, port 1030, Tue, Nov 26, 2019 08:56:17 [DoS attack: Sync flood] from source: 217.178.24.50, port 28478, Tue, Nov 26, 2019 08:52:53 [DoS attack: UDP Scan] from source: 223.71.167.62, port 54377, Tue, Nov 26, 2019 08:47:20 [DoS attack: ICMP Ping flood] from source: 182.19.231.126, Tue, Nov 26, 2019 08:13:25 [wireless signal schedule] The 5GHz wireless signal is OFF, Tue, Nov 26, 2019 08:00:03 [DoS attack: ICMP Ping flood] from source: 110.169.248.93, Tue, Nov 26, 2019 06:37:46 [DoS attack: ICMP Ping flood] from source: 211.76.109.4, Tue, Nov 26, 2019 06:24:34 [DoS attack: Sync flood] from source: 74.125.3.72, port 443, Tue, Nov 26, 2019 06:20:12 [DoS attack: UDP Scan] from source: 223.71.167.62, port 44028, Tue, Nov 26, 2019 05:47:45 [DoS attack: UDP Scan] from source: 223.71.167.62, port 55984, Tue, Nov 26, 2019 05:32:24 [DoS attack: ICMP Ping flood] from source: 58.72.41.238, Tue, Nov 26, 2019 04:51:32 [UPnP set event: AddPortMapping] from source 192.168.0.11, port 30880, Tue, Nov 26, 2019 04:46:57 [DoS attack: UDP Scan] from source: 211.150.70.18, port 19030, Tue, Nov 26, 2019 04:40:21 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Tue, Nov 26, 2019 03:55:45 [DoS attack: UDP Scan] from source: 223.71.167.62, port 29366, Tue, Nov 26, 2019 02:40:29 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Tue, Nov 26, 2019 00:33:30 [DoS attack: Echo char gen] from source: 71.6.232.5, port 37186, Mon, Nov 25, 2019 23:02:03 [DoS attack: UDP Scan] from source: 223.71.167.155, port 5696, Mon, Nov 25, 2019 22:42:04 [DoS attack: Echo char gen] from source: 184.105.139.69, port 24607, Mon, Nov 25, 2019 22:25:26 [DoS attack: Echo char gen] from source: 146.88.240.4, port 56117, Mon, Nov 25, 2019 20:01:54 [DoS attack: UDP Scan] from source: 146.88.240.4, port 56509, Mon, Nov 25, 2019 19:14:13 [DoS attack: UDP Scan] from source: 223.71.167.62, port 45745, Mon, Nov 25, 2019 18:36:07 [DoS attack: Sync flood] from source: 13.226.96.43, port 80, Mon, Nov 25, 2019 18:01:01 [DoS attack: UDP Scan] from source: 223.71.167.62, port 29129, Mon, Nov 25, 2019 15:07:05 [wireless signal schedule] The 5GHz wireless signal is ON, Mon, Nov 25, 2019 15:00:03 [DoS attack: UDP Scan] from source: 211.150.70.18, port 55813, Mon, Nov 25, 2019 14:04:48 [DoS attack: Ascend Kill attack] from source: 89.248.168.217, port 39991, Mon, Nov 25, 2019 10:38:10 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Mon, Nov 25, 2019 10:13:41 [DoS attack: Echo char gen] from source: 146.88.240.4, port 41651, Mon, Nov 25, 2019 09:56:42 [DoS attack: UDP Scan] from source: 211.150.70.18, port 12879, Mon, Nov 25, 2019 09:15:32 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Mon, Nov 25, 2019 08:00:15 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Mon, Nov 25, 2019 08:00:15 [wireless signal schedule] The 5GHz wireless signal is OFF, Mon, Nov 25, 2019 08:00:03 [DoS attack: Sync flood] from source: 213.174.137.53, port 443, Mon, Nov 25, 2019 07:58:59 [DoS attack: Sync flood] from source: 206.54.174.4, port 443, Mon, Nov 25, 2019 07:43:51 [DoS attack: Sync flood] from source: 206.54.174.4, port 443, Mon, Nov 25, 2019 07:43:51 [DoS attack: Sync flood] from source: 213.174.137.55, port 443, Mon, Nov 25, 2019 07:24:37 [DoS attack: Sync flood] from source: 213.174.137.55, port 443, Mon, Nov 25, 2019 07:23:08 [DoS attack: UDP Scan] from source: 223.71.167.62, port 16018, Mon, Nov 25, 2019 05:57:52 [DoS attack: Sync flood] from source: 213.174.137.55, port 443, Mon, Nov 25, 2019 05:19:56 [DoS attack: UDP Scan] from source: 146.88.240.4, port 45221, Mon, Nov 25, 2019 05:10:52 [DoS attack: UDP Scan] from source: 223.71.167.155, port 7127, Mon, Nov 25, 2019 04:31:04 [DoS attack: Echo char gen] from source: 80.82.77.245, port 45219, Mon, Nov 25, 2019 04:14:06 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Mon, Nov 25, 2019 03:30:56 [DoS attack: UDP Scan] from source: 185.94.111.1, port 52483, Mon, Nov 25, 2019 03:14:51 [DoS attack: UDP Scan] from source: 211.150.70.18, port 29658, Mon, Nov 25, 2019 00:59:38 [DoS attack: UDP Scan] from source: 185.94.111.1, port 41418, Sun, Nov 24, 2019 23:59:27 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Sun, Nov 24, 2019 23:18:20 [DoS attack: Echo char gen] from source: 52.73.169.169, port 40299, Sun, Nov 24, 2019 23:08:34 [DoS attack: Echo char gen] from source: 80.82.77.221, port 55979, Sun, Nov 24, 2019 22:36:20 [DoS attack: UDP Scan] from source: 146.88.240.2, port 50749, Sun, Nov 24, 2019 21:33:07 [DoS attack: UDP Scan] from source: 223.71.167.154, port 10141, Sun, Nov 24, 2019 21:19:42 [DoS attack: UDP Scan] from source: 146.88.240.2, port 48463, Sun, Nov 24, 2019 19:20:20 [DoS attack: UDP Scan] from source: 223.71.167.155, port 10995, Sun, Nov 24, 2019 18:03:41 [wireless signal schedule] The 5GHz wireless signal is ON, Sun, Nov 24, 2019 15:00:03 [DoS attack: UDP Scan] from source: 211.150.70.18, port 16119, Sun, Nov 24, 2019 13:12:19 [DoS attack: Echo char gen] from source: 122.228.19.80, port 17279, Sun, Nov 24, 2019 13:08:17 [DoS attack: UDP Scan] from source: 211.150.70.18, port 50742, Sun, Nov 24, 2019 12:57:27 [DoS attack: Echo char gen] from source: 83.97.20.167, port 29570, Sun, Nov 24, 2019 10:51:25 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Sun, Nov 24, 2019 09:45:41 [DoS attack: UDP Scan] from source: 104.131.209.76, port 35328, Sun, Nov 24, 2019 09:42:45 [wireless signal schedule] The 5GHz wireless signal is OFF, Sun, Nov 24, 2019 08:00:03 [DoS attack: UDP Scan] from source: 211.150.70.18, port 12045, Sun, Nov 24, 2019 07:32:11 [DoS attack: UDP Scan] from source: 146.88.240.4, port 44739, Sun, Nov 24, 2019 05:39:59 [DoS attack: Sync flood] from source: 64.210.158.130, port 443, Sun, Nov 24, 2019 04:32:13 [DoS attack: UDP Scan] from source: 223.71.167.154, port 64828, Sun, Nov 24, 2019 03:35:58 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Sun, Nov 24, 2019 02:53:54 [DHCP IP: (192.168.0.109)] to MAC address 54:33:cb:60:3e:a9, Sun, Nov 24, 2019 02:51:25 [DoS attack: UDP Scan] from source: 223.71.167.155, port 45675, Sun, Nov 24, 2019 02:09:46 [DoS attack: UDP Scan] from source: 104.152.52.39, port 57860, Sun, Nov 24, 2019 01:06:14 [DoS attack: Echo char gen] from source: 104.152.52.39, port 57860, Sun, Nov 24, 2019 01:02:59 [DoS attack: UDP Scan] from source: 104.152.52.39, port 57860, Sun, Nov 24, 2019 00:56:07 [DoS attack: UDP Scan] from source: 104.152.52.39, port 57860, Sun, Nov 24, 2019 00:45:22 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Sat, Nov 23, 2019 22:13:09 [DoS attack: UDP Scan] from source: 223.71.167.155, port 37207, Sat, Nov 23, 2019 21:51:36 [DoS attack: Echo char gen] from source: 185.173.35.41, port 64291, Sat, Nov 23, 2019 21:00:10 [DoS attack: Echo char gen] from source: 146.88.240.4, port 54483, Sat, Nov 23, 2019 18:21:02 [DoS attack: UDP Scan] from source: 223.71.167.61, port 39708, Sat, Nov 23, 2019 17:19:02 [DoS attack: Ascend Kill attack] from source: 89.248.168.217, port 42296, Sat, Nov 23, 2019 16:30:58 [DoS attack: Echo char gen] from source: 80.82.77.245, port 53461, Sat, Nov 23, 2019 16:06:56 [wireless signal schedule] The 5GHz wireless signal is ON, Sat, Nov 23, 2019 15:00:03 [DoS attack: Echo char gen] from source: 92.118.37.91, port 14908, Sat, Nov 23, 2019 13:40:52 [DoS attack: Echo char gen] from source: 92.118.37.91, port 55235, Sat, Nov 23, 2019 13:06:31 [DoS attack: Echo char gen] from source: 109.248.11.201, port 50630, Sat, Nov 23, 2019 10:45:29 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Sat, Nov 23, 2019 09:30:03 [DoS attack: UDP Scan] from source: 211.150.70.18, port 10351, Sat, Nov 23, 2019 08:49:49 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Sat, Nov 23, 2019 08:00:16 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Sat, Nov 23, 2019 08:00:15 [wireless signal schedule] The 5GHz wireless signal is OFF, Sat, Nov 23, 2019 08:00:03 [DoS attack: Sync flood] from source: 159.69.143.224, port 443, Sat, Nov 23, 2019 07:54:04 [DoS attack: Sync flood] from source: 94.130.139.59, port 443, Sat, Nov 23, 2019 07:33:19 [DoS attack: UDP Scan] from source: 211.150.70.18, port 16823, Sat, Nov 23, 2019 07:11:08 [DoS attack: Sync flood] from source: 88.99.166.9, port 443, Sat, Nov 23, 2019 06:35:14 [DoS attack: Echo char gen] from source: 146.88.240.4, port 55002, Sat, Nov 23, 2019 05:57:08 [DoS attack: UDP Scan] from source: 122.228.19.80, port 61126, Sat, Nov 23, 2019 05:56:00 [DoS attack: UDP Scan] from source: 185.94.111.1, port 49382, Sat, Nov 23, 2019 05:21:12 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Sat, Nov 23, 2019 04:17:33 [DoS attack: Echo char gen] from source: 141.212.123.202, port 42970, Sat, Nov 23, 2019 03:58:19 [DoS attack: UDP Scan] from source: 223.71.167.61, port 17609, Sat, Nov 23, 2019 03:37:28 [DoS attack: UDP Scan] from source: 223.71.167.154, port 53095, Sat, Nov 23, 2019 01:30:17 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Sat, Nov 23, 2019 00:06:16 [DoS attack: UDP Scan] from source: 146.88.240.4, port 56952, Fri, Nov 22, 2019 21:11:40 [DoS attack: Echo char gen] from source: 45.58.135.186, port 53170, Fri, Nov 22, 2019 18:22:03 [wireless signal schedule] The 5GHz wireless signal is ON, Fri, Nov 22, 2019 15:00:03 [DoS attack: Echo char gen] from source: 92.118.37.91, port 45118, Fri, Nov 22, 2019 11:48:34 [DoS attack: Echo char gen] from source: 92.118.37.91, port 33002, Fri, Nov 22, 2019 11:15:53 [DoS attack: UDP Scan] from source: 223.71.167.155, port 46652, Fri, Nov 22, 2019 10:33:08 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Fri, Nov 22, 2019 10:31:10 [wireless signal schedule] The 5GHz wireless signal is OFF, Fri, Nov 22, 2019 08:00:03 [DoS attack: UDP Scan] from source: 223.71.167.154, port 35421, Fri, Nov 22, 2019 06:49:21 [DoS attack: UDP Scan] from source: 211.150.70.18, port 12598, Fri, Nov 22, 2019 06:15:29 [DoS attack: Sync flood] from source: 213.174.137.135, port 443, Fri, Nov 22, 2019 05:42:15 [DoS attack: Echo char gen] from source: 146.88.240.4, port 57024, Fri, Nov 22, 2019 04:23:20 [DoS attack: Echo char gen] from source: 80.82.77.245, port 34658, Fri, Nov 22, 2019 04:03:24 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Fri, Nov 22, 2019 03:49:45 [DoS attack: UDP Scan] from source: 223.71.167.155, port 60808, Fri, Nov 22, 2019 03:16:06 [DoS attack: UDP Scan] from source: 211.150.70.18, port 39200, Fri, Nov 22, 2019 02:16:07 [DoS attack: UDP Scan] from source: 211.150.70.18, port 35299, Fri, Nov 22, 2019 02:00:59 [DoS attack: Echo char gen] from source: 184.105.139.77, port 24439, Fri, Nov 22, 2019 00:51:37 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Fri, Nov 22, 2019 00:12:24 [DoS attack: UDP Scan] from source: 211.150.70.18, port 30931, Thu, Nov 21, 2019 23:06:25 [DoS attack: Ascend Kill attack] from source: 89.248.168.217, port 47518, Thu, Nov 21, 2019 22:20:08 [DoS attack: UDP Scan] from source: 211.150.70.18, port 56282, Thu, Nov 21, 2019 21:14:42 [DoS attack: UDP Scan] from source: 211.150.70.18, port 35255, Thu, Nov 21, 2019 20:44:21 [DoS attack: UDP Scan] from source: 223.71.167.61, port 31588, Thu, Nov 21, 2019 20:13:53 [DoS attack: UDP Scan] from source: 146.88.240.4, port 59565, Thu, Nov 21, 2019 19:05:54 [DoS attack: UDP Scan] from source: 211.150.70.18, port 39519, Thu, Nov 21, 2019 18:36:31 [wireless signal schedule] The 5GHz wireless signal is ON, Thu, Nov 21, 2019 15:00:03 [DoS attack: UDP Scan] from source: 223.71.167.155, port 22201, Thu, Nov 21, 2019 12:53:23 [DoS attack: Echo char gen] from source: 92.118.37.91, port 38196, Thu, Nov 21, 2019 12:35:53 [DoS attack: Echo char gen] from source: 92.118.37.91, port 56177, Thu, Nov 21, 2019 11:59:48 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Thu, Nov 21, 2019 10:08:03 [DoS attack: UDP Scan] from source: 185.94.111.1, port 44870, Thu, Nov 21, 2019 10:05:04 [DoS attack: UDP Scan] from source: 211.150.70.18, port 26178, Thu, Nov 21, 2019 09:22:34 [DoS attack: UDP Scan] from source: 185.94.111.1, port 48420, Thu, Nov 21, 2019 08:02:05 [wireless signal schedule] The 5GHz wireless signal is OFF, Thu, Nov 21, 2019 08:00:03 [DoS attack: Sync flood] from source: 152.195.33.132, port 443, Thu, Nov 21, 2019 07:39:19 [DoS attack: Sync flood] from source: 74.125.3.121, port 443, Thu, Nov 21, 2019 06:39:23 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Thu, Nov 21, 2019 03:49:15 [DoS attack: UDP Scan] from source: 211.150.70.18, port 43042, Thu, Nov 21, 2019 00:58:31 [DoS attack: Echo char gen] from source: 172.104.51.17, port 53084, Thu, Nov 21, 2019 00:37:39 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Thu, Nov 21, 2019 00:07:34 [DoS attack: Echo char gen] from source: 82.221.105.6, port 27221, Wed, Nov 20, 2019 22:22:33 [DoS attack: Echo char gen] from source: 146.88.240.4, port 43032, Wed, Nov 20, 2019 21:17:48 [DoS attack: UDP Scan] from source: 146.88.240.4, port 53874, Wed, Nov 20, 2019 20:46:51 [DoS attack: UDP Scan] from source: 211.150.70.18, port 38862, Wed, Nov 20, 2019 17:50:09 [DoS attack: UDP Scan] from source: 211.150.70.18, port 8150, Wed, Nov 20, 2019 16:27:15 [wireless signal schedule] The 5GHz wireless signal is ON, Wed, Nov 20, 2019 15:00:02 [DoS attack: Echo char gen] from source: 80.82.77.245, port 42747, Wed, Nov 20, 2019 14:24:38 [DoS attack: Echo char gen] from source: 137.74.157.89, port 33696, Wed, Nov 20, 2019 09:31:22 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Wed, Nov 20, 2019 09:24:32 [DoS attack: Echo char gen] from source: 50.7.232.154, port 42299, Wed, Nov 20, 2019 09:21:47 [DoS attack: UDP Scan] from source: 211.150.70.18, port 20027, Wed, Nov 20, 2019 08:47:15 [DoS attack: UDP Scan] from source: 211.150.70.18, port 9583, Wed, Nov 20, 2019 08:12:04 [wireless signal schedule] The 5GHz wireless signal is OFF, Wed, Nov 20, 2019 08:00:02 [DoS attack: Sync flood] from source: 209.197.3.68, port 443, Wed, Nov 20, 2019 06:50:51 [DoS attack: UDP Scan] from source: 211.150.70.18, port 59743, Wed, Nov 20, 2019 04:40:35 [DoS attack: Ascend Kill attack] from source: 89.248.168.217, port 34898, Wed, Nov 20, 2019 04:15:53 [DoS attack: Echo char gen] from source: 92.118.37.91, port 34832, Wed, Nov 20, 2019 02:28:36 [DoS attack: UDP Scan] from source: 146.88.240.4, port 48255, Wed, Nov 20, 2019 02:22:48 [DoS attack: Echo char gen] from source: 92.118.37.91, port 64778, Wed, Nov 20, 2019 01:48:08 [UPnP set event: AddPortMapping] from source 192.168.0.28, port 3074, Wed, Nov 20, 2019 00:39:10 [UPnP set event: AddPortMapping] from source 192.168.0.23, port 9308, Wed, Nov 20, 2019 00:38:27 [DHCP IP: (192.168.0.108)] to MAC address 38:8c:50:d4:7a:cd, Wed, Nov 20, 2019 00:38:16 [DoS attack: Echo char gen] from source: 184.105.139.89, port 56943, Tue, Nov 19, 2019 22:32:06 [DoS attack: UDP Scan] from source: 223.71.167.155, port 29704, Tue, Nov 19, 2019 22:11:15 [DoS attack: Echo char gen] from source: 146.88.240.4, port 56312, Tue, Nov 19, 2019 20:19:06 [DoS attack: Echo char gen] from source: 46.161.27.142, port 8080, Tue, Nov 19, 2019 18:41:16 [wireless signal schedule] The 5GHz wireless signal is ON, Tue, Nov 19, 2019 15:00:02 [DoS attack: Echo char gen] from source: 185.106.122.220, port 60712, Tue, Nov 19, 2019 14:46:52 [DoS attack: UDP Scan] from source: 185.94.111.1, port 39928, Tue, Nov 19, 2019 14:30:41 [DoS attack: Echo char gen] from source: 92.118.37.91, port 64166, Tue, Nov 19, 2019 14:05:46 [DoS attack: Echo char gen] from source: 92.118.37.91, port 59761, Tue, Nov 19, 2019 13:25:20 [DoS attack: UDP Scan] from source: 185.94.111.1, port 53063, Tue, Nov 19, 2019 13:08:28 [DHCP IP: (192.168.0.100)] to MAC address 5c:f6:dc:65:80:11, Tue, Nov 19, 2019 10:41:12 [UPnP set event: DeletePortMapping] from source 192.168.0.28, port 3074, Tue, Nov 19, 2019 09:15:04 [DoS attack: Echo char gen] from source: 92.118.37.91, port 38982, Tue, Nov 19, 2019 08:57:44 [DoS attack: Echo char gen] from source: 92.118.37.91, port 56223, Tue, Nov 19, 2019 08:16:36 [wireless signal schedule] The 5GHz wireless signal is OFF, Tue, Nov 19, 2019 08:00:02 [DoS attack: Sync flood] from source: 213.174.154.9, port 443, Tue, Nov 19, 2019 07:00:12 [DHCP IP: (192.168.0.107)] to MAC address 3c:9b:d6:00:75:7c, Tue, Nov 19, 2019 03:59:34 [DHCP IP: (192.168.0.111)] to MAC address 00:ce:39:b5:98:92, Tue, Nov 19, 2019 03:59:27 [DoS attack: UDP Scan] from source: 211.150.70.18, port 26498, Tue, Nov 19, 2019 01:51:22 [DHCP IP: (192.168.0.104)] to MAC address 60:6b:ff:ae:ff:6c, Tue, Nov 19, 2019 01:26:03 [DoS attack: UDP Scan] from source: 146.88.240.4, port 58883, Tue, Nov 19, 2019 01:13:32 [DoS attack: UDP Scan] from source: 211.150.70.18, port 6095, Tue, Nov 19, 2019 01:02:41 [DHCP IP: (192.168.0.103)] to MAC address fc:6b:f0:33:ec:06, Tue, Nov 19, 2019 00:53:31 

Does any of this look sinister, or is it just a bunch of false positives?