Visitor
•
5 Messages
I have static ip address and would like a dynamic!
I have been getting too many DoS attacks which is slowing my internet service! I want a dynamic internet service! I want my ip address to be constantly changing! Why they say dynamic and give you static? I looked online the only people getting static ip address are businesses not regular consumers?
Accepted Solution
Andyr1
Gold Problem Solver
•
7.9K Messages
3 years ago
After you change your router's MAC address, you MUST reboot your modem. That forces Comcast's servers to then notice the MAC change and update accordingly.
2
Andyr1
Gold Problem Solver
•
7.9K Messages
3 years ago
Standard home Comcast HSI is dynamic. but it is 'sticky'. It is based on the MAC address of your router (or built-in router of a gateway.) It can often hold for years. If you want to change it, you can alter the MAC address of your router and then reboot the modem. If you have a Comcast gateway, you may be able to find a smart enough service agent to force a reprovision. Otherwise, you may have to swap it for another one.
0
user_dc5808
Visitor
•
5 Messages
3 years ago
I have my own equipment. I am using a Netgear Nighthawk and I have tried changing the MAC address and I was unable to get the internet to work; forcing me to revert all my changes! I even called xfinity tech support and the person said I have a static IP address and I asked him to change it to dynamic and he said he well have someone call me! I have regular internet service I am not a Buisness subscriber. I will try altering the MAC address and see if it works but if you have any links that could help it would be much appreciated.
0
user_dc5808
Visitor
•
5 Messages
3 years ago
I am still getting attacked after changing my IP address and using a VPN. Every time I run a speed test I am not getting the usual speed. Here is my router log.
[DoS Attack: SYN/ACK Scan] from source: 162.241.216.182, port 443, Saturday, February 05, 2022 15:55:35
[DoS Attack: RST Scan] from source: 179.107.50.150, port 6948, Saturday, February 05, 2022 15:50:50
[DoS Attack: SYN/ACK Scan] from source: 111.231.84.21, port 32331, Saturday, February 05, 2022 15:49:04
[DoS Attack: WinNuke Attack] from source: 122.226.174.130, port 5914, Saturday, February 05, 2022 15:43:21
[DoS Attack: SYN/ACK Scan] from source: 179.107.54.34, port 17405, Saturday, February 05, 2022 15:25:51
[DoS Attack: SYN/ACK Scan] from source: 179.107.54.34, port 17405, Saturday, February 05, 2022 15:25:51
[DoS Attack: SYN/ACK Scan] from source: 179.107.54.34, port 17405, Saturday, February 05, 2022 15:25:51
[WLAN access allowed] from MAC :
[Edited: "Personal Information"]
, Saturday, February 05, 2022 15:14:21
[DHCP IP: 10.0.0.10][Device Name: ] to MAC address
[Edited: "Personal Information"]
, Saturday, February 05, 2022 15:14:20
[Access Control] Device Unknown with MAC address
[Edited: "Personal Information"]
is allowed to access th, Saturday, February 05, 2022 15:14:20
[DoS Attack: SYN/ACK Scan] from source: 95.217.31.46, port 443, Saturday, February 05, 2022 15:02:12
[DoS Attack: ACK Scan] from source: 142.252.252.18, port 22222, Saturday, February 05, 2022 14:45:36
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: RST Scan] from source: 179.107.49.13, port 25220, Saturday, February 05, 2022 14:45:08
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 179.107.48.81, port 36409, Saturday, February 05, 2022 14:28:10
[DoS Attack: SYN/ACK Scan] from source: 111.231.84.21, port 13726, Saturday, February 05, 2022 14:13:07
[DoS Attack: ACK Scan] from source: 120.79.202.178, port 3559, Saturday, February 05, 2022 13:56:41
[DoS Attack: RST Scan] from source: 35.247.221.225, port 27018, Saturday, February 05, 2022 13:52:55
[DoS Attack: SYN/ACK Scan] from source: 95.217.31.46, port 443, Saturday, February 05, 2022 13:51:11
(edited)
0
0