What's new

Router hacked and pc accessed

  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Status
Not open for further replies.

Reddirtdog

New Around Here
My router is hacked by a neighbor, I know for a fact because he admitted it taunting me. They are also able to access my desktop pc through the router and change programs on my pc. I bought a new router tplink ac1750 I havent installed it yet but I currently use the same router and want to disable remote access to the router but im not sure how, I changed the default password but that didn't help they can still access it and also turn my internet off and on. heres a log
####################################################################
# Archer A7 System Log
# Time = 2021-12-04 05:51:18

# Clients connected: 3 ; WI-FI : 0
####################################################################
2021-12-04 05:41:30 access-control[16853]: <6> 239504 Service start
2021-12-04 05:41:30 access-control[16853]: <6> 239503 Function disabled
2021-12-04 05:41:30 access-control[16853]: <6> 239505 Service stop
2021-12-04 05:41:24 access-control[16478]: <6> 239504 Service start
2021-12-04 05:41:24 access-control[16478]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:41:24 access-control[16478]: <6> 239502 Function enabled
2021-12-04 05:41:24 access-control[16478]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:41:23 access-control[16478]: <6> 239505 Service stop
2021-12-04 05:40:02 usbshare[14506]: <5> 291254 MiniDLNA start
2021-12-04 05:40:02 usbshare[14506]: <5> 291252 ProFTPd start
2021-12-04 05:40:02 usbshare[14506]: <5> 291250 Samba start
2021-12-04 05:40:02 usbshare[14506]: <5> 291255 MiniDLNA stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291253 ProFTPd stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291251 Samba stop
2021-12-04 05:39:25 usbshare[13818]: <5> 291254 MiniDLNA start
2021-12-04 05:39:25 usbshare[13818]: <5> 291252 ProFTPd start
2021-12-04 05:39:25 usbshare[13818]: <5> 291250 Samba start
2021-12-04 05:39:24 usbshare[13818]: <5> 291255 MiniDLNA stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291253 ProFTPd stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291251 Samba stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291254 MiniDLNA start
2021-12-04 05:38:51 usbshare[13112]: <5> 291252 ProFTPd start
2021-12-04 05:38:51 usbshare[13112]: <5> 291250 Samba start
2021-12-04 05:38:51 usbshare[13112]: <5> 291255 MiniDLNA stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291253 ProFTPd stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291251 Samba stop
2021-12-04 05:37:07 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:05 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:03 network[9894]: <6> 290509 No config changed
2021-12-04 05:37:03 network[9894]: <4> 290702 Invalid arguments from webpages
2021-12-04 05:37:03 network[9894]: <6> 290150 Set mac clone
2021-12-04 05:37:03 network[9894]: <6> 290100 Set WAN protocol to dhcp, operation is write
2021-12-04 05:3<6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=63082;subnet=255.255.224.0;router128.1;dns=209.18.4
2021-12-04 05:36:55 dhcpc[9215]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.serverid=142.254
2021-12-04 05:36:55 dhcpc[9215]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.25lease=63082;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-12-04 05:36:55 dhcpc[9215]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-12-04 05:36:54 network[8924]: <6> 290003 Connect interface wan
2021-12-04 05:36:54 network[8924]: <6> 290005 Reload config
2021-12-04 05:36:53 network[8924]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:52 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:50 network[8924]: <6> 290100 Set WAN protocol to dhcp, operation is renew
2021-12-04 05:36:50 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:47 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:47 network[8550]: <6> 290005 Reload config
2021-12-04 05:36:46 dhcpc[5111]: <4> 210153 send dhcp release ip 98.151.135.198
2021-12-04 05:36:46 dhcpc[5111]: <6> 210056 teardown and release
2021-12-04 05:36:46 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:44 network[8550]: <6> 290100 Set WAN protocol to dhcp, operation is release
2021-12-04 05:19:36 access-control[15555]: <6> 239504 Service start
2021-12-04 05:19:36 access-control[15555]: <6> 239503 Function disabled
2021-12-04 05:19:36 access-control[15555]: <6> 239505 Service stop
2021-12-04 05:18:04 access-control[14913]: <6> 239504 Service start
2021-12-04 05:18:04 access-control[14913]: <6> 239503 Function disabled
2021-12-04 05:18:03 access-control[14913]: <6> 239505 Service stop
2021-12-04 05:15:21 access-control[12829]: <6> 239504 Service start
2021-12-04 05:15:21 access-control[12829]: <6> 239503 Function disabled
2021-12-04 05:15:21 access-control[12829]: <6> 239505 Service stop
2021-12-04 05:15:15 access-control[12528]: <6> 239504 Service start
2021-12-04 05:15:15 access-control[12528]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:15:15 access-control[12528]: <6> 239502 Function enabled
2021-12-04 05:15:15 access-control[12528]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:15:14 access-control[12528]: <6> 239505 Service stop
2021-12-04 05:14:39 access-control[12102]: <6> 239504 Service start
2021-12-04 05:14:39 access-control[12102]: <6> 239503 Function disabled
2021-12-04 05:14:39 access-control[12102]: <6> 239505 Service stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291254 MiniDLNA start
2021-12-04 05:08:13 usbshare[7717]: <5> 291252 ProFTPd start
2021-12-04 05:08:13 usbshare[7717]: <5> 291250 Samba start
2021-12-04 05:08:13 usbshare[7717]: <5> 291255 MiniDLNA stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291253 ProFTPd stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291251 Samba stop
2021-12-04 05:08:11 account-management[7717]: <6> 280055 Restart USB share services.
2021-01-25 00:01:31 upnp[6571]: <6> 217504 Service start
2021-01-25 00:01:28 qos[6577]: <6> 259504 Service start
2021-01-25 00:01:27 qos[6577]: <6> 259503 Function disabled
2021-01-25 00:01:27 upnp[6571]: <6> 217505 Service stop
2021-01-25 00:01:26 nat[5139]: <6> 211021 IPSEC ALG enabled
2021-01-25 00:01:26 nat[5139]: <6> 211021 L2TP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 PPTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 SIP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 RTSP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 H323 ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 TFTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 FTP ALG enabled
2021-01-25 00:01:19 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:14 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:13 dhcps[3770]: <6> 212054 send ack ip 19and dns 1to 94:c6:91:98:50:b6
2021-01-25 00:01:13 dhcps[3770]: <6> 212053 receive request ip 192.16from 94:c6:91:98:50:b6
2021-01-25 00:01:10 factory-reset[5419]: <6> 284504 Service start
2021-01-25 00:01:09 dhcps[3770]: <6> 212054 send ack ip 192.168.0.154 and dns 192.168.0.1 to e6:e0:41:f3:2a:0e
2021-01-25 00:01:09 dhcps[3770]: <6> 212053 receive request ip 192from e6:e0:41:f3:2a:0e
2021-01-25 00:01:04 dhcpc[5111]: <6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.135.198;serverid=142.254.191.25;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-01-25 00:00:54 dhcps[3770]: <6> 212054 send ack ip and dns 192to 24:4c:e3:3e:e3:2b
2021-01-25 00:00:54 dhcps[3770]: <6> 212053 receive request ip 192.from 24:4c:e3:3e:e3:2b
2021-01-25 00:00:44 parental-control[4547]: <6> 229504 Service start
2021-01-25 00:00:44 parental-control[4547]: <6> 229502 Function enabled
2021-01-25 00:00:40 nat[3496]: <6> 211502 Function enabled
2021-01-25 00:00:39 nat[3496]: <5> 211051 Create NAT chain succeeded
2021-01-25 00:00:37 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:35 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218507 Daemon connection succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218012 ARP Binding disabled
2021-01-25 00:00:31 imb[3411]: <6> 218506 Config interface initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218501 Initialization succeeded
2021-01-25 00:00:30 basic-security[2681]: <6> 219504 Service start
2021-01-25 00:00:30 basic-security[2681]: <5> 219606 Flush conntrack table succeeded
2021-01-25 00:00:29 upnp[2987]: <6> 217504 Service start
2021-01-25 00:00:27 upnp[2987]: <6> 217505 Service stop
2021-01-25 00:00:24 access-control[2663]: <6> 239504 Service start
2021-01-25 00:00:24 access-control[2663]: <6> 239503 Function disabled
2021-01-25 00:00:23 firewall[1289]: <6> 209504 Service start
2021-01-25 00:00:17 modem[2036]: <7> 292032 proto_init_config: proto=qmi
2021-01-25 00:00:12 modem[1591]: <7> 292032 proto_init_config: proto=ncm
2021-01-25 00:00:07 modem[1271]: <7> 292032 proto_init_config: proto=3g
2021-01-25 00:00:00 system[856]: <6> 293200 check num = 00110
2021-01-25 00:00:00 time-settings[823]: <6> 279504 Service start
 
My router is hacked by a neighbor, I know for a fact because he admitted it taunting me. They are also able to access my desktop pc through the router and change programs on my pc. I bought a new router tplink ac1750 I havent installed it yet but I currently use the same router and want to disable remote access to the router but im not sure how, I changed the default password but that didn't help they can still access it and also turn my internet off and on. heres a log
####################################################################
# Archer A7 System Log
# Time = 2021-12-04 05:51:18

# Clients connected: 3 ; WI-FI : 0
####################################################################
2021-12-04 05:41:30 access-control[16853]: <6> 239504 Service start
2021-12-04 05:41:30 access-control[16853]: <6> 239503 Function disabled
2021-12-04 05:41:30 access-control[16853]: <6> 239505 Service stop
2021-12-04 05:41:24 access-control[16478]: <6> 239504 Service start
2021-12-04 05:41:24 access-control[16478]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:41:24 access-control[16478]: <6> 239502 Function enabled
2021-12-04 05:41:24 access-control[16478]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:41:23 access-control[16478]: <6> 239505 Service stop
2021-12-04 05:40:02 usbshare[14506]: <5> 291254 MiniDLNA start
2021-12-04 05:40:02 usbshare[14506]: <5> 291252 ProFTPd start
2021-12-04 05:40:02 usbshare[14506]: <5> 291250 Samba start
2021-12-04 05:40:02 usbshare[14506]: <5> 291255 MiniDLNA stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291253 ProFTPd stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291251 Samba stop
2021-12-04 05:39:25 usbshare[13818]: <5> 291254 MiniDLNA start
2021-12-04 05:39:25 usbshare[13818]: <5> 291252 ProFTPd start
2021-12-04 05:39:25 usbshare[13818]: <5> 291250 Samba start
2021-12-04 05:39:24 usbshare[13818]: <5> 291255 MiniDLNA stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291253 ProFTPd stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291251 Samba stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291254 MiniDLNA start
2021-12-04 05:38:51 usbshare[13112]: <5> 291252 ProFTPd start
2021-12-04 05:38:51 usbshare[13112]: <5> 291250 Samba start
2021-12-04 05:38:51 usbshare[13112]: <5> 291255 MiniDLNA stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291253 ProFTPd stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291251 Samba stop
2021-12-04 05:37:07 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:05 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:03 network[9894]: <6> 290509 No config changed
2021-12-04 05:37:03 network[9894]: <4> 290702 Invalid arguments from webpages
2021-12-04 05:37:03 network[9894]: <6> 290150 Set mac clone
2021-12-04 05:37:03 network[9894]: <6> 290100 Set WAN protocol to dhcp, operation is write
2021-12-04 05:3<6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=63082;subnet=255.255.224.0;router128.1;dns=209.18.4
2021-12-04 05:36:55 dhcpc[9215]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.serverid=142.254
2021-12-04 05:36:55 dhcpc[9215]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.25lease=63082;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-12-04 05:36:55 dhcpc[9215]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-12-04 05:36:54 network[8924]: <6> 290003 Connect interface wan
2021-12-04 05:36:54 network[8924]: <6> 290005 Reload config
2021-12-04 05:36:53 network[8924]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:52 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:50 network[8924]: <6> 290100 Set WAN protocol to dhcp, operation is renew
2021-12-04 05:36:50 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:47 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:47 network[8550]: <6> 290005 Reload config
2021-12-04 05:36:46 dhcpc[5111]: <4> 210153 send dhcp release ip 98.151.135.198
2021-12-04 05:36:46 dhcpc[5111]: <6> 210056 teardown and release
2021-12-04 05:36:46 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:44 network[8550]: <6> 290100 Set WAN protocol to dhcp, operation is release
2021-12-04 05:19:36 access-control[15555]: <6> 239504 Service start
2021-12-04 05:19:36 access-control[15555]: <6> 239503 Function disabled
2021-12-04 05:19:36 access-control[15555]: <6> 239505 Service stop
2021-12-04 05:18:04 access-control[14913]: <6> 239504 Service start
2021-12-04 05:18:04 access-control[14913]: <6> 239503 Function disabled
2021-12-04 05:18:03 access-control[14913]: <6> 239505 Service stop
2021-12-04 05:15:21 access-control[12829]: <6> 239504 Service start
2021-12-04 05:15:21 access-control[12829]: <6> 239503 Function disabled
2021-12-04 05:15:21 access-control[12829]: <6> 239505 Service stop
2021-12-04 05:15:15 access-control[12528]: <6> 239504 Service start
2021-12-04 05:15:15 access-control[12528]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:15:15 access-control[12528]: <6> 239502 Function enabled
2021-12-04 05:15:15 access-control[12528]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:15:14 access-control[12528]: <6> 239505 Service stop
2021-12-04 05:14:39 access-control[12102]: <6> 239504 Service start
2021-12-04 05:14:39 access-control[12102]: <6> 239503 Function disabled
2021-12-04 05:14:39 access-control[12102]: <6> 239505 Service stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291254 MiniDLNA start
2021-12-04 05:08:13 usbshare[7717]: <5> 291252 ProFTPd start
2021-12-04 05:08:13 usbshare[7717]: <5> 291250 Samba start
2021-12-04 05:08:13 usbshare[7717]: <5> 291255 MiniDLNA stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291253 ProFTPd stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291251 Samba stop
2021-12-04 05:08:11 account-management[7717]: <6> 280055 Restart USB share services.
2021-01-25 00:01:31 upnp[6571]: <6> 217504 Service start
2021-01-25 00:01:28 qos[6577]: <6> 259504 Service start
2021-01-25 00:01:27 qos[6577]: <6> 259503 Function disabled
2021-01-25 00:01:27 upnp[6571]: <6> 217505 Service stop
2021-01-25 00:01:26 nat[5139]: <6> 211021 IPSEC ALG enabled
2021-01-25 00:01:26 nat[5139]: <6> 211021 L2TP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 PPTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 SIP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 RTSP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 H323 ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 TFTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 FTP ALG enabled
2021-01-25 00:01:19 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:14 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:13 dhcps[3770]: <6> 212054 send ack ip 19and dns 1to 94:c6:91:98:50:b6
2021-01-25 00:01:13 dhcps[3770]: <6> 212053 receive request ip 192.16from 94:c6:91:98:50:b6
2021-01-25 00:01:10 factory-reset[5419]: <6> 284504 Service start
2021-01-25 00:01:09 dhcps[3770]: <6> 212054 send ack ip 192.168.0.154 and dns 192.168.0.1 to e6:e0:41:f3:2a:0e
2021-01-25 00:01:09 dhcps[3770]: <6> 212053 receive request ip 192from e6:e0:41:f3:2a:0e
2021-01-25 00:01:04 dhcpc[5111]: <6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.135.198;serverid=142.254.191.25;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-01-25 00:00:54 dhcps[3770]: <6> 212054 send ack ip and dns 192to 24:4c:e3:3e:e3:2b
2021-01-25 00:00:54 dhcps[3770]: <6> 212053 receive request ip 192.from 24:4c:e3:3e:e3:2b
2021-01-25 00:00:44 parental-control[4547]: <6> 229504 Service start
2021-01-25 00:00:44 parental-control[4547]: <6> 229502 Function enabled
2021-01-25 00:00:40 nat[3496]: <6> 211502 Function enabled
2021-01-25 00:00:39 nat[3496]: <5> 211051 Create NAT chain succeeded
2021-01-25 00:00:37 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:35 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218507 Daemon connection succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218012 ARP Binding disabled
2021-01-25 00:00:31 imb[3411]: <6> 218506 Config interface initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218501 Initialization succeeded
2021-01-25 00:00:30 basic-security[2681]: <6> 219504 Service start
2021-01-25 00:00:30 basic-security[2681]: <5> 219606 Flush conntrack table succeeded
2021-01-25 00:00:29 upnp[2987]: <6> 217504 Service start
2021-01-25 00:00:27 upnp[2987]: <6> 217505 Service stop
2021-01-25 00:00:24 access-control[2663]: <6> 239504 Service start
2021-01-25 00:00:24 access-control[2663]: <6> 239503 Function disabled
2021-01-25 00:00:23 firewall[1289]: <6> 209504 Service start
2021-01-25 00:00:17 modem[2036]: <7> 292032 proto_init_config: proto=qmi
2021-01-25 00:00:12 modem[1591]: <7> 292032 proto_init_config: proto=ncm
2021-01-25 00:00:07 modem[1271]: <7> 292032 proto_init_config: proto=3g
2021-01-25 00:00:00 system[856]: <6> 293200 check num = 00110
2021-01-25 00:00:00 time-settings[823]: <6> 279504 Service start

Is your WiFi secured? You might want to get a secure router from your ISP, or hire someone to install your network for you.

OE
 
My router is hacked by a neighbor, I know for a fact because he admitted it taunting me. They are also able to access my desktop pc through the router and change programs on my pc. I bought a new router tplink ac1750 I havent installed it yet but I currently use the same router and want to disable remote access to the router but im not sure how, I changed the default password but that didn't help they can still access it and also turn my internet off and on. heres a log
####################################################################
# Archer A7 System Log
On your archer, you can set wireless security to WPA2-PSK:
tp link A7
With a decent password (lenght + complexity), it would be very hard* to obtain your password (* hard as in long time or lot of cpu resources).

Like someone else said, you need to find why you are hacked (which settings you had).
 
Immediately unplug your router from the AC power source.

Scan your computers for viruses and unknown (and recently) installed programs. Note you may need to format the drive(s) and fresh install the OS if they've planted further malware to enable their spying on you.

Fully reset the router to factory defaults. Do not plug it back in and use it without doing so.

Set up the router as much as possible offline. Only plug it in when you've fully secured it with new SSIDs, new passwords, and a new user name and password for the router too. Do not reuse any passwords you've ever used (remember, they've had access to your computers). Use the maximum length allowed by the router firmware you're using.

When you do connect to the ISP, immediately update the firmware to the latest available. You may want to go to a friend's house to do this 'offline' setup and update the router to the latest firmware fully.

Report this (and them) to authorities ASAP. This is criminal behavior and should be dealt as such.
 
My router is hacked by a neighbor, I know for a fact because he admitted it taunting me. They are also able to access my desktop pc through the router and change programs on my pc. I bought a new router tplink ac1750 I havent installed it yet but I currently use the same router and want to disable remote access to the router but im not sure how, I changed the default password but that didn't help they can still access it and also turn my internet off and on. heres a log
####################################################################
# Archer A7 System Log
# Time = 2021-12-04 05:51:18

# Clients connected: 3 ; WI-FI : 0
####################################################################
2021-12-04 05:41:30 access-control[16853]: <6> 239504 Service start
2021-12-04 05:41:30 access-control[16853]: <6> 239503 Function disabled
2021-12-04 05:41:30 access-control[16853]: <6> 239505 Service stop
2021-12-04 05:41:24 access-control[16478]: <6> 239504 Service start
2021-12-04 05:41:24 access-control[16478]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:41:24 access-control[16478]: <6> 239502 Function enabled
2021-12-04 05:41:24 access-control[16478]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:41:23 access-control[16478]: <6> 239505 Service stop
2021-12-04 05:40:02 usbshare[14506]: <5> 291254 MiniDLNA start
2021-12-04 05:40:02 usbshare[14506]: <5> 291252 ProFTPd start
2021-12-04 05:40:02 usbshare[14506]: <5> 291250 Samba start
2021-12-04 05:40:02 usbshare[14506]: <5> 291255 MiniDLNA stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291253 ProFTPd stop
2021-12-04 05:40:01 usbshare[14506]: <5> 291251 Samba stop
2021-12-04 05:39:25 usbshare[13818]: <5> 291254 MiniDLNA start
2021-12-04 05:39:25 usbshare[13818]: <5> 291252 ProFTPd start
2021-12-04 05:39:25 usbshare[13818]: <5> 291250 Samba start
2021-12-04 05:39:24 usbshare[13818]: <5> 291255 MiniDLNA stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291253 ProFTPd stop
2021-12-04 05:39:24 usbshare[13818]: <5> 291251 Samba stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291254 MiniDLNA start
2021-12-04 05:38:51 usbshare[13112]: <5> 291252 ProFTPd start
2021-12-04 05:38:51 usbshare[13112]: <5> 291250 Samba start
2021-12-04 05:38:51 usbshare[13112]: <5> 291255 MiniDLNA stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291253 ProFTPd stop
2021-12-04 05:38:51 usbshare[13112]: <5> 291251 Samba stop
2021-12-04 05:37:07 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:05 nat[9614]: <6> 211501 Initialization succeeded
2021-12-04 05:37:03 network[9894]: <6> 290509 No config changed
2021-12-04 05:37:03 network[9894]: <4> 290702 Invalid arguments from webpages
2021-12-04 05:37:03 network[9894]: <6> 290150 Set mac clone
2021-12-04 05:37:03 network[9894]: <6> 290100 Set WAN protocol to dhcp, operation is write
2021-12-04 05:3<6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=63082;subnet=255.255.224.0;router128.1;dns=209.18.4
2021-12-04 05:36:55 dhcpc[9215]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.serverid=142.254
2021-12-04 05:36:55 dhcpc[9215]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.25lease=63082;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-12-04 05:36:55 dhcpc[9215]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-12-04 05:36:54 network[8924]: <6> 290003 Connect interface wan
2021-12-04 05:36:54 network[8924]: <6> 290005 Reload config
2021-12-04 05:36:53 network[8924]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:52 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:50 network[8924]: <6> 290100 Set WAN protocol to dhcp, operation is renew
2021-12-04 05:36:50 nat[8594]: <6> 211501 Initialization succeeded
2021-12-04 05:36:47 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:47 network[8550]: <6> 290005 Reload config
2021-12-04 05:36:46 dhcpc[5111]: <4> 210153 send dhcp release ip 98.151.135.198
2021-12-04 05:36:46 dhcpc[5111]: <6> 210056 teardown and release
2021-12-04 05:36:46 network[8550]: <6> 290004 Disconnect interface wan
2021-12-04 05:36:44 network[8550]: <6> 290100 Set WAN protocol to dhcp, operation is release
2021-12-04 05:19:36 access-control[15555]: <6> 239504 Service start
2021-12-04 05:19:36 access-control[15555]: <6> 239503 Function disabled
2021-12-04 05:19:36 access-control[15555]: <6> 239505 Service stop
2021-12-04 05:18:04 access-control[14913]: <6> 239504 Service start
2021-12-04 05:18:04 access-control[14913]: <6> 239503 Function disabled
2021-12-04 05:18:03 access-control[14913]: <6> 239505 Service stop
2021-12-04 05:15:21 access-control[12829]: <6> 239504 Service start
2021-12-04 05:15:21 access-control[12829]: <6> 239503 Function disabled
2021-12-04 05:15:21 access-control[12829]: <6> 239505 Service stop
2021-12-04 05:15:15 access-control[12528]: <6> 239504 Service start
2021-12-04 05:15:15 access-control[12528]: <5> 239606 Flush conntrack table succeeded
2021-12-04 05:15:15 access-control[12528]: <6> 239502 Function enabled
2021-12-04 05:15:15 access-control[12528]: <7> 239011 black list add mac: 98:EE:CB:5D:8D:E8
2021-12-04 05:15:14 access-control[12528]: <6> 239505 Service stop
2021-12-04 05:14:39 access-control[12102]: <6> 239504 Service start
2021-12-04 05:14:39 access-control[12102]: <6> 239503 Function disabled
2021-12-04 05:14:39 access-control[12102]: <6> 239505 Service stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291254 MiniDLNA start
2021-12-04 05:08:13 usbshare[7717]: <5> 291252 ProFTPd start
2021-12-04 05:08:13 usbshare[7717]: <5> 291250 Samba start
2021-12-04 05:08:13 usbshare[7717]: <5> 291255 MiniDLNA stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291253 ProFTPd stop
2021-12-04 05:08:13 usbshare[7717]: <5> 291251 Samba stop
2021-12-04 05:08:11 account-management[7717]: <6> 280055 Restart USB share services.
2021-01-25 00:01:31 upnp[6571]: <6> 217504 Service start
2021-01-25 00:01:28 qos[6577]: <6> 259504 Service start
2021-01-25 00:01:27 qos[6577]: <6> 259503 Function disabled
2021-01-25 00:01:27 upnp[6571]: <6> 217505 Service stop
2021-01-25 00:01:26 nat[5139]: <6> 211021 IPSEC ALG enabled
2021-01-25 00:01:26 nat[5139]: <6> 211021 L2TP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 PPTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 SIP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 RTSP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 H323 ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 TFTP ALG enabled
2021-01-25 00:01:25 nat[5139]: <6> 211021 FTP ALG enabled
2021-01-25 00:01:19 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:14 nat[5139]: <6> 211501 Initialization succeeded
2021-01-25 00:01:13 dhcps[3770]: <6> 212054 send ack ip 19and dns 1to 94:c6:91:98:50:b6
2021-01-25 00:01:13 dhcps[3770]: <6> 212053 receive request ip 192.16from 94:c6:91:98:50:b6
2021-01-25 00:01:10 factory-reset[5419]: <6> 284504 Service start
2021-01-25 00:01:09 dhcps[3770]: <6> 212054 send ack ip 192.168.0.154 and dns 192.168.0.1 to e6:e0:41:f3:2a:0e
2021-01-25 00:01:09 dhcps[3770]: <6> 212053 receive request ip 192from e6:e0:41:f3:2a:0e
2021-01-25 00:01:04 dhcpc[5111]: <6> 210054 receive ack from server with ip 98.151.135.198, options(serverid=;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210053 send select request with options(cliid=01/cc:32:e5:4b:78:66:;reqip=98.151.135.198;serverid=142.254.191.25;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210052 receive offer from server with ip 98.151.135.198, options(serverid=142.254.191.25;lease=64894;subnet=255.255.224.0;router=98.151.128.1;dns=209.18.47.61 209.18.47.63;)
2021-01-25 00:01:04 dhcpc[5111]: <6> 210051 send discover with ip 0.0.0.0 and flags 8000
2021-01-25 00:00:54 dhcps[3770]: <6> 212054 send ack ip and dns 192to 24:4c:e3:3e:e3:2b
2021-01-25 00:00:54 dhcps[3770]: <6> 212053 receive request ip 192.from 24:4c:e3:3e:e3:2b
2021-01-25 00:00:44 parental-control[4547]: <6> 229504 Service start
2021-01-25 00:00:44 parental-control[4547]: <6> 229502 Function enabled
2021-01-25 00:00:40 nat[3496]: <6> 211502 Function enabled
2021-01-25 00:00:39 nat[3496]: <5> 211051 Create NAT chain succeeded
2021-01-25 00:00:37 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:35 nat[3496]: <6> 211501 Initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218507 Daemon connection succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218012 ARP Binding disabled
2021-01-25 00:00:31 imb[3411]: <6> 218506 Config interface initialization succeeded
2021-01-25 00:00:31 imb[3411]: <6> 218501 Initialization succeeded
2021-01-25 00:00:30 basic-security[2681]: <6> 219504 Service start
2021-01-25 00:00:30 basic-security[2681]: <5> 219606 Flush conntrack table succeeded
2021-01-25 00:00:29 upnp[2987]: <6> 217504 Service start
2021-01-25 00:00:27 upnp[2987]: <6> 217505 Service stop
2021-01-25 00:00:24 access-control[2663]: <6> 239504 Service start
2021-01-25 00:00:24 access-control[2663]: <6> 239503 Function disabled
2021-01-25 00:00:23 firewall[1289]: <6> 209504 Service start
2021-01-25 00:00:17 modem[2036]: <7> 292032 proto_init_config: proto=qmi
2021-01-25 00:00:12 modem[1591]: <7> 292032 proto_init_config: proto=ncm
2021-01-25 00:00:07 modem[1271]: <7> 292032 proto_init_config: proto=3g
2021-01-25 00:00:00 system[856]: <6> 293200 check num = 00110
2021-01-25 00:00:00 time-settings[823]: <6> 279504 Service start
I don't think your router has been hacked. I think your PC has been compromised.
Check your PC.
 
They can hack in either by WIFI or remotey using IP address assigned by your ISP. On the new router, turn off remote access. Like the others said, use a complex and long passwords. I would use different SSIDs. I would also set up the new router using the feature that allows only known MAC addresses to sign on to the network.

I would disconnect the devices and the internet from the old router but leave the old router up so they will see the old SSIDs but signing on does them no good. Change the passwords from time to time.
 
They can hack in either by WIFI or remotey using IP address assigned by your ISP. On the new router, turn off remote access. Like the others said, use a complex and long passwords. I would use different SSIDs. I would also set up the new router using the feature that allows only known MAC addresses to sign on to the network.

I would disconnect the devices and the internet from the old router but leave the old router up so they will see the old SSIDs but signing on does them no good. Change the passwords from time to time.
You're replying to someone that logged in only once over two months ago. One way or another I think he has resolved his issue by now.
 
.... or remotey using IP address assigned by your ISP.
I don't think so, but am curious how you think that would work.

using the feature that allows only known MAC addresses to sign on to the network.
MAC address spoofing is just about the easiest "hack" to do and sorry to say pretty much pointless.

I agree that continuing this thread is likely pointless, at least for the OP, but may provide insight for others, and now I'm curious to hear about the first item above :)

It would potentially have been useful to have heard more from the OP, but I suspect that there was no real hack or it was indeed a trojan or malware on the PC rather than the router.
 
Status
Not open for further replies.

Similar threads

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Top