John Henry
New Around Here
I have an 86U running Merlin, Diversion, Stubby, and Skynet plus two 68Us on AIMesh. In my Diversion reports, I've noticed that 192.168.1.1 calls Trendmicro, firmware updates, etc as expected, but it also calls several known spam sites - and always at 7:26AM. I've done hard resets on the 86 and the two 68s and I'm still getting the hits.
I'm not expert enough in networking to know if there could be other hardware in the network that would somehow be sending these requests through the 192.168.1.1 address instead of its own. Otherwise, is it possible there's a hack inside the router that's not cleared by a factory reset? Any other suggestions?
Sorry for what's probably an amateur and/or poorly phrased question - I'm picking all this up as I go.
DNSMasq log example:
May 27 07:26:59 dnsmasq[30986]: query[A] f.catalyst-resources.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded f.catalyst-resources.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[AAAA] f.catalyst-resources.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded f.catalyst-resources.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[A] stats.zdb2bmail.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded stats.zdb2bmail.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[AAAA] stats.zdb2bmail.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded stats.zdb2bmail.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[A] udmserve.net from 192.168.1.1
Diversion report:
192.168.1.1, Name-N/A:
--------------------------------------------------------
1712 rgom10-en.url.trendmicro.com
376 ipapi.co
28 ipinfo.io
14 google.com
12 raw.githubusercontent.com
10 fwupdate.asuswrt-merlin.net
10 RT-AC86U-3970
8 ntd-asus-2014b-en-cfg.fbs20.trendmicro.com
8 iplists.firehol.org
4 www.cloudflare.com
4 v.vfgtb.com blacklisted
4 us.pool.ntp.org
4 udmserve.net blocked
4 time.nist.gov
I'm not expert enough in networking to know if there could be other hardware in the network that would somehow be sending these requests through the 192.168.1.1 address instead of its own. Otherwise, is it possible there's a hack inside the router that's not cleared by a factory reset? Any other suggestions?
Sorry for what's probably an amateur and/or poorly phrased question - I'm picking all this up as I go.
DNSMasq log example:
May 27 07:26:59 dnsmasq[30986]: query[A] f.catalyst-resources.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded f.catalyst-resources.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[AAAA] f.catalyst-resources.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded f.catalyst-resources.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[A] stats.zdb2bmail.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded stats.zdb2bmail.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[AAAA] stats.zdb2bmail.com from 192.168.1.1
May 27 07:26:59 dnsmasq[30986]: forwarded stats.zdb2bmail.com to 127.0.0.1
May 27 07:26:59 dnsmasq[30986]: query[A] udmserve.net from 192.168.1.1
Diversion report:
192.168.1.1, Name-N/A:
--------------------------------------------------------
1712 rgom10-en.url.trendmicro.com
376 ipapi.co
28 ipinfo.io
14 google.com
12 raw.githubusercontent.com
10 fwupdate.asuswrt-merlin.net
10 RT-AC86U-3970
8 ntd-asus-2014b-en-cfg.fbs20.trendmicro.com
8 iplists.firehol.org
4 www.cloudflare.com
4 v.vfgtb.com blacklisted
4 us.pool.ntp.org
4 udmserve.net blocked
4 time.nist.gov