cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Highlighted
Newbie
419 Views
Message 2 of 3

Insane lag spikes during game play after around 1 hr

Hi everyone, i'm new here and after 3 months my BT connection has finally stopped disconnecting (5 engineers later). 

 

Now I have a new issue, around 1hr into gaming i'm starting to notice rubber banding issues. I'm not sure if this is due to lag or packet loss. 

 

Can someone have a look at my log to find out what's up? I'm a noob at this. 

 

23:59:29, 17 Jan.(193677.530000) Admin login successful by 192.168.1.253 on HTTP
23:59:09, 17 Jan.(193658.320000) New GUI session from IP 192.168.1.253
23:57:30, 17 Jan.IN: BLOCK [16] Remote administration (TCP [182.33.215.87]:9751- >[86.171.11.58]:22 on ppp3)
23:52:38, 17 Jan.IN: BLOCK [16] Remote administration (TCP [196.210.38.35]:61154- >[86.171.11.58]:22 on ppp3)
23:49:25, 17 Jan.IN: BLOCK [16] Remote administration (TCP [60.161.28.30]:7705- >[86.171.11.58]:80 on ppp3)
23:47:20, 17 Jan.IN: BLOCK [16] Remote administration (TCP [109.185.241.24]:43959- >[86.171.11.58]:22 on ppp3)
23:42:28, 17 Jan.(192657.310000) Lease for IP 192.168.1.72 expired. MAC: e0:3f:49:8b:79:7d, host name: Chubbs
23:35:12, 17 Jan.IN: BLOCK [16] Remote administration (TCP [218.87.109.155]:44253- >[86.171.11.58]:22 on ppp3)
23:30:34, 17 Jan.(191943.370000) OpenWiFi IPSec connection is down
23:23:33, 17 Jan.(191521.520000) Lease for IP 192.168.1.68 renewed by host Mammas- Boy (MAC 24:24:0e:c0:14:e6). Lease duration: 1440 min
23:23:32, 17 Jan.(191521.510000) Device connected: Hostname: Mammas- Boy IP: 192.168.1.68 MAC: 24:24:0e:c0:14:e6 Lease time: 1440 min. Link rate: 433.3 Mbps
23:23:32, 17 Jan.(191521.420000) Lease requested
23:23:32, 17 Jan.ath10: STA 24:24:0e:c0:14:e6 IEEE 802.11: Client associated
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
0 Ratings
2 REPLIES 2
Highlighted
Newbie
423 Views
Message 1 of 3

Re: Router log query

Would it be possible for someone to look at my router log too? 

 

I can usually game (Rocket League) for about an hour before i experience some insane spikes in either lag or packet loss. 

 

23:59:29, 17 Jan.(193677.530000) Admin login successful by 192.168.1.253 on HTTP
23:59:09, 17 Jan.(193658.320000) New GUI session from IP 192.168.1.253
23:57:30, 17 Jan.IN: BLOCK [16] Remote administration (TCP [182.33.215.87]:9751- >[86.171.11.58]:22 on ppp3)
23:52:38, 17 Jan.IN: BLOCK [16] Remote administration (TCP [196.210.38.35]:61154- >[86.171.11.58]:22 on ppp3)
23:49:25, 17 Jan.IN: BLOCK [16] Remote administration (TCP [60.161.28.30]:7705- >[86.171.11.58]:80 on ppp3)
23:47:20, 17 Jan.IN: BLOCK [16] Remote administration (TCP [109.185.241.24]:43959- >[86.171.11.58]:22 on ppp3)
23:42:28, 17 Jan.(192657.310000) Lease for IP 192.168.1.72 expired. MAC: e0:3f:49:8b:79:7d, host name: Chubbs
23:35:12, 17 Jan.IN: BLOCK [16] Remote administration (TCP [218.87.109.155]:44253- >[86.171.11.58]:22 on ppp3)
23:30:34, 17 Jan.(191943.370000) OpenWiFi IPSec connection is down
23:23:33, 17 Jan.(191521.520000) Lease for IP 192.168.1.68 renewed by host Mammas- Boy (MAC 24:24:0e:c0:14:e6). Lease duration: 1440 min
23:23:32, 17 Jan.(191521.510000) Device connected: Hostname: Mammas- Boy IP: 192.168.1.68 MAC: 24:24:0e:c0:14:e6 Lease time: 1440 min. Link rate: 433.3 Mbps
23:23:32, 17 Jan.(191521.420000) Lease requested
23:23:32, 17 Jan.ath10: STA 24:24:0e:c0:14:e6 IEEE 802.11: Client associated
23:17:10, 17 Jan.IN: BLOCK [16] Remote administration (TCP [121.251.50.6]:50862- >[86.171.11.58]:22 on ppp3)
23:15:27, 17 Jan.IN: BLOCK [16] Remote administration (TCP [121.34.161.75]:4816- >[86.171.11.58]:22 on ppp3)
23:15:00, 17 Jan.IN: BLOCK [16] Remote administration (TCP [80.85.84.75]:50781- >[86.171.11.58]:22 on ppp3)
23:12:35, 17 Jan.IN: BLOCK [16] Remote administration (TCP [77.122.21.130]:53211- >[86.171.11.58]:22 on ppp3)
23:08:38, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_br1_out/rule/1: ICMP type 8 code 0 10.206.87.53- >10.206.87.54 on br1)
23:08:38, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:38, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68- >[255.255.255.255]:67 on ath13)
23:08:37, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:35, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68- >[255.255.255.255]:67 on ath13)
23:08:32, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
0 Ratings
Highlighted
Newbie
413 Views
Message 3 of 3

Re: Router log query

3:17:10, 17 Jan.IN: BLOCK [16] Remote administration (TCP [121.251.50.6]:50862-​>[86.171.11.58]:22 on ppp3)
23:15:27, 17 Jan.IN: BLOCK [16] Remote administration (TCP [121.34.161.75]:4816-​>[86.171.11.58]:22 on ppp3)
23:15:00, 17 Jan.IN: BLOCK [16] Remote administration (TCP [80.85.84.75]:50781-​>[86.171.11.58]:22 on ppp3)
23:12:35, 17 Jan.IN: BLOCK [16] Remote administration (TCP [77.122.21.130]:53211-​>[86.171.11.58]:22 on ppp3)
23:08:38, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_br1_out/rule/1: ICMP type 8 code 0 10.206.87.53-​>10.206.87.54 on br1)
23:08:38, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:38, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68-​>[255.255.255.255]:67 on ath13)
23:08:37, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:35, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68-​>[255.255.255.255]:67 on ath13)
23:08:32, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:30, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68-​>[255.255.255.255]:67 on ath13)
23:08:28, 17 Jan.BLOCKED 3 more packets (because of Advanced Filter Rule)
23:08:26, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [fe80:0000:0000:0000:8417:8ac5:c738:2c64]:546-​>[ff02:0000:0000:0000:0000:0000:0001:0002]:547 on ath13)
23:08:06, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:08:05, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68-​>[255.255.255.255]:67 on ath13)
23:07:57, 17 Jan.BLOCKED 2 more packets (because of Advanced Filter Rule)
23:07:55, 17 Jan.OUT: BLOCK [44] Advanced Filter Rule (fw/policy/0/chain/fw_ath13_out/rule/0: UDP [0.0.0.0]:68-​>[255.255.255.255]:67 on ath13)
0 Ratings