Didn't find what you were looking for?

New post

Daily Report - Error Code WEASEL Still Occurring (16 March 2026, 02:46 UTC, PC)


Since day two of the Server Slam and since release I'm consistently hitting the following error. I'm posting this as a daily report because the issue occurred again today. I immediately get kicked out of the tutorial.

"Could not connect to Marathon servers. Check your network configuration and try again. For information on resolving this issue visit help.bungie.net and search for error code: WEASEL."

I'm the only person on my network, on PC, using a wired Ethernet connection. Every other online or multiplayer game works perfectly fine. Nothing in my setup has changed since the first day of the Server Slam when the game worked.

I've gone through both the Marathon Network Troubleshooting Guide and the Error Code WEASEL page and completed every step listed. Below is a full list of everything I've tried:

  • Verified game files
  • Forwarded all required ports (TCP and UDP)
  • Reinstalled the game
  • Reinstalled BattleEye
  • Restarted my router (full power cycle)
  • Changed DNS servers (tested 1.1.1.1 and 8.8.8.8)
  • Enabled and disabled UPnP
  • Closed all unnecessary background apps and downloads
  • No third-party antivirus. Windows Defender only (tested with it temporarily disabled)
  • Tested with a VPN (and without)
  • Disabled DLSS Override in the Nvidia App
  • Tried a different Steam account (during Server Slam)
  • Flushed DNS cache (ipconfig /flushdns)
  • Ran Winsock reset (netsh winsock reset + netsh int ip reset)
  • Ran System File Checker (sfc /scannow) to verify Windows system file integrity

System info:
OS: Windows 11 Pro 23H2
CPU: AMD Ryzen 9 9800X3D
GPU: RTX 4080 (Driver 591.74)
RAM: 32 GB

Router: FRITZ!Box 7490, firmware: FRITZ!OS 7.62
Connection: Wired Ethernet

Country: Germany
ISP: Deutsche Telekom

Bungie Account: Gitorian#9112
Platform: Steam / PC

 

Traceroute results:

Tracing route to bungie.net [104.17.100.21]

 
  1    <1 ms    <1 ms    <1 ms  fritz.box [192.168.178.1]
  2    17 ms    16 ms    15 ms  p3e9bf12c.dip0.t-ipconnect.de [62.155.241.44]
  3    24 ms    24 ms    24 ms  b-eh3-i.B.DE.NET.DTAG.DE [62.153.188.118]
  4    23 ms    23 ms    22 ms  ae10.edge5.ber1.sp.lumen.tech [4.68.62.205]
  5    24 ms    24 ms    24 ms  dialup-212.162.17.178.frankfurt1.mik.net [212.162.17.178]
  6    25 ms    24 ms    24 ms  104.17.100.21
 

Tracing route to active session endpoint observed during gameplay (205.234.118.78)

  1    <1 ms    <1 ms    <1 ms  fritz.box [192.168.178.1]
  2    18 ms    16 ms    17 ms  p3e9bf12c.dip0.t-ipconnect.de [62.155.241.44]
  3    25 ms    25 ms    24 ms  f-ed11-i.F.DE.NET.DTAG.DE [62.154.18.18]
  4    25 ms    24 ms    24 ms  80.157.128.21
 

Additional diagnostic test (pathping):

 
  0  PC.fritz.box [192.168.178.32]
  1  fritz.box [192.168.178.1]
  2  p3e9bf12c.dip0.t-ipconnect.de [62.155.241.44]
  3  f-ed11-i.F.DE.NET.DTAG.DE [62.154.18.18]
  4  80.157.128.21
 

Packet loss observed: 0% within the local network and ISP backbone.

The traceroute to the session endpoint stops after the Deutsche Telekom backbone. This is expected behavior because many game servers and relay networks intentionally drop ICMP packets and traceroute probes for security reasons. However, there is no packet loss or abnormal latency visible within the ISP network path.

Additional context:

I have exhausted all user side troubleshooting steps documented in the official guide and commonly suggested by the community. My local network, hardware configuration, and ISP connectivity appear stable, and other online games function normally, which suggests the issue may be related to backend connectivity, authentication, or session routing affecting certain players.

I am aware that the issue has been acknowledged by BungieHelp and that it is currently under investigation. This report is being submitted for documentation purposes in case additional network information from EU players using Deutsche Telekom is helpful.

Additional Diagnostic Information:

To provide further troubleshooting data, I have attached a full export of all Windows services running on my system.

It was generated using ServiWin v1.72 and contains a complete list of services, including their status, startup type, display name, and executable path. This is intended to help identify any potential service conflicts, security software, network filters, or background components that might interfere with the game's networking or anti-cheat systems.

services report

3

Comments

1 comment
  • Bungie Account Name: CloudyMinds#6190

    Platform: Steam/PC (Windows 10 Pro LTS 22H2 build 19045.6937)

    Error Code: WEASEL (consistent, every session)

    Issue: I am being repeatedly disconnected from Marathon servers with error code WEASEL. This has been happening consistently since launch. I have gone through every step listed in the official Network Troubleshooting Guide and then some, and have now conducted advanced network diagnostic analysis including Wireshark packet capture and pathping. The evidence conclusively points to a server-side session management issue on Bungie's infrastructure. I am submitting this fully documented report for escalation.


    System Specs:

    • CPU: AMD Ryzen 7 9800X3D
    • GPU: NVIDIA GeForce RTX 5070 Ti (16GB VRAM)
    • RAM: 32GB DDR5 @ 6000MHz
    • OS: Windows 10 Pro LTS 22H2 build 19045.6937
    • Router: ASUS RT-AX88U Pro (Firmware 3.0.0.6.102_33421 — latest available)
    • ISP: Charter/Spectrum
    • Connection: Wired Ethernet (not Wi-Fi)
    • NAT Type: Open (confirmed via router's Open NAT tab)

    Everything I have tried (none resolved the issue):

    • Verified game files via Steam
    • Forwarded all required TCP and UDP ports per Bungie's guide
    • Full reinstall of Marathon
    • Full reinstall of BattleEye
    • Full router power cycle (unplugged, waited 60 seconds)
    • Changed DNS servers (tested Cloudflare 1.1.1.1 and Google 8.8.8.8)
    • Tested with UPnP enabled and disabled (also tested with only UPnP active, no port forwarding — per Bungie's own guide recommendation)
    • Closed all background applications and active downloads
    • No third-party antivirus — Windows Defender only (also tested with Defender temporarily disabled)
    • Disabled DLSS Override in the NVIDIA App
    • Flushed DNS cache (ipconfig /flushdns)
    • Ran Winsock reset (netsh winsock reset + netsh int ip reset)
    • Ran sfc /scannow and DISM /Online /Cleanup-Image /RestoreHealth — no issues found
    • Disk Cleanup
    • Enabled Destiny 2 Open NAT profile on router for my device (ASUS Open NAT tab)
    • Confirmed no Double NAT — router is in standard Wireless Router mode, single gateway at 192.168.50.1 going directly out to ISP
    • Confirmed router firmware is fully up to date
    • Enabled IPv6 (Native mode) on router — confirmed legitimate IPv6 address assigned to PC (2603:8001 prefix via Spectrum)
    • Manually configured IPv6 DNS servers (Google: 2001:4860:4860::8888 / 2001:4860:4860::8844)
    • Only one account, one platform, one instance of the game running at a time (logged out of forum account, ruling out cross-platform simultaneous login)
    • Called ISP (Charter/Spectrum), escalated to Tier 2 — case opened, engineer callback pending
    • Filed BBB complaint against Bungie documenting failure to deliver purchased service and inadequate support responses

    Tracert Outputs:

    1. Direct trace to Marathon game server (205.234.118.195 — confirmed via Wireshark capture):

    Tracing route to 205.234.118.195 over a maximum of 30 hops
    
      1     1 ms     2 ms     1 ms  192.168.50.1
      2    11 ms    13 ms    11 ms  int-1.sntlcasm03m.netops.charter.com [142.254.176.173]
      3    39 ms    11 ms    15 ms  lag-58.sntlcaga02h.netops.charter.com [76.167.28.153]
      4    12 ms    15 ms    22 ms  lag-19.hcr02sntlcaga.netops.charter.com [76.167.5.0]
      5    11 ms    15 ms    21 ms  lag-47.mcr11vnnzca24.netops.charter.com [76.167.5.2]
      6    23 ms    15 ms    15 ms  lag-29.rcr01tustcaft.netops.charter.com [72.129.13.2]
      7    17 ms    19 ms    16 ms  lag-56-10.tustca4200w-bcr00.netops.charter.com [66.109.10.10]
      8    37 ms    23 ms    27 ms  lag-24.lsancarc0yw-bcr00.netops.charter.com [107.14.19.37]
      9    21 ms    24 ms    24 ms  lag-12.snjucacl67w-bcr00.netops.charter.com [66.109.6.6]
     10    32 ms    26 ms    23 ms  lag-0.pr1.sjc10.netops.charter.com [66.109.5.133]
     11    22 ms    31 ms    24 ms  akamai.prolexic.com [206.223.116.136]
     12–16  *        *        *     Request timed out.

    This tracert was run directly to the Marathon game server IP confirmed via Wireshark packet capture analysis. Charter/Spectrum handles hops 1–10 cleanly with consistent latency (1–37ms) and zero timeouts, confirming the client-side network path is fully healthy. At hop 11, traffic enters Akamai Prolexic (206.223.116.136), a DDoS mitigation and traffic scrubbing service that Bungie uses to protect their game servers. Hops 12–16 time out as expected — Prolexic deliberately obscures the path beyond their scrubbing infrastructure for security purposes. Importantly, this means all game session traffic passes through Prolexic's filtering layer before reaching Bungie's backend servers. The session keepalive failures documented in the Wireshark analysis below may be occurring at this Prolexic filtering layer or at Bungie's session management layer behind it, either of which is entirely outside the client's control.

    2. Direct trace to bungie.net 

    Tracing route to bungie.net [199.189.118.227]
    over a maximum of 30 hops:
    
      1     2 ms     2 ms     2 ms  192.168.50.1
      2     8 ms    18 ms    12 ms  int-1.sntlcasm03m.netops.charter.com [142.254.176.173]
      3    47 ms    17 ms    15 ms  lag-58.sntlcaga02h.netops.charter.com [76.167.28.153]
      4    12 ms    14 ms    11 ms  lag-19.hcr02sntlcaga.netops.charter.com [76.167.5.0]
      5    14 ms    16 ms    12 ms  lag-47.mcr11vnnzca24.netops.charter.com [76.167.5.2]
      6    16 ms    14 ms    14 ms  lag-29.rcr01tustcaft.netops.charter.com [72.129.13.2]
      7    19 ms    16 ms    44 ms  lag-36-10.tustca4200w-bcr00.netops.charter.com [66.109.6.202]
      8    16 ms    18 ms    23 ms  lag-1.pr2.lax10.netops.charter.com [66.109.5.241]
      9     *        *        *     Request timed out.
     10     *        *        *     Request timed out.
     11    24 ms    24 ms    26 ms  ae8.cs1.lax112.us.zip.zayo.com [64.125.28.44]
     12    22 ms    23 ms    20 ms  ae24.mpr2.las15.us.zip.zayo.com [64.125.25.101]
     13    32 ms    20 ms    21 ms  ae12.mpr2.las1.us.zip.zayo.com [64.125.21.240]
     14    25 ms    23 ms    30 ms  128.177.113.122.IPYX-090920-ZYO.zip.zayo.com [128.177.113.122]
     15    23 ms    23 ms    23 ms  be1761.las-sagg9s3-1.sinap-tix.com [199.189.116.202]
     16     *        *        *     Request timed out.
     17     *        *        *     Request timed out.

    A second tracert run directly to bungie.net (199.189.118.227) shows the full path reaching Bungie's network edge at hop 15. Charter/Spectrum handles hops 1–8 cleanly with consistent latency (2–44ms, with hop 7 showing a single spike to 44ms that did not persist). Hops 9–10 timing out is consistent with standard ICMP filtering. From hop 11 onward, traffic is handed off to Zayo, a third-party backbone transit provider, routing through Los Angeles and Las Vegas before terminating at Sinap-tix (hop 15), which sits at the edge of Bungie's network. Latency stabilizes cleanly at 23ms by hop 15. While the route completes without obvious breaks, tracert only measures ICMP traffic — any packet loss affecting UDP game traffic specifically would not be visible here and could still be occurring silently between Zayo, Sinap-tix, and Bungie's game servers.


    Pathping Output (to bungie.net 199.189.118.227):

      0  PC [192.168.50.130]
      1  192.168.50.1
      2  int-1.sntlcasm03m.netops.charter.com [142.254.176.173]
      3  lag-58.sntlcaga02h.netops.charter.com [76.167.28.153]
      4  lag-19.hcr02sntlcaga.netops.charter.com [76.167.5.0]
      5  lag-47.mcr11vnnzca24.netops.charter.com [76.167.5.2]
      6  lag-29.rcr01tustcaft.netops.charter.com [72.129.13.2]
      7  lag-36-10.tustca4200w-bcr00.netops.charter.com [66.109.6.202]
      8  lag-1.pr2.lax10.netops.charter.com [66.109.5.241]
    
    Hop  RTT    Lost/Sent = Pct   Address
      0                           192.168.50.130
      1    2ms    0/100 =  0%     192.168.50.1
      2   14ms    0/100 =  0%     int-1.sntlcasm03m.netops.charter.com
      3   17ms   19/100 = 19%     lag-58.sntlcaga02h.netops.charter.com
      4   13ms    3/100 =  3%     lag-19.hcr02sntlcaga.netops.charter.com
      5   14ms   17/100 = 17%     lag-47.mcr11vnnzca24.netops.charter.com
      6   16ms   11/100 = 11%     lag-29.rcr01tustcaft.netops.charter.com
      7   17ms    0/100 =  0%     lag-36-10.tustca4200w-bcr00.netops.charter.com
      8   19ms    0/100 =  0%     lag-1.pr2.lax10.netops.charter.com

    Note: Elevated ICMP loss at hops 3, 5, and 6 (19%, 17%, 11%) is worth flagging, though backbone routers commonly deprioritize ICMP under load. Hops 7 and 8 return to 0% loss, and latency throughout remains stable. The route completes cleanly to Spectrum's LAX egress point.


    Wireshark Packet Capture Analysis:

    A full Wireshark capture was conducted covering one minute before game launch through to post-disconnect. The capture was analyzed programmatically for IP flows, protocol distribution, and traffic patterns. Key findings:

    Identified game server IP: 205.234.118.195 (Marathon game server, TCP port 7500)

    Traffic pattern timeline:

    • Prior to game launch: No traffic to/from 205.234.118.195
    • Game launch (t+60,449s): Connection to Marathon game server established — bidirectional traffic begins, appearing healthy with both outbound and inbound packets exchanging normally
    • Mid-session (t+70,222s): Anomalous inbound burst detected — OUT=3, IN=12 — a disproportionate spike of 12 inbound packets against 3 outbound, inconsistent with normal session traffic
    • Post-spike: Traffic continues but becomes increasingly irregular with widening gaps between exchanges
    • Disconnect: No hard network cutoff observed — traffic does not abruptly stop on both sides simultaneously, which would indicate a network-layer drop. Instead, the session degrades and times out

    Critical finding: The disconnect does not present as a network failure. Packets are successfully reaching the game server and receiving responses throughout the session. The session termination pattern is consistent with a server-side session keepalive failure — the connection degrades and times out rather than being cut, indicating the issue originates at Bungie's session management or authentication layer, not at the network level.

    This is confirmed by the absence of any corresponding network anomaly at the time of disconnect — no hop in the tracert or pathping shows failure, no routing change occurs, and the client-side network remains fully operational before, during, and after the WEASEL error is thrown.


    Additional Context:

    During Marathon's Server Slam / FTP period, a patch was deployed mid-event that appeared to resolve the WEASEL issue for me — I was able to play without disconnects after that patch. Since full launch, the issue has returned and is persistent every session. The fact that a server-side patch previously resolved this for me, combined with the Wireshark evidence above, strongly indicates this is a regression introduced at or after launch on Bungie's backend.

    I am aware that Bungie/@BungieHelp has publicly acknowledged they are investigating WEASEL errors. It has now been over 10 days since launch with no resolution and no communicated timeline. Multiple players remain completely unable to access the product they paid for.

    Regarding previous support responses on this thread: Prior responses directed me to check minimum system requirements (my system exceeds them significantly: Ryzen 7 9800X3D, RTX 5070 Ti, 32GB DDR5), install the game on another disk, noted the game is unsupported on laptops (I am on a desktop), and provided Windows 11 recovery steps despite my OS being clearly listed as Windows 10 Pro in every submission. These responses did not reflect the contents of my report. I have run both sfc /scannow and DISM /Online /Cleanup-Image /RestoreHealth as the Windows 10 equivalent — no issues were found.

    I am respectfully but firmly requesting escalation to a senior support agent or network engineer who can review the technical evidence provided. The Wireshark analysis in particular represents definitive proof that this issue is not client-side and cannot be resolved through any further user-side troubleshooting. The fix must come from Bungie.

    Happy to provide the raw Wireshark capture file or any additional diagnostic data upon request.

    1

Please sign in to leave a comment.