cat /var/log/messages (Initial Flash) Dec 31 16:00:09 R7000 syslog.info syslogd started: BusyBox v1.33.0 Dec 31 16:00:09 R7000 user.info : _evalpid:klogd Dec 31 16:00:09 R7000 user.info : klogd : daemon successfully started Dec 31 16:00:09 R7000 user.info : _evalpid:resetbutton Dec 31 16:00:09 R7000 kern.notice kernel: klogd started: BusyBox v1.33.0 (2021-04-13 07:50:24 +07) Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x14: [mem 0x18002000-0x18002fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:01.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:02.0: [14e4:0502] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x10: [mem 0x1802c000-0x1802cfff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:02.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:03.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x10: [mem 0x18024000-0x18024fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:03.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:04.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x10: [mem 0x18025000-0x18025fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:04.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:05.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x10: [mem 0x18026000-0x18026fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:05.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:06.0: [14e4:4715] type 00 class 0x020000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x10: [mem 0x18027000-0x18027fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:06.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:07.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x10: [mem 0x18012000-0x18012fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:07.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:08.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x10: [mem 0x18013000-0x18013fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:08.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:09.0: [14e4:0501] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x10: [mem 0x18014000-0x18014fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:09.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0a.0: [14e4:0510] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x10: [mem 0x1800b000-0x1800bfff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x14: [mem 0x1800c000-0x1800cfff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0a.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.0: [14e4:471a] type 00 class 0x0c0310 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x10: [mem 0x18022000-0x18022fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.1: [14e4:471a] type 00 class 0x0c0320 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x10: [mem 0x18021000-0x18021fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0b.1: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0c.0: [14e4:472a] type 00 class 0x0c0330 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x10: [mem 0x18023000-0x18023fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0c.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0d.0: [14e4:0503] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x10: [mem 0x18020000-0x18020fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0d.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0e.0: [14e4:4711] type 00 class 0x040100 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x10: [mem 0x1802a000-0x1802afff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0e.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0f.0: [14e4:0506] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x10: [mem 0x18210000-0x1821ffff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:0f.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:10.0: [14e4:0507] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x10: [mem 0x18010000-0x18010fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:10.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:11.0: [14e4:0508] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.info kernel: pci 0000:00:11.0: [Firmware Bug]: reg 0x10: invalid BAR (can't size) Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:11.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:12.0: [14e4:0509] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x10: [mem 0x18028000-0x18028fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:12.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:13.0: [14e4:050a] type 00 class 0xffffff Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x10: [mem 0x18029000-0x18029fff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0000:00:13.0: reg 0x30: [mem 0x00000000-0x000007ff pref] Dec 31 16:00:09 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 0 Dec 31 16:00:09 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:09 R7000 kern.info kernel: PCIE1 switching to GEN2 Dec 31 16:00:09 R7000 kern.info kernel: PCIE1 link=1 Dec 31 16:00:09 R7000 kern.info kernel: PCI host bridge to bus 0001:00 Dec 31 16:00:09 R7000 kern.info kernel: pci_bus 0001:00: root bus resource [mem 0x08000000-0x0fffffff] Dec 31 16:00:09 R7000 kern.info kernel: pci_bus 0001:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0001:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0001:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:09 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 1 Dec 31 16:00:09 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:09 R7000 kern.debug kernel: pci 0001:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0001:01:00.0: reg 0x10: [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:09 R7000 kern.info kernel: pci 0001:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:09 R7000 kern.debug kernel: pci 0001:01:00.0: supports D1 D2 Dec 31 16:00:09 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 1 Dec 31 16:00:09 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:09 R7000 kern.debug kernel: pci_bus 0001:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:09 R7000 kern.debug kernel: pci_bus 0001:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:09 R7000 kern.info kernel: pci 0001:00:00.0: BAR 8: assigned [mem 0x08000000-0x080fffff] Dec 31 16:00:09 R7000 kern.info kernel: pci 0001:01:00.0: BAR 0: assigned [mem 0x08000000-0x08007fff 64bit] Dec 31 16:00:09 R7000 kern.info kernel: pci 0001:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:09 R7000 kern.info kernel: pci 0001:00:00.0: bridge window [mem 0x08000000-0x080fffff] Dec 31 16:00:09 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:09 R7000 kern.info kernel: PCIE2 switching to GEN2 Dec 31 16:00:09 R7000 kern.info kernel: PCIE2 link=1 Dec 31 16:00:09 R7000 kern.info kernel: PCI host bridge to bus 0002:00 Dec 31 16:00:09 R7000 kern.info kernel: pci_bus 0002:00: root bus resource [mem 0x40000000-0x47ffffff] Dec 31 16:00:09 R7000 kern.info kernel: pci_bus 0002:00: No busn resource found for root bus, will use [bus 00-ff] Dec 31 16:00:09 R7000 kern.debug kernel: pci 0002:00:00.0: [14e4:8012] type 01 class 0x060400 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0002:00:00.0: PME# supported from D0 D3hot D3cold Dec 31 16:00:09 R7000 kern.warn kernel: PCI: Fixing up bus 0 domain 2 Dec 31 16:00:09 R7000 kern.info kernel: PCI: bus0: Fast back to back transfers disabled Dec 31 16:00:09 R7000 kern.debug kernel: pci 0002:01:00.0: [14e4:4360] type 00 class 0x028000 Dec 31 16:00:09 R7000 kern.debug kernel: pci 0002:01:00.0: reg 0x10: [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:09 R7000 kern.info kernel: pci 0002:01:00.0: Max Payload Size set to 512 (was 128, max 512) Dec 31 16:00:09 R7000 kern.debug kernel: pci 0002:01:00.0: supports D1 D2 Dec 31 16:00:09 R7000 kern.warn kernel: PCI: Fixing up bus 1 domain 2 Dec 31 16:00:09 R7000 kern.info kernel: PCI: bus1: Fast back to back transfers disabled Dec 31 16:00:09 R7000 kern.debug kernel: pci_bus 0002:01: busn_res: [bus 01-ff] end is updated to 01 Dec 31 16:00:09 R7000 kern.debug kernel: pci_bus 0002:00: busn_res: [bus 00-ff] end is updated to 01 Dec 31 16:00:09 R7000 kern.info kernel: pci 0002:00:00.0: BAR 8: assigned [mem 0x40000000-0x400fffff] Dec 31 16:00:09 R7000 kern.info kernel: pci 0002:01:00.0: BAR 0: assigned [mem 0x40000000-0x40007fff 64bit] Dec 31 16:00:09 R7000 kern.info kernel: pci 0002:00:00.0: PCI bridge to [bus 01] Dec 31 16:00:09 R7000 kern.info kernel: pci 0002:00:00.0: bridge window [mem 0x40000000-0x400fffff] Dec 31 16:00:09 R7000 kern.info kernel: PCIE3 link=0 Dec 31 16:00:09 R7000 kern.info kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 31 16:00:09 R7000 kern.info kernel: io scheduler noop registered (default) Dec 31 16:00:09 R7000 kern.info kernel: io scheduler cfq registered Dec 31 16:00:09 R7000 kern.info kernel: serial8250_init Dec 31 16:00:09 R7000 kern.info kernel: Serial: 8250/16550 driver, 3 ports, IRQ sharing disabled Dec 31 16:00:09 R7000 kern.info kernel: console [ttyS0] disabled Dec 31 16:00:09 R7000 kern.info kernel: serial8250.0: ttyS0 at MMIO 0x18000300 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:09 R7000 kern.info kernel: console [ttyS0] enabled Dec 31 16:00:09 R7000 kern.info kernel: serial8250.0: ttyS1 at MMIO 0x18000400 (irq = 117, base_baud = 7812500) is a 16550 Dec 31 16:00:09 R7000 kern.info kernel: brd: module loaded Dec 31 16:00:09 R7000 kern.info kernel: loop: module loaded Dec 31 16:00:09 R7000 kern.err kernel: bcmsflash: found no supported devices Dec 31 16:00:09 R7000 kern.warn kernel: Boot partition size = 524288(0x80000) Dec 31 16:00:09 R7000 kern.warn kernel: lookup_nflash_rootfs_offset: offset = 0x200000 size = 0x2000000, 0x20000 Dec 31 16:00:09 R7000 kern.info kernel: found TRX Header on nflash! Dec 31 16:00:09 R7000 kern.notice kernel: nflash: squash filesystem with lzma found at block 30 Dec 31 16:00:09 R7000 kern.notice kernel: Creating 5 MTD partitions on "nflash": Dec 31 16:00:09 R7000 kern.notice kernel: 0x000000000000-0x000000080000 : "boot" Dec 31 16:00:09 R7000 kern.notice kernel: 0x000000080000-0x000000200000 : "nvram" Dec 31 16:00:09 R7000 kern.notice kernel: 0x000000200000-0x000002200000 : "linux" Dec 31 16:00:09 R7000 kern.notice kernel: 0x0000003c0000-0x000002200000 : "rootfs" Dec 31 16:00:09 R7000 kern.notice kernel: 0x000002200000-0x000002240000 : "board_data" Dec 31 16:00:09 R7000 kern.info kernel: PPP generic driver version 2.4.2 Dec 31 16:00:09 R7000 kern.info kernel: PPP BSD Compression module registered Dec 31 16:00:09 R7000 kern.info kernel: PPP Deflate Compression module registered Dec 31 16:00:09 R7000 kern.info kernel: PPP MPPE Compression module registered Dec 31 16:00:09 R7000 kern.info kernel: NET: Registered protocol family 24 Dec 31 16:00:09 R7000 kern.info kernel: i2c /dev entries driver Dec 31 16:00:09 R7000 kern.info kernel: GACT probability NOT on Dec 31 16:00:09 R7000 kern.info kernel: Mirror/redirect action on Dec 31 16:00:09 R7000 kern.info kernel: Simple TC action Loaded Dec 31 16:00:09 R7000 kern.info kernel: netem: version 1.3 Dec 31 16:00:09 R7000 kern.info kernel: u32 classifier Dec 31 16:00:09 R7000 kern.info kernel: Performance counters on Dec 31 16:00:09 R7000 kern.info kernel: input device check on Dec 31 16:00:09 R7000 kern.info kernel: Actions configured Dec 31 16:00:09 R7000 kern.info kernel: Netfilter messages via NETLINK v0.30. Dec 31 16:00:09 R7000 kern.info kernel: nf_conntrack version 0.5.0 (3967 buckets, 15868 max) Dec 31 16:00:09 R7000 kern.warn kernel: nf_conntrack_rtsp v0.7 loading Dec 31 16:00:09 R7000 kern.info kernel: xt_time: kernel timezone is -0000 Dec 31 16:00:09 R7000 kern.info kernel: ip_set: protocol 6 Dec 31 16:00:09 R7000 kern.info kernel: gre: GRE over IPv4 demultiplexor driver Dec 31 16:00:09 R7000 kern.warn kernel: nf_nat_rtsp v0.7 loading Dec 31 16:00:09 R7000 kern.info kernel: ip_tables: (C) 2000-2006 Netfilter Core Team Dec 31 16:00:09 R7000 kern.info kernel: NET: Registered protocol family 17 Dec 31 16:00:09 R7000 kern.info kernel: bridge: automatic filtering via arp/ip/ip6tables has been deprecated. Update your scripts to load br_netfilter if you need this. Dec 31 16:00:09 R7000 kern.notice kernel: Bridge firewalling registered Dec 31 16:00:09 R7000 kern.info kernel: 8021q: 802.1Q VLAN Support v1.8 Dec 31 16:00:09 R7000 kern.notice kernel: Registering SWP/SWPB emulation handler Dec 31 16:00:09 R7000 kern.info kernel: max nvram space = 131072 Dec 31 16:00:09 R7000 kern.info kernel: read 65536 bytes to offset 0 Dec 31 16:00:09 R7000 kern.info kernel: registered taskstats version 1 Dec 31 16:00:09 R7000 kern.info kernel: Northstar brcmnand NAND Flash Controller driver, Version 0.1 (c) Broadcom Inc. 2012 Dec 31 16:00:09 R7000 kern.info kernel: nand: device found, Manufacturer ID: 0xc2, Chip ID: 0xf1 Dec 31 16:00:09 R7000 kern.info kernel: nand: Macronix NAND 128MiB 3,3V 8-bit Dec 31 16:00:09 R7000 kern.info kernel: nand: 128 MiB, SLC, erase size: 128 KiB, page size: 2048, OOB size: 64 Dec 31 16:00:09 R7000 kern.warn kernel: Spare area=64 eccbytes 56, ecc bytes located at: Dec 31 16:00:09 R7000 kern.warn kernel: 2 3 4 5 6 7 8 9 10 11 12 13 14 15 18 19 20 21 22 23 24 25 26 27 28 29 30 31 34 35 36 37 38 39 40 41 42 43 44 45 46 47 50 51 52 53 54 55 56 57 58 59 60 61 62 63 Dec 31 16:00:09 R7000 kern.warn kernel: Available 7 bytes at (off,len): Dec 31 16:00:09 R7000 kern.warn kernel: (1,1) (16,2) (32,2) (48,2) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) (0,0) Dec 31 16:00:09 R7000 kern.info kernel: Scanning device for bad blocks Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 58 at 0x000000740000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 148 at 0x000001280000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 526 at 0x0000041c0000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 642 at 0x000005040000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 758 at 0x000005ec0000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 766 at 0x000005fc0000 Dec 31 16:00:09 R7000 kern.warn kernel: Bad eraseblock 787 at 0x000006260000 Dec 31 16:00:09 R7000 kern.warn kernel: Options: NO_SUBPAGE_WRITE, Dec 31 16:00:09 R7000 kern.notice kernel: Creating 1 MTD partitions on "brcmnand": Dec 31 16:00:09 R7000 kern.notice kernel: 0x000002240000-0x000008000000 : "ddwrt" Dec 31 16:00:09 R7000 kern.info kernel: VFS: Mounted root (squashfs filesystem) readonly on device 31:3. Dec 31 16:00:09 R7000 kern.info kernel: Freeing unused kernel memory: 344K Dec 31 16:00:09 R7000 kern.warn kernel: et: module license 'Proprietary' taints kernel. Dec 31 16:00:09 R7000 kern.warn kernel: Disabling lock debugging due to kernel taint Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: passivemode set to 0x0 Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: txworkq set to 0x0 Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: et_txq_thresh set to 0x400 Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: et_rxlazy_timeout set to 0x3e8 Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: et_rxlazy_framecnt set to 0x20 Dec 31 16:00:09 R7000 kern.warn kernel: et_module_init: et_rxlazy_dyn_thresh set to 0 Dec 31 16:00:09 R7000 kern.info kernel: ET Corerev 5 Dec 31 16:00:09 R7000 kern.warn kernel: eth0: Broadcom BCM47XX 10/100/1000 Mbps Ethernet Controller 7.14.89.21 (r524987) Dec 31 16:00:09 R7000 kern.info kernel: roboswitch: Probing device 'eth0' Dec 31 16:00:09 R7000 kern.info kernel: roboswitch: trying a 53012! at eth0 Dec 31 16:00:09 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:09 R7000 kern.info kernel: roboswitch: found a 53012! at eth0 Dec 31 16:00:09 R7000 kern.info kernel: detected CPU Port is 5 Dec 31 16:00:09 R7000 kern.warn kernel: wl_module_init: passivemode set to 0x0 Dec 31 16:00:09 R7000 kern.warn kernel: wl_module_init: txworkq set to 0x0 Dec 31 16:00:09 R7000 kern.warn kernel: eth1: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:09 R7000 kern.warn kernel: eth2: Broadcom BCM4360 802.11 Wireless Controller 7.14.89.21 (r524987) Dec 31 16:00:09 R7000 kern.warn kernel: eth0: mixed HW and IP checksum settings. Dec 31 16:00:09 R7000 user.info : resetbutton : resetbutton daemon successfully started Dec 31 16:00:09 R7000 user.info : _evalpid:vconfig set_name_type VLAN_PLUS_VID_NO_PAD Dec 31 16:00:09 R7000 user.info : _evalpid:vconfig add eth0 1 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 0.0.0.0 netmask 0.0.0.0 up Dec 31 16:00:09 R7000 user.info : _evalpid:vconfig set_name_type VLAN_PLUS_VID_NO_PAD Dec 31 16:00:09 R7000 user.info : _evalpid:vconfig add eth0 2 Dec 31 16:00:09 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:09 R7000 user.info : _evalpid:brctl addbr br0 Dec 31 16:00:09 R7000 user.debug : system2:echo 0 > /sys/devices/virtual/net/br0/bridge/multicast_snooping Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig br0 mtu 1500 Dec 31 16:00:09 R7000 user.info : _evalpid:/sbin/service hotplug_net start Dec 31 16:00:09 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl delbridge br0 Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl setmaxage br0 20 Dec 31 16:00:09 R7000 daemon.info mstpd[649]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl setfdelay br0 15 Dec 31 16:00:09 R7000 daemon.info mstpd[649]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl settreeprio br0 0 8 Dec 31 16:00:09 R7000 daemon.info mstpd[649]: error, CTL_set_msti_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:09 R7000 user.info : _evalpid:route del default Dec 31 16:00:09 R7000 user.info : _evalpid:route add default gw 24.205.212.1 Dec 31 16:00:09 R7000 user.info : _evalpid:wlconf eth1 down Dec 31 16:00:09 R7000 user.info : _evalpid:ledtool 1 Dec 31 16:00:09 R7000 user.info : _evalpid:wl -i eth1 down Dec 31 16:00:09 R7000 user.info : _evalpid:wl -i eth1 up Dec 31 16:00:09 R7000 user.info : bridge : bridge br0 successfully added Dec 31 16:00:09 R7000 user.info : _evalpid:brctl addbr br0 Dec 31 16:00:09 R7000 user.debug : system2:echo 0 > /sys/devices/virtual/net/br0/bridge/multicast_snooping Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig br0 mtu 1500 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig br0 promisc Dec 31 16:00:09 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl setmaxage br0 20 Dec 31 16:00:09 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:09 R7000 daemon.info mstpd[649]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : _evalpid:mstpctl setfdelay br0 15 Dec 31 16:00:09 R7000 daemon.info mstpd[649]: error, CTL_set_cist_bridge_config: Couldn't find bridge with index 8 Dec 31 16:00:09 R7000 user.info : _evalpid:killall -9 ead Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 down Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 mtu 1500 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 txqueuelen 0 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 up Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 0.0.0.0 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 down Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 mtu 1500 Dec 31 16:00:09 R7000 user.info : _evalpid:ifconfig vlan1 up Dec 31 16:00:09 R7000 user.info : bridge : interface vlan1 successfully added to bridge br0 Dec 31 16:00:09 R7000 user.info : _evalpid:brctl addif br0 vlan1 Dec 31 16:00:10 R7000 kern.info kernel: device vlan1 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device eth0 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Dec 31 16:00:10 R7000 user.debug : system2:echo 0 > /sys/class/net/vlan1/brport/multicast_to_unicast Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 down Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 mtu 1500 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 txqueuelen 1000 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 up Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 vht_features 3 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 vhtmode 1 Dec 31 16:00:10 R7000 user.info : _evalpid:wlconf eth1 up Dec 31 16:00:10 R7000 user.info : _evalpid:wlconf eth1 up Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 txpwr1 -m -o 71 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 txpwr1 -1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 roam_delta 15 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 afterburner_override 0 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 shortslot_override -1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 noack 0 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 acktiming 10 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 vlan_mode 0 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 up Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 0.0.0.0 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 down Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 mtu 1500 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth1 up Dec 31 16:00:10 R7000 user.info : bridge : interface eth1 successfully added to bridge br0 Dec 31 16:00:10 R7000 user.info : _evalpid:brctl addif br0 eth1 Dec 31 16:00:10 R7000 kern.info kernel: device eth1 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:10 R7000 user.debug : system2:echo 1 > /sys/class/net/eth1/brport/multicast_to_unicast Dec 31 16:00:10 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 down Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 mtu 1500 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 txqueuelen 1000 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 up Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 vht_features 0 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 vhtmode 1 Dec 31 16:00:10 R7000 user.info : _evalpid:wlconf eth2 up Dec 31 16:00:10 R7000 kern.notice kernel: random: nonblocking pool is initialized Dec 31 16:00:10 R7000 user.info : _evalpid:wlconf eth2 up Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 txpwr1 -m -o 71 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 txpwr1 -1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 roam_delta 15 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 afterburner_override -1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 shortslot_override -1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 noack 0 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 acktiming 10 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 vlan_mode 0 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 up Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 0.0.0.0 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 down Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 mtu 1500 Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth2 up Dec 31 16:00:10 R7000 user.info : bridge : interface eth2 successfully added to bridge br0 Dec 31 16:00:10 R7000 user.info : _evalpid:brctl addif br0 eth2 Dec 31 16:00:10 R7000 user.debug : system2:echo 1 > /sys/class/net/eth2/brport/multicast_to_unicast Dec 31 16:00:10 R7000 kern.info kernel: device eth2 entered promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Dec 31 16:00:10 R7000 user.debug : system2:ead -d vlan1 -d vlan2 -B Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig br0 promisc Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 kern.info kernel: device br0 entered promiscuous mode Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig br0 promisc Dec 31 16:00:10 R7000 user.info : _evalpid:ifconfig eth0:0 down Dec 31 16:00:10 R7000 user.info : _evalpid:gratarp br0 Dec 31 16:00:10 R7000 kern.info kernel: device br0 left promiscuous mode Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 vlan_mode 0 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 vlan_mode 0 Dec 31 16:00:10 R7000 user.debug : route_add: if:lo dst:127.0.0.0 gw: 0.0.0.0 mask: 255.0.0.0 Dec 31 16:00:10 R7000 user.info : _evalpid:route del default Dec 31 16:00:10 R7000 user.info : _evalpid:route add default gw 24.205.212.1 Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth1 radio on Dec 31 16:00:10 R7000 user.info : _evalpid:wl -i eth2 radio on Dec 31 16:00:10 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:10 R7000 user.info : _evalpid:rm /tmp/hosts Dec 31 16:00:10 R7000 user.debug : system2:echo "127.0.0.1 localhost">>/tmp/hosts Dec 31 16:00:10 R7000 user.debug : system2:echo "192.168.1.1 R7000">>/tmp/hosts Dec 31 16:00:10 R7000 user.debug : system2:echo "192.168.1.1 R7000.BLACK-ICE">>/tmp/hosts Dec 31 16:00:10 R7000 user.info : _evalpid:rmmod bonding Dec 31 16:00:10 R7000 user.info : _evalpid:startservices Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service hwmon start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service syslog start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service samba3 start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service privoxy start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service ftpsrv start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service mactelnetd start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service raid start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service dlna start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service olsrd start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service lighttpd start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service softether start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service tor start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service telnetd start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service transmission start Dec 31 16:00:10 R7000 user.info : mactelnetd : daemon trying to stop Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service udhcpd start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service printer start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service unbound start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service dnsmasq start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service smartdns start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service zebra start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service wland start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service cron start Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service pptpd start Dec 31 16:00:10 R7000 user.info : telnetd : daemon trying to stop Dec 31 16:00:10 R7000 user.info : _evalpid:/sbin/service sshd start Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service radvd start Dec 31 16:00:11 R7000 user.info : dnscrypt-proxy : daemon trying to stop Dec 31 16:00:11 R7000 user.info : minidlna : DLNA Media Server trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service snmp start Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service pppoeserver start Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service lltd start Dec 31 16:00:11 R7000 user.info : klogd : kernel log daemon trying to stop Dec 31 16:00:11 R7000 user.info : dropbear : ssh daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service splashd start Dec 31 16:00:11 R7000 user.info : snmpd : daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service wol start Dec 31 16:00:11 R7000 user.info : tor : daemon trying to stop Dec 31 16:00:11 R7000 user.info : proftpd : FTP Server trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service openvpnserversys start Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service vncrepeater start Dec 31 16:00:11 R7000 user.info : lld2d : daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service nstxd start Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service openvpn start Dec 31 16:00:11 R7000 user.info : _evalpid:route del default Dec 31 16:00:11 R7000 user.info : vpnclient : SoftEther Client trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service pppoerelay start Dec 31 16:00:11 R7000 user.info : wland : daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:telnetd Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service freeradius start Dec 31 16:00:11 R7000 user.debug : system2:grep -q crontabs /etc/passwd || echo "crontabs:*:0:0:Contab User,,,:/var:/bin/false" >> /etc/passwd Dec 31 16:00:11 R7000 user.info : transmissiond : daemon trying to stop Dec 31 16:00:11 R7000 user.info : klogd : kernel log daemon successfully stopped Dec 31 16:00:11 R7000 user.info : _evalpid:dnscrypt-proxy -d -S -a 127.0.0.1:30 -R cs-uswest5 -L /etc/dnscrypt/dnscrypt-resolvers.csv Dec 31 16:00:11 R7000 user.info : _evalpid:/sbin/service upnp start Dec 31 16:00:11 R7000 user.info : wol : Wake On LAN Daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:iptables -D INPUT -p tcp -i vlan2 --dport 5900 -j ACCEPT Dec 31 16:00:11 R7000 user.info : radiusd : daemon trying to stop Dec 31 16:00:11 R7000 user.info : upnp : daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:wland Dec 31 16:00:11 R7000 user.info : _evalpid:route add default gw 24.205.212.1 Dec 31 16:00:11 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:11 R7000 user.info : _evalpid:mstpctl delbridge br0 Dec 31 16:00:11 R7000 user.info : pppoe-relay : daemon trying to stop Dec 31 16:00:11 R7000 kern.notice kernel: klogd: exiting Dec 31 16:00:11 R7000 user.info : _evalpid:dropbearconvert openssh dropbear /tmp/root/.ssh/ssh_host_rsa_key /tmp/root/.ssh/ssh_host_rsa_key Dec 31 16:00:11 R7000 user.info : telnetd : daemon successfully started Dec 31 16:00:11 R7000 user.info : vpnserver : SoftEther Server trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:rmmod n_hdlc Dec 31 16:00:11 R7000 user.info : cron : daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:cp -af /tmp/mycron.d/* /tmp/cron.d/ Dec 31 16:00:11 R7000 user.info : _evalpid:ifconfig vlan2 allmulti promisc Dec 31 16:00:11 R7000 user.info : syslogd : syslog daemon trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:cp -af /jffs/mycron.d/* /tmp/cron.d/ Dec 31 16:00:11 R7000 user.info : _evalpid:cp -af /mmc/mycron.d/* /tmp/cron.d/ Dec 31 16:00:11 R7000 user.info : _evalpid:cron Dec 31 16:00:11 R7000 user.info : syslogd : syslog daemon successfully stopped Dec 31 16:00:11 R7000 user.info : _evalpid:rmmod fast-classifier Dec 31 16:00:11 R7000 user.info : vpnbridge : SoftEther Bridge trying to stop Dec 31 16:00:11 R7000 user.info : _evalpid:rmmod shortcut-fe-ipv6 Dec 31 16:00:11 R7000 user.info : _evalpid:rmmod shortcut-fe Dec 31 16:00:11 R7000 syslog.info syslogd exiting Dec 31 16:00:11 R7000 syslog.info syslogd started: BusyBox v1.33.0 Dec 31 16:00:11 R7000 user.info : _evalpid:iptables -D INPUT -p tcp -i vlan2 --dport 5500 -j ACCEPT Dec 31 16:00:11 R7000 user.info : vncrepeater : daemon trying to stop Dec 31 16:00:11 R7000 user.info : cron : daemon successfully started Dec 31 16:00:11 R7000 cron.info cron[939]: (CRON) STARTUP (fork ok) Dec 31 16:00:11 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Dec 31 16:00:11 R7000 user.info : + Namecoin domains can be resolved Dec 31 16:00:11 R7000 user.info : + Provider supposedly doesn't keep logs Dec 31 16:00:11 R7000 daemon.notice dnscrypt-proxy[940]: Starting dnscrypt-proxy 1.9.5 Dec 31 16:00:11 R7000 user.info : _evalpid:touch /tmp/hosts Dec 31 16:00:11 R7000 user.info : _evalpid:dnsmasq -u root -g root -C /tmp/dnsmasq.conf Dec 31 16:00:11 R7000 user.info : dropbear : ssh daemon trying to stop Dec 31 16:00:11 R7000 user.debug : system2:dropbear -b /tmp/loginprompt -r /tmp/root/.ssh/ssh_host_rsa_key -p 22 Dec 31 16:00:11 R7000 daemon.info dnscrypt-proxy[940]: Generating a new session key pair Dec 31 16:00:11 R7000 user.info : dropbear : ssh daemon successfully started Dec 31 16:00:11 R7000 daemon.info dnscrypt-proxy[940]: Done Dec 31 16:00:11 R7000 authpriv.info dropbear[951]: Running in background Dec 31 16:00:11 R7000 user.info : _evalpid:insmod iptable_raw Dec 31 16:00:11 R7000 user.info : _evalpid:insmod iptable_mangle Dec 31 16:00:11 R7000 user.info : _evalpid:insmod nf_conntrack_h323 Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_NFLOG Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_length Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_REDIRECT Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_CT Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_limit Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_TCPMSS Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_connbytes Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_connlimit Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_CLASSIFY Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_recent Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_conntrack Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_state Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_string Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_LOG Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_iprange Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_tcpmss Dec 31 16:00:11 R7000 user.info : _evalpid:insmod xt_NETMAP Dec 31 16:00:11 R7000 user.info : _evalpid:insmod compat_xtables Dec 31 16:00:11 R7000 user.info : _evalpid:insmod ipt_MASQUERADE Dec 31 16:00:11 R7000 user.info : _evalpid:insmod iptable_filter Dec 31 16:00:11 R7000 user.info : _evalpid:insmod nf_reject_ipv4 Dec 31 16:00:11 R7000 user.info : _evalpid:insmod ipt_REJECT Dec 31 16:00:12 R7000 user.info : _evalpid:insmod nf_nat_h323 Dec 31 16:00:12 R7000 user.info : _evalpid:insmod ipt_TRIGGER Dec 31 16:00:12 R7000 user.info : _evalpid:insmod nf_nat_masquerade_ipv4 Dec 31 16:00:12 R7000 user.info : _evalpid:insmod ipt_ah Dec 31 16:00:12 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:12 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:12 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod nf_nat_pptp Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod nf_conntrack_pptp Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod nf_nat_proto_gre Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod nf_conntrack_proto_gre Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod ip_nat_pptp Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod ip_nat_proto_gre Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod ip_conntrack_pptp Dec 31 16:00:12 R7000 user.info : _evalpid:rmmod ip_conntrack_proto_gre Dec 31 16:00:12 R7000 user.info : vpn modules : vpn modules successfully unloaded Dec 31 16:00:12 R7000 user.info : _evalpid:insmod ipt_mac Dec 31 16:00:12 R7000 user.info : _evalpid:insmod xt_mac Dec 31 16:00:12 R7000 user.info : _evalpid:insmod ipt_mac Dec 31 16:00:12 R7000 user.info : dnsmasq : daemon successfully started Dec 31 16:00:12 R7000 user.info : _evalpid:insmod xt_mac Dec 31 16:00:12 R7000 user.info : _evalpid:iptables-restore /tmp/.ipt Dec 31 16:00:12 R7000 user.info : _evalpid:/etc/config/eop-tunnel.firewall Dec 31 16:00:12 R7000 user.info : _evalpid:/etc/config/http-redirect.firewall Dec 31 16:00:12 R7000 user.info : _evalpid:/etc/config/smtp-redirect.firewall Dec 31 16:00:12 R7000 user.info : _evalpid:insmod shortcut-fe Dec 31 16:00:12 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Dec 31 16:00:12 R7000 user.info : _evalpid:insmod fast-classifier Dec 31 16:00:12 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 16:00:12 R7000 kern.alert kernel: fast-classifier: registered Dec 31 16:00:12 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Dec 31 16:00:12 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:12 R7000 user.info : _evalpid:wrtbwmon setup /tmp/bw.db Dec 31 16:00:12 R7000 kern.info kernel: ip6_tables: (C) 2000-2006 Netfilter Core Team Dec 31 16:00:12 R7000 user.info : _evalpid:/sbin/service httpd stop Dec 31 16:00:12 R7000 user.info : httpd : daemon trying to stop Dec 31 16:00:12 R7000 user.info : _evalpid:/sbin/service httpd start Dec 31 16:00:12 R7000 user.info : httpd : daemon trying to stop Dec 31 16:00:12 R7000 user.info : _evalpid:httpd -S -m 443 Dec 31 16:00:13 R7000 user.info : _evalpid:insmod shortcut-fe Dec 31 16:00:13 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Dec 31 16:00:13 R7000 user.info : _evalpid:insmod fast-classifier Dec 31 16:00:13 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Dec 31 16:00:13 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:13 R7000 user.info : _evalpid:rm -f /tmp/.fw_lock Dec 31 16:00:13 R7000 user.info : igmprt : multicast daemon trying to stop Dec 31 16:00:13 R7000 user.info : _evalpid:ifconfig vlan2 down Dec 31 16:00:13 R7000 user.info : _evalpid:ifconfig vlan2 txqueuelen 1000 Dec 31 16:00:13 R7000 user.info : udhcpc : DHCP client trying to stop Dec 31 16:00:13 R7000 user.info : _evalpid:udhcpc -i vlan2 -p /var/run/udhcpc.pid -s /tmp/udhcpc -O routes -O msstaticroutes -O staticroutes -H R7000 Dec 31 16:00:13 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:13 R7000 kern.info kernel: device vlan2 left promiscuous mode Dec 31 16:00:13 R7000 user.info : ttraff : traffic counter daemon trying to stop Dec 31 16:00:13 R7000 user.info : _evalpid:ttraff Dec 31 16:00:13 R7000 user.info : ttraff : traffic counter daemon successfully started Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 radio on Dec 31 16:00:13 R7000 user.info : _evalpid:ifconfig vlan2 0.0.0.0 up Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth1 down Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 vht_features 3 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 vhtmode 1 Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth1 up Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth1 up Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 txpwr1 -m -o 71 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 txpwr1 -1 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 roam_delta 15 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 afterburner_override 0 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 shortslot_override -1 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 noack 0 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 acktiming 10 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth1 vlan_mode 0 Dec 31 16:00:13 R7000 user.info : _evalpid:ifconfig eth1 up Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 radio on Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth2 down Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 vht_features 0 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 vhtmode 1 Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth2 up Dec 31 16:00:13 R7000 user.info : _evalpid:wlconf eth2 up Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 txpwr1 -m -o 71 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 txpwr1 -1 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 roam_delta 15 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 afterburner_override -1 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 shortslot_override -1 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 noack 0 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 acktiming 10 Dec 31 16:00:13 R7000 user.info : _evalpid:wl -i eth2 vlan_mode 0 Dec 31 16:00:13 R7000 user.info : _evalpid:ifconfig eth2 up Dec 31 16:00:13 R7000 user.info : _evalpid:startservice nas -f Dec 31 16:00:13 R7000 user.info : _evalpid:/sbin/service nas start -f Dec 31 16:00:13 R7000 daemon.info httpd[1115]: httpd : httpd SSL server started at port 443 Dec 31 16:00:14 R7000 user.info : httpd : https daemon successfully started Dec 31 16:00:14 R7000 user.info : nas : wait for network init Dec 31 16:00:16 R7000 user.info : _evalpid:iptables -t raw -F Dec 31 16:00:16 R7000 user.info : _evalpid:rmmod fast-classifier Dec 31 16:00:16 R7000 kern.alert kernel: fast-classifier: shutting down Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod shortcut-fe-ipv6 Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod shortcut-fe Dec 31 16:00:17 R7000 user.info : sfe : shortcut forwarding engine successfully stopped Dec 31 16:00:17 R7000 user.info : _evalpid:iptables -F Dec 31 16:00:17 R7000 user.info : _evalpid:iptables -t nat -F Dec 31 16:00:17 R7000 user.info : _evalpid:iptables -t mangle -F Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod ipt_webstr Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod ipt_layer7 Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod xt_layer7 Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod ipt_ipp2p Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod xt_ipp2p Dec 31 16:00:17 R7000 user.info : _evalpid:insmod shortcut-fe Dec 31 16:00:17 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Dec 31 16:00:17 R7000 user.info : _evalpid:insmod fast-classifier Dec 31 16:00:17 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Dec 31 16:00:17 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:17 R7000 user.info : _evalpid:rm -f /tmp/.fw_lock Dec 31 16:00:17 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 16:00:17 R7000 kern.alert kernel: fast-classifier: registered Dec 31 16:00:17 R7000 user.info : _evalpid:wrtbwmon setup /tmp/bw.db Dec 31 16:00:17 R7000 user.info : _evalpid:ifconfig vlan2 24.205.212.17 netmask 255.255.255.0 up Dec 31 16:00:17 R7000 user.debug : route_del: if:vlan2 dst:(null) gw: (null) mask: (null) Dec 31 16:00:17 R7000 user.debug : route_add: if:vlan2 dst:0.0.0.0 gw: 24.205.212.1 mask: 0.0.0.0 Dec 31 16:00:17 R7000 user.info : _evalpid:touch /tmp/hosts Dec 31 16:00:17 R7000 user.info : _evalpid:route del default Dec 31 16:00:17 R7000 user.info : _evalpid:route add default gw 24.205.212.1 Dec 31 16:00:17 R7000 user.info : upnp : daemon trying to stop Dec 31 16:00:17 R7000 user.info : watchquagga : daemon trying to stop Dec 31 16:00:17 R7000 user.info : zebra : daemon trying to stop Dec 31 16:00:17 R7000 user.info : ripd : daemon trying to stop Dec 31 16:00:17 R7000 user.info : ospfd : daemon trying to stop Dec 31 16:00:17 R7000 user.info : ospf6d : daemon trying to stop Dec 31 16:00:17 R7000 user.info : bgpd : daemon trying to stop Dec 31 16:00:17 R7000 user.info : upnp : daemon trying to stop Dec 31 16:00:17 R7000 user.info : wland : daemon trying to stop Dec 31 16:00:17 R7000 user.info : wland : daemon successfully stopped Dec 31 16:00:17 R7000 user.info : wland : daemon trying to stop Dec 31 16:00:17 R7000 user.info : _evalpid:wland Dec 31 16:00:17 R7000 user.info : wland : daemon successfully started Dec 31 16:00:17 R7000 user.info : _evalpid:brctl stp br0 off Dec 31 16:00:17 R7000 user.info : wan : WAN is up. IP: 24.205.212.17 Dec 31 16:00:17 R7000 user.info : smartdns : daemon trying to stop Dec 31 16:00:17 R7000 user.info : dnsmasq : daemon trying to stop Dec 31 16:00:17 R7000 user.info : dnsmasq : daemon successfully stopped Dec 31 16:00:17 R7000 user.info : dnscrypt-proxy : daemon trying to stop Dec 31 16:00:17 R7000 user.info : dnscrypt-proxy : daemon successfully stopped Dec 31 16:00:17 R7000 daemon.notice dnscrypt-proxy[940]: Stopping proxy Dec 31 16:00:17 R7000 daemon.info dnscrypt-proxy[940]: TCP listener shut down Dec 31 16:00:17 R7000 user.info : _evalpid:dnscrypt-proxy -d -S -a 127.0.0.1:30 -R cs-uswest5 -L /etc/dnscrypt/dnscrypt-resolvers.csv Dec 31 16:00:17 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Dec 31 16:00:17 R7000 user.info : + Namecoin domains can be resolved Dec 31 16:00:17 R7000 user.info : + Provider supposedly doesn't keep logs Dec 31 16:00:17 R7000 daemon.notice dnscrypt-proxy[1293]: Starting dnscrypt-proxy 1.9.5 Dec 31 16:00:17 R7000 daemon.info dnscrypt-proxy[1293]: Generating a new session key pair Dec 31 16:00:17 R7000 daemon.info dnscrypt-proxy[1293]: Done Dec 31 16:00:17 R7000 user.info : _evalpid:touch /tmp/hosts Dec 31 16:00:17 R7000 user.info : _evalpid:dnsmasq -u root -g root -C /tmp/dnsmasq.conf Dec 31 16:00:17 R7000 user.info : dnsmasq : daemon successfully started Dec 31 16:00:17 R7000 user.info : smartdns : daemon trying to stop Dec 31 16:00:17 R7000 user.info : dhcpfwd : dhcp forwarder trying to stop Dec 31 16:00:17 R7000 user.info : sputnik : daemon trying to stop Dec 31 16:00:17 R7000 user.info : tor : daemon trying to stop Dec 31 16:00:17 R7000 user.info : tor : daemon trying to stop Dec 31 16:00:17 R7000 user.info : ipvsadm : ipvs daemon trying to stop Dec 31 16:00:17 R7000 user.info : scc : speedchecker trying to stop Dec 31 16:00:17 R7000 user.info : radvd : daemon trying to stop Dec 31 16:00:17 R7000 user.info : unbound : daemon trying to stop Dec 31 16:00:17 R7000 user.info : igmprt : multicast daemon trying to stop Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod fast-classifier Dec 31 16:00:17 R7000 kern.alert kernel: fast-classifier: shutting down Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod shortcut-fe-ipv6 Dec 31 16:00:17 R7000 user.info : _evalpid:rmmod shortcut-fe Dec 31 16:00:17 R7000 user.info : sfe : shortcut forwarding engine successfully stopped Dec 31 16:00:17 R7000 user.info : _evalpid:/etc/config/eop-tunnel.prewall Dec 31 16:00:17 R7000 user.info : _evalpid:insmod iptable_raw Dec 31 16:00:17 R7000 user.info : _evalpid:insmod iptable_mangle Dec 31 16:00:17 R7000 user.info : _evalpid:insmod nf_conntrack_h323 Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_NFLOG Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_length Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_REDIRECT Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_CT Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_limit Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_TCPMSS Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_connbytes Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_connlimit Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_CLASSIFY Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_recent Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_conntrack Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_state Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_string Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_LOG Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_iprange Dec 31 16:00:17 R7000 user.info : _evalpid:insmod xt_tcpmss Dec 31 16:00:18 R7000 user.info : _evalpid:insmod xt_NETMAP Dec 31 16:00:18 R7000 user.info : _evalpid:insmod compat_xtables Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_MASQUERADE Dec 31 16:00:18 R7000 user.info : _evalpid:insmod iptable_filter Dec 31 16:00:18 R7000 user.info : _evalpid:insmod nf_reject_ipv4 Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_REJECT Dec 31 16:00:18 R7000 user.info : _evalpid:insmod nf_nat_h323 Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_TRIGGER Dec 31 16:00:18 R7000 user.info : _evalpid:insmod nf_nat_masquerade_ipv4 Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_ah Dec 31 16:00:18 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:18 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:18 R7000 user.info : _evalpid:ifconfig br0 up Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod nf_nat_pptp Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod nf_conntrack_pptp Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod nf_nat_proto_gre Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod nf_conntrack_proto_gre Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod ip_nat_pptp Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod ip_nat_proto_gre Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod ip_conntrack_pptp Dec 31 16:00:18 R7000 user.info : _evalpid:rmmod ip_conntrack_proto_gre Dec 31 16:00:18 R7000 user.info : vpn modules : vpn modules successfully unloaded Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_mac Dec 31 16:00:18 R7000 user.info : _evalpid:insmod xt_mac Dec 31 16:00:18 R7000 user.info : _evalpid:insmod ipt_mac Dec 31 16:00:18 R7000 user.info : _evalpid:insmod xt_mac Dec 31 16:00:18 R7000 user.info : _evalpid:iptables-restore /tmp/.ipt Dec 31 16:00:18 R7000 user.info : _evalpid:/etc/config/eop-tunnel.firewall Dec 31 16:00:18 R7000 user.info : _evalpid:/etc/config/http-redirect.firewall Dec 31 16:00:18 R7000 user.info : _evalpid:/etc/config/smtp-redirect.firewall Dec 31 16:00:18 R7000 user.info : _evalpid:insmod shortcut-fe Dec 31 16:00:18 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Dec 31 16:00:18 R7000 user.info : _evalpid:insmod fast-classifier Dec 31 16:00:18 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Dec 31 16:00:18 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:18 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Dec 31 16:00:18 R7000 kern.alert kernel: fast-classifier: registered Dec 31 16:00:18 R7000 user.info : _evalpid:wrtbwmon setup /tmp/bw.db Dec 31 16:00:18 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:4c SRC=142.250.101.188 DST=24.205.212.17 LEN=76 TOS=0x00 PREC=0x00 TTL=40 ID=9136 PROTO=TCP SPT=5228 DPT=60102 SEQ=264986086 ACK=839360495 WINDOW=265 RES= Dec 31 16:00:18 R7000 user.info : _evalpid:insmod shortcut-fe Dec 31 16:00:18 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Dec 31 16:00:18 R7000 user.info : _evalpid:insmod fast-classifier Dec 31 16:00:18 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Dec 31 16:00:18 R7000 user.info : sfe : shortcut forwarding engine successfully started Dec 31 16:00:18 R7000 user.info : _evalpid:rm -f /tmp/.fw_lock Dec 31 16:00:18 R7000 user.info : process_monitor : daemon trying to stop Dec 31 16:00:18 R7000 user.info : inadyn : dynamic dns daemon trying to stop Dec 31 16:00:18 R7000 user.info : _evalpid:process_monitor Dec 31 16:00:18 R7000 user.info : process_monitor : successfully started Dec 31 16:00:18 R7000 user.info : scc : speedchecker trying to stop Dec 31 16:00:18 R7000 daemon.info process_monitor[1486]: _evalpid:ntpclient 2.pool.ntp.org 212.18.3.19 88.99.174.22 Dec 31 16:00:23 R7000 daemon.err ntpclient[1487]: Failed resolving address to hostname 2.pool.ntp.org: Try again Dec 31 16:00:23 R7000 daemon.err ntpclient[1487]: Failed resolving server 2.pool.ntp.org: Network is down Dec 31 16:00:23 R7000 daemon.notice ntpclient[1487]: Network up, resolved address to hostname 212.18.3.19 Dec 31 16:00:23 R7000 daemon.debug ntpclient[1487]: Connecting to 212.18.3.19 [212.18.3.19] ... Apr 13 05:07:51 R7000 daemon.info ntpclient[1487]: Time set from 212.18.3.19 [212.18.3.19]. Apr 13 05:07:51 R7000 daemon.info process_monitor[1486]: cyclic NTP Update success (servers 2.pool.ntp.org 212.18.3.19 88.99.174.22) Apr 13 05:07:51 R7000 daemon.info process_monitor[1486]: _evalpid:restart firewall Apr 13 05:07:51 R7000 user.info : _evalpid:/sbin/service firewall stop Apr 13 05:07:51 R7000 user.info : _evalpid:iptables -t raw -F Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod fast-classifier Apr 13 05:07:51 R7000 kern.alert kernel: fast-classifier: shutting down Apr 13 05:07:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:85 SRC=35.162.4.166 DST=24.205.212.17 LEN=133 TOS=0x00 PREC=0x00 TTL=229 ID=17024 DF PROTO=TCP SPT=443 DPT=25558 SEQ=2849012973 ACK=118702 335 WINDOW=118 Apr 13 05:07:51 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=52.113.194.132 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=118 ID=35493 DF PROTO=TCP SPT=443 DPT=25855 SEQ=2773730343 ACK=15061 945 WINDOW=0 RE Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod shortcut-fe-ipv6 Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod shortcut-fe Apr 13 05:07:51 R7000 user.info : sfe : shortcut forwarding engine successfully stopped Apr 13 05:07:51 R7000 user.info : _evalpid:iptables -F Apr 13 05:07:51 R7000 user.info : _evalpid:iptables -t nat -F Apr 13 05:07:51 R7000 user.info : _evalpid:iptables -t mangle -F Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod ipt_webstr Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod ipt_layer7 Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod xt_layer7 Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod ipt_ipp2p Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod xt_ipp2p Apr 13 05:07:51 R7000 user.info : _evalpid:insmod shortcut-fe Apr 13 05:07:51 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Apr 13 05:07:51 R7000 user.info : _evalpid:insmod fast-classifier Apr 13 05:07:51 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Apr 13 05:07:51 R7000 user.info : sfe : shortcut forwarding engine successfully started Apr 13 05:07:51 R7000 user.info : _evalpid:rm -f /tmp/.fw_lock Apr 13 05:07:51 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Apr 13 05:07:51 R7000 kern.alert kernel: fast-classifier: registered Apr 13 05:07:51 R7000 user.info : _evalpid:wrtbwmon setup /tmp/bw.db Apr 13 05:07:51 R7000 user.info : _evalpid:/sbin/service firewall start Apr 13 05:07:51 R7000 user.info : _evalpid:rmmod fast-classifier Apr 13 05:07:51 R7000 kern.alert kernel: fast-classifier: shutting down Apr 13 05:07:51 R7000 user.info : nas : daemon trying to stop Apr 13 05:07:51 R7000 user.info : wrt-radauth : radauth daemon trying to stop Apr 13 05:07:51 R7000 user.info : nas : start nas lan Apr 13 05:07:51 R7000 user.info : nas : start nas for wl0 Apr 13 05:07:51 R7000 user.info : nas : NAS lan (wl0 interface) successfully started Apr 13 05:07:51 R7000 user.info : _evalpid:nas -P /tmp/nas.wl0lan.pid -H 34954 -l br0 -i eth1 -A -m 128 -k ******** -s LIONS DEN 1 -w 4 -g 3600 Apr 13 05:07:51 R7000 user.info : nas : start nas lan Apr 13 05:07:51 R7000 user.info : nas : start nas for wl1 Apr 13 05:07:51 R7000 user.info : nas : NAS lan (wl1 interface) successfully started Apr 13 05:07:51 R7000 user.info : _evalpid:nas -P /tmp/nas.wl1lan.pid -H 34954 -l br0 -i eth2 -A -m 128 -k ******** -s LIONS DEN 2 -w 4 -g 3600 Apr 13 05:07:51 R7000 user.info : _evalpid:startservice guest_nas -f Apr 13 05:07:52 R7000 user.info : _evalpid:/sbin/service guest_nas start -f Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod shortcut-fe-ipv6 Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod shortcut-fe Apr 13 05:07:52 R7000 user.info : sfe : shortcut forwarding engine successfully stopped Apr 13 05:07:52 R7000 user.info : _evalpid:/etc/config/eop-tunnel.prewall Apr 13 05:07:52 R7000 user.info : _evalpid:insmod iptable_raw Apr 13 05:07:52 R7000 user.info : _evalpid:insmod iptable_mangle Apr 13 05:07:52 R7000 user.info : _evalpid:insmod nf_conntrack_h323 Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_NFLOG Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_length Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_REDIRECT Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_CT Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_limit Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_TCPMSS Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_connbytes Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_connlimit Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_CLASSIFY Apr 13 05:07:52 R7000 kern.info kernel: br0: port 1(vlan1) entered forwarding state Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_recent Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_conntrack Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_state Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_string Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_LOG Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_iprange Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_tcpmss Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_NETMAP Apr 13 05:07:52 R7000 user.info : _evalpid:insmod compat_xtables Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_MASQUERADE Apr 13 05:07:52 R7000 user.info : _evalpid:insmod iptable_filter Apr 13 05:07:52 R7000 user.info : _evalpid:insmod nf_reject_ipv4 Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_REJECT Apr 13 05:07:52 R7000 user.info : _evalpid:insmod nf_nat_h323 Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_TRIGGER Apr 13 05:07:52 R7000 user.info : _evalpid:insmod nf_nat_masquerade_ipv4 Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_ah Apr 13 05:07:52 R7000 user.info : _evalpid:ifconfig br0 up Apr 13 05:07:52 R7000 user.info : _evalpid:ifconfig br0 up Apr 13 05:07:52 R7000 user.info : _evalpid:ifconfig br0 up Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod nf_nat_pptp Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod nf_conntrack_pptp Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod nf_nat_proto_gre Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod nf_conntrack_proto_gre Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod ip_nat_pptp Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod ip_nat_proto_gre Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod ip_conntrack_pptp Apr 13 05:07:52 R7000 user.info : _evalpid:rmmod ip_conntrack_proto_gre Apr 13 05:07:52 R7000 user.info : vpn modules : vpn modules successfully unloaded Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_mac Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_mac Apr 13 05:07:52 R7000 kern.info kernel: br0: port 2(eth1) entered forwarding state Apr 13 05:07:52 R7000 user.info : _evalpid:insmod ipt_mac Apr 13 05:07:52 R7000 user.info : _evalpid:insmod xt_mac Apr 13 05:07:52 R7000 user.info : _evalpid:iptables-restore /tmp/.ipt Apr 13 05:07:52 R7000 user.info : _evalpid:/etc/config/eop-tunnel.firewall Apr 13 05:07:52 R7000 user.info : _evalpid:/etc/config/http-redirect.firewall Apr 13 05:07:52 R7000 user.info : _evalpid:/etc/config/smtp-redirect.firewall Apr 13 05:07:52 R7000 user.info : _evalpid:insmod shortcut-fe Apr 13 05:07:52 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Apr 13 05:07:52 R7000 user.info : _evalpid:insmod fast-classifier Apr 13 05:07:52 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Apr 13 05:07:52 R7000 user.info : sfe : shortcut forwarding engine successfully started Apr 13 05:07:52 R7000 kern.alert kernel: fast-classifier (PBR safe v2.1.6b): starting up Apr 13 05:07:52 R7000 kern.alert kernel: fast-classifier: registered Apr 13 05:07:52 R7000 user.info : _evalpid:wrtbwmon setup /tmp/bw.db Apr 13 05:07:52 R7000 kern.info kernel: br0: port 3(eth2) entered forwarding state Apr 13 05:07:53 R7000 user.info : nas : daemon trying to stop Apr 13 05:07:53 R7000 user.info : nas : daemon successfully stopped Apr 13 05:07:53 R7000 user.info : _evalpid:insmod shortcut-fe Apr 13 05:07:53 R7000 user.info : _evalpid:insmod shortcut-fe-ipv6 Apr 13 05:07:53 R7000 user.info : _evalpid:insmod fast-classifier Apr 13 05:07:53 R7000 user.debug : system2:echo 1 > /sys/skip_to_bridge_ingress Apr 13 05:07:53 R7000 user.info : sfe : shortcut forwarding engine successfully started Apr 13 05:07:53 R7000 user.info : _evalpid:rm -f /tmp/.fw_lock Apr 13 05:07:53 R7000 daemon.debug process_monitor[1486]: Restarting cron (time sync change) Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: _evalpid:stopservice cron -f Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service cron stop Apr 13 05:07:53 R7000 user.info : cron : daemon trying to stop Apr 13 05:07:53 R7000 user.info : cron : daemon successfully stopped Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: _evalpid:startservice cron -f Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service cron start -f Apr 13 05:07:53 R7000 user.debug : system2:grep -q crontabs /etc/passwd || echo "crontabs:*:0:0:Contab User,,,:/var:/bin/false" >> /etc/passwd Apr 13 05:07:53 R7000 user.info : cron : daemon trying to stop Apr 13 05:07:53 R7000 user.info : _evalpid:cp -af /tmp/mycron.d/* /tmp/cron.d/ Apr 13 05:07:53 R7000 user.info : _evalpid:cp -af /jffs/mycron.d/* /tmp/cron.d/ Apr 13 05:07:53 R7000 user.info : _evalpid:cp -af /mmc/mycron.d/* /tmp/cron.d/ Apr 13 05:07:53 R7000 user.info : _evalpid:cron Apr 13 05:07:53 R7000 user.info : cron : daemon successfully started Apr 13 05:07:53 R7000 cron.info cron[1803]: (CRON) STARTUP (fork ok) Apr 13 05:07:53 R7000 daemon.debug process_monitor[1486]: Restarting dnsmasq (time sync change) Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: _evalpid:stopservice dnsmasq -f Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service dnsmasq stop Apr 13 05:07:53 R7000 user.info : smartdns : daemon trying to stop Apr 13 05:07:53 R7000 user.info : dnsmasq : daemon trying to stop Apr 13 05:07:53 R7000 user.info : dnsmasq : daemon successfully stopped Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: _evalpid:startservice dnsmasq -f Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service dnsmasq start -f Apr 13 05:07:53 R7000 user.info : dnscrypt-proxy : daemon trying to stop Apr 13 05:07:53 R7000 user.info : dnscrypt-proxy : daemon successfully stopped Apr 13 05:07:53 R7000 daemon.notice dnscrypt-proxy[1293]: Stopping proxy Apr 13 05:07:53 R7000 daemon.info dnscrypt-proxy[1293]: TCP listener shut down Apr 13 05:07:53 R7000 user.info : _evalpid:dnscrypt-proxy -d -S -a 127.0.0.1:30 -R cs-uswest5 -L /etc/dnscrypt/dnscrypt-resolvers.csv Apr 13 05:07:53 R7000 user.info : - [cs-uswest5] does not support DNS Security Extensions Apr 13 05:07:53 R7000 user.info : + Namecoin domains can be resolved Apr 13 05:07:53 R7000 user.info : + Provider supposedly doesn't keep logs Apr 13 05:07:53 R7000 daemon.notice dnscrypt-proxy[1809]: Starting dnscrypt-proxy 1.9.5 Apr 13 05:07:53 R7000 daemon.info dnscrypt-proxy[1809]: Generating a new session key pair Apr 13 05:07:53 R7000 daemon.info dnscrypt-proxy[1809]: Done Apr 13 05:07:53 R7000 user.info : _evalpid:touch /tmp/hosts Apr 13 05:07:53 R7000 user.info : _evalpid:dnsmasq -u root -g root -C /tmp/dnsmasq.conf Apr 13 05:07:53 R7000 user.info : dnsmasq : daemon successfully started Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: _evalpid:restart process_monitor Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service process_monitor stop Apr 13 05:07:53 R7000 user.info : process_monitor : daemon trying to stop Apr 13 05:07:53 R7000 user.info : process_monitor : daemon successfully stopped Apr 13 05:07:53 R7000 daemon.info process_monitor[1486]: process_monitor : cleanup timers Apr 13 05:07:53 R7000 user.info : _evalpid:/sbin/service process_monitor start Apr 13 05:07:53 R7000 user.info : _evalpid:process_monitor Apr 13 05:07:53 R7000 user.info : process_monitor : successfully started Apr 13 05:07:53 R7000 daemon.debug process_monitor[1820]: We need to re-update after 3600 seconds Apr 13 05:07:53 R7000 daemon.info process_monitor[1820]: process_monitor : set timer: 3600 seconds, callback: ntp_main() Apr 13 05:07:53 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=74.125.137.188 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=40 ID=44627 PROTO=TCP SPT=5228 DPT=56156 SEQ=3148679270 ACK=35736102 3 WINDOW=267 RE Apr 13 05:07:53 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=47479 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:53 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=47651 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:54 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=47867 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:54 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=48275 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:55 R7000 user.info : nas : daemon hanging, send SIGKILL Apr 13 05:07:55 R7000 user.info : wrt-radauth : radauth daemon trying to stop Apr 13 05:07:55 R7000 user.info : nas : start nas lan Apr 13 05:07:55 R7000 user.info : nas : start nas for wl0 Apr 13 05:07:55 R7000 user.info : nas : NAS lan (wl0 interface) successfully started Apr 13 05:07:55 R7000 user.info : _evalpid:nas -P /tmp/nas.wl0lan.pid -H 34954 -l br0 -i eth1 -A -m 128 -k ******** -s LIONS DEN 1 -w 4 -g 3600 Apr 13 05:07:55 R7000 user.info : nas : start nas lan Apr 13 05:07:55 R7000 user.info : nas : start nas for wl1 Apr 13 05:07:55 R7000 user.info : nas : NAS lan (wl1 interface) successfully started Apr 13 05:07:55 R7000 user.info : _evalpid:nas -P /tmp/nas.wl1lan.pid -H 34954 -l br0 -i eth2 -A -m 128 -k ******** -s LIONS DEN 2 -w 4 -g 3600 Apr 13 05:07:55 R7000 user.info : httpd : daemon trying to stop Apr 13 05:07:55 R7000 user.info : httpd : daemon successfully stopped Apr 13 05:07:55 R7000 daemon.info httpd[1176]: httpd : httpd server shutdown Apr 13 05:07:55 R7000 user.info : _evalpid:httpd -S -m 443 Apr 13 05:07:55 R7000 user.debug : ttraff: data collection started Apr 13 05:07:55 R7000 daemon.info httpd[1830]: httpd : httpd SSL server started at port 443 Apr 13 05:07:55 R7000 user.info : httpd : https daemon successfully started Apr 13 05:07:55 R7000 user.info : resetbutton : daemon trying to stop Apr 13 05:07:55 R7000 user.info : resetbutton : daemon successfully stopped Apr 13 05:07:55 R7000 user.info : _evalpid:resetbutton Apr 13 05:07:55 R7000 user.info : resetbutton : resetbutton daemon successfully started Apr 13 05:07:55 R7000 user.info : _evalpid:startservice_f modules_wait Apr 13 05:07:55 R7000 user.info : _evalpid:/sbin/service modules_wait start Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/init.d/rcS Apr 13 05:07:55 R7000 user.info : _evalpid:/opt/etc/init.d/rcS Apr 13 05:07:55 R7000 user.info : _evalpid:/jffs/etc/init.d/rcS Apr 13 05:07:55 R7000 user.info : _evalpid:/mmc/etc/init.d/rcS Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/dhcpd.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/jffs2.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/language.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/nocat.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/pptpd_client.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/proxywatchdog.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/rflow.startup Apr 13 05:07:55 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=48938 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/sambafs.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/schedulerb.startup Apr 13 05:07:55 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.11.74 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=57 ID=11242 PROTO=TCP SPT=443 DPT=52217 SEQ=53202926 ACK=197495727 WI DOW=265 RES=0x0 Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/shat.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/wdswatchdog.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/etc/config/zabbix.startup Apr 13 05:07:55 R7000 user.info : _evalpid:/tmp/.rc_startup Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=3.220.204.144 LEN=83 TOS=0x00 PREC=0x00 TTL=63 ID=39175 DF PROTO=TCP SPT=39651 DPT=443 SEQ=3639175688 ACK=548107020 WINDO =661 RES=0x00 A Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.0.0.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=4117 DF PROTO=UDP SPT=52317 DPT=53 LEN=42 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=73 TOS=0x00 PREC=0x00 TTL=63 ID=63493 DF PROTO=UDP SPT=35963 DPT=53 LEN=53 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.101.188 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=64206 DF PROTO=TCP SPT=45430 DPT=5228 SEQ=1013673803 ACK=0 WINDOW=146 0 RES=0x00 SYN Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=132.163.96.1 LEN=76 TOS=0x00 PREC=0x00 TTL=127 ID=45840 DF PROTO=UDP SPT=50482 DPT=123 LEN=56 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.0.0.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=4196 DF PROTO=UDP SPT=42226 DPT=53 LEN=55 Apr 13 05:07:56 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=74.125.137.188 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=41 ID=13709 PROTO=TCP SPT=5228 DPT=42331 SEQ=1853297122 ACK=39829216 4 WINDOW=265 RE Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=48832 DPT=53 LEN=55 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=41545 DPT=53 LEN=55 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=48683 DPT=53 LEN=55 Apr 13 05:07:56 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.0.0.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=51963 DPT=53 LEN=55 Apr 13 05:07:56 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=167.248.133.78 DST=24.205.212.17 LEN=44 TOS=0x00 PREC=0x00 TTL=34 ID=54814 PROTO=TCP SPT=54421 DPT=3103 SEQ=620886139 ACK=0 WINDOW= 024 RES=0x00 SY Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=142.250.68.14 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=40985 DF PROTO=TCP SPT=59192 DPT=80 SEQ=1367854370 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=58 TOS=0x00 PREC=0x00 TTL=63 ID=27969 DF PROTO=UDP SPT=11026 DPT=53 LEN=38 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=69.171.250.34 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=12944 DF PROTO=TCP SPT=41291 DPT=443 SEQ=1593794518 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=27975 DF PROTO=UDP SPT=13490 DPT=53 LEN=48 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.101.188 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=19249 DF PROTO=TCP SPT=45431 DPT=5228 SEQ=1109450010 ACK=0 WINDOW=146 0 RES=0x00 SYN Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=27998 DF PROTO=UDP SPT=29766 DPT=53 LEN=55 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.0.0.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=4354 DF PROTO=UDP SPT=44215 DPT=53 LEN=55 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=28006 DF PROTO=UDP SPT=29227 DPT=53 LEN=55 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=51.105.112.91 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=21346 DF PROTO=TCP SPT=34535 DPT=443 SEQ=3263512073 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.0.0.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=4356 DF PROTO=UDP SPT=42713 DPT=53 LEN=42 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=63673 DF PROTO=UDP SPT=57921 DPT=53 LEN=67 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=87 TOS=0x00 PREC=0x00 TTL=63 ID=63674 DF PROTO=UDP SPT=57921 DPT=53 LEN=67 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=28025 DF PROTO=UDP SPT=9579 DPT=53 LEN=48 Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=54.82.73.149 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=38467 DF PROTO=TCP SPT=48649 DPT=443 SEQ=1085407287 ACK=0 WINDOW=14600 R S=0x00 SYN URGP Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=69.171.250.20 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=32322 DF PROTO=TCP SPT=47692 DPT=443 SEQ=336073529 ACK=0 WINDOW=65535 RE =0x00 SYN URGP= Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=28038 DF PROTO=UDP SPT=15017 DPT=53 LEN=42 Apr 13 05:07:57 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=50165 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=142.250.101.188 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=49829 DF PROTO=TCP SPT=33577 DPT=5228 SEQ=3509235506 ACK=0 WINDOW=6553 RES=0x00 SYN U Apr 13 05:07:57 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=69.171.250.20 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=42923 DF PROTO=TCP SPT=47693 DPT=443 SEQ=3464415804 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Apr 13 05:07:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=28094 DF PROTO=UDP SPT=17625 DPT=53 LEN=44 Apr 13 05:07:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=31.13.65.1 LEN=1260 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=60591 DPT=443 LEN=1240 Apr 13 05:07:58 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=63708 DF PROTO=UDP SPT=54333 DPT=53 LEN=42 Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29203 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.20 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=29204 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865047006 ACK=3149131 79 WINDOW=269 R Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.20 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=29205 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865047006 ACK=3149131 79 WINDOW=269 R Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29206 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:07:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=63 ID=28237 DF PROTO=UDP SPT=32029 DPT=53 LEN=39 Apr 13 05:07:59 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=31.13.70.1 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=31463 DF PROTO=TCP SPT=43734 DPT=80 SEQ=2710246579 ACK=0 WINDOW=65535 RES=0 00 SYN URGP=0 O Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29207 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:07:59 R7000 kern.warn kernel: DROP IN=vlan2 OUT=vlan2 MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=82.76.166.218 DST=47.224.177.3 LEN=44 TOS=0x00 PREC=0x00 TTL=232 ID=49934 PROTO=TCP SPT=47011 DPT=4017 SEQ=1644789180 ACK=0 WI DOW=1024 RES=0x Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=3.113.82.189 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=17809 DF PROTO=TCP SPT=44084 DPT=5229 SEQ=4122749950 ACK=0 WINDOW=65535 R S=0x00 SYN URGP Apr 13 05:08:00 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29208 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=63957 DF PROTO=UDP SPT=47453 DPT=53 LEN=55 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=63958 DF PROTO=UDP SPT=37144 DPT=53 LEN=55 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=71 TOS=0x00 PREC=0x00 TTL=63 ID=28291 DF PROTO=UDP SPT=18995 DPT=53 LEN=51 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.5.195 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39050 DF PROTO=UDP SPT=34839 DPT=443 LEN=1358 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.5.195 LEN=367 TOS=0x00 PREC=0x00 TTL=63 ID=39051 DF PROTO=UDP SPT=34839 DPT=443 LEN=347 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.5.195 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=60072 DF PROTO=TCP SPT=49883 DPT=443 SEQ=3824906809 ACK=0 WINDOW=14600 ES=0x00 SYN URG Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=63990 DF PROTO=UDP SPT=36987 DPT=53 LEN=45 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39091 DF PROTO=UDP SPT=39906 DPT=443 LEN=1358 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39092 DF PROTO=UDP SPT=39906 DPT=443 LEN=1358 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39093 DF PROTO=UDP SPT=39906 DPT=443 LEN=1358 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=355 TOS=0x00 PREC=0x00 TTL=63 ID=39094 DF PROTO=UDP SPT=39906 DPT=443 LEN=335 Apr 13 05:08:00 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39095 DF PROTO=UDP SPT=39906 DPT=443 LEN=1358 Apr 13 05:08:00 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29209 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:84 SRC=3.113.82.189 DST=24.205.212.17 LEN=132 TOS=0x00 PREC=0x00 TTL=34 ID=45108 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=3.113.82.189 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=34 ID=45109 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728896 ACK=6537395 2 WINDOW=114 RE Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=3.113.82.189 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=34 ID=45110 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728927 ACK=6537395 2 WINDOW=114 RE Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31121 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=3.113.82.189 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=34 ID=45111 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728927 ACK=6537395 2 WINDOW=114 RE Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=54134 PROTO=ICMP TYPE=8 CODE=0 ID=1 SEQ=199 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=64 ID=54135 PROTO=UDP SPT=62746 DPT=5355 LEN=50 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=142 TOS=0x00 PREC=0x00 TTL=64 ID=54137 PROTO=UDP SPT=64440 DPT=1900 LEN=122 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=54138 PROTO=UDP SPT=64440 DPT=1900 LEN=132 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54136 DF PROTO=TCP SPT=25879 DPT=80 SEQ=4142313355 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=652 TOS=0x00 PREC=0x00 TTL=64 ID=54139 PROTO=UDP SPT=64441 DPT=3702 LEN=632 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=78 TOS=0x00 PREC=0x00 TTL=64 ID=54140 PROTO=UDP SPT=64442 DPT=137 LEN=58 Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=74 TOS=0x00 PREC=0x00 TTL=64 ID=54141 PROTO=UDP SPT=64443 DPT=5353 LEN=54 Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=52636 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41568 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=6855 PROTO=UDP SPT=60268 DPT=53 LEN=49 Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45112 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=69 TOS=0x00 PREC=0x00 TTL=63 ID=13798 PROTO=UDP SPT=60268 DPT=53 LEN=49 Apr 13 05:08:01 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41569 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:01 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=13.107.4.52 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=47325 DF PROTO=TCP SPT=25880 DPT=80 SEQ=3493005640 ACK=0 WINDOW=64240 RES= x00 SYN URGP=0 Apr 13 05:08:02 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41570 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:02 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29210 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54142 DF PROTO=TCP SPT=25879 DPT=80 SEQ=4142313355 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31122 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:02 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41571 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=6856 PROTO=UDP SPT=58876 DPT=53 LEN=56 Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=13.88.21.125 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=5566 DF PROTO=TCP SPT=25881 DPT=443 SEQ=854367366 ACK=0 WINDOW=65160 RES= x00 SYN URGP=0 Apr 13 05:08:02 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41572 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=6857 PROTO=UDP SPT=65346 DPT=53 LEN=50 Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=34.107.221.82 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=57517 DF PROTO=TCP SPT=25882 DPT=80 SEQ=1120096193 ACK=0 WINDOW=64240 RE =0x00 SYN URGP= Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=34.107.221.82 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=57518 DF PROTO=TCP SPT=25883 DPT=80 SEQ=3386399679 ACK=0 WINDOW=64240 RE =0x00 SYN URGP= Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=88 TOS=0x00 PREC=0x00 TTL=63 ID=6858 PROTO=UDP SPT=54454 DPT=53 LEN=68 Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54144 DF PROTO=TCP SPT=25879 DPT=80 SEQ=4142313355 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=88 TOS=0x00 PREC=0x00 TTL=63 ID=13799 PROTO=UDP SPT=54454 DPT=53 LEN=68 Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=88 TOS=0x00 PREC=0x00 TTL=63 ID=6859 PROTO=UDP SPT=52422 DPT=53 LEN=68 Apr 13 05:08:02 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45113 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=34.107.221.82 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=57524 DF PROTO=TCP SPT=25884 DPT=80 SEQ=3423382378 ACK=0 WINDOW=64240 RE =0x00 SYN URGP= Apr 13 05:08:02 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31123 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=28565 DF PROTO=UDP SPT=22837 DPT=53 LEN=50 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=142.250.72.234 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=52447 DF PROTO=TCP SPT=57901 DPT=443 SEQ=3653739329 ACK=0 WINDOW=65535 ES=0x00 SYN URG Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=6860 PROTO=UDP SPT=53261 DPT=53 LEN=60 Apr 13 05:08:03 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41573 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54146 DF PROTO=TCP SPT=25885 DPT=62078 SEQ=975182430 ACK=0 WINDOW=64240 RES=0x0 SYN URGP=0 OPT Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54147 DF PROTO=TCP SPT=25886 DPT=445 SEQ=4014373194 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=142 TOS=0x00 PREC=0x00 TTL=64 ID=54148 PROTO=UDP SPT=64440 DPT=1900 LEN=122 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=152 TOS=0x00 PREC=0x00 TTL=64 ID=54149 PROTO=UDP SPT=64440 DPT=1900 LEN=132 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=652 TOS=0x00 PREC=0x00 TTL=64 ID=54151 PROTO=UDP SPT=64441 DPT=3702 LEN=632 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31124 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:03 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=78 TOS=0x00 PREC=0x00 TTL=64 ID=54150 PROTO=UDP SPT=64442 DPT=137 LEN=58 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54152 DF PROTO=TCP SPT=25886 DPT=445 SEQ=4014373194 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54153 DF PROTO=TCP SPT=25885 DPT=62078 SEQ=975182430 ACK=0 WINDOW=64240 RES=0x0 SYN URGP=0 OPT Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=6861 PROTO=UDP SPT=55331 DPT=53 LEN=48 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=72 TOS=0x00 PREC=0x00 TTL=63 ID=6862 PROTO=UDP SPT=59327 DPT=53 LEN=52 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=13800 PROTO=UDP SPT=55331 DPT=53 LEN=48 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=40.91.76.238 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=948 DF PROTO=TCP SPT=25887 DPT=443 SEQ=843941852 ACK=0 WINDOW=64240 RES=0 00 SYN URGP=0 O Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31125 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31126 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=142.250.68.78 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39894 DF PROTO=UDP SPT=48724 DPT=443 LEN=1358 Apr 13 05:08:04 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29211 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:04 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45114 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54155 DF PROTO=TCP SPT=25886 DPT=445 SEQ=4014373194 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:04 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41574 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=52.230.222.68 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=37951 DF PROTO=TCP SPT=25888 DPT=443 SEQ=1171530202 ACK=0 WINDOW=64240 R S=0x00 SYN URGP Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=64339 DF PROTO=UDP SPT=51878 DPT=53 LEN=45 Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54156 DF PROTO=TCP SPT=25885 DPT=62078 SEQ=975182430 ACK=0 WINDOW=64240 RES=0x0 SYN URGP=0 OPT Apr 13 05:08:04 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=172.217.4.174 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=39968 DF PROTO=UDP SPT=49683 DPT=443 LEN=1358 Apr 13 05:08:05 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:bf SRC=52.242.211.89 DST=24.205.212.17 LEN=191 TOS=0x00 PREC=0x00 TTL=110 ID=30027 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:05 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:bf SRC=52.242.211.89 DST=24.205.212.17 LEN=191 TOS=0x00 PREC=0x00 TTL=110 ID=30028 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751737 ACK=304026 256 WINDOW=7199 Apr 13 05:08:05 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31127 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:05 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31128 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:05 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30029 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:05 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30030 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:05 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31129 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:05 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31130 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:06 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30031 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:06 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31131 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:06 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=ff:ff:ff:ff:ff:ff:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.255 LEN=96 TOS=0x00 PREC=0x00 TTL=64 ID=31132 PROTO=UDP SPT=137 DPT=137 LEN=76 Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36220 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=36221 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503987 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=36222 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503987 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30032 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41575 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36223 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36224 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:07 R7000 kern.warn kernel: DROP IN=vlan2 OUT=vlan2 MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=188.166.219.170 DST=47.224.177.3 LEN=44 TOS=0x00 PREC=0x00 TTL=237 ID=42052 PROTO=TCP SPT=55573 DPT=50009 SEQ=426235422 ACK=0 INDOW=1024 RES= Apr 13 05:08:08 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45115 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:08 R7000 daemon.err dnscrypt-proxy[1809]: Unable to retrieve server certificates Apr 13 05:08:08 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36225 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:09 R7000 daemon.info dnscrypt-proxy[1809]: Refetching server certificates Apr 13 05:08:09 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=16620 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29212 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=16770 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36226 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:4f SRC=13.225.148.97 DST=24.205.212.17 LEN=79 TOS=0x00 PREC=0x00 TTL=236 ID=36025 PROTO=TCP SPT=443 DPT=25780 SEQ=3203501987 ACK=287494225 WINDOW=131 RES Apr 13 05:08:10 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=6863 PROTO=UDP SPT=55244 DPT=53 LEN=42 Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30033 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:10 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=184.27.140.152 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=61102 DF PROTO=TCP SPT=25890 DPT=443 SEQ=2397159130 ACK=0 WINDOW=64240 ES=0x00 SYN URG Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:40 SRC=13.225.148.97 DST=24.205.212.17 LEN=64 TOS=0x00 PREC=0x00 TTL=236 ID=36026 PROTO=TCP SPT=443 DPT=25780 SEQ=3203502026 ACK=287494225 WINDOW=131 RES Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=57167 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 WINDOW=265 RES= Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=13.225.148.97 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=36027 PROTO=TCP SPT=443 DPT=25780 SEQ=3203502050 ACK=287494225 WINDOW=131 RES Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=13.225.148.97 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=36028 PROTO=TCP SPT=443 DPT=25780 SEQ=3203502050 ACK=287494225 WINDOW=131 RES Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=16938 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:67 SRC=13.225.148.97 DST=24.205.212.17 LEN=103 TOS=0x00 PREC=0x00 TTL=236 ID=36042 PROTO=TCP SPT=443 DPT=25780 SEQ=3203501987 ACK=28749422 4 WINDOW=131 RE Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=17149 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:10 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:67 SRC=13.225.148.97 DST=24.205.212.17 LEN=103 TOS=0x00 PREC=0x00 TTL=236 ID=36066 PROTO=TCP SPT=443 DPT=25780 SEQ=3203501987 ACK=28749422 4 WINDOW=131 RE Apr 13 05:08:11 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:4c SRC=142.250.101.188 DST=24.205.212.17 LEN=76 TOS=0x00 PREC=0x00 TTL=40 ID=22578 PROTO=TCP SPT=5228 DPT=60102 SEQ=264986086 ACK=83936049 WINDOW=265 RES Apr 13 05:08:11 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=17798 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:11 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:67 SRC=13.225.148.97 DST=24.205.212.17 LEN=103 TOS=0x00 PREC=0x00 TTL=236 ID=36132 PROTO=TCP SPT=443 DPT=25780 SEQ=3203501987 ACK=28749422 4 WINDOW=131 RE Apr 13 05:08:12 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36227 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:13 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41576 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:13 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:71 SRC=34.98.75.36 DST=24.205.212.17 LEN=113 TOS=0x00 PREC=0x00 TTL=57 ID=18620 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:13 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:67 SRC=13.225.148.97 DST=24.205.212.17 LEN=103 TOS=0x00 PREC=0x00 TTL=236 ID=36266 PROTO=TCP SPT=443 DPT=25780 SEQ=3203501987 ACK=28749422 4 WINDOW=131 RE Apr 13 05:08:14 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=45.148.10.50 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=237 ID=54321 PROTO=TCP SPT=41219 DPT=8001 SEQ=2033790141 ACK=0 WINDOW= 5535 RES=0x00 S Apr 13 05:08:14 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:60 SRC=34.98.75.36 DST=24.205.212.17 LEN=96 TOS=0x00 PREC=0x00 TTL=57 ID=19041 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120140 ACK=586759947 WI DOW=265 RES=0x0 Apr 13 05:08:14 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:01:56 SRC=52.242.211.89 DST=24.205.212.17 LEN=342 TOS=0x00 PREC=0x00 TTL=110 ID=30034 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751586 ACK=304026 256 WINDOW=7199 Apr 13 05:08:15 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45116 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54157 DF PROTO=TCP SPT=25892 DPT=443 SEQ=302043673 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:15 R7000 daemon.err httpd[1834]: httpd : Request Error Code 408: Unexpected connection close in intitial request Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=6864 PROTO=UDP SPT=49977 DPT=53 LEN=50 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=6865 PROTO=UDP SPT=58763 DPT=53 LEN=60 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=13.226.219.50 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=6036 DF PROTO=TCP SPT=25893 DPT=443 SEQ=3999689248 ACK=0 WINDOW=64240 RE =0x00 SYN URGP= Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=6866 PROTO=UDP SPT=50854 DPT=53 LEN=60 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=13.226.219.50 LEN=52 TOS=0x00 PREC=0x00 TTL=63 ID=6038 DF PROTO=TCP SPT=25894 DPT=443 SEQ=314683542 ACK=0 WINDOW=64240 RES 0x00 SYN URGP=0 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=13801 PROTO=UDP SPT=50854 DPT=53 LEN=60 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=6867 PROTO=UDP SPT=60787 DPT=53 LEN=60 Apr 13 05:08:15 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.0.0.1 LEN=80 TOS=0x00 PREC=0x00 TTL=63 ID=13802 PROTO=UDP SPT=60787 DPT=53 LEN=60 Apr 13 05:08:17 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36228 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:17 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a9 SRC=34.98.75.36 DST=24.205.212.17 LEN=169 TOS=0x00 PREC=0x00 TTL=57 ID=20574 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=6868 PROTO=UDP SPT=54942 DPT=53 LEN=45 Apr 13 05:08:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=6869 PROTO=UDP SPT=54421 DPT=53 LEN=50 Apr 13 05:08:17 R7000 kern.warn kernel: ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=6870 PROTO=UDP SPT=61207 DPT=53 LEN=50 Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54164 DF PROTO=TCP SPT=25895 DPT=443 SEQ=1798824206 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54184 DF PROTO=TCP SPT=25896 DPT=443 SEQ=4176036345 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54185 DF PROTO=TCP SPT=25897 DPT=443 SEQ=2390380334 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54188 DF PROTO=TCP SPT=25900 DPT=443 SEQ=2198290292 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54189 DF PROTO=TCP SPT=25901 DPT=443 SEQ=4191104206 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54186 DF PROTO=TCP SPT=25898 DPT=443 SEQ=3527286548 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54187 DF PROTO=TCP SPT=25899 DPT=443 SEQ=281299541 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54303 DF PROTO=TCP SPT=25902 DPT=443 SEQ=3464990431 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54314 DF PROTO=TCP SPT=25903 DPT=443 SEQ=2454199435 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54319 DF PROTO=TCP SPT=25904 DPT=443 SEQ=71736934 ACK=0 WINDOW=64240 RES=0x00 S N URGP=0 OPT (0 Apr 13 05:08:19 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54334 DF PROTO=TCP SPT=25905 DPT=443 SEQ=1109117166 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54412 DF PROTO=TCP SPT=25906 DPT=443 SEQ=4158977200 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54423 DF PROTO=TCP SPT=25907 DPT=443 SEQ=1558717777 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:20 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29213 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54496 DF PROTO=TCP SPT=25908 DPT=443 SEQ=804421470 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:20 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54497 DF PROTO=TCP SPT=25909 DPT=443 SEQ=2066107576 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:22 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=142.250.101.188 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=40 ID=29072 PROTO=TCP SPT=5228 DPT=60102 SEQ=264986110 ACK=83936049 WINDOW=265 RES Apr 13 05:08:23 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54519 DF PROTO=TCP SPT=25910 DPT=443 SEQ=3518136433 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:24 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=52.242.211.89 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=110 ID=30035 DF PROTO=TCP SPT=443 DPT=25489 SEQ=106751888 ACK=3040263 56 WINDOW=0 RES Apr 13 05:08:24 R7000 daemon.err dnscrypt-proxy[1809]: Unable to retrieve server certificates Apr 13 05:08:24 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41577 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:25 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a9 SRC=34.98.75.36 DST=24.205.212.17 LEN=169 TOS=0x00 PREC=0x00 TTL=57 ID=24639 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:26 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=172.217.5.206 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=1595 PROTO=TCP SPT=443 DPT=53663 SEQ=3333522609 ACK=1068034137 INDOW=265 RES=0 Apr 13 05:08:26 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54531 DF PROTO=TCP SPT=25912 DPT=443 SEQ=4269100982 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:27 R7000 daemon.info dnscrypt-proxy[1809]: Refetching server certificates Apr 13 05:08:27 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36229 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:29 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a3 SRC=3.113.82.189 DST=24.205.212.17 LEN=163 TOS=0x00 PREC=0x00 TTL=34 ID=45117 DF PROTO=TCP SPT=5229 DPT=44534 SEQ=1493728816 ACK=653739 12 WINDOW=114 R Apr 13 05:08:29 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54543 DF PROTO=TCP SPT=25913 DPT=443 SEQ=2114708308 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:31 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54555 DF PROTO=TCP SPT=25914 DPT=443 SEQ=2362100381 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:32 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54578 DF PROTO=TCP SPT=25915 DPT=443 SEQ=875174724 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:32 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54579 DF PROTO=TCP SPT=25916 DPT=443 SEQ=4187777923 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54601 DF PROTO=TCP SPT=25917 DPT=443 SEQ=2822640161 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54614 DF PROTO=TCP SPT=25918 DPT=443 SEQ=3805367540 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:34 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54615 DF PROTO=TCP SPT=25919 DPT=443 SEQ=3756825573 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:35 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=74.120.14.90 DST=24.205.212.17 LEN=44 TOS=0x00 PREC=0x00 TTL=36 ID=53274 PROTO=TCP SPT=36608 DPT=12293 SEQ=3971700344 ACK=0 WINDOW= 024 RES=0x00 SY Apr 13 05:08:39 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54637 DF PROTO=TCP SPT=25923 DPT=443 SEQ=583545929 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( Apr 13 05:08:40 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=29214 DF PROTO=TCP SPT=443 DPT=47659 SEQ=1865046975 ACK=3149131 79 WINDOW=269 R Apr 13 05:08:41 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=1.54.116.217 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=45 ID=27256 PROTO=TCP SPT=38341 DPT=23 SEQ=416142353 ACK=0 WINDOW=6161 RES=0x00 SYN U Apr 13 05:08:41 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:a9 SRC=34.98.75.36 DST=24.205.212.17 LEN=169 TOS=0x00 PREC=0x00 TTL=57 ID=33017 PROTO=TCP SPT=443 DPT=25775 SEQ=3967120067 ACK=586759947 W NDOW=265 RES=0x Apr 13 05:08:42 R7000 daemon.err dnscrypt-proxy[1809]: Unable to retrieve server certificates Apr 13 05:08:44 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54648 DF PROTO=TCP SPT=25924 DPT=443 SEQ=2178945692 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:47 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.20 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=41578 DF PROTO=TCP SPT=443 DPT=47667 SEQ=3497684799 ACK=3732071 60 WINDOW=284 R Apr 13 05:08:47 R7000 kern.warn kernel: DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:53 SRC=69.171.250.34 DST=24.205.212.17 LEN=83 TOS=0x00 PREC=0x00 TTL=84 ID=36230 DF PROTO=TCP SPT=443 DPT=52236 SEQ=2048503956 ACK=5252899 1 WINDOW=265 RE Apr 13 05:08:48 R7000 daemon.info dnscrypt-proxy[1809]: Refetching server certificates Apr 13 05:08:49 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54659 DF PROTO=TCP SPT=25925 DPT=443 SEQ=3009741927 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT Apr 13 05:08:50 R7000 kern.warn kernel: ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54670 DF PROTO=TCP SPT=25926 DPT=443 SEQ=615698602 ACK=0 WINDOW=64240 RES=0x00 YN URGP=0 OPT ( dmesg (Initial Flash) DROP IN=vlan2 OUT=vlan2 MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=165.22.28.239 DST=47.224.177.3 LEN=44 TOS=0x00 PREC=0x00 TTL=234 ID=28073 PROTO=TCP SPT=55612 DPT=3483 SEQ=4101165361 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (02040 18) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:b5 SRC=142.250.72.227 DST=24.205.212.17 LEN=181 TOS=0x00 PREC=0x00 TTL=56 ID=19018 PROTO=TCP SPT=443 DPT=49526 SEQ=4088750362 ACK=2446552118 WINDOW=266 RES=0x00 ACK PSH FIN URGP= OPT (0101080A0E6BFD6809231F72) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54853 DF PROTO=TCP SPT=25944 DPT=443 SEQ=1001939582 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=1.1.1.1 LEN=61 TOS=0x00 PREC=0x00 TTL=63 ID=5376 DF PROTO=UDP SPT=51368 DPT=53 LEN=41 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:3C:9B:D6:**:**:**:08:00 SRC=192.168.1.30 DST=216.239.35.0 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=4727 DF PROTO=UDP SPT=49537 DPT=123 LEN=56 DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=142.250.68.106 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=61500 PROTO=TCP SPT=443 DPT=48178 SEQ=3570997384 ACK=3063760238 WINDOW=265 RES=0x00 ACK FIN URGP=0 OPT (0101080A85934D0C000058D7) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=31233 DF PROTO=UDP SPT=35815 DPT=53 LEN=42 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=75 TOS=0x00 PREC=0x00 TTL=63 ID=31225 DF PROTO=UDP SPT=49029 DPT=53 LEN=55 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=216.239.35.4 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=31670 DF PROTO=UDP SPT=59212 DPT=123 LEN=56 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=31287 DF PROTO=UDP SPT=35067 DPT=53 LEN=40 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=172.217.5.195 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22740 DF PROTO=TCP SPT=40684 DPT=80 SEQ=3268308703 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 01360B0000000001030307) DROP IN=vlan2 OUT=vlan2 MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=167.99.92.106 DST=47.224.177.3 LEN=44 TOS=0x00 PREC=0x00 TTL=234 ID=27095 PROTO=TCP SPT=55703 DPT=34026 SEQ=3712179262 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (0204 218) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=62 TOS=0x00 PREC=0x00 TTL=63 ID=31305 DF PROTO=UDP SPT=47769 DPT=53 LEN=42 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=172.217.11.164 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=7956 DF PROTO=TCP SPT=32910 DPT=443 SEQ=2748197131 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 101361F0000000001030307) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54864 DF PROTO=TCP SPT=25945 DPT=443 SEQ=311172601 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.101.188 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=6823 DF PROTO=TCP SPT=39440 DPT=5228 SEQ=549137630 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080 010136790000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=69.171.250.34 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=26317 DF PROTO=TCP SPT=58950 DPT=443 SEQ=2182893675 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 10136A60000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=31319 DF PROTO=UDP SPT=49490 DPT=53 LEN=48 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=31466 DF PROTO=UDP SPT=40034 DPT=53 LEN=48 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.72.170 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=20266 DF PROTO=TCP SPT=48710 DPT=443 SEQ=2188146858 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080 010137800000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=31524 DF PROTO=UDP SPT=34088 DPT=53 LEN=44 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=31.13.65.1 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=48099 DF PROTO=TCP SPT=46852 DPT=443 SEQ=1134396383 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A010 383C0000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=79 TOS=0x00 PREC=0x00 TTL=63 ID=31533 DF PROTO=UDP SPT=1649 DPT=53 LEN=59 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.68.106 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=32314 DF PROTO=TCP SPT=35918 DPT=443 SEQ=4021765718 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080 0101386C0000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.68.3 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=41355 DF PROTO=TCP SPT=39934 DPT=443 SEQ=1345296654 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 0138850000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=31615 DF PROTO=UDP SPT=58653 DPT=53 LEN=45 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=172.217.14.106 LEN=1378 TOS=0x00 PREC=0x00 TTL=63 ID=14560 DF PROTO=UDP SPT=39265 DPT=443 LEN=1358 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=67 TOS=0x00 PREC=0x00 TTL=63 ID=31751 DF PROTO=UDP SPT=44348 DPT=53 LEN=47 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=54.165.207.178 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=28677 DF PROTO=TCP SPT=48736 DPT=443 SEQ=4067510660 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080 010139810000000001030307) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:28 SRC=87.251.70.56 DST=24.205.212.17 LEN=40 TOS=0x00 PREC=0x00 TTL=233 ID=46661 PROTO=TCP SPT=52100 DPT=13609 SEQ=1249597309 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=65 TOS=0x00 PREC=0x00 TTL=63 ID=31850 DF PROTO=UDP SPT=45261 DPT=53 LEN=45 DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51574 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A221391B90101250A) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=80.239.170.149 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=1541 DF PROTO=TCP SPT=40418 DPT=80 SEQ=878329835 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A01 139EE0000000001030307) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51575 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A221392E00101250A) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51576 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A221394080101250A) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51577 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A221396800101250A) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=32133 DF PROTO=UDP SPT=41243 DPT=53 LEN=48 ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54875 DF PROTO=TCP SPT=25946 DPT=443 SEQ=3609214324 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=13.225.148.17 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=852 DF PROTO=TCP SPT=47228 DPT=443 SEQ=1619212399 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A01 13B3B0000000001030307) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51578 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A22139B400101250A) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=71 TOS=0x00 PREC=0x00 TTL=63 ID=32409 DF PROTO=UDP SPT=52514 DPT=53 LEN=51 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=13.226.224.55 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=29556 DF PROTO=TCP SPT=40392 DPT=443 SEQ=2488225748 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 1013CA00000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=1.1.1.1 LEN=64 TOS=0x00 PREC=0x00 TTL=63 ID=39720 DF PROTO=UDP SPT=8493 DPT=53 LEN=44 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:10:A5:D0:**:**:**:08:00 SRC=192.168.1.4 DST=142.250.72.170 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=6308 DF PROTO=TCP SPT=55671 DPT=443 SEQ=3696788372 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 0009B300000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=81 TOS=0x00 PREC=0x00 TTL=63 ID=32555 DF PROTO=UDP SPT=60523 DPT=53 LEN=61 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.68.42 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=45152 DF PROTO=TCP SPT=39014 DPT=443 SEQ=1827376447 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 1013D5F0000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.68.42 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=49725 DF PROTO=TCP SPT=39016 DPT=443 SEQ=1295581026 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A 1013D5F0000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=70 TOS=0x00 PREC=0x00 TTL=63 ID=32599 DF PROTO=UDP SPT=48593 DPT=53 LEN=50 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=172.217.5.78 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22547 DF PROTO=TCP SPT=52090 DPT=443 SEQ=1299342726 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 013D950000000001030307) DROP IN=vlan2 OUT=vlan2 MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:2c SRC=45.148.10.50 DST=47.224.177.3 LEN=44 TOS=0x00 PREC=0x00 TTL=236 ID=54321 PROTO=TCP SPT=46885 DPT=8001 SEQ=1507713766 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (02040 18) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=69.171.250.34 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=84 ID=51579 DF PROTO=TCP SPT=443 DPT=58942 SEQ=1999966035 ACK=206709455 WINDOW=265 RES=0x00 ACK FIN URGP=0 OP (0101080A2213A4800101250A) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:34 SRC=142.250.68.106 DST=24.205.212.17 LEN=52 TOS=0x00 PREC=0x00 TTL=56 ID=1707 PROTO=TCP SPT=443 DPT=48178 SEQ=3570997384 ACK=3063760238 WINDOW=265 RES=0x00 ACK FIN URGP=0 OPT 0101080A8593790C000058D7) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=82 TOS=0x00 PREC=0x00 TTL=63 ID=33074 DF PROTO=UDP SPT=49205 DPT=53 LEN=62 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=142.250.188.234 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=42971 DF PROTO=TCP SPT=53604 DPT=443 SEQ=1993971832 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B4040208 A01013FA30000000001030307) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54886 DF PROTO=TCP SPT=25947 DPT=443 SEQ=2627672166 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B4010303080101040 ) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=59 TOS=0x00 PREC=0x00 TTL=63 ID=33121 DF PROTO=UDP SPT=61608 DPT=53 LEN=39 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=72 TOS=0x00 PREC=0x00 TTL=63 ID=33128 DF PROTO=UDP SPT=61537 DPT=53 LEN=52 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=38.90.227.24 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=12965 DF PROTO=TCP SPT=39820 DPT=443 SEQ=3215290926 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 01408B0000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=172.217.14.110 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=530 DF PROTO=TCP SPT=37776 DPT=443 SEQ=1752449671 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 0140950000000001030307) ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=1.1.1.1 LEN=68 TOS=0x00 PREC=0x00 TTL=63 ID=33245 DF PROTO=UDP SPT=44623 DPT=53 LEN=48 ACCEPT IN=br0 OUT=vlan2 MAC=E4:F4:C6:**:**:**:CC:21:19:**:**:**:08:00 SRC=192.168.1.6 DST=99.84.203.19 LEN=60 TOS=0x00 PREC=0x00 TTL=63 ID=22161 DF PROTO=TCP SPT=38902 DPT=443 SEQ=2760972194 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B40402080A0 0141330000000001030307) DROP IN=vlan2 OUT= MAC=E4:F4:C6:**:**:**:00:01:5C:**:**:**:08:00:45:00:00:b5 SRC=142.250.72.227 DST=24.205.212.17 LEN=181 TOS=0x00 PREC=0x00 TTL=56 ID=28151 PROTO=TCP SPT=443 DPT=49526 SEQ=4088750362 ACK=2446552118 WINDOW=266 RES=0x00 ACK PSH FIN URGP= OPT (0101080A0E6C3F6809231F72) ACCEPT IN=br0 OUT= MAC=E4:F4:C6:**:**:**:40:E2:30:**:**:**:08:00 SRC=192.168.1.2 DST=192.168.1.1 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=54897 DF PROTO=TCP SPT=25948 DPT=443 SEQ=562130227 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405B40103030801010402 cat /proc/cpuinfo model name : ARMv7 Processor rev 0 (v7l) processor : 0 BogoMIPS : 1987.37 Features : half fastmult edsp tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x3 CPU part : 0xc09 CPU revision : 0 model name : ARMv7 Processor rev 0 (v7l) processor : 1 BogoMIPS : 1993.93 Features : half fastmult edsp tls CPU implementer : 0x41 CPU architecture: 7 CPU variant : 0x3 CPU part : 0xc09 CPU revision : 0 Hardware : Northstar Prototype Revision : 0000 Serial : 0000000000000000 Startup echo 'nameserver 127.0.0.1' >> /etc/resolv.conf Custom Script sleep 1m && wl -i eth1 interference 23 && wl -i eth2 interference 23 && wl -i eth1 interference_override 23 && wl -i eth2 interference_override 23 cat /etc/resolv.conf search nv.charter.com search BLACK-ICE nameserver 192.168.1.1 nameserver 127.0.0.1 cat /tmp/resolv.conf search nv.charter.com search BLACK-ICE nameserver 192.168.1.1 nameserver 127.0.0.1 cat /tmp/hosts 127.0.0.1 localhost 192.168.1.1 R7000 192.168.1.1 R7000.BLACK-ICE cat /tmp/dnsmasq.conf interface=br0 resolv-file=/tmp/resolv.dnsmasq server=127.0.0.1#30 no-resolv domain=BLACK-ICE bogus-priv conf-file=/etc/rfc6761.conf conf-file=/etc/trust-anchors.conf dnssec dnssec-check-unsigned proxy-dnssec stop-dns-rebind dhcp-option=252," " dns-loop-detect dnssec-no-timecheck rebind-localhost-ok expand-hosts domain-needed rebind-domain-ok=/BLACK-ICE/ cache-size=10000 all-servers filterwin2k local=/R7000/ local=/R7000.BLACK-ICE/ server=/ordns.he.net/74.82.42.42 server=/ordns.he.net/2001:470:20::2 server=/or.isc.org/204.152.184.76 server=/or.isc.org/2001:4f8:0:2::14 server=/one.one.one.one/1.1.1.1 server=/one.one.one.one/1.0.0.1 server=/one.one.one.one/2606:4700:4700::1111 server=/one.one.one.one/2606:4700:4700::1001 log-queries=extra log-facility=/tmp/DNSCache.log cat /tmp/DNSCache.log Dec 31 16:00:12 dnsmasq[1000]: started, version 2.85 cachesize 10000 Dec 31 16:00:12 dnsmasq[1000]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack ipset no-auth cryptohash DNSSEC loop-detect no-inotify no-dumpfile Dec 31 16:00:12 dnsmasq[1000]: DNSSEC validation enabled Dec 31 16:00:12 dnsmasq[1000]: DNSSEC signature timestamps not checked until receipt of SIGINT Dec 31 16:00:12 dnsmasq[1000]: configured with trust anchor for keytag 20326 Dec 31 16:00:12 dnsmasq[1000]: warning: ignoring resolv-file flag because no-resolv is set Dec 31 16:00:12 dnsmasq[1000]: using nameserver 2606:4700:4700::1001#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 2606:4700:4700::1111#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 1.0.0.1#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 1.1.1.1#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 2001:4f8:0:2::14#53 for domain or.isc.org (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 204.152.184.76#53 for domain or.isc.org (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 2001:470:20::2#53 for domain ordns.he.net (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using nameserver 74.82.42.42#53 for domain ordns.he.net (no DNSSEC) Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain R7000.BLACK-ICE Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain R7000 Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain test Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain onion Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain localhost Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain local Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain invalid Dec 31 16:00:12 dnsmasq[1000]: using only locally-known addresses for domain bind Dec 31 16:00:12 dnsmasq[1000]: using nameserver 127.0.0.1#30 Dec 31 16:00:12 dnsmasq[1000]: read /etc/hosts - 3 addresses Dec 31 16:00:17 dnsmasq[1000]: exiting on receipt of SIGTERM Dec 31 16:00:17 dnsmasq[1299]: started, version 2.85 cachesize 10000 Dec 31 16:00:17 dnsmasq[1299]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack ipset no-auth cryptohash DNSSEC loop-detect no-inotify no-dumpfile Dec 31 16:00:17 dnsmasq[1299]: DNSSEC validation enabled Dec 31 16:00:17 dnsmasq[1299]: DNSSEC signature timestamps not checked until receipt of SIGINT Dec 31 16:00:17 dnsmasq[1299]: configured with trust anchor for keytag 20326 Dec 31 16:00:17 dnsmasq[1299]: warning: ignoring resolv-file flag because no-resolv is set Dec 31 16:00:17 dnsmasq[1299]: using nameserver 2606:4700:4700::1001#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 2606:4700:4700::1111#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 1.0.0.1#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 1.1.1.1#53 for domain one.one.one.one (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 2001:4f8:0:2::14#53 for domain or.isc.org (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 204.152.184.76#53 for domain or.isc.org (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 2001:470:20::2#53 for domain ordns.he.net (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using nameserver 74.82.42.42#53 for domain ordns.he.net (no DNSSEC) Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain R7000.BLACK-ICE Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain R7000 Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain test Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain onion Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain localhost Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain local Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain invalid Dec 31 16:00:17 dnsmasq[1299]: using only locally-known addresses for domain bind Dec 31 16:00:17 dnsmasq[1299]: using nameserver 127.0.0.1#30 Dec 31 16:00:17 dnsmasq[1299]: read /etc/hosts - 3 addresses Dec 31 16:00:18 dnsmasq[1299]: 1 192.168.1.1/37305 query[A] 2.pool.ntp.org from 192.168.1.1 Dec 31 16:00:18 dnsmasq[1299]: 1 192.168.1.1/37305 forwarded 2.pool.ntp.org to 127.0.0.1 Dec 31 16:00:18 dnsmasq[1299]: 2 192.168.1.1/37305 query[AAAA] 2.pool.ntp.org from 192.168.1.1 Dec 31 16:00:18 dnsmasq[1299]: 2 192.168.1.1/37305 forwarded 2.pool.ntp.org to 127.0.0.1 Dec 31 16:00:21 dnsmasq[1299]: 3 192.168.1.1/37305 query[A] 2.pool.ntp.org from 192.168.1.1 Dec 31 16:00:21 dnsmasq[1299]: 3 192.168.1.1/37305 forwarded 2.pool.ntp.org to 127.0.0.1 Dec 31 16:00:21 dnsmasq[1299]: 4 192.168.1.1/37305 query[AAAA] 2.pool.ntp.org from 192.168.1.1 Dec 31 16:00:21 dnsmasq[1299]: 4 192.168.1.1/37305 forwarded 2.pool.ntp.org to 127.0.0.1 Apr 13 05:07:53 dnsmasq[1299]: exiting on receipt of SIGTERM Apr 13 05:07:53 dnsmasq[1815]: started, version 2.85 cachesize 10000 Apr 13 05:07:53 dnsmasq[1815]: compile time options: IPv6 GNU-getopt no-DBus no-UBus no-i18n no-IDN DHCP DHCPv6 no-Lua no-TFTP no-conntrack ipset no-auth cryptohash DNSSEC loop-detect no-inotify no-dumpfile Apr 13 05:07:53 dnsmasq[1815]: DNSSEC validation enabled Apr 13 05:07:53 dnsmasq[1815]: DNSSEC signature timestamps not checked until receipt of SIGINT Apr 13 05:07:53 dnsmasq[1815]: configured with trust anchor for keytag 20326 Apr 13 05:07:53 dnsmasq[1815]: warning: ignoring resolv-file flag because no-resolv is set Apr 13 05:07:53 dnsmasq[1815]: using nameserver 2606:4700:4700::1001#53 for domain one.one.one.one (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 2606:4700:4700::1111#53 for domain one.one.one.one (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 1.0.0.1#53 for domain one.one.one.one (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 1.1.1.1#53 for domain one.one.one.one (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 2001:4f8:0:2::14#53 for domain or.isc.org (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 204.152.184.76#53 for domain or.isc.org (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 2001:470:20::2#53 for domain ordns.he.net (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using nameserver 74.82.42.42#53 for domain ordns.he.net (no DNSSEC) Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain R7000.BLACK-ICE Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain R7000 Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain test Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain onion Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain localhost Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain local Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain invalid Apr 13 05:07:53 dnsmasq[1815]: using only locally-known addresses for domain bind Apr 13 05:07:53 dnsmasq[1815]: using nameserver 127.0.0.1#30 Apr 13 05:07:53 dnsmasq[1815]: read /etc/hosts - 3 addresses cat /tmp/unbound.conf cat: can't open '/tmp/unbound.conf': No such file or directory