Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Wed Nov 11 01:27:22 2020 kern.err kernel: [ 27.957575] firmware ath10k!QCA9984!hw1.0!ct-firmware-2.bin: firmware_loading_store: map pages failed
- Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 27.957722] ath10k_pci 0001:01:00.0: Direct firmware load for ath10k/QCA9984/hw1.0/firmware-6.bin failed with error -2
- Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 27.965850] ath10k_pci 0001:01:00.0: Falling back to user helper
- Wed Nov 11 01:27:22 2020 kern.err kernel: [ 27.992848] firmware ath10k!QCA9984!hw1.0!firmware-6.bin: firmware_loading_store: map pages failed
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 27.992988] ath10k_pci 0001:01:00.0: qca9984/qca9994 hw1.0 target 0x01000000 chip_id 0x00000000 sub 168c:cafe
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 28.000792] ath10k_pci 0001:01:00.0: kconfig debug 0 debugfs 1 tracing 0 dfs 1 testmode 0
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 28.012983] ath10k_pci 0001:01:00.0: firmware ver 10.4b-ct-9984-fW-13-795874169 api 5 features mfp,peer-flow-ctrl,txstatus-noack,wmi-10.x-CT,ratemask-CT,regdump-CT,txrate-CT,flush-all-CT,pingpong-CT,ch-regs-CT,nop-CT,set-special-CT,tx-rc-CT,cust-stats-CT,txrate2-CT,beacon-cb-CT,wmi-block-ack-CT,wmi-bcn-rc-CT crc32 f3d4b769
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 30.338464] ath10k_pci 0001:01:00.0: board_file api 2 bmi_id 0:2 crc32 85498734
- Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 36.185396] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Wed Nov 11 01:27:22 2020 kern.warn kernel: [ 36.185424] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.269438] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.270313] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
- Wed Nov 11 01:27:22 2020 kern.info kernel: [ 36.553493] ath10k_pci 0001:01:00.0: htt-ver 2.2 wmi-op 6 htt-op 4 cal pre-cal-file max-sta 32 raw 0 hwcrypto 1
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652936] ath: EEPROM regdomain: 0x0
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652949] ath: EEPROM indicates default country code should be used
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652958] ath: doing EEPROM country->regdmn map search
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652973] ath: country maps to regdmn code: 0x3a
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652984] ath: Country alpha2 being used: US
- Wed Nov 11 01:27:22 2020 kern.debug kernel: [ 36.652992] ath: Regpair used: 0x3a
- Wed Nov 11 01:27:22 2020 user.info kernel: [ 36.661190] kmodloader: done loading kernel modules from /etc/modules.d/*
- Wed Nov 11 01:27:23 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Nov 11 01:27:23 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: started, version 2.80 cachesize 150
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: DNS service limited to local subnets
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain test
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain onion
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain localhost
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain local
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain invalid
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain bind
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5056
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5055
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5054
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using nameserver 127.0.0.1#5053
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: using local addresses only for domain lan
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:23 2020 daemon.info dnsmasq[1078]: read /tmp/hosts/dhcp.cfg01411c - 132 addresses
- Wed Nov 11 01:27:24 2020 authpriv.info dropbear[1111]: Not backgrounding
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: 8021ad
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: 8021q
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: macvlan
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: veth
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: bridge
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: Network device
- Wed Nov 11 01:27:25 2020 user.notice : Added device handler type: tunnel
- Wed Nov 11 01:27:25 2020 user.info adblock-4.0.7[1232]: adblock instance started ::: action: start, priority: 0, pid: 1232
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.979573] Generic PHY fixed-0:01: attached PHY driver [Generic PHY] (mii_bus:phy_addr=fixed-0:01, irq=POLL)
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.980718] dwmac1000: Master AXI performs any burst length
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.988580] ipq806x-gmac-dwmac 37400000.ethernet eth1: IEEE 1588-2008 Advanced Timestamp supported
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 40.994052] ipq806x-gmac-dwmac 37400000.ethernet eth1: registered PTP clock
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.003071] IPv6: ADDRCONF(NETDEV_UP): eth1: link is not ready
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.026879] br-lan: port 1(eth1.1) entered blocking state
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.026944] br-lan: port 1(eth1.1) entered disabled state
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.031600] device eth1.1 entered promiscuous mode
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.036748] device eth1 entered promiscuous mode
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is enabled
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is setting up now
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'lan' is now up
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is enabled
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is setting up now
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' is now up
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.053720] IPv6: ADDRCONF(NETDEV_UP): br-lan: link is not ready
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.065507] Generic PHY fixed-0:00: attached PHY driver [Generic PHY] (mii_bus:phy_addr=fixed-0:00, irq=POLL)
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.066828] dwmac1000: Master AXI performs any burst length
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.074483] ipq806x-gmac-dwmac 37200000.ethernet eth0: IEEE 1588-2008 Advanced Timestamp supported
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.079950] ipq806x-gmac-dwmac 37200000.ethernet eth0: registered PTP clock
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.089657] IPv6: ADDRCONF(NETDEV_UP): eth0: link is not ready
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'wan' is enabled
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'wan6' is enabled
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Network device 'lo' link is up
- Wed Nov 11 01:27:26 2020 daemon.notice netifd: Interface 'loopback' has link connectivity
- Wed Nov 11 01:27:26 2020 kern.info kernel: [ 41.114522] IPv6: ADDRCONF(NETDEV_UP): eth0.2: link is not ready
- Wed Nov 11 01:27:27 2020 daemon.warn dnsmasq[1078]: Ignoring query from non-local network
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.674669] print_req_error: I/O error, dev mtdblock0, sector 0
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.675103] print_req_error: I/O error, dev mtdblock0, sector 8
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.679797] print_req_error: I/O error, dev mtdblock0, sector 16
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.687053] print_req_error: I/O error, dev mtdblock0, sector 24
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.695442] print_req_error: I/O error, dev mtdblock0, sector 0
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.697534] Buffer I/O error on dev mtdblock0, logical block 0, async page read
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.705132] print_req_error: I/O error, dev mtdblock1, sector 0
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.710871] print_req_error: I/O error, dev mtdblock1, sector 8
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.716820] print_req_error: I/O error, dev mtdblock1, sector 16
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.722659] print_req_error: I/O error, dev mtdblock1, sector 24
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.729074] print_req_error: I/O error, dev mtdblock1, sector 0
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.734518] Buffer I/O error on dev mtdblock1, logical block 0, async page read
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.845326] ntfs: (device sda2): parse_ntfs_boot_sector(): Volume size (2TiB) is too large for this architecture. Maximum supported is 2TiB. Sorry.
- Wed Nov 11 01:27:27 2020 kern.err kernel: [ 41.845361] ntfs: (device sda2): ntfs_fill_super(): Unsupported NTFS filesystem.
- Wed Nov 11 01:27:27 2020 daemon.err block: mounting /dev/sda2 (ntfs) as /mnt/sda2 failed (22) - Not a tty
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.019652] ath: EEPROM regdomain: 0x807c
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.019672] ath: EEPROM indicates we should expect a country code
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.022633] ath: doing EEPROM country->regdmn map search
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.028821] ath: country maps to regdmn code: 0x3a
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.034139] ath: Country alpha2 being used: CA
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.038691] ath: Regpair used: 0x3a
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.043117] ath: regdomain 0x807c dynamically updated by user
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.046595] ath: EEPROM regdomain: 0x807c
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.052404] ath: EEPROM indicates we should expect a country code
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.056474] ath: doing EEPROM country->regdmn map search
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.062477] ath: country maps to regdmn code: 0x3a
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.067909] ath: Country alpha2 being used: CA
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.072460] ath: Regpair used: 0x3a
- Wed Nov 11 01:27:27 2020 kern.debug kernel: [ 42.076940] ath: regdomain 0x807c dynamically updated by user
- Wed Nov 11 01:27:27 2020 cron.info crond[1733]: crond (busybox 1.30.1) started, log level 5
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.117017] ipq806x-gmac-dwmac 37400000.ethernet eth1: Link is Up - 1Gbps/Full - flow control off
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Network device 'eth1' link is up
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.121647] IPv6: ADDRCONF(NETDEV_CHANGE): eth1: link becomes ready
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.126310] br-lan: port 1(eth1.1) entered blocking state
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.130951] br-lan: port 1(eth1.1) entered forwarding state
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: VLAN 'eth1.1' link is up
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: bridge 'br-lan' link is up
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'lan' has link connectivity
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.140046] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.154234] ipq806x-gmac-dwmac 37200000.ethernet eth0: Link is Up - 1Gbps/Full - flow control off
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.154277] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Network device 'eth0' link is up
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: VLAN 'eth0.2' link is up
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan' has link connectivity
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan' is setting up now
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan6' has link connectivity
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: Interface 'wan6' is setting up now
- Wed Nov 11 01:27:27 2020 kern.info kernel: [ 42.166612] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.2: link becomes ready
- Wed Nov 11 01:27:27 2020 daemon.notice netifd: wan (1799): udhcpc: started, v1.30.1
- Wed Nov 11 01:27:28 2020 daemon.err odhcp6c[1810]: Failed to send RS (Address not available)
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: sending discover
- Wed Nov 11 01:27:28 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: sending select for 24.57.18.56
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: wan (1799): udhcpc: lease of 24.57.18.56 obtained, lease time 37887
- Wed Nov 11 01:27:28 2020 user.notice SQM: Starting SQM script: simple.qos on eth1, in: 85000 Kbps, out: 10000 Kbps
- Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: Starting SQM script: simple.qos on eth1, in: 85000 Kbps, out: 10000 Kbps
- Wed Nov 11 01:27:28 2020 user.notice SQM: Using generic sqm_start_default function.
- Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: Using generic sqm_start_default function.
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: Interface 'wan' is now up
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: radio1 (1382): command failed: Not supported (-95)
- Wed Nov 11 01:27:28 2020 user.notice mac80211: Failed command: iw phy phy1 set distance 0
- Wed Nov 11 01:27:28 2020 daemon.err odhcp6c[1810]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
- Wed Nov 11 01:27:28 2020 daemon.notice netifd: radio0 (1381): command failed: Not supported (-95)
- Wed Nov 11 01:27:28 2020 user.notice mac80211: Failed command: iw phy phy0 set distance 0
- Wed Nov 11 01:27:28 2020 user.notice SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
- Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
- Wed Nov 11 01:27:28 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy1.conf
- Wed Nov 11 01:27:28 2020 user.notice SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
- Wed Nov 11 01:27:28 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: get_burst (by duration): the calculated burst/quantum size of 1250 bytes was below the minimum of 1749 bytes.
- Wed Nov 11 01:27:29 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:29 2020 daemon.err odhcpd[1570]: Failed to send to ff02::1%lan@br-lan (Address not available)
- Wed Nov 11 01:27:29 2020 daemon.err odhcp6c[1810]: Failed to send DHCPV6 message to ff02::1:2 (Address not available)
- Wed Nov 11 01:27:30 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:31 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:32 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'youtube' failed, url: https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 19, log: 11/11 01:27:26 [[1;32mNOTICE[0m] Downloading 1 item(s) 11/11 01:27:32 [[1;31mERROR[0m] CUID#7 - Download aborted. URI=https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://raw.githubusercontent.com/kboghdady/youTube_ads_4_pi-hole/master/black.list -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname raw.githubusercontent.com, cause: Try again 11/11 01:27:32 [[1;32mNOTICE[0m] Download GID#d0dffe0d24a9bf5d not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.youtube.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= d0dffe|ERR | 0B/s|//tmp/tmp.aIpjnk/
- Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'adguard' failed, url: https://filters.adtidy.org/windows/filters/15.txt, rule: BEGIN{FS="[/|^|\r]"}/^\|\|([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+[\/\^\r]+$/{print tolower($3)}, categories: -, rc: 19, log: 11/11 01:27:26 [[1;32mNOTICE[0m] Downloading 1 item(s) 11/11 01:27:32 [[1;31mERROR[0m] CUID#7 - Download aborted. URI=https://filters.adtidy.org/windows/filters/15.txt Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://filters.adtidy.org/windows/filters/15.txt -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname filters.adtidy.org, cause: Try again 11/11 01:27:32 [[1;32mNOTICE[0m] Download GID#0848868e2928c62c not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.adguard.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= 084886|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.adguard.load Status Legend: (ERR):error occurred. aria2 will resume download
- Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'malwarelist' failed, url: https://www.malwaredomainlist.com/hostslist/hosts.txt, rule: /^127\.0\.0\.1[[:space:]]+([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($2)}, categories: -, rc: 19, log: 11/11 01:27:26 [[1;32mNOTICE[0m] Downloading 1 item(s) 11/11 01:27:32 [[1;31mERROR[0m] CUID#7 - Download aborted. URI=https://www.malwaredomainlist.com/hostslist/hosts.txt Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://www.malwaredomainlist.com/hostslist/hosts.txt -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname www.malwaredomainlist.com, cause: Try again 11/11 01:27:32 [[1;32mNOTICE[0m] Download GID#f84a8848dfa62cb1 not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.malwarelist.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= f84a88|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.malwarelist.load Status Legend: (ERR):error oc
- Wed Nov 11 01:27:32 2020 user.info adblock-4.0.7[1232]: download of 'malwaredomains' failed, url: https://mirror1.malwaredomains.com/files/justdomains, rule: /^([[:alnum:]_-]{1,63}\.)+[[:alpha:]]+([[:space:]]|$)/{print tolower($1)}, categories: -, rc: 19, log: 11/11 01:27:26 [[1;32mNOTICE[0m] Downloading 1 item(s) 11/11 01:27:32 [[1;31mERROR[0m] CUID#7 - Download aborted. URI=https://mirror1.malwaredomains.com/files/justdomains Exception: [AbstractCommand.cc:351] errorCode=19 URI=https://mirror1.malwaredomains.com/files/justdomains -> [NameResolver.cc:60] errorCode=19 Failed to resolve the hostname mirror1.malwaredomains.com, cause: Try again 11/11 01:27:32 [[1;32mNOTICE[0m] Download GID#4ff11352faddb678 not complete: //tmp/tmp.aIpjnk/tmp.eImIKj.malwaredomains.load Download Results: gid |stat|avg speed |path/URI ======+====+===========+======================================================= 4ff113|ERR | 0B/s|//tmp/tmp.aIpjnk/tmp.eImIKj.malwaredomains.load Status Legend: (ERR):error occurred. aria2 wi
- Wed Nov 11 01:27:33 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:34 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:34 2020 kern.warn kernel: [ 49.256043] ath10k_pci 0001:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Wed Nov 11 01:27:34 2020 kern.warn kernel: [ 49.256070] ath10k_pci 0001:01:00.0: msdu-desc: 2500 skid: 32
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.339877] ath10k_pci 0001:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.340771] ath10k_pci 0001:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
- Wed Nov 11 01:27:35 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:35 2020 kern.warn kernel: [ 49.746003] ath10k_pci 0001:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.746281] IPv6: ADDRCONF(NETDEV_UP): wlan1: link is not ready
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.766063] br-lan: port 2(wlan1) entered blocking state
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.766089] br-lan: port 2(wlan1) entered disabled state
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.770607] device wlan1 entered promiscuous mode
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.775871] br-lan: port 2(wlan1) entered blocking state
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.780340] br-lan: port 2(wlan1) entered forwarding state
- Wed Nov 11 01:27:35 2020 daemon.notice hostapd: wlan1: interface state UNINITIALIZED->COUNTRY_UPDATE
- Wed Nov 11 01:27:35 2020 daemon.notice hostapd: wlan1: interface state COUNTRY_UPDATE->HT_SCAN
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 49.824367] br-lan: port 2(wlan1) entered disabled state
- Wed Nov 11 01:27:35 2020 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
- Wed Nov 11 01:27:35 2020 kern.info kernel: [ 50.254934] ath10k_pci 0001:01:00.0: NOTE: Firmware DBGLOG output disabled in debug_mask: 0x10000000
- Wed Nov 11 01:27:36 2020 daemon.info dnsmasq[1078]: exiting on receipt of SIGTERM
- Wed Nov 11 01:27:36 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:36 2020 user.info : dnscrypt-proxy - [fvz-anyone] does not support DNS Security Extensions
- Wed Nov 11 01:27:36 2020 user.info : dnscrypt-proxy + Provider supposedly doesn't keep logs
- Wed Nov 11 01:27:36 2020 daemon.notice dnscrypt-proxy[3087]: dnscrypt-proxy Starting dnscrypt-proxy 1.9.5
- Wed Nov 11 01:27:36 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Generating a new session key pair
- Wed Nov 11 01:27:37 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Done
- Wed Nov 11 01:27:37 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: Giving up on getting lock after 10 attempts
- Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: This is a bug; please report it at https://github.com/tohojo/sqm-scripts/issues
- Wed Nov 11 01:27:38 2020 user.notice SQM: ERROR: Then, to re-enable sqm-scripts, manually remove /var/run/sqm/sqm-run.lock
- Wed Nov 11 01:27:38 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:39 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:40 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:41 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.327720] ath10k_pci 0000:01:00.0: 10.4 wmi init: vdevs: 16 peers: 48 tid: 96
- Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.327746] ath10k_pci 0000:01:00.0: msdu-desc: 2500 skid: 32
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.409606] ath10k_pci 0000:01:00.0: wmi print 'P 48/48 V 16 K 144 PH 176 T 186 msdu-desc: 2500 sw-crypt: 0 ct-sta: 0'
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.410430] ath10k_pci 0000:01:00.0: wmi print 'free: 84920 iram: 13316 sram: 11224'
- Wed Nov 11 01:27:42 2020 kern.warn kernel: [ 56.761788] ath10k_pci 0000:01:00.0: Firmware lacks feature flag indicating a retry limit of > 2 is OK, requested limit: 4
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.761911] IPv6: ADDRCONF(NETDEV_UP): wlan0: link is not ready
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: started, version 2.80 cachesize 150
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: DNS service limited to local subnets
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq-dhcp[3030]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain test
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain onion
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain localhost
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain local
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain invalid
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain bind
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5056
- Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' is now up
- Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' has lost the connection
- Wed Nov 11 01:27:42 2020 daemon.notice hostapd: 20/40 MHz operation not permitted on channel pri=6 sec=10 based on overlapping BSSes
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5055
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5054
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using nameserver 127.0.0.1#5053
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: using local addresses only for domain lan
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:42 2020 daemon.err hostapd: Using interface wlan1 with hwaddr dc:ef:09:e5:75:3d and ssid "733MCKAY"
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.826536] br-lan: port 3(wlan0) entered blocking state
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.826562] br-lan: port 3(wlan0) entered disabled state
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 56.831132] device wlan0 entered promiscuous mode
- Wed Nov 11 01:27:42 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->COUNTRY_UPDATE
- Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan0: interface state COUNTRY_UPDATE->HT_SCAN
- Wed Nov 11 01:27:42 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.158374] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.158500] br-lan: port 2(wlan1) entered blocking state
- Wed Nov 11 01:27:42 2020 kern.info kernel: [ 57.163788] br-lan: port 2(wlan1) entered forwarding state
- Wed Nov 11 01:27:42 2020 daemon.notice netifd: Interface 'wan6' is now up
- Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan1: interface state HT_SCAN->ENABLED
- Wed Nov 11 01:27:42 2020 daemon.notice hostapd: wlan1: AP-ENABLED
- Wed Nov 11 01:27:42 2020 daemon.err hostapd: Using interface wlan0 with hwaddr dc:ef:09:e5:75:3c and ssid "733MCKAY-5GHz"
- Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.508930] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready
- Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.509074] br-lan: port 3(wlan0) entered blocking state
- Wed Nov 11 01:27:43 2020 kern.info kernel: [ 57.514438] br-lan: port 3(wlan0) entered forwarding state
- Wed Nov 11 01:27:43 2020 daemon.notice hostapd: wlan0: interface state HT_SCAN->ENABLED
- Wed Nov 11 01:27:43 2020 daemon.notice hostapd: wlan0: AP-ENABLED
- Wed Nov 11 01:27:43 2020 daemon.notice netifd: Network device 'wlan1' link is up
- Wed Nov 11 01:27:43 2020 daemon.notice netifd: Network device 'wlan0' link is up
- Wed Nov 11 01:27:43 2020 user.notice SQM: WARNING: Unable to get run lock - already held by 1831
- Wed Nov 11 01:27:43 2020 daemon.warn odhcpd[1570]: A default route is present but there is no public prefix on lan thus we don't announce a default route!
- Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPDISCOVER(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
- Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPOFFER(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
- Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee
- Wed Nov 11 01:27:43 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.201 bc:ae:c5:59:21:ee PHENOM-II-X6
- Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c.3208 - 53 addresses
- Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 0 addresses
- Wed Nov 11 01:27:44 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:44 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:27:44 2020 user.info banIP-0.3.11[3206]: banIP is currently disabled, please set ban_enabled to '1' to use this service
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 IEEE 802.11: authenticated
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 IEEE 802.11: associated (aid 1)
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.569838] br-lan: port 4(wlan1.sta1) entered blocking state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.569864] br-lan: port 4(wlan1.sta1) entered disabled state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.574781] device wlan1.sta1 entered promiscuous mode
- Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: WDS-STA-INTERFACE-ADDED ifname=wlan1.sta1 sta_addr=84:c9:b2:58:77:63
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.581391] br-lan: port 4(wlan1.sta1) entered blocking state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 58.585375] br-lan: port 4(wlan1.sta1) entered forwarding state
- Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:c9:b2:58:77:63
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 RADIUS: starting accounting session BE43098CB13A5B31
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 84:c9:b2:58:77:63 WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:27:44 2020 user.notice SQM: simple.qos was started on eth1 successfully
- Wed Nov 11 01:27:44 2020 daemon.notice procd: /etc/rc.d/S50sqm: SQM: simple.qos was started on eth1 successfully
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de IEEE 802.11: authenticated
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de IEEE 802.11: associated (aid 2)
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.174616] br-lan: port 5(wlan1.sta2) entered blocking state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.174641] br-lan: port 5(wlan1.sta2) entered disabled state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.179521] device wlan1.sta2 entered promiscuous mode
- Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: WDS-STA-INTERFACE-ADDED ifname=wlan1.sta2 sta_addr=00:26:5a:c8:e8:de
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.199334] br-lan: port 5(wlan1.sta2) entered blocking state
- Wed Nov 11 01:27:44 2020 kern.info kernel: [ 59.199363] br-lan: port 5(wlan1.sta2) entered forwarding state
- Wed Nov 11 01:27:44 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 00:26:5a:c8:e8:de
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de RADIUS: starting accounting session BCB5334CDB422B2F
- Wed Nov 11 01:27:44 2020 daemon.info hostapd: wlan1: STA 00:26:5a:c8:e8:de WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 2 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:27:45 2020 daemon.notice procd: /etc/rc.d/S60dbus: dbus[3727]: Unknown group "netdev" in message bus configuration file
- Wed Nov 11 01:27:45 2020 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/odhcpd - 2 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq[3030]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:45 2020 daemon.info dnsmasq-dhcp[3030]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Found user 'nobody' (UID 65534) and group 'nogroup' (GID 65534).
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Successfully dropped root privileges.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: avahi-daemon 0.8 starting up.
- Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: WARNING: No NSS support for mDNS detected, consider installing nss-mdns!
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: No service file found in /etc/avahi/services.
- Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: *** WARNING: Detected another IPv4 mDNS stack running on this host. This makes mDNS unreliable and is thus not recommended. ***
- Wed Nov 11 01:27:45 2020 daemon.warn avahi-daemon[3813]: bind() failed: Address in use
- Wed Nov 11 01:27:45 2020 daemon.notice avahi-daemon[3813]: Failed to create IPv4 socket, proceeding in IPv6 only mode
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.sta2.IPv6 with address fe80::deef:9ff:fee5:753d.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.sta2.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.sta1.IPv6 with address fe80::deef:9ff:fee5:753d.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.sta1.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan0.IPv6 with address fe80::deef:9ff:fee5:753c.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan0.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface wlan1.IPv6 with address fe80::deef:9ff:fee5:753d.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface wlan1.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth0.2.IPv6 with address 2001:1970:4000:d8:9d78:fc30:66e3:45df.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth0.2.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface br-lan.IPv6 with address fd7d:6174:287a::1.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface br-lan.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth1.IPv6 with address fe80::deef:9ff:fee5:753a.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth1.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface eth0.IPv6 with address fe80::deef:9ff:fee5:753b.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface eth0.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Joining mDNS multicast group on interface lo.IPv6 with address ::1.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: New relevant interface lo.IPv6 for mDNS.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Network interface enumeration completed.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.sta2.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.sta1.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753c on wlan0.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753d on wlan1.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for 2001:1970:4000:d8:9d78:fc30:66e3:45df on eth0.2.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fd7d:6174:287a::1 on br-lan.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for 2001:1970:5d2a:c500::1 on br-lan.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753a on eth1.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for fe80::deef:9ff:fee5:753b on eth0.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering new address record for ::1 on lo.*.
- Wed Nov 11 01:27:45 2020 daemon.info avahi-daemon[3813]: Registering HINFO record with values 'ARMV7L'/'LINUX'.
- Wed Nov 11 01:27:45 2020 daemon.notice ntpd[3911]: ntpd 4.2.8p15@1.3728-o Sun Sep 6 16:19:39 UTC 2020 (1): Starting
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: Command line: /sbin/ntpd -g -u ntp:ntp -p /var/run/ntpd.pid -n -c /var/etc/ntpd.conf
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ----------------------------------------------------
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ntp-4 is maintained by Network Time Foundation,
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: corporation. Support and training for ntp-4 are
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: available at https://www.nwtime.org/support
- Wed Nov 11 01:27:46 2020 daemon.notice ntpd[3911]: ----------------------------------------------------
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: proto: precision = 2.560 usec (-18)
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: basedate set to 2020-08-25
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: gps base set to 2020-08-30 (week 2121)
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen and drop on 0 v6wildcard [::]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen and drop on 1 v4wildcard 0.0.0.0:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 2 lo 127.0.0.1:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 3 br-lan 192.168.1.1:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 4 eth0.2 24.57.18.56:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 5 lo [::1]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 6 eth0 [fe80::deef:9ff:fee5:753b%2]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 7 eth1 [fe80::deef:9ff:fee5:753a%3]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 8 br-lan [2001:1970:5d2a:c500::1]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 9 br-lan [fd7d:6174:287a::1]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 10 br-lan [fe80::deef:9ff:fee5:753a%10]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 11 eth0.2 [2001:1970:4000:d8:9d78:fc30:66e3:45df]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 12 eth0.2 [fe80::deef:9ff:fee5:753b%12]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 13 ifb4eth1 [fe80::a049:9bff:fee8:cd9b%20]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 14 wlan1 [fe80::deef:9ff:fee5:753d%21]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 15 wlan0 [fe80::deef:9ff:fee5:753c%22]:123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listen normally on 16 wlan1.sta1 [fe80::deef:9ff:fee5:753d%24]:123
- Wed Nov 11 01:27:46 2020 daemon.err ntpd[3911]: bind(65) AF_INET6 fe80::deef:9ff:fee5:753d%25#123 flags 0x11 failed: Address not available
- Wed Nov 11 01:27:46 2020 daemon.err ntpd[3911]: unable to create socket on wlan1.sta2 (17) for fe80::deef:9ff:fee5:753d%25#123
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: failed to init interface for address fe80::deef:9ff:fee5:753d%25
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: Listening on routing socket on fd #65 for interface updates
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
- Wed Nov 11 01:27:46 2020 daemon.info ntpd[3911]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
- Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe IEEE 802.11: authenticated
- Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe IEEE 802.11: associated (aid 3)
- Wed Nov 11 01:27:46 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED ac:ae:19:b4:ba:fe
- Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe RADIUS: starting accounting session 978D305E157CFC4B
- Wed Nov 11 01:27:46 2020 daemon.info hostapd: wlan1: STA ac:ae:19:b4:ba:fe WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:27:46 2020 daemon.info avahi-daemon[3813]: Server startup complete. Host name is Nighthawk.local. Local service cookie is 4000022860.
- Wed Nov 11 01:27:46 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.242 ac:ae:19:b4:ba:fe
- Wed Nov 11 01:27:46 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.242 ac:ae:19:b4:ba:fe RokuBox
- Wed Nov 11 01:27:47 2020 user.info banIP-0.3.11[4004]: banIP is currently disabled, please set ban_enabled to '1' to use this service
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: configfile: stat (/etc/collectd/conf.d) failed: No such file or directory
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "iwinfo" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "memory" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "cpu" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "rrdtool" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: rrdtool plugin: RRASingle = true: creating only AVERAGE RRAs
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "interface" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "sensors" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "load" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: plugin_load: plugin "thermal" successfully loaded.
- Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f IEEE 802.11: authenticated
- Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f IEEE 802.11: associated (aid 1)
- Wed Nov 11 01:27:47 2020 daemon.err collectd[4336]: Initialization complete, entering read-loop.
- Wed Nov 11 01:27:47 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 9c:b6:d0:0f:b6:2f
- Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f RADIUS: starting accounting session 9532EDC3A17CDF85
- Wed Nov 11 01:27:47 2020 daemon.info hostapd: wlan0: STA 9c:b6:d0:0f:b6:2f WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:27:47 2020 daemon.info dnsmasq-dhcp[3030]: DHCPREQUEST(br-lan) 192.168.1.200 9c:b6:d0:0f:b6:2f
- Wed Nov 11 01:27:47 2020 daemon.info dnsmasq-dhcp[3030]: DHCPACK(br-lan) 192.168.1.200 9c:b6:d0:0f:b6:2f XOTICPC
- Wed Nov 11 01:27:49 2020 daemon.info ntpd[3911]: Listen normally on 18 wlan1.sta2 [fe80::deef:9ff:fee5:753d%25]:123
- Wed Nov 11 01:27:49 2020 daemon.debug ntpd[3911]: new interface(s) found: waking up resolver
- Wed Nov 11 01:27:49 2020 daemon.info dnsmasq[3030]: exiting on receipt of SIGTERM
- Wed Nov 11 01:27:50 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Nov 11 01:27:50 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Nov 11 01:27:50 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Nov 11 01:27:50 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Nov 11 01:27:50 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 IEEE 802.11: authenticated
- Wed Nov 11 01:27:50 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 IEEE 802.11: associated (aid 4)
- Wed Nov 11 01:27:52 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED c8:d3:ff:57:d5:c4
- Wed Nov 11 01:27:52 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 RADIUS: starting accounting session 206DCD5F02CA28B5
- Wed Nov 11 01:27:52 2020 daemon.info hostapd: wlan1: STA c8:d3:ff:57:d5:c4 WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:27:52 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:27:52 2020 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[3911]: ntpd exiting on signal 15 (Terminated)
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 45.55.9.9 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 108.59.2.24 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 2001:470:1d:1bb::1 local addr 2001:1970:5d2a:c500::1 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 198.27.76.102 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 206.108.0.133 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 209.115.181.102 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 162.159.200.1 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 13.86.101.172 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 2610:20:6f15:15::27 local addr 2001:1970:5d2a:c500::1 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 131.107.13.100 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 129.6.15.28 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 129.6.15.29 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[3911]: 52.1.151.223 local addr 24.57.18.56 -> <null>
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ntpd 4.2.8p15@1.3728-o Sun Sep 6 16:19:39 UTC 2020 (1): Starting
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: Command line: /sbin/ntpd -g -u ntp:ntp -p /var/run/ntpd.pid -n -c /var/etc/ntpd.conf
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ----------------------------------------------------
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ntp-4 is maintained by Network Time Foundation,
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: corporation. Support and training for ntp-4 are
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: available at https://www.nwtime.org/support
- Wed Nov 11 01:27:52 2020 daemon.notice ntpd[4875]: ----------------------------------------------------
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: proto: precision = 2.400 usec (-19)
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: basedate set to 2020-08-25
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: gps base set to 2020-08-30 (week 2121)
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen and drop on 0 v6wildcard [::]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen and drop on 1 v4wildcard 0.0.0.0:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 2 lo 127.0.0.1:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 3 br-lan 192.168.1.1:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 4 eth0.2 24.57.18.56:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 5 lo [::1]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 6 eth0 [fe80::deef:9ff:fee5:753b%2]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 7 eth1 [fe80::deef:9ff:fee5:753a%3]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 8 br-lan [2001:1970:5d2a:c500::1]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 9 br-lan [fd7d:6174:287a::1]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 10 br-lan [fe80::deef:9ff:fee5:753a%10]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 11 eth0.2 [2001:1970:4000:d8:9d78:fc30:66e3:45df]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 12 eth0.2 [fe80::deef:9ff:fee5:753b%12]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 13 ifb4eth1 [fe80::a049:9bff:fee8:cd9b%20]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 14 wlan1 [fe80::deef:9ff:fee5:753d%21]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 15 wlan0 [fe80::deef:9ff:fee5:753c%22]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 16 wlan1.sta1 [fe80::deef:9ff:fee5:753d%24]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listen normally on 17 wlan1.sta2 [fe80::deef:9ff:fee5:753d%25]:123
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: Listening on routing socket on fd #66 for interface updates
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
- Wed Nov 11 01:27:52 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
- Wed Nov 11 01:27:52 2020 user.info banIP-0.3.11[4873]: banIP is currently disabled, please set ban_enabled to '1' to use this service
- Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: HTTP listening on port 5000
- Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: HTTP IPv6 address given to control points : [fd7d:6174:287a::1]
- Wed Nov 11 01:27:52 2020 daemon.notice miniupnpd[5020]: Listening for NAT-PMP/PCP traffic on port 5351
- Wed Nov 11 01:27:53 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:27:53 2020 user.notice firewall: Reloading firewall due to ifup of wan6 (eth0.2)
- Wed Nov 11 01:27:53 2020 user.notice ddns-scripts[5075]: myddns_ipv4: PID '5075' started at 2020-11-11 01:27
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: started, version 2.80 cachesize 150
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: DNS service limited to local subnets
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq-dhcp[5229]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain test
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain onion
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain localhost
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain local
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain invalid
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain bind
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain googlevideo.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain checkmyip.torrentprivacy.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain torrentprivacy.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain cbcdn.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain httpi.jsrdn.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain windsorstar.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain postmedia.digital
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using standard nameservers for domain beap.gemini.yahoo.com
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5056
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5055
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5054
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using nameserver 127.0.0.1#5053
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: using local addresses only for domain lan
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 4 addresses
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c.4437 - 132 addresses
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:53 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:27:53 2020 user.warn ddns-scripts[5075]: myddns_ipv4: Service section disabled! - TERMINATE
- Wed Nov 11 01:27:53 2020 user.warn ddns-scripts[5075]: myddns_ipv4: PID '5075' exit WITH ERROR '1' at 2020-11-11 01:27
- Wed Nov 11 01:27:54 2020 user.info banIP-0.3.11[5416]: banIP is currently disabled, please set ban_enabled to '1' to use this service
- Wed Nov 11 01:27:54 2020 user.notice ddns-scripts[5469]: myddns_ipv6: PID '5469' started at 2020-11-11 01:27
- Wed Nov 11 01:27:54 2020 user.warn ddns-scripts[5469]: myddns_ipv6: Service section disabled! - TERMINATE
- Wed Nov 11 01:27:54 2020 user.warn ddns-scripts[5469]: myddns_ipv6: PID '5469' exit WITH ERROR '1' at 2020-11-11 01:27
- Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/dhcp
- Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/radvd
- Wed Nov 11 01:27:54 2020 user.notice ucitrack: Setting up /etc/config/wireless reload dependency on /etc/config/network
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/luci-splash
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/qos
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/miniupnpd
- Wed Nov 11 01:27:55 2020 user.info adblock-4.0.7[1232]: blocklist with overall 42174 blocked domains loaded successfully (Netgear Nighthawk X4S R7800, OpenWrt 19.07.4 r11208-ce6496d796)
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/firewall reload dependency on /etc/config/sqm
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/odhcpd
- Wed Nov 11 01:27:55 2020 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
- Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
- Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/luci_statistics
- Wed Nov 11 01:27:56 2020 user.notice ucitrack: Setting up /etc/config/system reload dependency on /etc/config/dhcp
- Wed Nov 11 01:27:57 2020 daemon.notice procd: /etc/rc.d/S90noddos:
- Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 6 addresses
- Wed Nov 11 01:27:58 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:27:58 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a4312115 does not match aorg 0000000000.00000000 from server@129.6.15.28 xmt 0xe3560677.bf6c56c0
- Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a446b428 does not match aorg 0000000000.00000000 from server@209.115.181.102 xmt 0xe3560677.c27d57cc
- Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a424a04e does not match aorg 0000000000.00000000 from server@52.1.151.223 xmt 0xe3560677.c21d5f53
- Wed Nov 11 01:43:03 2020 daemon.info ntpd[4875]: receive: Unexpected origin timestamp 0xe35602ef.a461c4c1 does not match aorg 0000000000.00000000 from server@129.128.12.20 xmt 0xe3560677.c3aea06e
- Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 IEEE 802.11: authenticated
- Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 IEEE 802.11: associated (aid 2)
- Wed Nov 11 01:43:04 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 30:fd:38:bd:98:f8
- Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 RADIUS: starting accounting session 0C93371292843DC8
- Wed Nov 11 01:43:04 2020 daemon.info hostapd: wlan0: STA 30:fd:38:bd:98:f8 WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.236 30:fd:38:bd:98:f8
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.236 30:fd:38:bd:98:f8 Chromecast5893
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef IEEE 802.11: authenticated
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef IEEE 802.11: associated (aid 5)
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 IEEE 802.11: authenticated
- Wed Nov 11 01:43:05 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:10:0d:99:42:ef
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef RADIUS: starting accounting session 967A35D685B9E456
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:42:ef WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 IEEE 802.11: associated (aid 6)
- Wed Nov 11 01:43:05 2020 daemon.notice hostapd: wlan1: AP-STA-CONNECTED 84:10:0d:99:98:03
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 RADIUS: starting accounting session 8FB80587E1F773CE
- Wed Nov 11 01:43:05 2020 daemon.info hostapd: wlan1: STA 84:10:0d:99:98:03 WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) 84:10:0d:99:42:ef
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.229 84:10:0d:99:42:ef
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.229 84:10:0d:99:42:ef
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.229 84:10:0d:99:42:ef Moto-G-Dad
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) 84:10:0d:99:98:03
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.228 84:10:0d:99:98:03
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.228 84:10:0d:99:98:03
- Wed Nov 11 01:43:05 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.228 84:10:0d:99:98:03 Moto-G-Mom
- Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/odhcpd - 8 addresses
- Wed Nov 11 01:43:07 2020 daemon.info dnsmasq[5229]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:43:07 2020 daemon.info dnsmasq-dhcp[5229]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) c8:d3:ff:57:d5:c4
- Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4
- Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4
- Wed Nov 11 01:43:08 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.218 c8:d3:ff:57:d5:c4 OfficeJet3830
- Wed Nov 11 01:43:12 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:43:15 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:43:21 2020 daemon.err collectd[4336]: Sleeping only 2s because the next interval is 874.096 seconds in the past!
- Wed Nov 11 01:43:30 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:43:31 2020 authpriv.info dropbear[6051]: Child connection from 192.168.1.200:52986
- Wed Nov 11 01:43:31 2020 authpriv.notice dropbear[6051]: Password auth succeeded for 'root' from 192.168.1.200:52986
- Wed Nov 11 01:43:36 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:43:41 2020 daemon.err uhttpd[3691]: luci: accepted login on / for root from 192.168.1.200
- Wed Nov 11 01:43:51 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:43:55 2020 kern.warn kernel: [ 125.745618] ath10k_pci 0000:01:00.0: Invalid VHT mcs 15 peer stats
- Wed Nov 11 01:44:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:44:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:44:27 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 IEEE 802.11: authenticated
- Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: STA-OPMODE-MAX-BW-CHANGED b8:78:26:3f:36:e3 20
- Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: STA-OPMODE-N_SS-CHANGED b8:78:26:3f:36:e3 2
- Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 IEEE 802.11: associated (aid 3)
- Wed Nov 11 01:44:36 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED b8:78:26:3f:36:e3
- Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 RADIUS: starting accounting session D102084CDCFF6F81
- Wed Nov 11 01:44:36 2020 daemon.info hostapd: wlan0: STA b8:78:26:3f:36:e3 WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPDISCOVER(br-lan) b8:78:26:3f:36:e3
- Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPOFFER(br-lan) 192.168.1.239 b8:78:26:3f:36:e3
- Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.239 b8:78:26:3f:36:e3
- Wed Nov 11 01:44:36 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.239 b8:78:26:3f:36:e3 FoxSwitch
- Wed Nov 11 01:44:42 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:44:57 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:45:12 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:45:30 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:45:45 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:45:58 2020 daemon.notice miniupnpd[5020]: remove port mapping 52028 TCP because it has expired
- Wed Nov 11 01:46:06 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:46:20 2020 daemon.info procd: - shutdown -
- Wed Nov 11 01:46:21 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:46:44 2020 daemon.warn miniupnpd[5020]: upnp_event_process_notify: connect(192.168.1.200:7652): Operation timed out
- Wed Nov 11 01:46:44 2020 daemon.err miniupnpd[5020]: upnpevents_processfds: 0x41f30, remove subscriber uuid:1665be55-03cd-4764-bfff-92f008938b23 after an ERROR cb: http://192.168.1.200:7652/evetSub
- Wed Nov 11 01:46:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:47:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.262249] print_req_error: I/O error, dev mtdblock0, sector 0
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.262693] print_req_error: I/O error, dev mtdblock0, sector 8
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.267496] print_req_error: I/O error, dev mtdblock0, sector 16
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.273288] print_req_error: I/O error, dev mtdblock0, sector 24
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.279954] print_req_error: I/O error, dev mtdblock0, sector 0
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.285116] Buffer I/O error on dev mtdblock0, logical block 0, async page read
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.291846] print_req_error: I/O error, dev mtdblock1, sector 0
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.298735] print_req_error: I/O error, dev mtdblock1, sector 8
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.304535] print_req_error: I/O error, dev mtdblock1, sector 16
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.310379] print_req_error: I/O error, dev mtdblock1, sector 24
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.316868] print_req_error: I/O error, dev mtdblock1, sector 0
- Wed Nov 11 01:47:25 2020 kern.err kernel: [ 335.322093] Buffer I/O error on dev mtdblock1, logical block 0, async page read
- Wed Nov 11 01:47:27 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:47:42 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:48:12 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:48:16 2020 authpriv.info dropbear[6768]: Child connection from 192.168.1.200:61107
- Wed Nov 11 01:48:16 2020 authpriv.notice dropbear[6768]: Password auth succeeded for 'root' from 192.168.1.200:61107
- Wed Nov 11 01:48:27 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:49:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:49:00 2020 daemon.info ntpd[4875]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
- Wed Nov 11 01:49:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:49:51 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:50:06 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:50:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:51:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:51:42 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:51:55 2020 authpriv.info dropbear[6985]: Child connection from 192.168.1.200:49415
- Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a IEEE 802.11: authenticated
- Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a IEEE 802.11: associated (aid 4)
- Wed Nov 11 01:51:55 2020 daemon.notice hostapd: wlan0: AP-STA-CONNECTED 2c:59:8a:61:c6:6a
- Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a RADIUS: starting accounting session 31592ADBE87655CF
- Wed Nov 11 01:51:55 2020 daemon.info hostapd: wlan0: STA 2c:59:8a:61:c6:6a WPA: pairwise key handshake completed (RSN)
- Wed Nov 11 01:51:56 2020 daemon.info dnsmasq-dhcp[5229]: DHCPREQUEST(br-lan) 192.168.1.198 2c:59:8a:61:c6:6a
- Wed Nov 11 01:51:56 2020 daemon.info dnsmasq-dhcp[5229]: DHCPACK(br-lan) 192.168.1.198 2c:59:8a:61:c6:6a Shawn-LG-G4
- Wed Nov 11 01:51:57 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:51:58 2020 authpriv.notice dropbear[6985]: Password auth succeeded for 'root' from 192.168.1.200:49415
- Wed Nov 11 01:52:04 2020 daemon.info dnsmasq[5229]: exiting on receipt of SIGTERM
- Wed Nov 11 01:52:04 2020 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
- Wed Nov 11 01:52:04 2020 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: started, version 2.80 cachesize 150
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: DNS service limited to local subnets
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: compile time options: IPv6 GNU-getopt no-DBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-auth no-DNSSEC no-ID loop-detect inotify dumpfile
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq-dhcp[7093]: DHCP, IP range 192.168.0.100 -- 192.168.0.249, lease time 12h
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain test
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain onion
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain localhost
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain local
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain invalid
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain bind
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain googlevideo.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain checkmyip.torrentprivacy.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain torrentprivacy.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain cbcdn.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain httpi.jsrdn.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain windsorstar.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain postmedia.digital
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using standard nameservers for domain beap.gemini.yahoo.com
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5056
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5055
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5054
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using nameserver 127.0.0.1#5053
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: using local addresses only for domain lan
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /etc/hosts - 57 addresses
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /tmp/hosts/odhcpd - 8 addresses
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq[7093]: read /tmp/hosts/dhcp.cfg01411c - 134 addresses
- Wed Nov 11 01:52:08 2020 daemon.info dnsmasq-dhcp[7093]: read /etc/ethers - 0 addresses
- Wed Nov 11 01:52:42 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:52:57 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:52:58 2020 daemon.warn miniupnpd[5020]: upnp_event_process_notify: connect(192.168.1.200:7652): Operation timed out
- Wed Nov 11 01:52:58 2020 daemon.err miniupnpd[5020]: upnpevents_processfds: 0x41e20, remove subscriber uuid:ca5ea599-de58-4e4c-8c75-ab09824f6294 after an ERROR cb: http://192.168.1.200:7652/evetSub
- Wed Nov 11 01:53:45 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:54:00 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:54:51 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:55:06 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
- Wed Nov 11 01:55:28 2020 user.err kernel: [ 818.221732] procd: Failed to add object: Invalid argument
- Wed Nov 11 01:56:00 2020 daemon.info dnscrypt-proxy[3087]: dnscrypt-proxy Refetching server certificates
- Wed Nov 11 01:56:15 2020 daemon.err dnscrypt-proxy[3087]: dnscrypt-proxy Unable to retrieve server certificates
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement