0% found this document useful (0 votes)
419 views54 pages

FG6123BTM Firewall Logs & DoS Alerts

This document contains log entries from a firewall over a period of time. It logs details of detected denial of service attacks in the form of TCP and UDP port scans from various sources, and records that each time the packet was dropped by the firewall. It also contains some system log entries about device startup, synchronization with NTP servers, and connections to an ACS server.

Uploaded by

Arp Pabmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
419 views54 pages

FG6123BTM Firewall Logs & DoS Alerts

This document contains log entries from a firewall over a period of time. It logs details of detected denial of service attacks in the form of TCP and UDP port scans from various sources, and records that each time the packet was dropped by the firewall. It also contains some system log entries about device startup, synchronization with NTP servers, and connections to an ACS server.

Uploaded by

Arp Pabmar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd

Device Information

Module Name: FG6123BTM


Build Tag: SERCOMM.TELMEX
Firmware Version: FG6123BV3021
Build Time: Wed Dec 9 03:29:56 CST 2020
PON Serial Number: SCOM207C8F96

{Firewall} 12-23-2020 21:39:45 DoS attack: TCP Port Scan from source:
94.102.49.117:41176
{Firewall} 12-23-2020 21:39:45 drop this packet for psd
{Firewall} 12-23-2020 23:58:40 DoS attack: TCP Port Scan from source:
221.231.126.2:58186
{Firewall} 12-23-2020 23:58:40 drop this packet for psd
{Firewall} 12-24-2020 14:23:03 DoS attack: TCP Port Scan from source:
94.102.49.93:41377
{Firewall} 12-24-2020 14:23:03 drop this packet for psd
{Firewall} 12-25-2020 00:00:13 DoS attack: TCP Port Scan from source:
220.164.192.25:49045
{Firewall} 12-25-2020 00:00:13 drop this packet for psd
{Firewall} 12-25-2020 08:42:13 DoS attack: TCP Port Scan from source:
94.102.49.137:47323
{Firewall} 12-25-2020 08:42:13 drop this packet for psd
{Firewall} 12-25-2020 21:43:46 DoS attack: TCP Port Scan from source:
94.102.49.104:54216
{Firewall} 12-25-2020 21:43:46 drop this packet for psd
{System} 12-26-2020 08:21:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 08:21:45 Sync up with NTP Server successfully, 2020-12-
26T08:21:45Z.
{System} 12-26-2020 08:21:46 TR069 connects to ACS server success.
{System} 12-26-2020 09:23:42 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 09:24:11 Sync up with NTP Server successfully, 2020-12-
26T09:24:11Z.
{System} 12-26-2020 09:24:13 TR069 connects to ACS server success.
{Firewall} 12-26-2020 09:46:04 DoS attack: TCP Port Scan from source:
89.248.174.39:49546
{Firewall} 12-26-2020 09:46:04 drop this packet for psd
{Firewall} 12-26-2020 10:52:44 DoS attack: TCP Port Scan from source:
94.102.49.137:41556
{Firewall} 12-26-2020 10:52:44 drop this packet for psd
{System} 12-26-2020 11:36:46 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 11:37:23 Sync up with NTP Server successfully, 2020-12-
26T11:37:23Z.
{System} 12-26-2020 11:37:25 TR069 connects to ACS server success.
{Firewall} 12-26-2020 12:01:13 DoS attack: TCP Port Scan from source:
89.248.174.39:49546
{Firewall} 12-26-2020 12:01:13 drop this packet for psd
{System} 12-26-2020 18:56:35 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 18:57:04 Sync up with NTP Server successfully, 2020-12-
26T18:57:04Z.
{System} 12-26-2020 18:57:06 TR069 connects to ACS server success.
{Firewall} 12-26-2020 19:14:33 DoS attack: TCP Port Scan from source:
89.248.174.39:56352
{Firewall} 12-26-2020 19:14:33 drop this packet for psd
{Firewall} 12-27-2020 00:10:22 DoS attack: TCP Port Scan from source:
45.129.33.128:49964
{Firewall} 12-27-2020 00:10:22 drop this packet for psd
{Firewall} 12-27-2020 03:12:08 DoS attack: TCP Port Scan from source:
45.129.33.56:40310
{Firewall} 12-27-2020 03:12:08 drop this packet for psd
{Firewall} 12-27-2020 08:10:12 DoS attack: TCP Port Scan from source:
94.102.49.137:58205
{Firewall} 12-27-2020 08:10:12 drop this packet for psd
{Firewall} 12-27-2020 08:53:15 DoS attack: TCP Port Scan from source:
195.54.160.228:41649
{Firewall} 12-27-2020 08:53:15 drop this packet for psd
{Firewall} 12-27-2020 17:48:28 DoS attack: TCP Port Scan from source:
89.248.165.22:52892
{Firewall} 12-27-2020 17:48:28 drop this packet for psd
{Firewall} 12-28-2020 03:24:57 DoS attack: TCP Port Scan from source:
80.82.77.235:47491
{Firewall} 12-28-2020 03:24:57 drop this packet for psd
{Firewall} 12-28-2020 06:25:46 DoS attack: TCP Port Scan from source:
123.146.23.149:61454
{Firewall} 12-28-2020 06:25:46 drop this packet for psd
{Firewall} 12-28-2020 13:05:29 DoS attack: TCP Port Scan from source:
80.82.77.235:42322
{Firewall} 12-28-2020 13:05:29 drop this packet for psd
{System} 12-28-2020 15:50:29 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-28-2020 15:51:27 Sync up with NTP Server successfully, 2020-12-
28T15:51:28Z.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server success.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:41 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:47 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:58 TR069 connects to ACS server failed, http error 502.
{Firewall} 12-28-2020 16:44:40 DoS attack: TCP Port Scan from source:
45.129.33.128:47364
{Firewall} 12-28-2020 16:44:40 drop this packet for psd
{System} 12-28-2020 16:56:39 The cmld process has been dead ! we restart the
process!
{Firewall} 12-28-2020 22:43:18 DoS attack: TCP Port Scan from source:
80.82.77.235:56981
{Firewall} 12-28-2020 22:43:18 drop this packet for psd
{Firewall} 12-29-2020 08:25:17 DoS attack: TCP Port Scan from source:
94.102.49.93:51905
{Firewall} 12-29-2020 08:25:17 drop this packet for psd
{System} 12-29-2020 10:03:26 Sync up with NTP Server successfully, 2020-12-
29T10:03:25Z.
{Firewall} 12-29-2020 12:39:08 DoS attack: TCP Port Scan from source:
194.26.25.13:49669
{Firewall} 12-29-2020 12:39:08 drop this packet for psd
{Firewall} 12-29-2020 18:07:23 DoS attack: TCP Port Scan from source:
80.82.65.60:46833
{Firewall} 12-29-2020 18:07:23 drop this packet for psd
{Firewall} 12-30-2020 00:23:21 DoS attack: TCP Port Scan from source:
119.60.5.37:3402
{Firewall} 12-30-2020 00:23:21 drop this packet for psd
{Firewall} 12-30-2020 03:54:01 DoS attack: TCP Port Scan from source:
80.82.77.235:42034
{Firewall} 12-30-2020 03:54:01 drop this packet for psd
{Firewall} 12-30-2020 08:56:03 DoS attack: TCP Port Scan from source:
164.68.112.178:55266
{Firewall} 12-30-2020 08:56:03 drop this packet for psd
{Firewall} 12-30-2020 13:47:49 DoS attack: TCP Port Scan from source:
89.248.162.179:57662
{Firewall} 12-30-2020 13:47:49 drop this packet for psd
{Firewall} 12-31-2020 00:03:42 DoS attack: TCP Port Scan from source:
94.102.49.117:54614
{Firewall} 12-31-2020 00:03:42 drop this packet for psd
{System} 12-31-2020 09:51:11 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-31-2020 09:51:43 Sync up with NTP Server successfully, 2020-12-
31T09:51:43Z.
{System} 12-31-2020 09:51:45 TR069 connects to ACS server success.
{Firewall} 12-31-2020 10:03:06 DoS attack: TCP Port Scan from source:
80.82.64.242:50574
{Firewall} 12-31-2020 10:03:06 drop this packet for psd
{Firewall} 12-31-2020 19:57:32 DoS attack: TCP Port Scan from source:
94.102.49.117:46241
{Firewall} 12-31-2020 19:57:32 drop this packet for psd
{Firewall} 01-01-2021 05:43:06 DoS attack: TCP Port Scan from source:
89.248.171.134:41377
{Firewall} 01-01-2021 05:43:06 drop this packet for psd
{Firewall} 01-01-2021 07:55:21 DoS attack: TCP Port Scan from source:
45.134.26.226:56400
{Firewall} 01-01-2021 07:55:21 drop this packet for psd
{System} 01-01-2021 12:33:35 Sync up with NTP Server successfully, 2021-01-
01T12:33:35Z.
{Firewall} 01-01-2021 14:03:59 DoS attack: TCP Port Scan from source:
89.248.168.62:41790
{Firewall} 01-01-2021 14:03:59 drop this packet for psd
{Firewall} 01-01-2021 15:57:39 DoS attack: TCP Port Scan from source:
94.102.49.59:58251
{Firewall} 01-01-2021 15:57:39 drop this packet for psd
{Firewall} 01-02-2021 02:23:19 DoS attack: TCP Port Scan from source:
89.248.165.20:55792
{Firewall} 01-02-2021 02:23:19 drop this packet for psd
{Firewall} 01-02-2021 07:00:31 DoS attack: TCP Port Scan from source:
185.175.93.104:50545
{Firewall} 01-02-2021 07:00:31 drop this packet for psd
{Firewall} 01-04-2021 23:27:14 DoS attack: UDP Port Scan from source:
69.162.117.142:5210
{Firewall} 01-04-2021 23:27:14 drop this packet for psd
{Firewall} 01-08-2021 21:14:15 DoS attack: TCP Port Scan from source:
220.191.220.65:6000
{Firewall} 01-08-2021 21:14:15 drop this packet for psd
{Firewall} 01-14-2021 21:38:54 DoS attack: UDP Port Scan from source:
23.148.145.27:5121
{Firewall} 01-14-2021 21:38:54 drop this packet for psd
{System} 01-17-2021 16:03:36 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-17-2021 16:05:00 Sync up with NTP Server successfully, 2021-01-
17T16:05:00Z.
{System} 01-17-2021 16:05:01 TR069 connects to ACS server success.
{Firewall} 01-17-2021 17:54:51 DoS attack: TCP Port Scan from source:
139.59.87.56:47544
{Firewall} 01-17-2021 17:54:51 drop this packet for psd
{Firewall} 01-18-2021 03:30:30 DoS attack: TCP Port Scan from source:
89.248.165.63:42222
{Firewall} 01-18-2021 03:30:30 drop this packet for psd
{Firewall} 01-19-2021 09:19:11 DoS attack: TCP Port Scan from source:
45.146.165.24:53297
{Firewall} 01-19-2021 09:19:11 drop this packet for psd
{Firewall} 01-22-2021 11:46:39 DoS attack: TCP Port Scan from source:
67.212.1.185:32826
{Firewall} 01-22-2021 11:46:39 drop this packet for psd
{Firewall} 01-23-2021 02:54:33 DoS attack: TCP Port Scan from source:
219.132.152.130:6000
{Firewall} 01-23-2021 02:54:33 drop this packet for psd
{Firewall} 01-27-2021 01:25:38 DoS attack: TCP Port Scan from source:
223.112.70.109:6000
{Firewall} 01-27-2021 01:25:38 drop this packet for psd
{Firewall} 01-29-2021 04:23:18 DoS attack: UDP Port Scan from source:
80.94.93.23:5124
{Firewall} 01-29-2021 04:23:18 drop this packet for psd
{Firewall} 01-29-2021 21:39:36 DoS attack: TCP Port Scan from source:
95.46.114.141:45015
{Firewall} 01-29-2021 21:39:36 drop this packet for psd
{Firewall} 02-04-2021 01:30:21 DoS attack: TCP Port Scan from source:
211.148.188.89:7471
{Firewall} 02-04-2021 01:30:21 drop this packet for psd
{Firewall} 02-04-2021 07:27:04 DoS attack: UDP Port Scan from source:
80.94.93.23:5264
{Firewall} 02-04-2021 07:27:04 drop this packet for psd
{Firewall} 02-07-2021 23:13:50 DoS attack: TCP Port Scan from source:
220.164.192.25:6000
{Firewall} 02-07-2021 23:13:50 drop this packet for psd
{Firewall} 02-08-2021 05:52:57 DoS attack: TCP Port Scan from source:
14.192.241.68:50310
{Firewall} 02-08-2021 05:52:57 drop this packet for psd
{System} 02-08-2021 16:15:52 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 02-08-2021 16:16:24 TR069 connects to ACS server success.
{System} 02-08-2021 16:16:27 Sync up with NTP Server successfully, 2021-02-
08T16:16:27Z.
{Firewall} 02-08-2021 16:47:06 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-08-2021 16:47:06 drop this packet for psd
{Firewall} 02-09-2021 02:04:01 DoS attack: TCP Port Scan from source:
92.63.197.58:54907
{Firewall} 02-09-2021 02:04:01 drop this packet for psd
{Firewall} 02-09-2021 04:45:05 DoS attack: TCP Port Scan from source:
194.147.140.48:53068
{Firewall} 02-09-2021 04:45:05 drop this packet for psd
{Firewall} 02-09-2021 09:50:21 DoS attack: TCP Port Scan from source:
194.147.140.105:50306
{Firewall} 02-09-2021 09:50:21 drop this packet for psd
{Firewall} 02-09-2021 10:31:12 DoS attack: TCP Port Scan from source:
45.146.165.153:45863
{Firewall} 02-09-2021 10:31:12 drop this packet for psd
{Firewall} 02-09-2021 13:29:35 DoS attack: TCP Port Scan from source:
194.147.140.29:50255
{Firewall} 02-09-2021 13:29:35 drop this packet for psd
{Firewall} 02-10-2021 03:34:24 DoS attack: TCP Port Scan from source:
104.152.52.58:45283
{Firewall} 02-10-2021 03:34:24 drop this packet for psd
{Firewall} 02-10-2021 17:40:04 UDP flood attack from WAN1 has been detected,
SRC=15.176.5.22 DST=187.221.153.229 PROTO=UDP SPT=3478 DPT=3478 LEN=16
{Firewall} 02-14-2021 02:33:23 DoS attack: TCP Port Scan from source:
204.93.154.208:52942
{Firewall} 02-14-2021 02:33:23 drop this packet for psd
{System} 02-15-2021 19:28:42 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 02-15-2021 19:30:08 TR069 connects to ACS server success.
{System} 02-15-2021 19:30:11 Sync up with NTP Server successfully, 2021-02-
15T19:30:11Z.
{Firewall} 02-15-2021 20:12:47 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-15-2021 20:12:47 drop this packet for psd
{System} 02-15-2021 21:26:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 02-15-2021 21:28:05 Sync up with NTP Server successfully, 2021-02-
15T21:28:05Z.
{System} 02-15-2021 21:28:06 TR069 connects to ACS server success.
{Firewall} 02-15-2021 21:53:57 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-15-2021 21:53:57 drop this packet for psd
{Firewall} 02-15-2021 23:38:08 DoS attack: TCP Port Scan from source:
194.147.140.73:51171
{Firewall} 02-15-2021 23:38:08 drop this packet for psd
{Firewall} 02-16-2021 08:33:13 DoS attack: UDP Port Scan from source:
174.139.47.130:6252
{Firewall} 02-16-2021 08:33:13 drop this packet for psd
{Firewall} 02-16-2021 12:11:56 DoS attack: TCP Port Scan from source:
185.236.11.32:41593
{Firewall} 02-16-2021 12:11:56 drop this packet for psd
{Firewall} 02-16-2021 17:16:34 DoS attack: TCP Port Scan from source:
194.147.140.41:45943
{Firewall} 02-16-2021 17:16:34 drop this packet for psd
{System} 02-16-2021 17:45:00 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 02-16-2021 17:45:30 Sync up with NTP Server successfully, 2021-02-
16T17:45:30Z.
{System} 02-16-2021 17:45:32 TR069 connects to ACS server success.
{Firewall} 02-16-2021 19:48:13 DoS attack: TCP Port Scan from source:
194.147.140.73:51171
{Firewall} 02-16-2021 19:48:13 drop this packet for psd
{Firewall} 02-16-2021 20:44:09 DoS attack: TCP Port Scan from source:
194.147.140.41:45943
{Firewall} 02-16-2021 20:44:09 drop this packet for psd
{Firewall} 02-16-2021 21:09:09 DoS attack: TCP Port Scan from source:
172.245.10.231:42613
{Firewall} 02-16-2021 21:09:09 drop this packet for psd
{Firewall} 02-16-2021 22:48:45 DoS attack: TCP Port Scan from source:
45.9.148.54:43329
{Firewall} 02-16-2021 22:48:45 drop this packet for psd
{Firewall} 02-17-2021 19:38:25 DoS attack: TCP Port Scan from source:
104.152.52.72:38958
{Firewall} 02-17-2021 19:38:25 drop this packet for psd
{Firewall} 02-18-2021 02:53:34 DoS attack: TCP Port Scan from source:
89.248.169.2:58386
{Firewall} 02-18-2021 02:53:34 drop this packet for psd
{System} 02-19-2021 11:18:20 Sync up with NTP Server successfully, 2021-02-
19T11:18:20Z.
{Firewall} 02-19-2021 13:09:45 DoS attack: TCP Port Scan from source:
95.142.44.155:53308
{Firewall} 02-19-2021 13:09:45 drop this packet for psd
{Firewall} 02-20-2021 16:20:26 DoS attack: TCP Port Scan from source:
52.205.180.248:59624
{Firewall} 02-20-2021 16:20:26 drop this packet for psd
{Firewall} 02-21-2021 01:56:18 DoS attack: UDP Port Scan from source:
163.172.14.15:5608
{Firewall} 02-21-2021 01:56:18 drop this packet for psd
{Firewall} 02-21-2021 13:09:51 DoS attack: TCP Port Scan from source:
89.248.165.13:54585
{Firewall} 02-21-2021 13:09:51 drop this packet for psd
{Firewall} 02-22-2021 05:42:17 DoS attack: UDP Port Scan from source:
92.204.54.16:5798
{Firewall} 02-22-2021 05:42:17 drop this packet for psd
{Firewall} 02-24-2021 02:34:38 DoS attack: TCP Port Scan from source:
193.29.13.31:65531
{Firewall} 02-24-2021 02:34:38 drop this packet for psd
{Firewall} 02-24-2021 03:38:47 DoS attack: TCP Port Scan from source:
194.165.16.8:65525
{Firewall} 02-24-2021 03:38:47 drop this packet for psd
{Firewall} 02-24-2021 16:54:10 DoS attack: TCP Port Scan from source:
211.148.188.89:3560
{Firewall} 02-24-2021 16:54:10 drop this packet for psd
{Firewall} 02-27-2021 18:03:29 DoS attack: TCP Port Scan from source:
45.144.225.112:50604
{Firewall} 02-27-2021 18:03:29 drop this packet for psd
{System} 03-01-2021 10:08:11 The vgw_app process has been dead ! we restart the
process!
{System} 03-01-2021 10:08:19 The voip_monitor process has been dead ! we restart
the process!
{System} 03-01-2021 20:11:03 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 20:12:17 Sync up with NTP Server successfully, 2021-03-
01T20:12:17Z.
{System} 03-01-2021 20:12:18 TR069 connects to ACS server success.
{System} 03-01-2021 20:15:38 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 20:16:38 Sync up with NTP Server successfully, 2021-03-
01T20:16:37Z.
{System} 03-01-2021 20:16:39 TR069 connects to ACS server success.
{Firewall} 03-01-2021 21:22:59 DoS attack: TCP Port Scan from source:
194.147.140.94:46287
{Firewall} 03-01-2021 21:22:59 drop this packet for psd
{System} 03-01-2021 21:29:04 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 21:29:38 TR069 connects to ACS server success.
{System} 03-01-2021 21:29:41 Sync up with NTP Server successfully, 2021-03-
01T21:29:41Z.
{Firewall} 03-03-2021 12:53:47 DoS attack: TCP Port Scan from source:
89.248.165.104:41264
{Firewall} 03-03-2021 12:53:47 drop this packet for psd
{System} 03-04-2021 18:45:49 Sync up with NTP Server successfully, 2021-03-
04T18:45:48Z.
{Firewall} 03-06-2021 01:08:14 DoS attack: TCP Port Scan from source:
219.132.152.130:6000
{Firewall} 03-06-2021 01:08:14 drop this packet for psd
{Firewall} 03-06-2021 09:24:51 DoS attack: TCP Port Scan from source:
220.164.192.25:13547
{Firewall} 03-06-2021 09:24:51 drop this packet for psd
{System} 03-06-2021 12:20:30 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-06-2021 12:21:04 Sync up with NTP Server successfully, 2021-03-
06T12:21:04Z.
{System} 03-06-2021 12:21:06 TR069 connects to ACS server success.
{Firewall} 03-06-2021 12:47:00 DoS attack: TCP Port Scan from source:
194.147.140.41:56562
{Firewall} 03-06-2021 12:47:00 drop this packet for psd
{Firewall} 03-06-2021 13:17:50 DoS attack: TCP Port Scan from source:
45.146.165.25:54947
{Firewall} 03-06-2021 13:17:50 drop this packet for psd
{Firewall} 03-06-2021 13:24:09 DoS attack: TCP Port Scan from source:
194.147.140.94:54301
{Firewall} 03-06-2021 13:24:09 drop this packet for psd
{Firewall} 03-06-2021 14:05:56 DoS attack: TCP Port Scan from source:
5.135.0.34:58751
{Firewall} 03-06-2021 14:05:56 drop this packet for psd
{Firewall} 03-06-2021 16:29:29 DoS attack: TCP Port Scan from source:
194.147.140.40:45424
{Firewall} 03-06-2021 16:29:29 drop this packet for psd
{Firewall} 03-07-2021 02:22:24 DoS attack: TCP Port Scan from source:
195.54.160.228:47318
{Firewall} 03-07-2021 02:22:24 drop this packet for psd
{Firewall} 03-07-2021 12:27:30 DoS attack: TCP Port Scan from source:
89.248.165.104:41264
{Firewall} 03-07-2021 12:27:30 drop this packet for psd
{Firewall} 03-10-2021 09:31:50 DoS attack: TCP Port Scan from source:
118.178.136.160:39220
{Firewall} 03-10-2021 09:31:50 drop this packet for psd
{Firewall} 03-10-2021 12:08:23 DoS attack: UDP Port Scan from source:
163.172.14.15:5103
{Firewall} 03-10-2021 12:08:23 drop this packet for psd
{Firewall} 03-11-2021 03:21:51 DoS attack: TCP Port Scan from source:
194.165.16.22:65531
{Firewall} 03-11-2021 03:21:51 drop this packet for psd
{System} 03-11-2021 06:56:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-11-2021 06:57:41 Sync up with NTP Server successfully, 2021-03-
11T06:57:41Z.
{System} 03-11-2021 06:57:43 TR069 connects to ACS server success.
{Firewall} 03-11-2021 08:38:43 DoS attack: TCP Port Scan from source:
45.146.165.24:44218
{Firewall} 03-11-2021 08:38:43 drop this packet for psd
{Firewall} 03-11-2021 10:34:33 DoS attack: TCP Port Scan from source:
194.147.140.42:53568
{Firewall} 03-11-2021 10:34:33 drop this packet for psd
{Firewall} 03-11-2021 13:34:06 DoS attack: TCP Port Scan from source:
193.29.13.29:65507
{Firewall} 03-11-2021 13:34:06 drop this packet for psd
{Firewall} 03-12-2021 11:52:17 DoS attack: TCP Port Scan from source:
193.29.13.29:65519
{Firewall} 03-12-2021 11:52:17 drop this packet for psd
{Firewall} 03-12-2021 20:29:47 DoS attack: TCP Port Scan from source:
113.6.248.162:6000
{Firewall} 03-12-2021 20:29:47 drop this packet for psd
{Firewall} 03-14-2021 21:35:30 DoS attack: TCP Port Scan from source:
194.165.16.4:65533
{Firewall} 03-14-2021 21:35:30 drop this packet for psd
{Firewall} 03-15-2021 21:11:28 DoS attack: TCP Port Scan from source:
193.29.13.29:65525
{Firewall} 03-15-2021 21:11:28 drop this packet for psd
{Firewall} 03-16-2021 11:16:39 DoS attack: TCP Port Scan from source:
85.143.174.12:38440
{Firewall} 03-16-2021 11:16:39 drop this packet for psd
{Firewall} 03-18-2021 02:16:33 DoS attack: UDP Port Scan from source:
193.46.254.182:6305
{Firewall} 03-18-2021 02:16:33 drop this packet for psd
{System} 03-19-2021 21:50:55 Requested to reboot by web client 192.168.1.77.
{System} 03-19-2021 21:51:34 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 744840 seconds
{System} 03-19-2021 21:52:03 Sync up with NTP Server successfully, 2021-03-
19T21:52:03Z.
{System} 03-19-2021 21:52:05 TR069 connects to ACS server success.
{System} 03-19-2021 21:52:22 TR069 download file
http://gateway.telmex.com//SERCOMM_FG6123BTM_FG6123BV3021/FG6123BV3021.img
successfully.
{System} 03-19-2021 21:52:31 Upgrade image version: FG6123BV3021.
{System} 03-19-2021 21:52:35 Request to reboot by TR069.
{System} 03-19-2021 21:53:10 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 60 seconds
{System} 03-19-2021 21:53:45 Sync up with NTP Server successfully, 2021-03-
19T21:53:44Z.
{System} 03-19-2021 21:53:48 TR069 connects to ACS server success.
{System} 03-19-2021 22:41:23 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{GPON} 01-01-1970 00:00:18 OLT type changed to nokia.
{System} 01-01-1970 00:01:10 Restore facroty defaults by Restore Button.
{System} 03-19-2021 22:51:58 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{GPON} 03-19-2021 22:52:03 OLT type changed to nokia.
{System} 03-19-2021 22:53:22 TR069 connects to ACS server success.
{System} 03-19-2021 22:53:25 Sync up with NTP Server successfully, 2021-03-
19T22:53:26Z.
{System} 03-19-2021 23:07:20 Login Password changed Successfully by web client
192.168.1.67(MAC:Unknown Host Name: Unknown).
{Firewall} 03-20-2021 13:46:37 DoS attack: TCP Port Scan from source:
193.29.13.29:65523
{Firewall} 03-20-2021 13:46:37 drop this packet for psd
{Firewall} 03-23-2021 00:21:42 DoS attack: UDP Port Scan from source:
195.154.134.96:6236
{Firewall} 03-23-2021 00:21:42 drop this packet for psd
{Firewall} 03-25-2021 22:19:29 DoS attack: TCP Port Scan from source:
91.240.85.219:60966
{Firewall} 03-25-2021 22:19:29 drop this packet for psd
{Firewall} 03-26-2021 09:01:04 DoS attack: TCP Port Scan from source:
82.99.193.155:6000
{Firewall} 03-26-2021 09:01:04 drop this packet for psd
{Firewall} 03-26-2021 14:23:50 DoS attack: TCP Port Scan from source:
194.165.16.22:65529
{Firewall} 03-26-2021 14:23:50 drop this packet for psd
{Firewall} 03-26-2021 22:13:12 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 03-26-2021 22:13:12 drop this packet for psd
{Firewall} 03-28-2021 20:03:42 DoS attack: UDP Port Scan from source:
195.154.134.96:6236
{Firewall} 03-28-2021 20:03:42 drop this packet for psd
{Firewall} 03-29-2021 01:44:13 DoS attack: TCP Port Scan from source:
223.112.70.109:6000
{Firewall} 03-29-2021 01:44:13 drop this packet for psd
{System} 03-29-2021 14:45:54 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-29-2021 14:46:35 TR069 connects to ACS server success.
{System} 03-29-2021 14:46:43 Sync up with NTP Server successfully, 2021-03-
29T14:46:43Z.
{Firewall} 03-29-2021 16:23:14 DoS attack: TCP Port Scan from source:
172.93.194.124:40405
{Firewall} 03-29-2021 16:23:14 drop this packet for psd
{Firewall} 03-29-2021 18:18:09 DoS attack: TCP Port Scan from source:
5.188.119.145:41935
{Firewall} 03-29-2021 18:18:09 drop this packet for psd
{Firewall} 03-29-2021 19:43:50 DoS attack: TCP Port Scan from source:
5.188.119.201:41892
{Firewall} 03-29-2021 19:43:50 drop this packet for psd
{Firewall} 03-29-2021 21:27:00 DoS attack: TCP Port Scan from source:
5.188.119.200:41922
{Firewall} 03-29-2021 21:27:00 drop this packet for psd
{Firewall} 03-30-2021 03:44:52 DoS attack: TCP Port Scan from source:
194.147.140.24:44733
{Firewall} 03-30-2021 03:44:52 drop this packet for psd
{Firewall} 03-30-2021 05:51:00 DoS attack: TCP Port Scan from source:
185.236.11.32:56404
{Firewall} 03-30-2021 05:51:00 drop this packet for psd
{Firewall} 03-30-2021 06:43:51 DoS attack: TCP Port Scan from source:
194.147.140.23:48722
{Firewall} 03-30-2021 06:43:51 drop this packet for psd
{Firewall} 03-30-2021 10:06:15 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 03-30-2021 10:06:15 drop this packet for psd
{System} 03-30-2021 13:33:05 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-30-2021 13:33:36 TR069 connects to ACS server success.
{System} 03-30-2021 13:33:39 Sync up with NTP Server successfully, 2021-03-
30T13:33:39Z.
{Firewall} 03-30-2021 15:50:02 DoS attack: TCP Port Scan from source:
172.93.194.124:40405
{Firewall} 03-30-2021 15:50:02 drop this packet for psd
{Firewall} 03-30-2021 17:01:57 DoS attack: TCP Port Scan from source:
5.188.159.238:52944
{Firewall} 03-30-2021 17:01:57 drop this packet for psd
{Firewall} 03-30-2021 17:20:27 DoS attack: TCP Port Scan from source:
188.124.36.118:46198
{Firewall} 03-30-2021 17:20:27 drop this packet for psd
{Firewall} 03-30-2021 18:13:18 DoS attack: TCP Port Scan from source:
5.188.159.218:52925
{Firewall} 03-30-2021 18:13:18 drop this packet for psd
{Firewall} 03-30-2021 18:44:46 DoS attack: TCP Port Scan from source:
5.188.119.145:53034
{Firewall} 03-30-2021 18:44:46 drop this packet for psd
{Firewall} 03-30-2021 20:13:24 DoS attack: TCP Port Scan from source:
188.124.36.159:46596
{Firewall} 03-30-2021 20:13:24 drop this packet for psd
{Firewall} 03-31-2021 02:39:00 DoS attack: TCP Port Scan from source:
185.236.11.18:45503
{Firewall} 03-31-2021 02:39:00 drop this packet for psd
{Firewall} 03-31-2021 03:24:34 DoS attack: TCP Port Scan from source:
45.146.165.24:58744
{Firewall} 03-31-2021 03:24:34 drop this packet for psd
{Firewall} 03-31-2021 04:49:15 DoS attack: TCP Port Scan from source:
194.147.140.127:43333
{Firewall} 03-31-2021 04:49:15 drop this packet for psd
{Firewall} 03-31-2021 05:01:16 DoS attack: TCP Port Scan from source:
194.147.140.23:48722
{Firewall} 03-31-2021 05:01:16 drop this packet for psd
{Firewall} 03-31-2021 06:08:14 DoS attack: TCP Port Scan from source:
92.63.197.95:8080
{Firewall} 03-31-2021 06:08:14 drop this packet for psd
{Firewall} 03-31-2021 06:52:01 DoS attack: TCP Port Scan from source:
81.2.247.240:55044
{Firewall} 03-31-2021 06:52:01 drop this packet for psd
{Firewall} 03-31-2021 09:06:00 DoS attack: TCP Port Scan from source:
194.147.140.105:58646
{Firewall} 03-31-2021 09:06:00 drop this packet for psd
{System} 03-31-2021 20:04:03 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-31-2021 20:04:53 Sync up with NTP Server successfully, 2021-03-
31T20:04:53Z.
{System} 03-31-2021 20:04:56 TR069 connects to ACS server success.
{Firewall} 03-31-2021 21:52:32 DoS attack: TCP Port Scan from source:
45.146.165.24:58744
{Firewall} 03-31-2021 21:52:32 drop this packet for psd
{Firewall} 04-01-2021 01:09:43 DoS attack: TCP Port Scan from source:
5.188.159.238:49331
{Firewall} 04-01-2021 01:09:43 drop this packet for psd
{Firewall} 04-01-2021 05:21:14 DoS attack: TCP Port Scan from source:
188.124.36.131:47247
{Firewall} 04-01-2021 05:21:14 drop this packet for psd
{Firewall} 04-01-2021 09:09:55 DoS attack: TCP Port Scan from source:
185.236.11.4:49226
{Firewall} 04-01-2021 09:09:55 drop this packet for psd
{System} 04-01-2021 09:52:37 Sync up with NTP Server successfully, 2021-04-
01T09:52:37Z.
{System} 04-03-2021 09:26:08 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 04-03-2021 09:26:39 Sync up with NTP Server successfully, 2021-04-
03T09:26:39Z.
{System} 04-03-2021 09:26:40 TR069 connects to ACS server success.
{Firewall} 04-03-2021 16:22:25 DoS attack: TCP Port Scan from source:
188.124.36.131:47247
{Firewall} 04-03-2021 16:22:25 drop this packet for psd
{Firewall} 04-04-2021 04:58:31 DoS attack: TCP Port Scan from source:
45.146.165.24:47849
{Firewall} 04-04-2021 04:58:31 drop this packet for psd
{Firewall} 04-04-2021 10:46:53 DoS attack: TCP Port Scan from source:
194.165.16.22:65530
{Firewall} 04-04-2021 10:46:53 drop this packet for psd
{Firewall} 04-05-2021 01:06:50 DoS attack: TCP Port Scan from source:
89.248.165.118:54377
{Firewall} 04-05-2021 01:06:50 drop this packet for psd
{Firewall} 04-06-2021 22:32:24 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 04-06-2021 22:32:24 drop this packet for psd
{Firewall} 04-07-2021 07:50:25 DoS attack: TCP Port Scan from source:
45.33.85.185:59824
{Firewall} 04-07-2021 07:50:25 drop this packet for psd
{Firewall} 04-09-2021 00:00:55 DoS attack: TCP Port Scan from source:
134.228.205.62:36414
{Firewall} 04-09-2021 00:00:55 drop this packet for psd
{Firewall} 04-11-2021 06:59:06 DoS attack: TCP Port Scan from source:
193.29.13.29:65526
{Firewall} 04-11-2021 06:59:06 drop this packet for psd
{Firewall} 04-13-2021 02:37:42 DoS attack: TCP Port Scan from source:
194.165.16.4:65528
{Firewall} 04-13-2021 02:37:42 drop this packet for psd
{Firewall} 04-14-2021 08:04:27 UDP flood attack from LAN has been detected,
SRC=192.168.1.71 DST=192.168.1.254 PROTO=UDP SPT=54600 DPT=53 LEN=40
{Firewall} 04-14-2021 13:56:55 DoS attack: TCP Port Scan from source:
104.149.181.226:46615
{Firewall} 04-14-2021 13:56:55 drop this packet for psd
{Firewall} 04-16-2021 23:49:39 DoS attack: UDP Port Scan from source:
195.154.154.139:5633
{Firewall} 04-16-2021 23:49:39 drop this packet for psd
{Firewall} 04-21-2021 20:37:48 DoS attack: TCP Port Scan from source:
104.149.181.226:55467
{Firewall} 04-21-2021 20:37:48 drop this packet for psd
{Firewall} 04-22-2021 12:36:58 DoS attack: TCP Port Scan from source:
193.29.13.29:65527
{Firewall} 04-22-2021 12:36:58 drop this packet for psd
{System} 04-23-2021 18:09:59 Requested to reboot by web client 192.168.1.71.
{System} 04-23-2021 18:10:39 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1755780 seconds
{System} 04-23-2021 18:11:08 Sync up with NTP Server successfully, 2021-04-
23T18:11:07Z.
{System} 04-23-2021 18:11:10 TR069 connects to ACS server success.
{Firewall} 04-23-2021 18:33:37 DoS attack: TCP Port Scan from source:
88.214.24.63:50776
{Firewall} 04-23-2021 18:33:37 drop this packet for psd
{Firewall} 04-23-2021 18:40:54 DoS attack: TCP Port Scan from source:
79.124.62.206:51069
{Firewall} 04-23-2021 18:40:54 drop this packet for psd
{Firewall} 04-23-2021 19:14:48 DoS attack: TCP Port Scan from source:
194.61.25.241:51101
{Firewall} 04-23-2021 19:14:48 drop this packet for psd
{Firewall} 04-23-2021 20:09:30 DoS attack: TCP Port Scan from source:
45.146.165.208:40276
{Firewall} 04-23-2021 20:09:30 drop this packet for psd
{Firewall} 04-23-2021 20:50:26 DoS attack: UDP Port Scan from source:
193.46.255.104:5585
{Firewall} 04-23-2021 20:50:26 drop this packet for psd
{Firewall} 04-23-2021 21:12:31 DoS attack: TCP Port Scan from source:
188.124.36.161:55383
{Firewall} 04-23-2021 21:12:31 drop this packet for psd
{Firewall} 04-23-2021 21:18:29 DoS attack: TCP Port Scan from source:
5.188.119.88:41531
{Firewall} 04-23-2021 21:18:29 drop this packet for psd
{Firewall} 04-23-2021 23:24:19 DoS attack: TCP Port Scan from source:
5.188.119.157:41557
{Firewall} 04-23-2021 23:24:19 drop this packet for psd
{Firewall} 04-24-2021 11:27:27 DoS attack: TCP Port Scan from source:
188.124.36.131:47819
{Firewall} 04-24-2021 11:27:27 drop this packet for psd
{Firewall} 04-24-2021 15:34:47 DoS attack: TCP Port Scan from source:
89.248.165.68:47309
{Firewall} 04-24-2021 15:34:47 drop this packet for psd
{Firewall} 04-24-2021 17:05:53 DoS attack: TCP Port Scan from source:
89.248.165.98:55510
{Firewall} 04-24-2021 17:05:53 drop this packet for psd
{Firewall} 04-24-2021 19:40:59 DoS attack: TCP Port Scan from source:
92.38.152.172:40520
{Firewall} 04-24-2021 19:40:59 drop this packet for psd
{Firewall} 04-25-2021 16:15:57 DoS attack: TCP Port Scan from source:
89.248.165.52:41054
{Firewall} 04-25-2021 16:15:57 drop this packet for psd
{System} 04-26-2021 01:30:08 Sync up with NTP Server successfully, 2021-04-
26T01:30:09Z.
{System} 04-27-2021 13:30:10 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 04-27-2021 13:31:04 Sync up with NTP Server successfully, 2021-04-
27T13:31:04Z.
{System} 04-27-2021 13:31:06 TR069 connects to ACS server success.
{Firewall} 04-27-2021 14:23:54 DoS attack: TCP Port Scan from source:
5.135.0.33:58707
{Firewall} 04-27-2021 14:23:54 drop this packet for psd
{Firewall} 04-27-2021 17:07:14 DoS attack: TCP Port Scan from source:
91.206.14.241:58310
{Firewall} 04-27-2021 17:07:14 drop this packet for psd
{Firewall} 04-27-2021 17:13:18 DoS attack: TCP Port Scan from source:
5.188.119.204:58346
{Firewall} 04-27-2021 17:13:18 drop this packet for psd
{Firewall} 04-27-2021 20:39:52 DoS attack: TCP Port Scan from source:
188.124.36.158:48886
{Firewall} 04-27-2021 20:39:52 drop this packet for psd
{Firewall} 04-27-2021 21:22:24 DoS attack: UDP Port Scan from source:
103.145.13.240:10961
{Firewall} 04-27-2021 21:22:24 drop this packet for psd
{Firewall} 04-27-2021 21:53:15 DoS attack: TCP Port Scan from source:
188.124.36.131:47819
{Firewall} 04-27-2021 21:53:15 drop this packet for psd
{Firewall} 04-28-2021 11:35:16 UDP flood attack from LAN has been detected,
SRC=192.168.1.66 DST=192.168.1.254 PROTO=UDP SPT=63585 DPT=53 LEN=47
{Firewall} 04-30-2021 17:29:52 DoS attack: TCP Port Scan from source:
104.152.52.64:37719
{Firewall} 04-30-2021 17:29:52 drop this packet for psd
{System} 05-01-2021 03:05:37 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-01-2021 03:06:28 Sync up with NTP Server successfully, 2021-05-
01T03:06:28Z.
{System} 05-01-2021 03:06:31 TR069 connects to ACS server success.
{Firewall} 05-01-2021 04:20:31 DoS attack: TCP Port Scan from source:
5.135.0.33:58707
{Firewall} 05-01-2021 04:20:31 drop this packet for psd
{Firewall} 05-01-2021 04:55:32 DoS attack: TCP Port Scan from source:
5.135.0.34:58837
{Firewall} 05-01-2021 04:55:32 drop this packet for psd
{Firewall} 05-01-2021 05:57:40 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-01-2021 06:57:08 DoS attack: TCP Port Scan from source:
5.188.159.238:51968
{Firewall} 05-01-2021 06:57:08 drop this packet for psd
{Firewall} 05-01-2021 07:36:07 DoS attack: TCP Port Scan from source:
5.188.119.201:52003
{Firewall} 05-01-2021 07:36:07 drop this packet for psd
{Firewall} 05-01-2021 09:11:04 DoS attack: TCP Port Scan from source:
5.188.119.205:52050
{Firewall} 05-01-2021 09:11:04 drop this packet for psd
{Firewall} 05-01-2021 09:13:23 DoS attack: TCP Port Scan from source:
188.124.36.118:52645
{Firewall} 05-01-2021 09:13:23 drop this packet for psd
{Firewall} 05-01-2021 12:12:32 DoS attack: TCP Port Scan from source:
158.69.21.2:50671
{Firewall} 05-01-2021 12:12:32 drop this packet for psd
{Firewall} 05-01-2021 12:49:44 DoS attack: UDP Port Scan from source:
62.210.31.216:6484
{Firewall} 05-01-2021 12:49:44 drop this packet for psd
{System} 05-04-2021 10:23:57 Sync up with NTP Server successfully, 2021-05-
04T10:23:57Z.
{Firewall} 05-04-2021 16:37:05 DoS attack: TCP Port Scan from source:
193.29.13.29:65532
{Firewall} 05-04-2021 16:37:05 drop this packet for psd
{Firewall} 05-06-2021 22:46:35 DoS attack: TCP Port Scan from source:
193.29.13.29:65529
{Firewall} 05-06-2021 22:46:35 drop this packet for psd
{System} 05-07-2021 00:37:48 Requested to reboot by web client 192.168.1.69.
{System} 05-07-2021 00:38:27 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 509520 seconds
{System} 05-07-2021 00:38:57 Sync up with NTP Server successfully, 2021-05-
07T00:38:57Z.
{System} 05-07-2021 00:39:00 TR069 connects to ACS server success.
{Firewall} 05-09-2021 09:26:14 DoS attack: TCP Port Scan from source:
193.29.13.29:65527
{Firewall} 05-09-2021 09:26:14 drop this packet for psd
{System} 05-09-2021 14:27:47 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-09-2021 14:28:32 Sync up with NTP Server successfully, 2021-05-
09T14:28:32Z.
{System} 05-09-2021 14:28:34 TR069 connects to ACS server success.
{System} 05-09-2021 15:28:59 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-09-2021 15:29:43 TR069 connects to ACS server success.
{System} 05-09-2021 15:29:46 Sync up with NTP Server successfully, 2021-05-
09T15:29:46Z.
{Firewall} 05-09-2021 22:04:25 DoS attack: TCP Port Scan from source:
5.188.119.200:43093
{Firewall} 05-09-2021 22:04:25 drop this packet for psd
{Firewall} 05-09-2021 22:40:16 DoS attack: TCP Port Scan from source:
188.124.36.163:42902
{Firewall} 05-09-2021 22:40:16 drop this packet for psd
{System} 05-10-2021 00:03:03 Requested to reboot by web client 192.168.1.66.
{System} 05-10-2021 00:03:43 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 30840 seconds
{System} 05-10-2021 00:04:12 Sync up with NTP Server successfully, 2021-05-
10T00:04:11Z.
{System} 05-10-2021 00:04:14 TR069 connects to ACS server success.
{System} 05-10-2021 00:41:39 GPIO_Protect abnormal!!! tx power off
{System} 05-10-2021 00:41:54 Sync up with NTP Server successfully, 2021-05-
10T00:41:54Z.
{System} 05-10-2021 00:46:50 Requested to reboot by web client 192.168.1.69.
{System} 05-10-2021 00:47:28 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 2580 seconds
{System} 05-10-2021 00:47:58 Sync up with NTP Server successfully, 2021-05-
10T00:47:58Z.
{System} 05-10-2021 00:48:02 TR069 connects to ACS server success.
{Firewall} 05-10-2021 00:48:27 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.64 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-10-2021 03:57:46 DoS attack: TCP Port Scan from source:
5.188.159.218:42983
{Firewall} 05-10-2021 03:57:46 drop this packet for psd
{Firewall} 05-10-2021 04:05:07 DoS attack: TCP Port Scan from source:
5.188.119.205:43124
{Firewall} 05-10-2021 04:05:07 drop this packet for psd
{Firewall} 05-10-2021 06:22:40 DoS attack: TCP Port Scan from source:
5.188.119.88:43014
{Firewall} 05-10-2021 06:22:40 drop this packet for psd
{Firewall} 05-10-2021 12:21:30 DoS attack: TCP Port Scan from source:
5.188.119.204:41906
{Firewall} 05-10-2021 12:21:30 drop this packet for psd
{System} 05-10-2021 13:34:42 Restore facroty defaults by Restore Button.
{System} 05-10-2021 13:35:14 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 46020 seconds
{GPON} 05-10-2021 13:35:21 OLT type changed to nokia.
{System} 05-10-2021 13:35:49 TR069 connects to ACS server success.
{System} 05-10-2021 13:35:52 Sync up with NTP Server successfully, 2021-05-
10T13:35:52Z.
{Firewall} 05-10-2021 13:55:08 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-10-2021 14:04:22 DoS attack: TCP Port Scan from source:
45.146.165.209:54221
{Firewall} 05-10-2021 14:04:22 drop this packet for psd
{Firewall} 05-10-2021 14:15:11 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 05-10-2021 14:26:40 Login Password changed Successfully by web client
192.168.1.65(MAC:34-F3-9A-9F-88-E1 Host Name: ARP_DELL).
{Firewall} 05-10-2021 14:37:41 UDP flood attack from LAN has been detected,
SRC=192.168.1.68 DST=192.168.1.254 PROTO=UDP SPT=51212 DPT=53 LEN=51
{Firewall} 05-10-2021 17:22:01 DoS attack: TCP Port Scan from source:
5.188.119.157:41945
{Firewall} 05-10-2021 17:22:01 drop this packet for psd
{Firewall} 05-10-2021 17:37:47 DoS attack: TCP Port Scan from source:
5.188.159.218:41860
{Firewall} 05-10-2021 17:37:47 drop this packet for psd
{Firewall} 05-10-2021 17:58:39 DoS attack: TCP Port Scan from source:
5.188.119.204:41906
{Firewall} 05-10-2021 17:58:39 drop this packet for psd
{Firewall} 05-10-2021 18:44:08 DoS attack: TCP Port Scan from source:
5.188.119.200:41960
{Firewall} 05-10-2021 18:44:08 drop this packet for psd
{Firewall} 05-10-2021 19:08:11 DoS attack: TCP Port Scan from source:
188.124.36.118:41798
{Firewall} 05-10-2021 19:08:11 drop this packet for psd
{Firewall} 05-10-2021 19:21:58 DoS attack: TCP Port Scan from source:
5.188.119.88:41892
{Firewall} 05-10-2021 19:21:58 drop this packet for psd
{Firewall} 05-10-2021 19:27:04 DoS attack: TCP Port Scan from source:
188.124.36.158:42854
{Firewall} 05-10-2021 19:27:04 drop this packet for psd
{Firewall} 05-11-2021 09:51:52 DoS attack: TCP Port Scan from source:
89.248.165.204:49854
{Firewall} 05-11-2021 09:51:52 drop this packet for psd
{Firewall} 05-11-2021 11:26:36 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 05-11-2021 11:26:36 drop this packet for psd
{System} 05-11-2021 16:03:05 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-11-2021 16:03:34 Sync up with NTP Server successfully, 2021-05-
11T16:03:34Z.
{System} 05-11-2021 16:03:35 TR069 connects to ACS server success.
{Firewall} 05-12-2021 18:44:09 DoS attack: TCP Port Scan from source:
192.53.173.193:53471
{Firewall} 05-12-2021 18:44:09 drop this packet for psd
{Firewall} 05-13-2021 08:56:31 DoS attack: TCP Port Scan from source:
193.29.13.29:65530
{Firewall} 05-13-2021 08:56:31 drop this packet for psd
{Firewall} 05-16-2021 21:08:35 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 05-16-2021 21:08:35 drop this packet for psd
{Firewall} 05-18-2021 13:22:00 DoS attack: UDP Port Scan from source:
193.46.255.106:5229
{Firewall} 05-18-2021 13:22:00 drop this packet for psd
{Firewall} 05-18-2021 21:38:53 DoS attack: TCP Port Scan from source:
193.29.13.29:65533
{Firewall} 05-18-2021 21:38:53 drop this packet for psd
{Firewall} 05-20-2021 11:46:10 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.77 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 05-21-2021 20:00:24 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-21-2021 20:01:23 Sync up with NTP Server successfully, 2021-05-
21T20:01:22Z.
{System} 05-21-2021 20:01:25 TR069 connects to ACS server success.
{Firewall} 05-21-2021 20:18:25 DoS attack: TCP Port Scan from source:
45.146.165.209:57107
{Firewall} 05-21-2021 20:18:25 drop this packet for psd
{Firewall} 05-21-2021 20:33:34 DoS attack: TCP Port Scan from source:
45.143.203.2:41736
{Firewall} 05-21-2021 20:33:34 drop this packet for psd
{Firewall} 05-21-2021 20:34:48 DoS attack: TCP Port Scan from source:
205.205.150.57:49010
{Firewall} 05-21-2021 20:34:48 drop this packet for psd
{Firewall} 05-21-2021 20:53:43 DoS attack: TCP Port Scan from source:
3.17.47.176:61000
{Firewall} 05-21-2021 20:53:43 drop this packet for psd
{Firewall} 05-21-2021 22:09:34 DoS attack: TCP Port Scan from source:
135.181.110.223:52890
{Firewall} 05-21-2021 22:09:34 drop this packet for psd
{Firewall} 05-22-2021 01:53:40 DoS attack: TCP Port Scan from source:
5.188.119.157:57308
{Firewall} 05-22-2021 01:53:40 drop this packet for psd
{Firewall} 05-22-2021 02:10:25 DoS attack: TCP Port Scan from source:
185.212.131.64:50720
{Firewall} 05-22-2021 02:10:25 drop this packet for psd
{Firewall} 05-22-2021 07:01:12 DoS attack: TCP Port Scan from source:
89.248.165.199:50491
{Firewall} 05-22-2021 07:01:12 drop this packet for psd
{Firewall} 05-22-2021 14:28:50 DoS attack: TCP Port Scan from source:
183.136.225.42:43462
{Firewall} 05-22-2021 14:28:50 drop this packet for psd
{Firewall} 05-25-2021 01:24:39 DoS attack: TCP Port Scan from source:
60.211.181.178:6000
{Firewall} 05-25-2021 01:24:39 drop this packet for psd
{Firewall} 05-27-2021 22:22:58 DoS attack: TCP Port Scan from source:
89.248.165.6:59944
{Firewall} 05-27-2021 22:22:58 drop this packet for psd
{System} 06-01-2021 09:52:16 Sync up with NTP Server successfully, 2021-06-
01T09:52:16Z.
{Firewall} 06-06-2021 05:46:57 DoS attack: TCP Port Scan from source:
61.142.20.9:63278
{Firewall} 06-06-2021 05:46:57 drop this packet for psd
{System} 06-06-2021 07:27:51 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 06-06-2021 07:29:16 Sync up with NTP Server successfully, 2021-06-
06T07:29:16Z.
{System} 06-06-2021 07:29:18 TR069 connects to ACS server success.
{Firewall} 06-06-2021 08:14:07 DoS attack: TCP Port Scan from source:
3.17.47.176:61000
{Firewall} 06-06-2021 08:14:07 drop this packet for psd
{Firewall} 06-07-2021 02:58:26 DoS attack: TCP Port Scan from source:
89.248.165.201:56450
{Firewall} 06-07-2021 02:58:26 drop this packet for psd
{Firewall} 06-07-2021 19:02:22 DoS attack: TCP Port Scan from source:
185.117.154.155:34118
{Firewall} 06-07-2021 19:02:22 drop this packet for psd
{Firewall} 06-09-2021 08:09:22 DoS attack: UDP Port Scan from source:
77.247.108.229:5067
{Firewall} 06-09-2021 08:09:22 drop this packet for psd
{Firewall} 06-09-2021 10:33:31 DoS attack: TCP Port Scan from source:
104.131.107.50:55162
{Firewall} 06-09-2021 10:33:31 drop this packet for psd
{Firewall} 06-17-2021 05:39:26 DoS attack: TCP Port Scan from source:
141.98.9.155:65530
{Firewall} 06-17-2021 05:39:26 drop this packet for psd
{System} 06-18-2021 04:32:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 06-18-2021 04:33:15 Sync up with NTP Server successfully, 2021-06-
18T04:33:13Z.
{System} 06-18-2021 04:33:16 TR069 connects to ACS server success.
{Firewall} 06-18-2021 21:14:03 DoS attack: TCP Port Scan from source:
188.124.36.158:54341
{Firewall} 06-18-2021 21:14:03 drop this packet for psd
{Firewall} 06-19-2021 09:39:00 DoS attack: TCP Port Scan from source:
92.63.197.94:58203
{Firewall} 06-19-2021 09:39:00 drop this packet for psd
{Firewall} 06-19-2021 12:53:55 DoS attack: TCP Port Scan from source:
89.248.165.6:46490
{Firewall} 06-19-2021 12:53:55 drop this packet for psd
{Firewall} 06-19-2021 16:19:48 DoS attack: TCP Port Scan from source:
92.63.197.71:55484
{Firewall} 06-19-2021 16:19:48 drop this packet for psd
{System} 06-20-2021 07:25:59 Sync up with NTP Server successfully, 2021-06-
20T07:25:58Z.
{Firewall} 06-22-2021 02:39:06 DoS attack: TCP Port Scan from source:
182.92.122.79:54816
{Firewall} 06-22-2021 02:39:06 drop this packet for psd
{Firewall} 06-25-2021 22:43:23 DoS attack: TCP Port Scan from source:
47.110.239.235:43980
{Firewall} 06-25-2021 22:43:23 drop this packet for psd
{Firewall} 06-28-2021 02:49:02 DoS attack: TCP Port Scan from source:
52.67.129.70:48970
{Firewall} 06-28-2021 02:49:02 drop this packet for psd
{Firewall} 06-28-2021 22:21:33 DoS attack: TCP Port Scan from source:
89.248.165.6:60600
{Firewall} 06-28-2021 22:21:33 drop this packet for psd
{System} 06-29-2021 11:45:24 The vgw_app process has been dead ! we restart the
process!
{System} 06-29-2021 11:45:32 The voip_monitor process has been dead ! we restart
the process!
{System} 07-01-2021 09:58:09 Sync up with NTP Server successfully, 2021-07-
01T09:58:09Z.
{System} 07-01-2021 12:43:01 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 07-01-2021 12:44:01 Sync up with NTP Server successfully, 2021-07-
01T12:44:10Z.
{System} 07-01-2021 12:44:05 TR069 connects to ACS server success.
{Firewall} 07-01-2021 12:58:20 DoS attack: TCP Port Scan from source:
94.102.59.97:41285
{Firewall} 07-01-2021 12:58:20 drop this packet for psd
{Firewall} 07-01-2021 12:58:50 DoS attack: TCP Port Scan from source:
80.82.79.194:44630
{Firewall} 07-01-2021 12:58:50 drop this packet for psd
{Firewall} 07-01-2021 16:01:33 DoS attack: TCP Port Scan from source:
5.188.119.204:49579
{Firewall} 07-01-2021 16:01:33 drop this packet for psd
{Firewall} 07-01-2021 17:56:51 DoS attack: TCP Port Scan from source:
91.206.14.241:49449
{Firewall} 07-01-2021 17:56:51 drop this packet for psd
{Firewall} 07-01-2021 18:25:50 DoS attack: TCP Port Scan from source:
188.124.36.118:49428
{Firewall} 07-01-2021 18:25:50 drop this packet for psd
{Firewall} 07-02-2021 04:13:46 DoS attack: TCP Port Scan from source:
185.191.34.207:44187
{Firewall} 07-02-2021 04:13:46 drop this packet for psd
{Firewall} 07-03-2021 13:19:11 DoS attack: TCP Port Scan from source:
185.156.73.12:48550
{Firewall} 07-03-2021 13:19:11 drop this packet for psd
{Firewall} 07-04-2021 14:27:30 DoS attack: UDP Port Scan from source:
45.95.147.59:6235
{Firewall} 07-04-2021 14:27:30 drop this packet for psd
{System} 07-05-2021 17:53:38 Sync up with NTP Server successfully, 2021-07-
05T17:53:47Z.
{Firewall} 07-06-2021 10:17:17 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.73 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 07-07-2021 20:06:39 DoS attack: TCP Port Scan from source:
89.248.165.100:46401
{Firewall} 07-07-2021 20:06:39 drop this packet for psd
{System} 07-09-2021 16:49:45 Sync up with NTP Server successfully, 2021-07-
09T16:49:54Z.
{System} 07-09-2021 16:53:24 Sync up with NTP Server successfully, 2021-07-
09T16:53:34Z.
{System} 07-10-2021 10:16:09 Sync up with NTP Server successfully, 2021-07-
10T10:16:19Z.
{System} 07-10-2021 10:36:58 Sync up with NTP Server successfully, 2021-07-
10T10:37:08Z.
{System} 07-11-2021 19:45:49 Sync up with NTP Server successfully, 2021-07-
11T19:45:59Z.
{Firewall} 07-17-2021 15:21:39 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 07-17-2021 15:21:39 drop this packet for psd
{Firewall} 07-18-2021 01:14:05 DoS attack: TCP Port Scan from source:
118.190.104.47:38712
{Firewall} 07-18-2021 01:14:05 drop this packet for psd
{Firewall} 07-18-2021 03:40:10 DoS attack: TCP Port Scan from source:
89.248.165.6:32878
{Firewall} 07-18-2021 03:40:10 drop this packet for psd
{Firewall} 07-18-2021 22:09:33 DoS attack: UDP Port Scan from source:
46.8.19.204:5060
{Firewall} 07-18-2021 22:09:33 drop this packet for psd
{Firewall} 07-19-2021 21:28:57 DoS attack: TCP Port Scan from source:
141.98.9.155:65531
{Firewall} 07-19-2021 21:28:57 drop this packet for psd
{Firewall} 07-21-2021 06:17:39 DoS attack: UDP Port Scan from source:
91.132.58.45:5069
{Firewall} 07-21-2021 06:17:39 drop this packet for psd
{Firewall} 07-23-2021 23:55:38 DoS attack: TCP Port Scan from source:
185.20.226.243:53138
{Firewall} 07-23-2021 23:55:38 drop this packet for psd
{System} 07-29-2021 18:50:18 TR069 connects to ACS server success.
{System} 07-29-2021 18:50:22 TR069 connects to ACS server success.
{System} 07-30-2021 01:50:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:50:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:51:06 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:51:39 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:52:32 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:54:19 TR069 connects to ACS server failed, couldn't resolve.
{Firewall} 07-30-2021 01:55:42 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=46554 DPT=53 LEN=44
{System} 07-30-2021 01:57:12 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 02:02:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 02:10:14 TR069 connects to ACS server success.
{System} 07-30-2021 02:10:18 Sync up with NTP Server successfully, 2021-07-
30T02:10:25Z.
{System} 07-30-2021 04:50:13 TR069 connects to ACS server failed, http error 500.
{System} 08-03-2021 11:01:46 Sync up with NTP Server successfully, 2021-08-
03T11:01:46Z.
{System} 08-04-2021 04:50:14 TR069 connects to ACS server failed, http error 500.
{Firewall} 08-04-2021 10:53:57 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.74 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 08-04-2021 15:44:09 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 08-04-2021 15:44:43 TR069 connects to ACS server success.
{System} 08-04-2021 15:44:43 Sync up with NTP Server successfully, 2021-08-
04T15:44:43Z.
{Firewall} 08-04-2021 15:54:09 DoS attack: TCP Port Scan from source:
89.248.165.73:58112
{Firewall} 08-04-2021 15:54:09 drop this packet for psd
{Firewall} 08-04-2021 16:18:45 DoS attack: TCP Port Scan from source:
222.175.199.222:23456
{Firewall} 08-04-2021 16:18:45 drop this packet for psd
{Firewall} 08-04-2021 19:03:47 DoS attack: TCP Port Scan from source:
91.206.14.241:49664
{Firewall} 08-04-2021 19:03:47 drop this packet for psd
{Firewall} 08-04-2021 19:03:49 DoS attack: TCP Port Scan from source:
188.124.36.161:50008
{Firewall} 08-04-2021 19:03:49 drop this packet for psd
{System} 08-04-2021 19:33:53 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
[GPON] 08-04-2021 19:33:53 Starting GPON interface OK.
[System] 08-04-2021 19:33:53 Register watchdog (umcid)
[System] 08-04-2021 19:33:53 Register watchdog (network_manager)
[GPON] 08-04-2021 19:33:54 OLT reset the OMCI mib.
[System] 08-04-2021 19:33:54 OLT Deactivate ONT
[System] 08-04-2021 19:33:54 Link state transition [O1 - O2]
[System] 08-04-2021 19:33:55 OLT Deactivate ONT
[System] 08-04-2021 19:33:55 Link state transition [O2 - O4]
[Firewall] 08-04-2021 19:33:56 Firewall Block Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Spoof Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 UDP Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 ICMP Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP SYN Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP FIN Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 Port Scan Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Land Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Broadcast Source Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP Syn With Data Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP Syn With Data Detect has been disabled.
[IPTV] 08-04-2021 19:33:56 Start IPTV OK
[System] 08-04-2021 19:33:56 OLT Deactivate ONT
[System] 08-04-2021 19:33:56 Link state transition [O4 - O3]
[System] 08-04-2021 19:33:57 OLT Deactivate ONT
[System] 08-04-2021 19:33:57 Link state transition [O3 - O2]
[IPTV] 08-04-2021 19:33:57 LAN send out a general query.
[System] 08-04-2021 19:33:58 OLT Deactivate ONT
[System] 08-04-2021 19:33:58 Link state transition [O2 - O3]
[System] 08-04-2021 19:33:59 OLT Deactivate ONT
[System] 08-04-2021 19:33:59 Link state transition [O3 - O2]
[VoIP] 08-04-2021 19:34:00 Info Center Config Init...
[VoIP] 08-04-2021 19:34:00 FXS_Number=*1
[System] 08-04-2021 19:34:00 Register watchdog (vgw_app)
[VoIP] 08-04-2021 19:34:00 Failed to open ringing schedule configuration file
[System] 08-04-2021 19:34:00 Starting VoIP OK..
[System] 08-04-2021 19:34:00 OLT Deactivate ONT
[System] 08-04-2021 19:34:00 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:01 Register watchdog (voip_monitor)
[WIFI] 08-04-2021 19:34:01 WiFi Init..
[System] 08-04-2021 19:34:01 OLT Deactivate ONT
[System] 08-04-2021 19:34:01 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:02 OLT Deactivate ONT
[System] 08-04-2021 19:34:02 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:03 OLT Deactivate ONT
[System] 08-04-2021 19:34:03 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:04 OLT Deactivate ONT
[System] 08-04-2021 19:34:04 Link state transition [O2 - O3]
[VoIP] 08-04-2021 19:34:05 Starting VoIP OK.
[VoIP] 08-04-2021 19:34:05 VoIP call manager v02.01.00_03.13a.2020-12-09,03:12
[VoIP] 08-04-2021 19:34:05 VoIP service running at Jan 1 00:00:24 1970
[System] 08-04-2021 19:34:05 OLT Deactivate ONT
[System] 08-04-2021 19:34:05 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:06 OLT Deactivate ONT
[System] 08-04-2021 19:34:06 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:07 OLT Deactivate ONT
[System] 08-04-2021 19:34:07 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:08 Register watchdog (temp_monitor)
[System] 08-04-2021 19:34:08 Register watchdog (optical_monitor)
[Firewall] 08-04-2021 19:34:09 Fireall Level has been set to Medium.
[Firewall] 08-04-2021 19:34:09 Local UDP Flood Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local ICMP Flood Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local Winnuke Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local LAN Source Detect has been enabled.
[Firewall] 08-04-2021 19:34:09 Local Smurf Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local Frament Flood Detect has been enabled on LAN.
[LAN] 08-04-2021 19:34:09 DHCP Server Started
[IPTV] 08-04-2021 19:34:09 LAN send out a general query.
[System] 08-04-2021 19:34:09 OLT Deactivate ONT
[System] 08-04-2021 19:34:09 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:11 OLT Deactivate ONT
[System] 08-04-2021 19:34:11 Link state transition [O3 - O2]
[WIFI] 08-04-2021 19:34:11 channel score,che03a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che06a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che08a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che09b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che13a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che16a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che18a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che19b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che23a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che26a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che28a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che29b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che33a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che36a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che39b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 5G select auto channel :52
[System] 08-04-2021 19:34:12 OLT Deactivate ONT
[System] 08-04-2021 19:34:12 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:13 OLT Deactivate ONT
[System] 08-04-2021 19:34:13 Link state transition [O3 - O2]
[UPnP] 08-04-2021 19:34:13 HTTP listening on port 49152
[UPnP] 08-04-2021 19:34:13 Starting UPnP IGD OK.
[System] 08-04-2021 19:34:14 OLT Deactivate ONT
[System] 08-04-2021 19:34:14 Link state transition [O2 - O3]
[WIFI] 08-04-2021 19:34:14 channel score,ch1001:bss20 intfadj50 cns-81 tol-70
[WIFI] 08-04-2021 19:34:14 channel score,ch1006:bss17 intfadj24 cns-78 tol-41
[WIFI] 08-04-2021 19:34:14 channel score,ch100b:bss12 intfadj13 cns-78 tol-25
[WIFI] 08-04-2021 19:34:14 2.4G select auto channel :11
[WIFI] 08-04-2021 19:34:14 acsd run
[System] 08-04-2021 19:34:15 OLT Deactivate ONT
[System] 08-04-2021 19:34:15 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:16 OLT Deactivate ONT
[System] 08-04-2021 19:34:16 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:17 OLT Deactivate ONT
[System] 08-04-2021 19:34:17 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:18 OLT Deactivate ONT
[System] 08-04-2021 19:34:18 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:19 OLT Deactivate ONT
[System] 08-04-2021 19:34:19 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:20 OLT Deactivate ONT
[System] 08-04-2021 19:34:20 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:21 OLT Deactivate ONT
[System] 08-04-2021 19:34:21 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:22 OLT Active ONT
[System] 08-04-2021 19:34:22 Link state transition [O2 - O5]
[GPON] 08-04-2021 19:34:26 Apply OMCI configuration.
[IPTV] 08-04-2021 19:34:27 LAN send out a general query.
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 ASSOC(8) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 DISASSOC(12) reason8 send to sta:14:cc:20:3f:a6:21 intf
wl1
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 ASSOC(8) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:28 Authorized sta:14:cc:20:3f:a6:21 intf wl1
[IPTV] 08-04-2021 19:34:28 IPTV Configure file changed, reload IPTV config
[WAN] 08-04-2021 19:34:29 LCP Termination request has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:29 PPPOE PADT has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:29 PPPOE PADI has been sent from WAN WAN1
[IPTV] 08-04-2021 19:34:29 LAN send out a general query.
[WAN] 08-04-2021 19:34:30 PPPOE PADI has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:32 PPPOE PADI has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:36 PPPOE PADI has been sent from WAN WAN1
[WIFI] 08-04-2021 19:34:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:34:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:34:36 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:34:38 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:34:38 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:38 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:38 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:39 Send OFFER of ip [192.168.1.71] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:40 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:40 Successfully assign IP [192.168.1.71] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[LAN] 08-04-2021 19:34:41 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 19:34:41 Request IP [192.168.1.64] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:34:42 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[WIFI] 08-04-2021 19:34:42 AUTH(4) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 AUTH(4) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 ASSOC(8) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 Authorized sta:d0:77:14:ce:bd:ae intf wl1
[LAN] 08-04-2021 19:34:42 Received DISCOVER from client mac [d0:77:14:ce:bd:ae]
[WAN] 08-04-2021 19:34:43 PPPOE PADO has been received from WAN WAN1, BRAS name is
ipdsl-mex-ctsj-56.
[WAN] 08-04-2021 19:34:43 PPPOE PADR has been sent from WAN WAN1
[LAN] 08-04-2021 19:34:43 Send OFFER of ip [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae]
[LAN] 08-04-2021 19:34:43 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 19:34:43 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-04-2021 19:34:43 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:ce:bd:ae]
[WAN] 08-04-2021 19:34:43 PPPOE PADS has been received from WAN WAN1
[LAN] 08-04-2021 19:34:43 Successfully assign IP [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae], lease time [86400]
[WAN] 08-04-2021 19:34:46 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:34:47 DEAUTH(5) reason7 from sta:4c:c9:5e:29:00:fc intf wl1
[LAN] 08-04-2021 19:34:47 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[WAN] 08-04-2021 19:34:48 PPP PAP authentication is successful on WAN WAN1
[LAN] 08-04-2021 19:34:48 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:48 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[Firewall] 08-04-2021 19:34:49 Local UDP Flood Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Forward UDP Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local ICMP Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local TCP SYN Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local TCP FIN Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local Winnuke Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Local Smurf Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Local Fraggle Flood detect has been enabled on WAN
ppp1.
[LAN] 08-04-2021 19:34:49 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:49 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:50 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:50 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[System] 08-04-2021 19:34:52 DNSMasq proxy server enable
[System] 08-04-2021 19:34:52 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:54 VoIP wan up, bind wan interface ppp1, notify interface
ppp1.
[VoIP] 08-04-2021 19:34:54 WAN Interface UP with new bind interface:
187.221.151.105,ppp1
[WIFI] 08-04-2021 19:34:54 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:34:54 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:54 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:34:54 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
{System} 08-04-2021 19:34:55 Sync up with NTP Server successfully, 2021-08-
04T19:34:55Z.
[LAN] 08-04-2021 19:34:55 Send OFFER of ip [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Successfully assign IP [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 19:34:56 LCP echo-reply has been received from WAN WAN1
[WAN] 08-04-2021 19:34:56 Start DHCPv6 Client OK
{System} 08-04-2021 19:34:56 TR069 connects to ACS server success.
[VoIP] 08-04-2021 19:34:59 Switch to primary proxy server vims-h.telmex.com on line
0
[System] 08-04-2021 19:35:01 DNSMasq proxy server enable
[System] 08-04-2021 19:35:01 DNSMasq proxy server enable
[WIFI] 08-04-2021 19:35:10 WiFi Scheduler Time ON
[WIFI] 08-04-2021 19:35:52 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 ASSOC(8) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 Authorized sta:a8:7d:12:27:ab:de intf wl0
[LAN] 08-04-2021 19:35:52 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Send NAK to client ip [0.0.0.0] mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Send NAK to client ip [0.0.0.0] mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Received DISCOVER from client mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:53 Send OFFER of ip [192.168.1.68] to client mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:53 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:54 Successfully assign IP [192.168.1.68] to client mac
[a8:7d:12:27:ab:de], lease time [86400]
[WIFI] 08-04-2021 19:36:00 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 19:36:00 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:36:00 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:36:00 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:36:06 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 ASSOC(8) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 Authorized sta:10:c7:53:2a:c5:98 intf wl1
[LAN] 08-04-2021 19:36:07 Received DISCOVER from client mac [10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Send OFFER of ip [192.168.1.69] to client mac
[10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Received REQUEST from client ip [0.0.0.0] mac
[10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Successfully assign IP [192.168.1.69] to client mac
[10:c7:53:2a:c5:98], lease time [86400]
[IPTV] 08-04-2021 19:36:34 LAN send out a general query.
[IPTV] 08-04-2021 19:38:39 LAN send out a general query.
[WAN] 08-04-2021 19:39:46 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:39:47 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:39:47 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 19:39:54 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:39:54 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:39:54 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-04-2021 19:39:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 19:40:44 LAN send out a general query.
[IPTV] 08-04-2021 19:42:49 LAN send out a general query.
[IPTV] 08-04-2021 19:44:54 LAN send out a general query.
[WAN] 08-04-2021 19:44:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 19:45:07 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 19:46:34 DEAUTH(5) reason7 from sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 19:46:59 LAN send out a general query.
[WIFI] 08-04-2021 19:47:20 DEAUTH(5) reason4 from sta:a8:7d:12:27:ab:de intf wl0
[WIFI] 08-04-2021 19:47:20 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl0
[IPTV] 08-04-2021 19:49:04 LAN send out a general query.
[VoIP] 08-04-2021 19:50:00 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-04-2021 19:50:00 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:00 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:01 Authorized sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:50:01 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:01 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:01 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:03 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:04 Send OFFER of ip [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:05 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:05 Successfully assign IP [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 19:50:07 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:50:09 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:50:11 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:11 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:11 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:12 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:12 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:13 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:17 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[WAN] 08-04-2021 19:50:17 LCP echo-reply has been received from WAN WAN1
[LAN] 08-04-2021 19:50:18 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:20 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WIFI] 08-04-2021 19:50:37 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 ASSOC(8) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:50:37 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:37 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:37 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
{Firewall} 08-04-2021 19:50:38 DoS attack: TCP Port Scan from source:
89.248.165.73:58112
{Firewall} 08-04-2021 19:50:38 drop this packet for psd
[LAN] 08-04-2021 19:50:38 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:38 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:38 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[UPnP] 08-04-2021 19:50:41 Add Port Mapping: Teredo 192.168.1.70:61494->61494
UDP UDP 61494 to 192.168.1.70:61494 Success.
[UPnP] 08-04-2021 19:50:47 Delete Port Mapping: '':UDP 61494 to all Success.
[WIFI] 08-04-2021 19:50:53 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 19:50:53 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 19:50:54 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:54 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:55 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:50:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:55 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 19:51:09 LAN send out a general query.
[WIFI] 08-04-2021 19:51:09 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 19:51:09 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 19:51:19 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 ASSOC(8) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:51:19 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:51:19 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 19:53:14 LAN send out a general query.
[WAN] 08-04-2021 19:55:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 19:55:17 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 19:55:19 LAN send out a general query.
[IPTV] 08-04-2021 19:57:24 LAN send out a general query.
[Firewall] 08-04-2021 19:58:24, DROP SRC=187.191.62.174 DST=187.221.151.105
PROTO=TCP SPT=53770 DPT=445
[IPTV] 08-04-2021 19:59:29 LAN send out a general query.
[WAN] 08-04-2021 20:00:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:00:28 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 20:00:33, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=39499 DPT=53 LEN=38
[IPTV] 08-04-2021 20:01:34 LAN send out a general query.
[Firewall] 08-04-2021 20:01:40, DROP SRC=187.187.199.19 DST=187.221.151.105
PROTO=TCP SPT=59210 DPT=445
[Firewall] 08-04-2021 20:01:43, DROP SRC=187.187.199.19 DST=187.221.151.105
PROTO=TCP SPT=59210 DPT=445
[WIFI] 08-04-2021 20:01:51 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 20:01:51 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:51 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:51 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:52 Send OFFER of ip [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:53 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:53 Successfully assign IP [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[Firewall] 08-04-2021 20:03:29, DROP SRC=181.226.45.201 DST=187.221.151.105
PROTO=TCP SPT=55818 DPT=445
[IPTV] 08-04-2021 20:03:39 LAN send out a general query.
[WAN] 08-04-2021 20:05:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:05:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:05:44 LAN send out a general query.
[Firewall] 08-04-2021 20:06:15, DROP SRC=121.43.96.36 DST=187.221.151.105 PROTO=TCP
SPT=46964 DPT=445
[IPTV] 08-04-2021 20:07:49 LAN send out a general query.
[IPTV] 08-04-2021 20:09:54 LAN send out a general query.
[WAN] 08-04-2021 20:10:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:10:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:11:59 LAN send out a general query.
[Firewall] 08-04-2021 20:12:40, DROP SRC=201.210.87.59 DST=187.221.151.105
PROTO=TCP SPT=53092 DPT=445
[Firewall] 08-04-2021 20:12:43, DROP SRC=201.210.87.59 DST=187.221.151.105
PROTO=TCP SPT=53092 DPT=445
[Firewall] 08-04-2021 20:13:33, DROP SRC=186.94.40.33 DST=187.221.151.105 PROTO=TCP
SPT=60927 DPT=445
[IPTV] 08-04-2021 20:14:04 LAN send out a general query.
[WAN] 08-04-2021 20:15:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:15:49 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:16:09 LAN send out a general query.
[IPTV] 08-04-2021 20:18:14 LAN send out a general query.
[VoIP] 08-04-2021 20:20:03 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 20:20:19 LAN send out a general query.
[Firewall] 08-04-2021 20:20:44, DROP SRC=113.163.215.70 DST=187.221.151.105
PROTO=TCP SPT=46104 DPT=445
[WAN] 08-04-2021 20:20:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:20:59 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 20:21:18, DROP SRC=88.80.186.137 DST=187.221.151.105
PROTO=UDP SPT=20338 DPT=53 LEN=36
[WIFI] 08-04-2021 20:21:34 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 20:21:34 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 20:21:35 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:21:35 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[LAN] 08-04-2021 20:21:35 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[WIFI] 08-04-2021 20:21:35 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 20:21:35 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
{Firewall} 08-04-2021 20:22:01 DoS attack: TCP Port Scan from source:
222.175.199.222:23456
{Firewall} 08-04-2021 20:22:01 drop this packet for psd
[IPTV] 08-04-2021 20:22:24 LAN send out a general query.
[IPTV] 08-04-2021 20:24:29 LAN send out a general query.
[WAN] 08-04-2021 20:25:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:25:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:26:34 LAN send out a general query.
[Firewall] 08-04-2021 20:27:39, DROP SRC=14.249.111.254 DST=187.221.151.105
PROTO=TCP SPT=54430 DPT=445
[IPTV] 08-04-2021 20:28:39 LAN send out a general query.
[IPTV] 08-04-2021 20:30:44 LAN send out a general query.
[WAN] 08-04-2021 20:31:00 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:31:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:32:49 LAN send out a general query.
[Firewall] 08-04-2021 20:34:01, DROP SRC=110.39.23.154 DST=187.221.151.105
PROTO=TCP SPT=52010 DPT=445
[IPTV] 08-04-2021 20:34:54 LAN send out a general query.
[WAN] 08-04-2021 20:36:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:36:20 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:36:59 LAN send out a general query.
[IPTV] 08-04-2021 20:39:04 LAN send out a general query.
[WIFI] 08-04-2021 20:40:56 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:40:56 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:40:56 Authorized sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 20:41:09 LAN send out a general query.
[WAN] 08-04-2021 20:41:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:41:20 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 20:41:54 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl1
[WIFI] 08-04-2021 20:41:54 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:41:54 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:41:54 Authorized sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 20:43:14 LAN send out a general query.
[IPTV] 08-04-2021 20:45:19 LAN send out a general query.
[WAN] 08-04-2021 20:46:21 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:46:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:47:24 LAN send out a general query.
[WIFI] 08-04-2021 20:47:36 DEAUTH(5) reason4 from sta:a8:7d:12:27:ab:de intf wl1
[WIFI] 08-04-2021 20:47:36 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl1
[Firewall] 08-04-2021 20:48:14, DROP SRC=209.141.59.224 DST=187.221.151.105
PROTO=UDP SPT=41934 DPT=53 LEN=38
[IPTV] 08-04-2021 20:49:29 LAN send out a general query.
[VoIP] 08-04-2021 20:50:07 receive response of OPTIONS message, rspcode is:200
[WAN] 08-04-2021 20:51:31 LCP echo-request has been send from WAN WAN1
[IPTV] 08-04-2021 20:51:34 LAN send out a general query.
[WAN] 08-04-2021 20:51:41 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 20:51:44 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 20:51:44 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 20:51:44 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:51:44 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:51:44 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 20:51:44 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 20:51:44 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-04-2021 20:53:19, DROP SRC=74.120.14.28 DST=187.221.151.105 PROTO=UDP
SPT=64115 DPT=53 LEN=53
[WIFI] 08-04-2021 20:53:37 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 20:53:37 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 20:53:39 LAN send out a general query.
[IPTV] 08-04-2021 20:55:44 LAN send out a general query.
[WAN] 08-04-2021 20:56:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:56:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:57:49 LAN send out a general query.
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:59 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 20:59:54 LAN send out a general query.
[Firewall] 08-04-2021 21:01:14, DROP SRC=14.190.18.107 DST=187.221.151.105
PROTO=TCP SPT=57056 DPT=445
[WAN] 08-04-2021 21:01:42 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:01:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:01:59 LAN send out a general query.
[IPTV] 08-04-2021 21:04:04 LAN send out a general query.
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:16 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:16 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:17 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:17 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:18 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:18 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:19 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:19 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[Firewall] 08-04-2021 21:05:34, DROP SRC=74.82.47.6 DST=187.221.151.105 PROTO=UDP
SPT=55765 DPT=53 LEN=50
[IPTV] 08-04-2021 21:06:09 LAN send out a general query.
[WAN] 08-04-2021 21:06:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:07:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:08:14 LAN send out a general query.
[WIFI] 08-04-2021 21:08:41 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:08:41 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 21:08:44 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 21:10:19 LAN send out a general query.
[WAN] 08-04-2021 21:11:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:12:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:12:24 LAN send out a general query.
[IPTV] 08-04-2021 21:14:29 LAN send out a general query.
[WIFI] 08-04-2021 21:15:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-04-2021 21:15:36 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 21:15:36 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-04-2021 21:16:34 LAN send out a general query.
[WAN] 08-04-2021 21:17:03 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:17:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:18:39 LAN send out a general query.
[VoIP] 08-04-2021 21:20:10 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 21:20:44 LAN send out a general query.
[WIFI] 08-04-2021 21:21:53 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 21:21:53 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 21:21:53 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:21:53 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:21:53 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 21:21:53 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 21:21:53 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 21:22:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:22:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:22:49 LAN send out a general query.
[IPTV] 08-04-2021 21:24:54 LAN send out a general query.
[IPTV] 08-04-2021 21:26:59 LAN send out a general query.
[WAN] 08-04-2021 21:27:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:27:23 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 21:28:54 AUTH(4) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:54 AUTH(4) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:54 ASSOC(8) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:55 Authorized sta:d0:77:14:c5:70:66 intf wl1
[LAN] 08-04-2021 21:28:56 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[IPTV] 08-04-2021 21:29:04 LAN send out a general query.
[WIFI] 08-04-2021 21:30:18 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:30:18 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 21:31:09 LAN send out a general query.
[GPON] 08-04-2021 21:32:17 Transmit omci packet over time! sec=3757575748064378880
nsec=2668463181004800
[WAN] 08-04-2021 21:32:24 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:32:34 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:33:14 LAN send out a general query.
[WIFI] 08-04-2021 21:35:06 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 21:35:06 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:35:06 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:35:07 Send OFFER of ip [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:10 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Send OFFER of ip [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Successfully assign IP [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-04-2021 21:35:19 LAN send out a general query.
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:32 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:32 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:35 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 21:37:24 LAN send out a general query.
[WAN] 08-04-2021 21:37:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:37:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:39:29 LAN send out a general query.
[WIFI] 08-04-2021 21:39:48 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:39:48 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 21:41:34 LAN send out a general query.
[Firewall] 08-04-2021 21:42:06, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:06, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:07, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:07, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:08, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:08, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:12, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:13, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:14, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[WAN] 08-04-2021 21:42:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:42:44 LCP echo-reply has been received from WAN WAN1
[UPnP] 08-04-2021 21:42:54 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954567 Success.
[UPnP] 08-04-2021 21:42:54 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:42:54 upnp_event_send: msg: NOTIFY /upnp/eventing/rbigrhotiv
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954567SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:42:59 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309523c6 Success.
[UPnP] 08-04-2021 21:42:59 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:42:59 upnp_event_send: msg: NOTIFY /upnp/eventing/zxcaifpyek
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309523c6SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[Firewall] 08-04-2021 21:43:16, DROP SRC=167.248.133.24 DST=187.221.151.105
PROTO=UDP SPT=17207 DPT=53 LEN=53
[UPnP] 08-04-2021 21:43:17 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830959869 Success.
[UPnP] 08-04-2021 21:43:17 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:17 upnp_event_send: msg: NOTIFY /upnp/eventing/qzyadasgyq
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830959869SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:17 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954873 Success.
[UPnP] 08-04-2021 21:43:17 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:17 upnp_event_send: msg: NOTIFY /upnp/eventing/msnigjdtmc
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954873SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:25 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095dc51 Success.
[UPnP] 08-04-2021 21:43:25 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:25 upnp_event_send: msg: NOTIFY /upnp/eventing/tujzxuquno
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a1683095dc51SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:25 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830955cff Success.
[UPnP] 08-04-2021 21:43:25 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:25 upnp_event_send: msg: NOTIFY /upnp/eventing/uclushlscr
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830955cffSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 08-04-2021 21:43:39 LAN send out a general query.
[IPTV] 08-04-2021 21:45:44 LAN send out a general query.
[UPnP] 08-04-2021 21:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095944a Success.
[UPnP] 08-04-2021 21:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309558ec Success.
[UPnP] 08-04-2021 21:46:04 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830951f29 Success.
[UPnP] 08-04-2021 21:46:04 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830957ccd Success.
[Firewall] 08-04-2021 21:46:09, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21934 DPT=445
[WAN] 08-04-2021 21:47:44 LCP echo-request has been send from WAN WAN1
[IPTV] 08-04-2021 21:47:49 LAN send out a general query.
[WAN] 08-04-2021 21:47:54 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 21:49:50 DEAUTH(5) reason4 from sta:d0:77:14:c5:70:66 intf wl1
[WIFI] 08-04-2021 21:49:50 DISASSOC(12) reason8 send to sta:d0:77:14:c5:70:66 intf
wl1
[IPTV] 08-04-2021 21:49:54 LAN send out a general query.
[VoIP] 08-04-2021 21:50:15 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 21:51:59 LAN send out a general query.
[WIFI] 08-04-2021 21:52:02 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 21:52:02 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 21:52:03 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:52:03 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:52:03 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 21:52:03 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 21:52:03 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-04-2021 21:52:48, DROP SRC=146.88.240.4 DST=187.221.151.105 PROTO=UDP
SPT=51783 DPT=137 LEN=58
[WAN] 08-04-2021 21:52:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:53:05 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 21:53:32, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=36658 DPT=53 LEN=38
[IPTV] 08-04-2021 21:54:04 LAN send out a general query.
[IPTV] 08-04-2021 21:56:09 LAN send out a general query.
[Firewall] 08-04-2021 21:57:07, DROP SRC=125.25.158.174 DST=187.221.151.105
PROTO=TCP SPT=64623 DPT=445
[WIFI] 08-04-2021 21:57:09 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:57:09 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:57:09 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-04-2021 21:57:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:58:05 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:58:14 LAN send out a general query.
[UPnP] 08-04-2021 21:59:20 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309558ba Success.
[UPnP] 08-04-2021 21:59:20 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:59:20 upnp_event_send: msg: NOTIFY /upnp/eventing/yoooaqtmwp
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309558baSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:59:24 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095d7ab Success.
[UPnP] 08-04-2021 21:59:24 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:59:24 upnp_event_send: msg: NOTIFY /upnp/eventing/sfjdabfnbh
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a1683095d7abSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 08-04-2021 22:00:19 LAN send out a general query.
[IPTV] 08-04-2021 22:02:24 LAN send out a general query.
[WAN] 08-04-2021 22:03:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:03:15 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:04:29 LAN send out a general query.
[Firewall] 08-04-2021 22:05:22, DROP SRC=129.250.206.86 DST=187.221.151.105
PROTO=UDP SPT=13959 DPT=53 LEN=55
[IPTV] 08-04-2021 22:06:34 LAN send out a general query.
[Firewall] 08-04-2021 22:08:08, DROP SRC=187.190.95.149 DST=187.221.151.105
PROTO=TCP SPT=8220 DPT=445
[WAN] 08-04-2021 22:08:16 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:08:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:08:39 LAN send out a general query.
[IPTV] 08-04-2021 22:10:44 LAN send out a general query.
[IPTV] 08-04-2021 22:12:49 LAN send out a general query.
[WAN] 08-04-2021 22:13:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:13:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:14:54 LAN send out a general query.
[Firewall] 08-04-2021 22:16:54, DROP SRC=113.175.129.42 DST=187.221.151.105
PROTO=TCP SPT=53724 DPT=445
[IPTV] 08-04-2021 22:16:59 LAN send out a general query.
[WIFI] 08-04-2021 22:17:58 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 22:17:58 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WAN] 08-04-2021 22:18:36 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:18:36 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:19:04 LAN send out a general query.
[WIFI] 08-04-2021 22:19:58 DEAUTH(5) reason7 from sta:d0:77:14:c5:70:66 intf wl1
[LAN] 08-04-2021 22:20:00 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[VoIP] 08-04-2021 22:20:19 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 22:21:09 LAN send out a general query.
[WIFI] 08-04-2021 22:22:11 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 22:22:11 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 22:22:11 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:22:11 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:22:11 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 22:22:11 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 22:22:11 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 22:23:14 LAN send out a general query.
[WAN] 08-04-2021 22:23:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:23:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:25:19 LAN send out a general query.
[Firewall] 08-04-2021 22:26:30, DROP SRC=128.14.209.253 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-04-2021 22:27:24 LAN send out a general query.
[WAN] 08-04-2021 22:28:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:28:57 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:29:29 LAN send out a general query.
[IPTV] 08-04-2021 22:31:34 LAN send out a general query.
[IPTV] 08-04-2021 22:33:39 LAN send out a general query.
[WAN] 08-04-2021 22:33:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:33:57 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:35:44 LAN send out a general query.
[Firewall] 08-04-2021 22:36:32, DROP SRC=180.152.9.86 DST=187.221.151.105 PROTO=TCP
SPT=63222 DPT=445
[IPTV] 08-04-2021 22:37:49 LAN send out a general query.
[WAN] 08-04-2021 22:39:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:39:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:39:54 LAN send out a general query.
[IPTV] 08-04-2021 22:41:59 LAN send out a general query.
[IPTV] 08-04-2021 22:44:04 LAN send out a general query.
[WAN] 08-04-2021 22:44:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:44:18 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:46:09 LAN send out a general query.
[WIFI] 08-04-2021 22:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 22:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 22:47:27 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 22:48:14 LAN send out a general query.
[WAN] 08-04-2021 22:49:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:49:28 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:50:19 LAN send out a general query.
[VoIP] 08-04-2021 22:50:23 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-04-2021 22:52:20 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 22:52:20 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 22:52:20 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:52:20 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:52:20 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 22:52:20 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 22:52:20 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 22:52:24 LAN send out a general query.
[IPTV] 08-04-2021 22:54:29 LAN send out a general query.
[WAN] 08-04-2021 22:54:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:54:39 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:56:34 LAN send out a general query.
[IPTV] 08-04-2021 22:58:39 LAN send out a general query.
[WAN] 08-04-2021 22:59:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:59:49 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:00:24, DROP SRC=202.163.101.11 DST=187.221.151.105
PROTO=TCP SPT=55187 DPT=445
[IPTV] 08-04-2021 23:00:44 LAN send out a general query.
[LAN] 08-04-2021 23:01:47 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:48 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:49 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:49 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[IPTV] 08-04-2021 23:02:49 LAN send out a general query.
[Firewall] 08-04-2021 23:04:28, DROP SRC=192.241.207.141 DST=187.221.151.105
PROTO=TCP SPT=60355 DPT=139
[Firewall] 08-04-2021 23:04:48, DROP SRC=58.9.45.27 DST=187.221.151.105 PROTO=TCP
SPT=48908 DPT=445
[IPTV] 08-04-2021 23:04:54 LAN send out a general query.
[WAN] 08-04-2021 23:04:59 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:04:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:06:59 LAN send out a general query.
[IPTV] 08-04-2021 23:09:04 LAN send out a general query.
[WAN] 08-04-2021 23:10:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:10:10 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:10:37, DROP SRC=192.35.168.154 DST=187.221.151.105
PROTO=UDP SPT=56339 DPT=53 LEN=37
[IPTV] 08-04-2021 23:11:09 LAN send out a general query.
[IPTV] 08-04-2021 23:13:14 LAN send out a general query.
[IPTV] 08-04-2021 23:15:19 LAN send out a general query.
[WAN] 08-04-2021 23:15:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:15:20 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:16:31, DROP SRC=187.217.115.162 DST=187.221.151.105
PROTO=TCP SPT=62972 DPT=445
[IPTV] 08-04-2021 23:17:24 LAN send out a general query.
[IPTV] 08-04-2021 23:19:29 LAN send out a general query.
[WAN] 08-04-2021 23:20:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:20:20 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-04-2021 23:20:27 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 23:21:34 LAN send out a general query.
[WIFI] 08-04-2021 23:22:29 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 23:22:29 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 23:22:29 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:22:29 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:22:29 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 23:22:29 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 23:22:29 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 23:23:39 LAN send out a general query.
[WAN] 08-04-2021 23:25:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:25:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:25:44 LAN send out a general query.
[IPTV] 08-04-2021 23:27:49 LAN send out a general query.
[IPTV] 08-04-2021 23:29:54 LAN send out a general query.
[WAN] 08-04-2021 23:30:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:30:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:31:59 LAN send out a general query.
[IPTV] 08-04-2021 23:34:04 LAN send out a general query.
[Firewall] 08-04-2021 23:34:16, DROP SRC=43.249.52.185 DST=187.221.151.105
PROTO=TCP SPT=59282 DPT=445
[WAN] 08-04-2021 23:35:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:35:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:36:09 LAN send out a general query.
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 23:37:35 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:35 Request IP [192.168.1.72] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 23:37:35 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:36 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:36 Request IP [192.168.1.72] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 23:37:37 Send OFFER of ip [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:37 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:37 Successfully assign IP [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-04-2021 23:38:14 LAN send out a general query.
[IPTV] 08-04-2021 23:40:19 LAN send out a general query.
[WAN] 08-04-2021 23:40:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:40:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:42:24 LAN send out a general query.
[WIFI] 08-04-2021 23:43:31 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:43:31 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:43:50 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:43:50 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:43:50 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[Firewall] 08-04-2021 23:44:02, DROP SRC=103.164.98.138 DST=187.221.151.105
PROTO=TCP SPT=54421 DPT=445
[Firewall] 08-04-2021 23:44:23, DROP SRC=62.141.75.108 DST=187.221.151.105
PROTO=TCP SPT=41626 DPT=445
[IPTV] 08-04-2021 23:44:29 LAN send out a general query.
[Firewall] 08-04-2021 23:45:58, DROP SRC=144.172.83.87 DST=187.221.151.105
PROTO=UDP SPT=59001 DPT=53 LEN=38
[WAN] 08-04-2021 23:46:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:46:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:46:34 LAN send out a general query.
[WIFI] 08-04-2021 23:47:26 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:26 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:47:27 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:52 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:52 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:48:19 DEAUTH(5) reason4 from sta:10:c7:53:2a:c5:98 intf wl1
[WIFI] 08-04-2021 23:48:19 DISASSOC(12) reason8 send to sta:10:c7:53:2a:c5:98 intf
wl1
[IPTV] 08-04-2021 23:48:39 LAN send out a general query.
[VoIP] 08-04-2021 23:50:28 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 23:50:44 LAN send out a general query.
[WAN] 08-04-2021 23:51:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:51:02 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 23:52:38 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 23:52:38 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 23:52:39 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:52:39 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:52:39 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 23:52:39 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 23:52:39 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 23:52:49 LAN send out a general query.
[Firewall] 08-04-2021 23:53:42, DROP SRC=187.254.96.60 DST=187.221.151.105
PROTO=TCP SPT=53103 DPT=445
[Firewall] 08-04-2021 23:53:43, DROP SRC=187.254.96.60 DST=187.221.151.105
PROTO=TCP SPT=53103 DPT=445
[IPTV] 08-04-2021 23:54:54 LAN send out a general query.
[WIFI] 08-04-2021 23:54:55 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 ASSOC(8) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 Authorized sta:64:1c:ae:07:d8:ab intf wl0
[LAN] 08-04-2021 23:54:56 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:54:56 Send NAK to client ip [0.0.0.0] mac [64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:54:59 Received DISCOVER from client mac [64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:00 Send OFFER of ip [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:01 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:01 Successfully assign IP [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab], lease time [86400]
[WIFI] 08-04-2021 23:55:48 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:55:48 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:55:48 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:55:51 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:55:51 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WAN] 08-04-2021 23:56:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:56:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:56:59 LAN send out a general query.
[IPTV] 08-04-2021 23:59:04 LAN send out a general query.
[IPTV] 08-05-2021 00:01:09 LAN send out a general query.
[WAN] 08-05-2021 00:01:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:01:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:03:14 LAN send out a general query.
[IPTV] 08-05-2021 00:05:19 LAN send out a general query.
[WAN] 08-05-2021 00:06:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:06:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:07:24 LAN send out a general query.
[WIFI] 08-05-2021 00:08:29 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:08:29 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:08:29 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 00:09:29 LAN send out a general query.
[Firewall] 08-05-2021 00:09:52, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=48044 DPT=53 LEN=38
[WAN] 08-05-2021 00:11:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:11:34 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:11:34 LAN send out a general query.
[IPTV] 08-05-2021 00:13:39 LAN send out a general query.
[LAN] 08-05-2021 00:13:52 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:13:52 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:15:44 LAN send out a general query.
[WAN] 08-05-2021 00:16:44 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:16:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:17:49 LAN send out a general query.
{Firewall} 08-05-2021 00:19:48 DoS attack: TCP Port Scan from source:
188.124.36.118:44452
{Firewall} 08-05-2021 00:19:48 drop this packet for psd
[IPTV] 08-05-2021 00:19:54 LAN send out a general query.
[VoIP] 08-05-2021 00:20:33 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-05-2021 00:20:33 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:33 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-05-2021 00:20:48 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:50 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:20:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:20:51 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:21:02 DEAUTH(5) reason3 from sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-05-2021 00:21:44 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:21:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:21:59 LAN send out a general query.
[WIFI] 08-05-2021 00:22:48 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 00:22:48 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 00:22:48 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:22:48 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:22:48 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 00:22:48 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 00:22:48 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 00:24:04 LAN send out a general query.
[WIFI] 08-05-2021 00:25:30 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-05-2021 00:25:30 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:25:30 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[WIFI] 08-05-2021 00:25:51 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:25:51 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 00:26:09 LAN send out a general query.
[WAN] 08-05-2021 00:26:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:26:55 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:28:14 LAN send out a general query.
[WIFI] 08-05-2021 00:28:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:28:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:28:51 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 00:30:19 LAN send out a general query.
[WAN] 08-05-2021 00:32:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:32:05 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:32:24 LAN send out a general query.
[WIFI] 08-05-2021 00:33:12 DEAUTH(5) reason4 from sta:64:1c:ae:07:d8:ab intf wl0
[WIFI] 08-05-2021 00:33:12 DISASSOC(12) reason8 send to sta:64:1c:ae:07:d8:ab intf
wl0
[IPTV] 08-05-2021 00:34:29 LAN send out a general query.
[IPTV] 08-05-2021 00:36:34 LAN send out a general query.
[WAN] 08-05-2021 00:37:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:37:05 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 00:37:33 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:37:33 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[Firewall] 08-05-2021 00:37:33, DROP SRC=113.184.25.201 DST=187.221.151.105
PROTO=TCP SPT=52535 DPT=445
[IPTV] 08-05-2021 00:38:39 LAN send out a general query.
[WIFI] 08-05-2021 00:39:05 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-05-2021 00:39:06 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:06 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:06 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:08 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:08 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:08 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:10 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:11 Send OFFER of ip [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:12 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:13 Send OFFER of ip [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:14 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:14 Successfully assign IP [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:40:44 LAN send out a general query.
[WIFI] 08-05-2021 00:41:14 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:41:14 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:41:14 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-05-2021 00:42:16 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:42:16 LCP echo-reply has been received from WAN WAN1
[LAN] 08-05-2021 00:42:34 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:34 Request IP [192.168.1.73] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:42:34 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:40 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:40 Request IP [192.168.1.73] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:42:41 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:42 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:43 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:44 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:44 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-05-2021 00:42:45 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:46 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-05-2021 00:42:47 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:47 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:42:49 LAN send out a general query.
[LAN] 08-05-2021 00:42:51 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:51 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[WIFI] 08-05-2021 00:43:34 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:43:34 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 00:44:54 LAN send out a general query.
[Firewall] 08-05-2021 00:45:04, DROP SRC=183.136.225.42 DST=187.221.151.105
PROTO=UDP SPT=6828 DPT=53 LEN=38
[IPTV] 08-05-2021 00:46:59 LAN send out a general query.
[WAN] 08-05-2021 00:47:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:47:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:49:04 LAN send out a general query.
[VoIP] 08-05-2021 00:50:34 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 00:51:09 LAN send out a general query.
[WAN] 08-05-2021 00:52:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:52:26 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 00:52:56 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 00:52:56 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 00:52:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:52:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:52:56 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 00:52:56 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 00:52:56 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 00:53:14 LAN send out a general query.
[IPTV] 08-05-2021 00:55:19 LAN send out a general query.
[IPTV] 08-05-2021 00:57:24 LAN send out a general query.
[WAN] 08-05-2021 00:57:37 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:57:37 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:59:29 LAN send out a general query.
{Firewall} 08-05-2021 01:01:15 DoS attack: TCP Port Scan from source:
188.124.36.163:44435
{Firewall} 08-05-2021 01:01:15 drop this packet for psd
[IPTV] 08-05-2021 01:01:34 LAN send out a general query.
[WAN] 08-05-2021 01:02:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:02:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:03:39 LAN send out a general query.
[IPTV] 08-05-2021 01:05:44 LAN send out a general query.
{Firewall} 08-05-2021 01:07:45 DoS attack: UDP Port Scan from source:
146.88.240.4:42987
{Firewall} 08-05-2021 01:07:45 drop this packet for psd
[WAN] 08-05-2021 01:07:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:07:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:07:49 LAN send out a general query.
[IPTV] 08-05-2021 01:09:54 LAN send out a general query.
[IPTV] 08-05-2021 01:11:59 LAN send out a general query.
[WAN] 08-05-2021 01:12:58 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:12:58 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:14:04 LAN send out a general query.
[Firewall] 08-05-2021 01:14:09, DROP SRC=36.27.214.242 DST=187.221.151.105
PROTO=UDP SPT=43638 DPT=53 LEN=39
[WIFI] 08-05-2021 01:15:18 DEAUTH(5) reason7 from sta:4c:c9:5e:29:00:fc intf wl1
[LAN] 08-05-2021 01:15:19 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:19 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 01:15:20 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:20 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:21 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:21 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:22 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:22 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[IPTV] 08-05-2021 01:16:09 LAN send out a general query.
[Firewall] 08-05-2021 01:17:55, DROP SRC=2.89.171.218 DST=187.221.151.105 PROTO=TCP
SPT=41337 DPT=445
[WAN] 08-05-2021 01:18:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:18:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:18:14 LAN send out a general query.
[IPTV] 08-05-2021 01:20:19 LAN send out a general query.
[VoIP] 08-05-2021 01:20:35 receive response of OPTIONS message, rspcode is:200
[Firewall] 08-05-2021 01:21:43, DROP SRC=203.159.80.142 DST=187.221.151.105
PROTO=UDP SPT=45622 DPT=53 LEN=20
[IPTV] 08-05-2021 01:22:24 LAN send out a general query.
[WIFI] 08-05-2021 01:23:05 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 01:23:05 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 01:23:05 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:23:05 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:23:05 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 01:23:06 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 01:23:06 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-05-2021 01:23:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:23:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:24:29 LAN send out a general query.
[IPTV] 08-05-2021 01:26:34 LAN send out a general query.
[WAN] 08-05-2021 01:28:19 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:28:19 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:28:39 LAN send out a general query.
[Firewall] 08-05-2021 01:30:27, DROP SRC=23.94.188.98 DST=187.221.151.105 PROTO=TCP
SPT=41186 DPT=445
[IPTV] 08-05-2021 01:30:44 LAN send out a general query.
[Firewall] 08-05-2021 01:32:17, DROP SRC=185.180.143.32 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 01:32:49 LAN send out a general query.
[WAN] 08-05-2021 01:33:29 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:33:29 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:34:54 LAN send out a general query.
[IPTV] 08-05-2021 01:36:59 LAN send out a general query.
[WAN] 08-05-2021 01:38:29 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:38:29 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:39:04 LAN send out a general query.
[Firewall] 08-05-2021 01:39:51, DROP SRC=203.160.187.102 DST=187.221.151.105
PROTO=TCP SPT=60580 DPT=445
[IPTV] 08-05-2021 01:41:09 LAN send out a general query.
[Firewall] 08-05-2021 01:41:59, DROP SRC=186.153.121.253 DST=187.221.151.105
PROTO=TCP SPT=59733 DPT=445
[IPTV] 08-05-2021 01:43:14 LAN send out a general query.
[WAN] 08-05-2021 01:43:40 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:43:40 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:45:19 LAN send out a general query.
[IPTV] 08-05-2021 01:47:24 LAN send out a general query.
[Firewall] 08-05-2021 01:47:30, DROP SRC=115.78.129.37 DST=187.221.151.105
PROTO=TCP SPT=42364 DPT=445
[WAN] 08-05-2021 01:48:50 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:48:50 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:49:29 LAN send out a general query.
[VoIP] 08-05-2021 01:50:37 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 01:51:34 LAN send out a general query.
[WIFI] 08-05-2021 01:53:14 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 01:53:14 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 01:53:14 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:53:14 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:53:14 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 01:53:14 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 01:53:14 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 01:53:39 LAN send out a general query.
[WAN] 08-05-2021 01:53:50 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:53:50 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:55:44 LAN send out a general query.
[IPTV] 08-05-2021 01:57:49 LAN send out a general query.
[WAN] 08-05-2021 01:59:01 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:59:01 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:59:54 LAN send out a general query.
[Firewall] 08-05-2021 02:00:57, DROP SRC=117.247.82.217 DST=187.221.151.105
PROTO=TCP SPT=51585 DPT=445
[Firewall] 08-05-2021 02:01:49, DROP SRC=114.35.78.235 DST=187.221.151.105
PROTO=TCP SPT=48118 DPT=445
[IPTV] 08-05-2021 02:01:59 LAN send out a general query.
{Firewall} 08-05-2021 02:03:07 DoS attack: TCP Port Scan from source:
91.206.14.241:49664
{Firewall} 08-05-2021 02:03:07 drop this packet for psd
[IPTV] 08-05-2021 02:04:04 LAN send out a general query.
[WAN] 08-05-2021 02:04:11 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:04:11 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 02:05:24, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=49109 DPT=53 LEN=38
[Firewall] 08-05-2021 02:05:53, DROP SRC=5.110.95.96 DST=187.221.151.105 PROTO=TCP
SPT=9272 DPT=445
[Firewall] 08-05-2021 02:05:56, DROP SRC=5.110.95.96 DST=187.221.151.105 PROTO=TCP
SPT=9272 DPT=445
[IPTV] 08-05-2021 02:06:09 LAN send out a general query.
[IPTV] 08-05-2021 02:08:14 LAN send out a general query.
[WAN] 08-05-2021 02:09:11 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:09:11 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:10:19 LAN send out a general query.
[IPTV] 08-05-2021 02:12:24 LAN send out a general query.
[WAN] 08-05-2021 02:14:22 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:14:22 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:14:29 LAN send out a general query.
[Firewall] 08-05-2021 02:15:54, DROP SRC=172.104.143.39 DST=187.221.151.105
PROTO=TCP SPT=60659 DPT=53
[IPTV] 08-05-2021 02:16:34 LAN send out a general query.
[IPTV] 08-05-2021 02:18:39 LAN send out a general query.
[WAN] 08-05-2021 02:19:32 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:19:32 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 02:20:38 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 02:20:44 LAN send out a general query.
[IPTV] 08-05-2021 02:22:49 LAN send out a general query.
[WIFI] 08-05-2021 02:23:46 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 02:23:46 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 02:23:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:23:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:23:46 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 02:23:46 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 02:23:46 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-05-2021 02:24:32 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:24:32 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:24:54 LAN send out a general query.
[IPTV] 08-05-2021 02:26:59 LAN send out a general query.
[Firewall] 08-05-2021 02:28:44, DROP SRC=41.38.45.99 DST=187.221.151.105 PROTO=TCP
SPT=60339 DPT=445
[IPTV] 08-05-2021 02:29:04 LAN send out a general query.
[WAN] 08-05-2021 02:29:43 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:29:43 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:31:09 LAN send out a general query.
[IPTV] 08-05-2021 02:33:14 LAN send out a general query.
[WAN] 08-05-2021 02:34:53 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:34:53 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:35:19 LAN send out a general query.
[IPTV] 08-05-2021 02:37:24 LAN send out a general query.
[WIFI] 08-05-2021 02:37:43 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-05-2021 02:37:43 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:43 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 02:37:43 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:44 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:44 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 02:37:45 Send OFFER of ip [192.168.1.71] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:45 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:45 Successfully assign IP [192.168.1.71] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-05-2021 02:39:29 LAN send out a general query.
[WAN] 08-05-2021 02:39:53 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:39:53 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:41:34 LAN send out a general query.
[IPTV] 08-05-2021 02:43:39 LAN send out a general query.
[WAN] 08-05-2021 02:45:04 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:45:04 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 02:45:43, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[IPTV] 08-05-2021 02:45:44 LAN send out a general query.
[Firewall] 08-05-2021 02:45:46, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[UPnP] 08-05-2021 02:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309541f2 Success.
[Firewall] 08-05-2021 02:45:52, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[UPnP] 08-05-2021 02:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830951efb Success.
[IPTV] 08-05-2021 02:47:49 LAN send out a general query.
[IPTV] 08-05-2021 02:49:54 LAN send out a general query.
[WAN] 08-05-2021 02:50:14 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:50:14 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 02:50:39 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 02:51:59 LAN send out a general query.
[WIFI] 08-05-2021 02:53:55 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 02:53:55 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 02:53:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:53:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:53:56 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 02:53:56 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 02:53:56 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 02:54:04 LAN send out a general query.
[WAN] 08-05-2021 02:55:14 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:55:14 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:56:09 LAN send out a general query.
[IPTV] 08-05-2021 02:58:14 LAN send out a general query.
[Firewall] 08-05-2021 02:59:12, DROP SRC=71.6.232.6 DST=187.221.151.105 PROTO=TCP
SPT=60816 DPT=445
[IPTV] 08-05-2021 03:00:19 LAN send out a general query.
[WAN] 08-05-2021 03:00:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:00:25 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:02:24 LAN send out a general query.
[IPTV] 08-05-2021 03:04:29 LAN send out a general query.
[WAN] 08-05-2021 03:05:35 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:05:35 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:06:34 LAN send out a general query.
[IPTV] 08-05-2021 03:08:39 LAN send out a general query.
[WAN] 08-05-2021 03:10:35 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:10:35 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:10:44 LAN send out a general query.
[IPTV] 08-05-2021 03:12:49 LAN send out a general query.
[Firewall] 08-05-2021 03:14:24, DROP SRC=122.187.95.118 DST=187.221.151.105
PROTO=TCP SPT=52550 DPT=445
[Firewall] 08-05-2021 03:14:27, DROP SRC=122.187.95.118 DST=187.221.151.105
PROTO=TCP SPT=52550 DPT=445
[IPTV] 08-05-2021 03:14:54 LAN send out a general query.
[WAN] 08-05-2021 03:15:45 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:15:45 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:16:59 LAN send out a general query.
[Firewall] 08-05-2021 03:17:37, DROP SRC=213.154.48.70 DST=187.221.151.105
PROTO=TCP SPT=6912 DPT=445
[IPTV] 08-05-2021 03:19:04 LAN send out a general query.
[VoIP] 08-05-2021 03:20:41 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 03:20:56 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:20:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:21:09 LAN send out a general query.
[Firewall] 08-05-2021 03:22:53, DROP SRC=220.189.119.47 DST=187.221.151.105
PROTO=TCP SPT=12218 DPT=445
[IPTV] 08-05-2021 03:23:14 LAN send out a general query.
[WIFI] 08-05-2021 03:24:05 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 03:24:05 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 03:24:06 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:24:06 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:24:06 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 03:24:06 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 03:24:06 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 03:25:19 LAN send out a general query.
[WAN] 08-05-2021 03:25:56 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:25:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:27:24 LAN send out a general query.
[IPTV] 08-05-2021 03:29:29 LAN send out a general query.
[WAN] 08-05-2021 03:31:06 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:31:06 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:31:34 LAN send out a general query.
[IPTV] 08-05-2021 03:33:39 LAN send out a general query.
[GPON] 08-05-2021 03:34:12 Transmit omci packet over time! sec=4087619073951662080
nsec=2668463181004800
[IPTV] 08-05-2021 03:35:44 LAN send out a general query.
[WAN] 08-05-2021 03:36:17 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:36:17 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:37:49 LAN send out a general query.
[IPTV] 08-05-2021 03:39:54 LAN send out a general query.
[WAN] 08-05-2021 03:41:27 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:41:27 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:41:59 LAN send out a general query.
[IPTV] 08-05-2021 03:44:04 LAN send out a general query.
[IPTV] 08-05-2021 03:46:09 LAN send out a general query.
[WAN] 08-05-2021 03:46:27 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:46:27 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:48:14 LAN send out a general query.
[IPTV] 08-05-2021 03:50:19 LAN send out a general query.
[VoIP] 08-05-2021 03:50:44 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 03:51:38 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:51:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:52:24 LAN send out a general query.
[WIFI] 08-05-2021 03:54:15 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 03:54:15 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 03:54:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:54:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:54:15 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 03:54:15 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 03:54:15 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 03:54:29 LAN send out a general query.
[Firewall] 08-05-2021 03:55:46, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=47791 DPT=53 LEN=38
[IPTV] 08-05-2021 03:56:34 LAN send out a general query.
[WAN] 08-05-2021 03:56:48 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:56:48 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:58:39 LAN send out a general query.
[IPTV] 08-05-2021 04:00:44 LAN send out a general query.
[WAN] 08-05-2021 04:01:48 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:01:48 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:02:49 LAN send out a general query.
[Firewall] 08-05-2021 04:04:33, DROP SRC=81.18.134.18 DST=187.221.151.105 PROTO=TCP
SPT=54345 DPT=445
[IPTV] 08-05-2021 04:04:54 LAN send out a general query.
[WAN] 08-05-2021 04:06:59 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:06:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:06:59 LAN send out a general query.
[IPTV] 08-05-2021 04:09:04 LAN send out a general query.
[IPTV] 08-05-2021 04:11:09 LAN send out a general query.
[WAN] 08-05-2021 04:12:09 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:12:09 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:13:14 LAN send out a general query.
[Firewall] 08-05-2021 04:14:49, DROP SRC=85.101.11.161 DST=187.221.151.105
PROTO=TCP SPT=54229 DPT=445
[Firewall] 08-05-2021 04:14:52, DROP SRC=85.101.11.161 DST=187.221.151.105
PROTO=TCP SPT=54229 DPT=445
[IPTV] 08-05-2021 04:15:19 LAN send out a general query.
[WAN] 08-05-2021 04:17:09 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:17:09 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:17:24 LAN send out a general query.
[IPTV] 08-05-2021 04:19:29 LAN send out a general query.
[VoIP] 08-05-2021 04:20:44 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 04:21:34 LAN send out a general query.
[WAN] 08-05-2021 04:22:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:22:20 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:23:39 LAN send out a general query.
[WIFI] 08-05-2021 04:25:27 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 04:25:27 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 04:25:27 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:25:27 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:25:27 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 04:25:27 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 04:25:27 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 04:25:44 LAN send out a general query.
[WAN] 08-05-2021 04:27:30 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:27:30 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:27:49 LAN send out a general query.
[IPTV] 08-05-2021 04:29:54 LAN send out a general query.
[IPTV] 08-05-2021 04:31:59 LAN send out a general query.
[WAN] 08-05-2021 04:32:30 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:32:30 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:34:04 LAN send out a general query.
[IPTV] 08-05-2021 04:36:09 LAN send out a general query.
[WAN] 08-05-2021 04:37:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:37:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:38:14 LAN send out a general query.
[IPTV] 08-05-2021 04:40:19 LAN send out a general query.
[IPTV] 08-05-2021 04:42:24 LAN send out a general query.
[Firewall] 08-05-2021 04:42:44, DROP SRC=222.67.247.104 DST=187.221.151.105
PROTO=TCP SPT=40033 DPT=445
[WAN] 08-05-2021 04:42:51 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:42:51 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:44:29 LAN send out a general query.
[IPTV] 08-05-2021 04:46:34 LAN send out a general query.
[WAN] 08-05-2021 04:47:51 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:47:51 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:48:39 LAN send out a general query.
[Firewall] 08-05-2021 04:49:37, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21209 DPT=139
[Firewall] 08-05-2021 04:49:40, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21209 DPT=139
[Firewall] 08-05-2021 04:50:35, DROP SRC=185.180.143.16 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 04:50:44 LAN send out a general query.
[VoIP] 08-05-2021 04:50:45 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 04:52:49 LAN send out a general query.
[WAN] 08-05-2021 04:53:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:53:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:54:54 LAN send out a general query.
[WIFI] 08-05-2021 04:55:36 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 04:55:36 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 04:55:36 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:55:36 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:55:36 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 04:55:36 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 04:55:36 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 04:56:59 LAN send out a general query.
[WAN] 08-05-2021 04:58:12 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:58:12 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:59:04 LAN send out a general query.
[IPTV] 08-05-2021 05:01:09 LAN send out a general query.
[WAN] 08-05-2021 05:03:12 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:03:12 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:03:14 LAN send out a general query.
[IPTV] 08-05-2021 05:05:19 LAN send out a general query.
[Firewall] 08-05-2021 05:05:48, DROP SRC=81.91.235.146 DST=187.221.151.105
PROTO=TCP SPT=61697 DPT=445
[IPTV] 08-05-2021 05:07:24 LAN send out a general query.
[WAN] 08-05-2021 05:08:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:08:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:09:29 LAN send out a general query.
[IPTV] 08-05-2021 05:11:34 LAN send out a general query.
[WAN] 08-05-2021 05:13:33 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:13:33 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:13:39 LAN send out a general query.
[IPTV] 08-05-2021 05:15:44 LAN send out a general query.
[IPTV] 08-05-2021 05:17:49 LAN send out a general query.
[WAN] 08-05-2021 05:18:33 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:18:33 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:19:54 LAN send out a general query.
[VoIP] 08-05-2021 05:20:49 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 05:21:59 LAN send out a general query.
[WAN] 08-05-2021 05:23:43 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:23:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:24:04 LAN send out a general query.
[WIFI] 08-05-2021 05:25:45 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 05:25:45 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 05:25:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:25:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:25:46 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 05:25:46 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 05:25:46 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 05:26:09 LAN send out a general query.
[IPTV] 08-05-2021 05:28:14 LAN send out a general query.
[WAN] 08-05-2021 05:28:54 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:28:54 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:30:19 LAN send out a general query.
[IPTV] 08-05-2021 05:32:24 LAN send out a general query.
[WAN] 08-05-2021 05:33:54 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:33:54 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:34:29 LAN send out a general query.
[IPTV] 08-05-2021 05:36:34 LAN send out a general query.
[Firewall] 08-05-2021 05:36:50, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=56555 DPT=53 LEN=38
[IPTV] 08-05-2021 05:38:39 LAN send out a general query.
[WAN] 08-05-2021 05:39:04 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:39:04 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:40:44 LAN send out a general query.
[IPTV] 08-05-2021 05:42:49 LAN send out a general query.
[WAN] 08-05-2021 05:44:15 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:44:15 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:44:54 LAN send out a general query.
[IPTV] 08-05-2021 05:46:59 LAN send out a general query.
[IPTV] 08-05-2021 05:49:04 LAN send out a general query.
[WAN] 08-05-2021 05:49:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:49:25 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 05:50:49 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 05:51:09 LAN send out a general query.
[Firewall] 08-05-2021 05:51:34, DROP SRC=113.161.78.238 DST=187.221.151.105
PROTO=TCP SPT=56594 DPT=445
[IPTV] 08-05-2021 05:53:14 LAN send out a general query.
[WAN] 08-05-2021 05:54:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:54:25 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:55:19 LAN send out a general query.
[WIFI] 08-05-2021 05:55:54 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 05:55:54 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 05:55:55 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:55:55 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:55:55 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 05:55:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 05:55:55 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-05-2021 05:56:05, DROP SRC=180.211.162.198 DST=187.221.151.105
PROTO=TCP SPT=47642 DPT=445
[IPTV] 08-05-2021 05:57:24 LAN send out a general query.
[IPTV] 08-05-2021 05:59:29 LAN send out a general query.
[WAN] 08-05-2021 05:59:36 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:59:36 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:01:34 LAN send out a general query.
[IPTV] 08-05-2021 06:03:39 LAN send out a general query.
[WAN] 08-05-2021 06:04:46 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:04:46 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:05:44 LAN send out a general query.
[IPTV] 08-05-2021 06:07:49 LAN send out a general query.
[WAN] 08-05-2021 06:09:46 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:09:46 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:09:54 LAN send out a general query.
[IPTV] 08-05-2021 06:11:59 LAN send out a general query.
[Firewall] 08-05-2021 06:12:07, DROP SRC=117.205.99.128 DST=187.221.151.105
PROTO=TCP SPT=63056 DPT=445
[IPTV] 08-05-2021 06:14:04 LAN send out a general query.
[WAN] 08-05-2021 06:14:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:14:57 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 06:15:06, DROP SRC=58.40.21.224 DST=187.221.151.105 PROTO=TCP
SPT=51175 DPT=445
[IPTV] 08-05-2021 06:16:09 LAN send out a general query.
[IPTV] 08-05-2021 06:18:14 LAN send out a general query.
[WAN] 08-05-2021 06:20:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:20:07 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:20:19 LAN send out a general query.
[VoIP] 08-05-2021 06:20:53 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 06:22:24 LAN send out a general query.
[IPTV] 08-05-2021 06:24:29 LAN send out a general query.
[WAN] 08-05-2021 06:25:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:25:07 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 06:26:14 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 06:26:14 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:26:15 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 06:26:15 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 06:26:15 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 06:26:34 LAN send out a general query.
[IPTV] 08-05-2021 06:28:39 LAN send out a general query.
[WAN] 08-05-2021 06:30:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:30:18 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:30:44 LAN send out a general query.
[Firewall] 08-05-2021 06:31:25, DROP SRC=185.94.111.1 DST=187.221.151.105 PROTO=UDP
SPT=43295 DPT=137 LEN=58
[IPTV] 08-05-2021 06:32:49 LAN send out a general query.
[Firewall] 08-05-2021 06:33:43, DROP SRC=147.203.255.20 DST=187.221.151.105
PROTO=UDP SPT=41013 DPT=53 LEN=38
[GPON] 08-05-2021 06:34:21 Transmit omci packet over time! sec=3700085291525079040
nsec=2668463181004800
[IPTV] 08-05-2021 06:34:54 LAN send out a general query.
[WAN] 08-05-2021 06:35:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:35:28 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:36:59 LAN send out a general query.
[IPTV] 08-05-2021 06:39:04 LAN send out a general query.
[WAN] 08-05-2021 06:40:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:40:28 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:07, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:08, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[IPTV] 08-05-2021 06:41:09 LAN send out a general query.
[IPTV] 08-05-2021 06:43:14 LAN send out a general query.
[IPTV] 08-05-2021 06:45:19 LAN send out a general query.
[WAN] 08-05-2021 06:45:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:45:39 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:47:24 LAN send out a general query.
[IPTV] 08-05-2021 06:49:29 LAN send out a general query.
[WAN] 08-05-2021 06:50:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:50:49 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 06:50:54 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 06:51:34 LAN send out a general query.
[Firewall] 08-05-2021 06:53:16, DROP SRC=58.34.159.197 DST=187.221.151.105
PROTO=TCP SPT=59638 DPT=445
[IPTV] 08-05-2021 06:53:39 LAN send out a general query.
[IPTV] 08-05-2021 06:55:44 LAN send out a general query.
[WAN] 08-05-2021 06:55:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:55:49 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 06:56:23 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 06:56:23 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 06:56:23 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:56:23 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:56:23 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 06:56:26 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 06:56:26 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 06:57:49 LAN send out a general query.
[IPTV] 08-05-2021 06:59:54 LAN send out a general query.
[WAN] 08-05-2021 07:01:00 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:01:00 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 07:01:06 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 07:01:06 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 07:01:59 LAN send out a general query.
[IPTV] 08-05-2021 07:04:04 LAN send out a general query.
[Firewall] 08-05-2021 07:05:55, DROP SRC=128.14.209.147 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 07:06:09 LAN send out a general query.
[WAN] 08-05-2021 07:06:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:06:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:08:14 LAN send out a general query.
[IPTV] 08-05-2021 07:10:19 LAN send out a general query.
[WAN] 08-05-2021 07:11:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:11:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:12:24 LAN send out a general query.
[IPTV] 08-05-2021 07:14:29 LAN send out a general query.
[WAN] 08-05-2021 07:16:21 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:16:21 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:16:34 LAN send out a general query.
[IPTV] 08-05-2021 07:18:39 LAN send out a general query.
[IPTV] 08-05-2021 07:20:44 LAN send out a general query.
[VoIP] 08-05-2021 07:20:54 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 07:21:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:21:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:22:49 LAN send out a general query.
[IPTV] 08-05-2021 07:24:54 LAN send out a general query.
[WAN] 08-05-2021 07:26:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:26:31 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 07:26:32 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 07:26:32 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 07:26:33 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 07:26:33 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 07:26:33 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 07:26:33 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 07:26:33 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 07:26:59 LAN send out a general query.
[IPTV] 08-05-2021 07:29:04 LAN send out a general query.
[IPTV] 08-05-2021 07:31:09 LAN send out a general query.
[WAN] 08-05-2021 07:31:42 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:31:42 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:33:14 LAN send out a general query.
[WIFI] 08-05-2021 07:34:22 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:22 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:22 ASSOC(8) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:25 Authorized sta:10:c7:53:2a:c5:98 intf wl1
[LAN] 08-05-2021 07:34:25 Received DISCOVER from client mac [10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Send OFFER of ip [192.168.1.69] to client mac
[10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Received REQUEST from client ip [0.0.0.0] mac
[10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Successfully assign IP [192.168.1.69] to client mac
[10:c7:53:2a:c5:98], lease time [86400]
[LAN] 08-05-2021 07:34:43 Received REQUEST from client ip [192.168.1.64] mac
[d0:77:14:ce:bd:ae]
[LAN] 08-05-2021 07:34:43 Successfully assign IP [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae], lease time [86400]
[IPTV] 08-05-2021 07:35:19 LAN send out a general query.
[LAN] 08-05-2021 07:35:54 Received REQUEST from client ip [192.168.1.68] mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:54 Request IP [192.168.1.68] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 07:35:54 Send NAK to client ip [192.168.1.68] mac
[a8:7d:12:27:ab:de]
[WIFI] 08-05-2021 07:35:57 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 ASSOC(8) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 Authorized sta:a8:7d:12:27:ab:de intf wl0
[LAN] 08-05-2021 07:35:57 Received DISCOVER from client mac [a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:57 Request IP [192.168.1.68] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 07:35:58 Send OFFER of ip [192.168.1.67] to client mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:58 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:58 Successfully assign IP [192.168.1.67] to client mac
[a8:7d:12:27:ab:de], lease time [86400]
[WAN] 08-05-2021 07:36:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:36:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:37:24 LAN send out a general query.
[WIFI] 08-05-2021 07:39:16 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 07:39:16 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 07:39:16 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 07:39:29 LAN send out a general query.
[IPTV] 08-05-2021 07:41:34 LAN send out a general query.
[WAN] 08-05-2021 07:41:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:41:52 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 07:43:18, DROP SRC=185.162.192.32 DST=187.221.151.105
PROTO=TCP SPT=47697 DPT=445
[IPTV] 08-05-2021 07:43:39 LAN send out a general query.
[WIFI] 08-05-2021 07:44:04 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 ASSOC(8) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 Authorized sta:64:1c:ae:07:d8:ab intf wl0
[LAN] 08-05-2021 07:44:04 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-05-2021 07:44:04 Successfully assign IP [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab], lease time [86400]
[IPTV] 08-05-2021 07:45:44 LAN send out a general query.
[UPnP] 08-05-2021 07:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095a9e3 Success.
[UPnP] 08-05-2021 07:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095e146 Success.
[UPnP] 08-05-2021 07:46:00 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095007c Success.
[UPnP] 08-05-2021 07:46:00 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309562c2 Success.
[WAN] 08-05-2021 07:47:03 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:47:03 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:47:49 LAN send out a general query.
[WIFI] 08-05-2021 07:48:30 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 07:48:30 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[Firewall] 08-05-2021 07:48:54, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:54, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:55, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:55, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:56, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:56, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:49:00, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:01, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:02, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[IPTV] 08-05-2021 07:49:54 LAN send out a general query.
[VoIP] 08-05-2021 07:50:55 receive response of OPTIONS message, rspcode is:200
[Firewall] 08-05-2021 07:51:47, DROP SRC=181.44.118.39 DST=187.221.151.105
PROTO=TCP SPT=38357 DPT=445
[IPTV] 08-05-2021 07:51:59 LAN send out a general query.
[WAN] 08-05-2021 07:52:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:52:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:54:04 LAN send out a general query.
[System] 08-05-2021 07:54:14 User 'TELMEX' login failed via HTTP from
192.168.1.70(MAC: 0C-7A-15-9C-F8-5B Host Name: MX-5CG0010WNN)
[System] 08-05-2021 07:54:21 User 'TELMEX' login successfully via HTTP from
192.168.1.70(MAC: 0C-7A-15-9C-F8-5B Host Name: MX-5CG0010WNN)
[System] 08-05-2021 07:55:26 Download Event Log by web client 192.168.1.70(MAC:0C-
7A-15-9C-F8-5B Host Name: MX-5CG0010WNN).

You might also like