FG6123BTM Firewall Logs & DoS Alerts
FG6123BTM Firewall Logs & DoS Alerts
{Firewall} 12-23-2020 21:39:45 DoS attack: TCP Port Scan from source:
94.102.49.117:41176
{Firewall} 12-23-2020 21:39:45 drop this packet for psd
{Firewall} 12-23-2020 23:58:40 DoS attack: TCP Port Scan from source:
221.231.126.2:58186
{Firewall} 12-23-2020 23:58:40 drop this packet for psd
{Firewall} 12-24-2020 14:23:03 DoS attack: TCP Port Scan from source:
94.102.49.93:41377
{Firewall} 12-24-2020 14:23:03 drop this packet for psd
{Firewall} 12-25-2020 00:00:13 DoS attack: TCP Port Scan from source:
220.164.192.25:49045
{Firewall} 12-25-2020 00:00:13 drop this packet for psd
{Firewall} 12-25-2020 08:42:13 DoS attack: TCP Port Scan from source:
94.102.49.137:47323
{Firewall} 12-25-2020 08:42:13 drop this packet for psd
{Firewall} 12-25-2020 21:43:46 DoS attack: TCP Port Scan from source:
94.102.49.104:54216
{Firewall} 12-25-2020 21:43:46 drop this packet for psd
{System} 12-26-2020 08:21:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 08:21:45 Sync up with NTP Server successfully, 2020-12-
26T08:21:45Z.
{System} 12-26-2020 08:21:46 TR069 connects to ACS server success.
{System} 12-26-2020 09:23:42 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 09:24:11 Sync up with NTP Server successfully, 2020-12-
26T09:24:11Z.
{System} 12-26-2020 09:24:13 TR069 connects to ACS server success.
{Firewall} 12-26-2020 09:46:04 DoS attack: TCP Port Scan from source:
89.248.174.39:49546
{Firewall} 12-26-2020 09:46:04 drop this packet for psd
{Firewall} 12-26-2020 10:52:44 DoS attack: TCP Port Scan from source:
94.102.49.137:41556
{Firewall} 12-26-2020 10:52:44 drop this packet for psd
{System} 12-26-2020 11:36:46 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 11:37:23 Sync up with NTP Server successfully, 2020-12-
26T11:37:23Z.
{System} 12-26-2020 11:37:25 TR069 connects to ACS server success.
{Firewall} 12-26-2020 12:01:13 DoS attack: TCP Port Scan from source:
89.248.174.39:49546
{Firewall} 12-26-2020 12:01:13 drop this packet for psd
{System} 12-26-2020 18:56:35 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-26-2020 18:57:04 Sync up with NTP Server successfully, 2020-12-
26T18:57:04Z.
{System} 12-26-2020 18:57:06 TR069 connects to ACS server success.
{Firewall} 12-26-2020 19:14:33 DoS attack: TCP Port Scan from source:
89.248.174.39:56352
{Firewall} 12-26-2020 19:14:33 drop this packet for psd
{Firewall} 12-27-2020 00:10:22 DoS attack: TCP Port Scan from source:
45.129.33.128:49964
{Firewall} 12-27-2020 00:10:22 drop this packet for psd
{Firewall} 12-27-2020 03:12:08 DoS attack: TCP Port Scan from source:
45.129.33.56:40310
{Firewall} 12-27-2020 03:12:08 drop this packet for psd
{Firewall} 12-27-2020 08:10:12 DoS attack: TCP Port Scan from source:
94.102.49.137:58205
{Firewall} 12-27-2020 08:10:12 drop this packet for psd
{Firewall} 12-27-2020 08:53:15 DoS attack: TCP Port Scan from source:
195.54.160.228:41649
{Firewall} 12-27-2020 08:53:15 drop this packet for psd
{Firewall} 12-27-2020 17:48:28 DoS attack: TCP Port Scan from source:
89.248.165.22:52892
{Firewall} 12-27-2020 17:48:28 drop this packet for psd
{Firewall} 12-28-2020 03:24:57 DoS attack: TCP Port Scan from source:
80.82.77.235:47491
{Firewall} 12-28-2020 03:24:57 drop this packet for psd
{Firewall} 12-28-2020 06:25:46 DoS attack: TCP Port Scan from source:
123.146.23.149:61454
{Firewall} 12-28-2020 06:25:46 drop this packet for psd
{Firewall} 12-28-2020 13:05:29 DoS attack: TCP Port Scan from source:
80.82.77.235:42322
{Firewall} 12-28-2020 13:05:29 drop this packet for psd
{System} 12-28-2020 15:50:29 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-28-2020 15:51:27 Sync up with NTP Server successfully, 2020-12-
28T15:51:28Z.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server success.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:29 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:41 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:47 TR069 connects to ACS server failed, http error 502.
{System} 12-28-2020 15:51:58 TR069 connects to ACS server failed, http error 502.
{Firewall} 12-28-2020 16:44:40 DoS attack: TCP Port Scan from source:
45.129.33.128:47364
{Firewall} 12-28-2020 16:44:40 drop this packet for psd
{System} 12-28-2020 16:56:39 The cmld process has been dead ! we restart the
process!
{Firewall} 12-28-2020 22:43:18 DoS attack: TCP Port Scan from source:
80.82.77.235:56981
{Firewall} 12-28-2020 22:43:18 drop this packet for psd
{Firewall} 12-29-2020 08:25:17 DoS attack: TCP Port Scan from source:
94.102.49.93:51905
{Firewall} 12-29-2020 08:25:17 drop this packet for psd
{System} 12-29-2020 10:03:26 Sync up with NTP Server successfully, 2020-12-
29T10:03:25Z.
{Firewall} 12-29-2020 12:39:08 DoS attack: TCP Port Scan from source:
194.26.25.13:49669
{Firewall} 12-29-2020 12:39:08 drop this packet for psd
{Firewall} 12-29-2020 18:07:23 DoS attack: TCP Port Scan from source:
80.82.65.60:46833
{Firewall} 12-29-2020 18:07:23 drop this packet for psd
{Firewall} 12-30-2020 00:23:21 DoS attack: TCP Port Scan from source:
119.60.5.37:3402
{Firewall} 12-30-2020 00:23:21 drop this packet for psd
{Firewall} 12-30-2020 03:54:01 DoS attack: TCP Port Scan from source:
80.82.77.235:42034
{Firewall} 12-30-2020 03:54:01 drop this packet for psd
{Firewall} 12-30-2020 08:56:03 DoS attack: TCP Port Scan from source:
164.68.112.178:55266
{Firewall} 12-30-2020 08:56:03 drop this packet for psd
{Firewall} 12-30-2020 13:47:49 DoS attack: TCP Port Scan from source:
89.248.162.179:57662
{Firewall} 12-30-2020 13:47:49 drop this packet for psd
{Firewall} 12-31-2020 00:03:42 DoS attack: TCP Port Scan from source:
94.102.49.117:54614
{Firewall} 12-31-2020 00:03:42 drop this packet for psd
{System} 12-31-2020 09:51:11 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 12-31-2020 09:51:43 Sync up with NTP Server successfully, 2020-12-
31T09:51:43Z.
{System} 12-31-2020 09:51:45 TR069 connects to ACS server success.
{Firewall} 12-31-2020 10:03:06 DoS attack: TCP Port Scan from source:
80.82.64.242:50574
{Firewall} 12-31-2020 10:03:06 drop this packet for psd
{Firewall} 12-31-2020 19:57:32 DoS attack: TCP Port Scan from source:
94.102.49.117:46241
{Firewall} 12-31-2020 19:57:32 drop this packet for psd
{Firewall} 01-01-2021 05:43:06 DoS attack: TCP Port Scan from source:
89.248.171.134:41377
{Firewall} 01-01-2021 05:43:06 drop this packet for psd
{Firewall} 01-01-2021 07:55:21 DoS attack: TCP Port Scan from source:
45.134.26.226:56400
{Firewall} 01-01-2021 07:55:21 drop this packet for psd
{System} 01-01-2021 12:33:35 Sync up with NTP Server successfully, 2021-01-
01T12:33:35Z.
{Firewall} 01-01-2021 14:03:59 DoS attack: TCP Port Scan from source:
89.248.168.62:41790
{Firewall} 01-01-2021 14:03:59 drop this packet for psd
{Firewall} 01-01-2021 15:57:39 DoS attack: TCP Port Scan from source:
94.102.49.59:58251
{Firewall} 01-01-2021 15:57:39 drop this packet for psd
{Firewall} 01-02-2021 02:23:19 DoS attack: TCP Port Scan from source:
89.248.165.20:55792
{Firewall} 01-02-2021 02:23:19 drop this packet for psd
{Firewall} 01-02-2021 07:00:31 DoS attack: TCP Port Scan from source:
185.175.93.104:50545
{Firewall} 01-02-2021 07:00:31 drop this packet for psd
{Firewall} 01-04-2021 23:27:14 DoS attack: UDP Port Scan from source:
69.162.117.142:5210
{Firewall} 01-04-2021 23:27:14 drop this packet for psd
{Firewall} 01-08-2021 21:14:15 DoS attack: TCP Port Scan from source:
220.191.220.65:6000
{Firewall} 01-08-2021 21:14:15 drop this packet for psd
{Firewall} 01-14-2021 21:38:54 DoS attack: UDP Port Scan from source:
23.148.145.27:5121
{Firewall} 01-14-2021 21:38:54 drop this packet for psd
{System} 01-17-2021 16:03:36 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-17-2021 16:05:00 Sync up with NTP Server successfully, 2021-01-
17T16:05:00Z.
{System} 01-17-2021 16:05:01 TR069 connects to ACS server success.
{Firewall} 01-17-2021 17:54:51 DoS attack: TCP Port Scan from source:
139.59.87.56:47544
{Firewall} 01-17-2021 17:54:51 drop this packet for psd
{Firewall} 01-18-2021 03:30:30 DoS attack: TCP Port Scan from source:
89.248.165.63:42222
{Firewall} 01-18-2021 03:30:30 drop this packet for psd
{Firewall} 01-19-2021 09:19:11 DoS attack: TCP Port Scan from source:
45.146.165.24:53297
{Firewall} 01-19-2021 09:19:11 drop this packet for psd
{Firewall} 01-22-2021 11:46:39 DoS attack: TCP Port Scan from source:
67.212.1.185:32826
{Firewall} 01-22-2021 11:46:39 drop this packet for psd
{Firewall} 01-23-2021 02:54:33 DoS attack: TCP Port Scan from source:
219.132.152.130:6000
{Firewall} 01-23-2021 02:54:33 drop this packet for psd
{Firewall} 01-27-2021 01:25:38 DoS attack: TCP Port Scan from source:
223.112.70.109:6000
{Firewall} 01-27-2021 01:25:38 drop this packet for psd
{Firewall} 01-29-2021 04:23:18 DoS attack: UDP Port Scan from source:
80.94.93.23:5124
{Firewall} 01-29-2021 04:23:18 drop this packet for psd
{Firewall} 01-29-2021 21:39:36 DoS attack: TCP Port Scan from source:
95.46.114.141:45015
{Firewall} 01-29-2021 21:39:36 drop this packet for psd
{Firewall} 02-04-2021 01:30:21 DoS attack: TCP Port Scan from source:
211.148.188.89:7471
{Firewall} 02-04-2021 01:30:21 drop this packet for psd
{Firewall} 02-04-2021 07:27:04 DoS attack: UDP Port Scan from source:
80.94.93.23:5264
{Firewall} 02-04-2021 07:27:04 drop this packet for psd
{Firewall} 02-07-2021 23:13:50 DoS attack: TCP Port Scan from source:
220.164.192.25:6000
{Firewall} 02-07-2021 23:13:50 drop this packet for psd
{Firewall} 02-08-2021 05:52:57 DoS attack: TCP Port Scan from source:
14.192.241.68:50310
{Firewall} 02-08-2021 05:52:57 drop this packet for psd
{System} 02-08-2021 16:15:52 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 02-08-2021 16:16:24 TR069 connects to ACS server success.
{System} 02-08-2021 16:16:27 Sync up with NTP Server successfully, 2021-02-
08T16:16:27Z.
{Firewall} 02-08-2021 16:47:06 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-08-2021 16:47:06 drop this packet for psd
{Firewall} 02-09-2021 02:04:01 DoS attack: TCP Port Scan from source:
92.63.197.58:54907
{Firewall} 02-09-2021 02:04:01 drop this packet for psd
{Firewall} 02-09-2021 04:45:05 DoS attack: TCP Port Scan from source:
194.147.140.48:53068
{Firewall} 02-09-2021 04:45:05 drop this packet for psd
{Firewall} 02-09-2021 09:50:21 DoS attack: TCP Port Scan from source:
194.147.140.105:50306
{Firewall} 02-09-2021 09:50:21 drop this packet for psd
{Firewall} 02-09-2021 10:31:12 DoS attack: TCP Port Scan from source:
45.146.165.153:45863
{Firewall} 02-09-2021 10:31:12 drop this packet for psd
{Firewall} 02-09-2021 13:29:35 DoS attack: TCP Port Scan from source:
194.147.140.29:50255
{Firewall} 02-09-2021 13:29:35 drop this packet for psd
{Firewall} 02-10-2021 03:34:24 DoS attack: TCP Port Scan from source:
104.152.52.58:45283
{Firewall} 02-10-2021 03:34:24 drop this packet for psd
{Firewall} 02-10-2021 17:40:04 UDP flood attack from WAN1 has been detected,
SRC=15.176.5.22 DST=187.221.153.229 PROTO=UDP SPT=3478 DPT=3478 LEN=16
{Firewall} 02-14-2021 02:33:23 DoS attack: TCP Port Scan from source:
204.93.154.208:52942
{Firewall} 02-14-2021 02:33:23 drop this packet for psd
{System} 02-15-2021 19:28:42 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 02-15-2021 19:30:08 TR069 connects to ACS server success.
{System} 02-15-2021 19:30:11 Sync up with NTP Server successfully, 2021-02-
15T19:30:11Z.
{Firewall} 02-15-2021 20:12:47 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-15-2021 20:12:47 drop this packet for psd
{System} 02-15-2021 21:26:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 02-15-2021 21:28:05 Sync up with NTP Server successfully, 2021-02-
15T21:28:05Z.
{System} 02-15-2021 21:28:06 TR069 connects to ACS server success.
{Firewall} 02-15-2021 21:53:57 DoS attack: TCP Port Scan from source:
3.64.168.80:53555
{Firewall} 02-15-2021 21:53:57 drop this packet for psd
{Firewall} 02-15-2021 23:38:08 DoS attack: TCP Port Scan from source:
194.147.140.73:51171
{Firewall} 02-15-2021 23:38:08 drop this packet for psd
{Firewall} 02-16-2021 08:33:13 DoS attack: UDP Port Scan from source:
174.139.47.130:6252
{Firewall} 02-16-2021 08:33:13 drop this packet for psd
{Firewall} 02-16-2021 12:11:56 DoS attack: TCP Port Scan from source:
185.236.11.32:41593
{Firewall} 02-16-2021 12:11:56 drop this packet for psd
{Firewall} 02-16-2021 17:16:34 DoS attack: TCP Port Scan from source:
194.147.140.41:45943
{Firewall} 02-16-2021 17:16:34 drop this packet for psd
{System} 02-16-2021 17:45:00 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 02-16-2021 17:45:30 Sync up with NTP Server successfully, 2021-02-
16T17:45:30Z.
{System} 02-16-2021 17:45:32 TR069 connects to ACS server success.
{Firewall} 02-16-2021 19:48:13 DoS attack: TCP Port Scan from source:
194.147.140.73:51171
{Firewall} 02-16-2021 19:48:13 drop this packet for psd
{Firewall} 02-16-2021 20:44:09 DoS attack: TCP Port Scan from source:
194.147.140.41:45943
{Firewall} 02-16-2021 20:44:09 drop this packet for psd
{Firewall} 02-16-2021 21:09:09 DoS attack: TCP Port Scan from source:
172.245.10.231:42613
{Firewall} 02-16-2021 21:09:09 drop this packet for psd
{Firewall} 02-16-2021 22:48:45 DoS attack: TCP Port Scan from source:
45.9.148.54:43329
{Firewall} 02-16-2021 22:48:45 drop this packet for psd
{Firewall} 02-17-2021 19:38:25 DoS attack: TCP Port Scan from source:
104.152.52.72:38958
{Firewall} 02-17-2021 19:38:25 drop this packet for psd
{Firewall} 02-18-2021 02:53:34 DoS attack: TCP Port Scan from source:
89.248.169.2:58386
{Firewall} 02-18-2021 02:53:34 drop this packet for psd
{System} 02-19-2021 11:18:20 Sync up with NTP Server successfully, 2021-02-
19T11:18:20Z.
{Firewall} 02-19-2021 13:09:45 DoS attack: TCP Port Scan from source:
95.142.44.155:53308
{Firewall} 02-19-2021 13:09:45 drop this packet for psd
{Firewall} 02-20-2021 16:20:26 DoS attack: TCP Port Scan from source:
52.205.180.248:59624
{Firewall} 02-20-2021 16:20:26 drop this packet for psd
{Firewall} 02-21-2021 01:56:18 DoS attack: UDP Port Scan from source:
163.172.14.15:5608
{Firewall} 02-21-2021 01:56:18 drop this packet for psd
{Firewall} 02-21-2021 13:09:51 DoS attack: TCP Port Scan from source:
89.248.165.13:54585
{Firewall} 02-21-2021 13:09:51 drop this packet for psd
{Firewall} 02-22-2021 05:42:17 DoS attack: UDP Port Scan from source:
92.204.54.16:5798
{Firewall} 02-22-2021 05:42:17 drop this packet for psd
{Firewall} 02-24-2021 02:34:38 DoS attack: TCP Port Scan from source:
193.29.13.31:65531
{Firewall} 02-24-2021 02:34:38 drop this packet for psd
{Firewall} 02-24-2021 03:38:47 DoS attack: TCP Port Scan from source:
194.165.16.8:65525
{Firewall} 02-24-2021 03:38:47 drop this packet for psd
{Firewall} 02-24-2021 16:54:10 DoS attack: TCP Port Scan from source:
211.148.188.89:3560
{Firewall} 02-24-2021 16:54:10 drop this packet for psd
{Firewall} 02-27-2021 18:03:29 DoS attack: TCP Port Scan from source:
45.144.225.112:50604
{Firewall} 02-27-2021 18:03:29 drop this packet for psd
{System} 03-01-2021 10:08:11 The vgw_app process has been dead ! we restart the
process!
{System} 03-01-2021 10:08:19 The voip_monitor process has been dead ! we restart
the process!
{System} 03-01-2021 20:11:03 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 20:12:17 Sync up with NTP Server successfully, 2021-03-
01T20:12:17Z.
{System} 03-01-2021 20:12:18 TR069 connects to ACS server success.
{System} 03-01-2021 20:15:38 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 20:16:38 Sync up with NTP Server successfully, 2021-03-
01T20:16:37Z.
{System} 03-01-2021 20:16:39 TR069 connects to ACS server success.
{Firewall} 03-01-2021 21:22:59 DoS attack: TCP Port Scan from source:
194.147.140.94:46287
{Firewall} 03-01-2021 21:22:59 drop this packet for psd
{System} 03-01-2021 21:29:04 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-01-2021 21:29:38 TR069 connects to ACS server success.
{System} 03-01-2021 21:29:41 Sync up with NTP Server successfully, 2021-03-
01T21:29:41Z.
{Firewall} 03-03-2021 12:53:47 DoS attack: TCP Port Scan from source:
89.248.165.104:41264
{Firewall} 03-03-2021 12:53:47 drop this packet for psd
{System} 03-04-2021 18:45:49 Sync up with NTP Server successfully, 2021-03-
04T18:45:48Z.
{Firewall} 03-06-2021 01:08:14 DoS attack: TCP Port Scan from source:
219.132.152.130:6000
{Firewall} 03-06-2021 01:08:14 drop this packet for psd
{Firewall} 03-06-2021 09:24:51 DoS attack: TCP Port Scan from source:
220.164.192.25:13547
{Firewall} 03-06-2021 09:24:51 drop this packet for psd
{System} 03-06-2021 12:20:30 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-06-2021 12:21:04 Sync up with NTP Server successfully, 2021-03-
06T12:21:04Z.
{System} 03-06-2021 12:21:06 TR069 connects to ACS server success.
{Firewall} 03-06-2021 12:47:00 DoS attack: TCP Port Scan from source:
194.147.140.41:56562
{Firewall} 03-06-2021 12:47:00 drop this packet for psd
{Firewall} 03-06-2021 13:17:50 DoS attack: TCP Port Scan from source:
45.146.165.25:54947
{Firewall} 03-06-2021 13:17:50 drop this packet for psd
{Firewall} 03-06-2021 13:24:09 DoS attack: TCP Port Scan from source:
194.147.140.94:54301
{Firewall} 03-06-2021 13:24:09 drop this packet for psd
{Firewall} 03-06-2021 14:05:56 DoS attack: TCP Port Scan from source:
5.135.0.34:58751
{Firewall} 03-06-2021 14:05:56 drop this packet for psd
{Firewall} 03-06-2021 16:29:29 DoS attack: TCP Port Scan from source:
194.147.140.40:45424
{Firewall} 03-06-2021 16:29:29 drop this packet for psd
{Firewall} 03-07-2021 02:22:24 DoS attack: TCP Port Scan from source:
195.54.160.228:47318
{Firewall} 03-07-2021 02:22:24 drop this packet for psd
{Firewall} 03-07-2021 12:27:30 DoS attack: TCP Port Scan from source:
89.248.165.104:41264
{Firewall} 03-07-2021 12:27:30 drop this packet for psd
{Firewall} 03-10-2021 09:31:50 DoS attack: TCP Port Scan from source:
118.178.136.160:39220
{Firewall} 03-10-2021 09:31:50 drop this packet for psd
{Firewall} 03-10-2021 12:08:23 DoS attack: UDP Port Scan from source:
163.172.14.15:5103
{Firewall} 03-10-2021 12:08:23 drop this packet for psd
{Firewall} 03-11-2021 03:21:51 DoS attack: TCP Port Scan from source:
194.165.16.22:65531
{Firewall} 03-11-2021 03:21:51 drop this packet for psd
{System} 03-11-2021 06:56:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-11-2021 06:57:41 Sync up with NTP Server successfully, 2021-03-
11T06:57:41Z.
{System} 03-11-2021 06:57:43 TR069 connects to ACS server success.
{Firewall} 03-11-2021 08:38:43 DoS attack: TCP Port Scan from source:
45.146.165.24:44218
{Firewall} 03-11-2021 08:38:43 drop this packet for psd
{Firewall} 03-11-2021 10:34:33 DoS attack: TCP Port Scan from source:
194.147.140.42:53568
{Firewall} 03-11-2021 10:34:33 drop this packet for psd
{Firewall} 03-11-2021 13:34:06 DoS attack: TCP Port Scan from source:
193.29.13.29:65507
{Firewall} 03-11-2021 13:34:06 drop this packet for psd
{Firewall} 03-12-2021 11:52:17 DoS attack: TCP Port Scan from source:
193.29.13.29:65519
{Firewall} 03-12-2021 11:52:17 drop this packet for psd
{Firewall} 03-12-2021 20:29:47 DoS attack: TCP Port Scan from source:
113.6.248.162:6000
{Firewall} 03-12-2021 20:29:47 drop this packet for psd
{Firewall} 03-14-2021 21:35:30 DoS attack: TCP Port Scan from source:
194.165.16.4:65533
{Firewall} 03-14-2021 21:35:30 drop this packet for psd
{Firewall} 03-15-2021 21:11:28 DoS attack: TCP Port Scan from source:
193.29.13.29:65525
{Firewall} 03-15-2021 21:11:28 drop this packet for psd
{Firewall} 03-16-2021 11:16:39 DoS attack: TCP Port Scan from source:
85.143.174.12:38440
{Firewall} 03-16-2021 11:16:39 drop this packet for psd
{Firewall} 03-18-2021 02:16:33 DoS attack: UDP Port Scan from source:
193.46.254.182:6305
{Firewall} 03-18-2021 02:16:33 drop this packet for psd
{System} 03-19-2021 21:50:55 Requested to reboot by web client 192.168.1.77.
{System} 03-19-2021 21:51:34 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 744840 seconds
{System} 03-19-2021 21:52:03 Sync up with NTP Server successfully, 2021-03-
19T21:52:03Z.
{System} 03-19-2021 21:52:05 TR069 connects to ACS server success.
{System} 03-19-2021 21:52:22 TR069 download file
http://gateway.telmex.com//SERCOMM_FG6123BTM_FG6123BV3021/FG6123BV3021.img
successfully.
{System} 03-19-2021 21:52:31 Upgrade image version: FG6123BV3021.
{System} 03-19-2021 21:52:35 Request to reboot by TR069.
{System} 03-19-2021 21:53:10 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 60 seconds
{System} 03-19-2021 21:53:45 Sync up with NTP Server successfully, 2021-03-
19T21:53:44Z.
{System} 03-19-2021 21:53:48 TR069 connects to ACS server success.
{System} 03-19-2021 22:41:23 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{GPON} 01-01-1970 00:00:18 OLT type changed to nokia.
{System} 01-01-1970 00:01:10 Restore facroty defaults by Restore Button.
{System} 03-19-2021 22:51:58 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{GPON} 03-19-2021 22:52:03 OLT type changed to nokia.
{System} 03-19-2021 22:53:22 TR069 connects to ACS server success.
{System} 03-19-2021 22:53:25 Sync up with NTP Server successfully, 2021-03-
19T22:53:26Z.
{System} 03-19-2021 23:07:20 Login Password changed Successfully by web client
192.168.1.67(MAC:Unknown Host Name: Unknown).
{Firewall} 03-20-2021 13:46:37 DoS attack: TCP Port Scan from source:
193.29.13.29:65523
{Firewall} 03-20-2021 13:46:37 drop this packet for psd
{Firewall} 03-23-2021 00:21:42 DoS attack: UDP Port Scan from source:
195.154.134.96:6236
{Firewall} 03-23-2021 00:21:42 drop this packet for psd
{Firewall} 03-25-2021 22:19:29 DoS attack: TCP Port Scan from source:
91.240.85.219:60966
{Firewall} 03-25-2021 22:19:29 drop this packet for psd
{Firewall} 03-26-2021 09:01:04 DoS attack: TCP Port Scan from source:
82.99.193.155:6000
{Firewall} 03-26-2021 09:01:04 drop this packet for psd
{Firewall} 03-26-2021 14:23:50 DoS attack: TCP Port Scan from source:
194.165.16.22:65529
{Firewall} 03-26-2021 14:23:50 drop this packet for psd
{Firewall} 03-26-2021 22:13:12 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 03-26-2021 22:13:12 drop this packet for psd
{Firewall} 03-28-2021 20:03:42 DoS attack: UDP Port Scan from source:
195.154.134.96:6236
{Firewall} 03-28-2021 20:03:42 drop this packet for psd
{Firewall} 03-29-2021 01:44:13 DoS attack: TCP Port Scan from source:
223.112.70.109:6000
{Firewall} 03-29-2021 01:44:13 drop this packet for psd
{System} 03-29-2021 14:45:54 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-29-2021 14:46:35 TR069 connects to ACS server success.
{System} 03-29-2021 14:46:43 Sync up with NTP Server successfully, 2021-03-
29T14:46:43Z.
{Firewall} 03-29-2021 16:23:14 DoS attack: TCP Port Scan from source:
172.93.194.124:40405
{Firewall} 03-29-2021 16:23:14 drop this packet for psd
{Firewall} 03-29-2021 18:18:09 DoS attack: TCP Port Scan from source:
5.188.119.145:41935
{Firewall} 03-29-2021 18:18:09 drop this packet for psd
{Firewall} 03-29-2021 19:43:50 DoS attack: TCP Port Scan from source:
5.188.119.201:41892
{Firewall} 03-29-2021 19:43:50 drop this packet for psd
{Firewall} 03-29-2021 21:27:00 DoS attack: TCP Port Scan from source:
5.188.119.200:41922
{Firewall} 03-29-2021 21:27:00 drop this packet for psd
{Firewall} 03-30-2021 03:44:52 DoS attack: TCP Port Scan from source:
194.147.140.24:44733
{Firewall} 03-30-2021 03:44:52 drop this packet for psd
{Firewall} 03-30-2021 05:51:00 DoS attack: TCP Port Scan from source:
185.236.11.32:56404
{Firewall} 03-30-2021 05:51:00 drop this packet for psd
{Firewall} 03-30-2021 06:43:51 DoS attack: TCP Port Scan from source:
194.147.140.23:48722
{Firewall} 03-30-2021 06:43:51 drop this packet for psd
{Firewall} 03-30-2021 10:06:15 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 03-30-2021 10:06:15 drop this packet for psd
{System} 03-30-2021 13:33:05 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-30-2021 13:33:36 TR069 connects to ACS server success.
{System} 03-30-2021 13:33:39 Sync up with NTP Server successfully, 2021-03-
30T13:33:39Z.
{Firewall} 03-30-2021 15:50:02 DoS attack: TCP Port Scan from source:
172.93.194.124:40405
{Firewall} 03-30-2021 15:50:02 drop this packet for psd
{Firewall} 03-30-2021 17:01:57 DoS attack: TCP Port Scan from source:
5.188.159.238:52944
{Firewall} 03-30-2021 17:01:57 drop this packet for psd
{Firewall} 03-30-2021 17:20:27 DoS attack: TCP Port Scan from source:
188.124.36.118:46198
{Firewall} 03-30-2021 17:20:27 drop this packet for psd
{Firewall} 03-30-2021 18:13:18 DoS attack: TCP Port Scan from source:
5.188.159.218:52925
{Firewall} 03-30-2021 18:13:18 drop this packet for psd
{Firewall} 03-30-2021 18:44:46 DoS attack: TCP Port Scan from source:
5.188.119.145:53034
{Firewall} 03-30-2021 18:44:46 drop this packet for psd
{Firewall} 03-30-2021 20:13:24 DoS attack: TCP Port Scan from source:
188.124.36.159:46596
{Firewall} 03-30-2021 20:13:24 drop this packet for psd
{Firewall} 03-31-2021 02:39:00 DoS attack: TCP Port Scan from source:
185.236.11.18:45503
{Firewall} 03-31-2021 02:39:00 drop this packet for psd
{Firewall} 03-31-2021 03:24:34 DoS attack: TCP Port Scan from source:
45.146.165.24:58744
{Firewall} 03-31-2021 03:24:34 drop this packet for psd
{Firewall} 03-31-2021 04:49:15 DoS attack: TCP Port Scan from source:
194.147.140.127:43333
{Firewall} 03-31-2021 04:49:15 drop this packet for psd
{Firewall} 03-31-2021 05:01:16 DoS attack: TCP Port Scan from source:
194.147.140.23:48722
{Firewall} 03-31-2021 05:01:16 drop this packet for psd
{Firewall} 03-31-2021 06:08:14 DoS attack: TCP Port Scan from source:
92.63.197.95:8080
{Firewall} 03-31-2021 06:08:14 drop this packet for psd
{Firewall} 03-31-2021 06:52:01 DoS attack: TCP Port Scan from source:
81.2.247.240:55044
{Firewall} 03-31-2021 06:52:01 drop this packet for psd
{Firewall} 03-31-2021 09:06:00 DoS attack: TCP Port Scan from source:
194.147.140.105:58646
{Firewall} 03-31-2021 09:06:00 drop this packet for psd
{System} 03-31-2021 20:04:03 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 03-31-2021 20:04:53 Sync up with NTP Server successfully, 2021-03-
31T20:04:53Z.
{System} 03-31-2021 20:04:56 TR069 connects to ACS server success.
{Firewall} 03-31-2021 21:52:32 DoS attack: TCP Port Scan from source:
45.146.165.24:58744
{Firewall} 03-31-2021 21:52:32 drop this packet for psd
{Firewall} 04-01-2021 01:09:43 DoS attack: TCP Port Scan from source:
5.188.159.238:49331
{Firewall} 04-01-2021 01:09:43 drop this packet for psd
{Firewall} 04-01-2021 05:21:14 DoS attack: TCP Port Scan from source:
188.124.36.131:47247
{Firewall} 04-01-2021 05:21:14 drop this packet for psd
{Firewall} 04-01-2021 09:09:55 DoS attack: TCP Port Scan from source:
185.236.11.4:49226
{Firewall} 04-01-2021 09:09:55 drop this packet for psd
{System} 04-01-2021 09:52:37 Sync up with NTP Server successfully, 2021-04-
01T09:52:37Z.
{System} 04-03-2021 09:26:08 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 04-03-2021 09:26:39 Sync up with NTP Server successfully, 2021-04-
03T09:26:39Z.
{System} 04-03-2021 09:26:40 TR069 connects to ACS server success.
{Firewall} 04-03-2021 16:22:25 DoS attack: TCP Port Scan from source:
188.124.36.131:47247
{Firewall} 04-03-2021 16:22:25 drop this packet for psd
{Firewall} 04-04-2021 04:58:31 DoS attack: TCP Port Scan from source:
45.146.165.24:47849
{Firewall} 04-04-2021 04:58:31 drop this packet for psd
{Firewall} 04-04-2021 10:46:53 DoS attack: TCP Port Scan from source:
194.165.16.22:65530
{Firewall} 04-04-2021 10:46:53 drop this packet for psd
{Firewall} 04-05-2021 01:06:50 DoS attack: TCP Port Scan from source:
89.248.165.118:54377
{Firewall} 04-05-2021 01:06:50 drop this packet for psd
{Firewall} 04-06-2021 22:32:24 DoS attack: TCP Port Scan from source:
79.124.62.21:65534
{Firewall} 04-06-2021 22:32:24 drop this packet for psd
{Firewall} 04-07-2021 07:50:25 DoS attack: TCP Port Scan from source:
45.33.85.185:59824
{Firewall} 04-07-2021 07:50:25 drop this packet for psd
{Firewall} 04-09-2021 00:00:55 DoS attack: TCP Port Scan from source:
134.228.205.62:36414
{Firewall} 04-09-2021 00:00:55 drop this packet for psd
{Firewall} 04-11-2021 06:59:06 DoS attack: TCP Port Scan from source:
193.29.13.29:65526
{Firewall} 04-11-2021 06:59:06 drop this packet for psd
{Firewall} 04-13-2021 02:37:42 DoS attack: TCP Port Scan from source:
194.165.16.4:65528
{Firewall} 04-13-2021 02:37:42 drop this packet for psd
{Firewall} 04-14-2021 08:04:27 UDP flood attack from LAN has been detected,
SRC=192.168.1.71 DST=192.168.1.254 PROTO=UDP SPT=54600 DPT=53 LEN=40
{Firewall} 04-14-2021 13:56:55 DoS attack: TCP Port Scan from source:
104.149.181.226:46615
{Firewall} 04-14-2021 13:56:55 drop this packet for psd
{Firewall} 04-16-2021 23:49:39 DoS attack: UDP Port Scan from source:
195.154.154.139:5633
{Firewall} 04-16-2021 23:49:39 drop this packet for psd
{Firewall} 04-21-2021 20:37:48 DoS attack: TCP Port Scan from source:
104.149.181.226:55467
{Firewall} 04-21-2021 20:37:48 drop this packet for psd
{Firewall} 04-22-2021 12:36:58 DoS attack: TCP Port Scan from source:
193.29.13.29:65527
{Firewall} 04-22-2021 12:36:58 drop this packet for psd
{System} 04-23-2021 18:09:59 Requested to reboot by web client 192.168.1.71.
{System} 04-23-2021 18:10:39 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1755780 seconds
{System} 04-23-2021 18:11:08 Sync up with NTP Server successfully, 2021-04-
23T18:11:07Z.
{System} 04-23-2021 18:11:10 TR069 connects to ACS server success.
{Firewall} 04-23-2021 18:33:37 DoS attack: TCP Port Scan from source:
88.214.24.63:50776
{Firewall} 04-23-2021 18:33:37 drop this packet for psd
{Firewall} 04-23-2021 18:40:54 DoS attack: TCP Port Scan from source:
79.124.62.206:51069
{Firewall} 04-23-2021 18:40:54 drop this packet for psd
{Firewall} 04-23-2021 19:14:48 DoS attack: TCP Port Scan from source:
194.61.25.241:51101
{Firewall} 04-23-2021 19:14:48 drop this packet for psd
{Firewall} 04-23-2021 20:09:30 DoS attack: TCP Port Scan from source:
45.146.165.208:40276
{Firewall} 04-23-2021 20:09:30 drop this packet for psd
{Firewall} 04-23-2021 20:50:26 DoS attack: UDP Port Scan from source:
193.46.255.104:5585
{Firewall} 04-23-2021 20:50:26 drop this packet for psd
{Firewall} 04-23-2021 21:12:31 DoS attack: TCP Port Scan from source:
188.124.36.161:55383
{Firewall} 04-23-2021 21:12:31 drop this packet for psd
{Firewall} 04-23-2021 21:18:29 DoS attack: TCP Port Scan from source:
5.188.119.88:41531
{Firewall} 04-23-2021 21:18:29 drop this packet for psd
{Firewall} 04-23-2021 23:24:19 DoS attack: TCP Port Scan from source:
5.188.119.157:41557
{Firewall} 04-23-2021 23:24:19 drop this packet for psd
{Firewall} 04-24-2021 11:27:27 DoS attack: TCP Port Scan from source:
188.124.36.131:47819
{Firewall} 04-24-2021 11:27:27 drop this packet for psd
{Firewall} 04-24-2021 15:34:47 DoS attack: TCP Port Scan from source:
89.248.165.68:47309
{Firewall} 04-24-2021 15:34:47 drop this packet for psd
{Firewall} 04-24-2021 17:05:53 DoS attack: TCP Port Scan from source:
89.248.165.98:55510
{Firewall} 04-24-2021 17:05:53 drop this packet for psd
{Firewall} 04-24-2021 19:40:59 DoS attack: TCP Port Scan from source:
92.38.152.172:40520
{Firewall} 04-24-2021 19:40:59 drop this packet for psd
{Firewall} 04-25-2021 16:15:57 DoS attack: TCP Port Scan from source:
89.248.165.52:41054
{Firewall} 04-25-2021 16:15:57 drop this packet for psd
{System} 04-26-2021 01:30:08 Sync up with NTP Server successfully, 2021-04-
26T01:30:09Z.
{System} 04-27-2021 13:30:10 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 04-27-2021 13:31:04 Sync up with NTP Server successfully, 2021-04-
27T13:31:04Z.
{System} 04-27-2021 13:31:06 TR069 connects to ACS server success.
{Firewall} 04-27-2021 14:23:54 DoS attack: TCP Port Scan from source:
5.135.0.33:58707
{Firewall} 04-27-2021 14:23:54 drop this packet for psd
{Firewall} 04-27-2021 17:07:14 DoS attack: TCP Port Scan from source:
91.206.14.241:58310
{Firewall} 04-27-2021 17:07:14 drop this packet for psd
{Firewall} 04-27-2021 17:13:18 DoS attack: TCP Port Scan from source:
5.188.119.204:58346
{Firewall} 04-27-2021 17:13:18 drop this packet for psd
{Firewall} 04-27-2021 20:39:52 DoS attack: TCP Port Scan from source:
188.124.36.158:48886
{Firewall} 04-27-2021 20:39:52 drop this packet for psd
{Firewall} 04-27-2021 21:22:24 DoS attack: UDP Port Scan from source:
103.145.13.240:10961
{Firewall} 04-27-2021 21:22:24 drop this packet for psd
{Firewall} 04-27-2021 21:53:15 DoS attack: TCP Port Scan from source:
188.124.36.131:47819
{Firewall} 04-27-2021 21:53:15 drop this packet for psd
{Firewall} 04-28-2021 11:35:16 UDP flood attack from LAN has been detected,
SRC=192.168.1.66 DST=192.168.1.254 PROTO=UDP SPT=63585 DPT=53 LEN=47
{Firewall} 04-30-2021 17:29:52 DoS attack: TCP Port Scan from source:
104.152.52.64:37719
{Firewall} 04-30-2021 17:29:52 drop this packet for psd
{System} 05-01-2021 03:05:37 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-01-2021 03:06:28 Sync up with NTP Server successfully, 2021-05-
01T03:06:28Z.
{System} 05-01-2021 03:06:31 TR069 connects to ACS server success.
{Firewall} 05-01-2021 04:20:31 DoS attack: TCP Port Scan from source:
5.135.0.33:58707
{Firewall} 05-01-2021 04:20:31 drop this packet for psd
{Firewall} 05-01-2021 04:55:32 DoS attack: TCP Port Scan from source:
5.135.0.34:58837
{Firewall} 05-01-2021 04:55:32 drop this packet for psd
{Firewall} 05-01-2021 05:57:40 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-01-2021 06:57:08 DoS attack: TCP Port Scan from source:
5.188.159.238:51968
{Firewall} 05-01-2021 06:57:08 drop this packet for psd
{Firewall} 05-01-2021 07:36:07 DoS attack: TCP Port Scan from source:
5.188.119.201:52003
{Firewall} 05-01-2021 07:36:07 drop this packet for psd
{Firewall} 05-01-2021 09:11:04 DoS attack: TCP Port Scan from source:
5.188.119.205:52050
{Firewall} 05-01-2021 09:11:04 drop this packet for psd
{Firewall} 05-01-2021 09:13:23 DoS attack: TCP Port Scan from source:
188.124.36.118:52645
{Firewall} 05-01-2021 09:13:23 drop this packet for psd
{Firewall} 05-01-2021 12:12:32 DoS attack: TCP Port Scan from source:
158.69.21.2:50671
{Firewall} 05-01-2021 12:12:32 drop this packet for psd
{Firewall} 05-01-2021 12:49:44 DoS attack: UDP Port Scan from source:
62.210.31.216:6484
{Firewall} 05-01-2021 12:49:44 drop this packet for psd
{System} 05-04-2021 10:23:57 Sync up with NTP Server successfully, 2021-05-
04T10:23:57Z.
{Firewall} 05-04-2021 16:37:05 DoS attack: TCP Port Scan from source:
193.29.13.29:65532
{Firewall} 05-04-2021 16:37:05 drop this packet for psd
{Firewall} 05-06-2021 22:46:35 DoS attack: TCP Port Scan from source:
193.29.13.29:65529
{Firewall} 05-06-2021 22:46:35 drop this packet for psd
{System} 05-07-2021 00:37:48 Requested to reboot by web client 192.168.1.69.
{System} 05-07-2021 00:38:27 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 509520 seconds
{System} 05-07-2021 00:38:57 Sync up with NTP Server successfully, 2021-05-
07T00:38:57Z.
{System} 05-07-2021 00:39:00 TR069 connects to ACS server success.
{Firewall} 05-09-2021 09:26:14 DoS attack: TCP Port Scan from source:
193.29.13.29:65527
{Firewall} 05-09-2021 09:26:14 drop this packet for psd
{System} 05-09-2021 14:27:47 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-09-2021 14:28:32 Sync up with NTP Server successfully, 2021-05-
09T14:28:32Z.
{System} 05-09-2021 14:28:34 TR069 connects to ACS server success.
{System} 05-09-2021 15:28:59 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-09-2021 15:29:43 TR069 connects to ACS server success.
{System} 05-09-2021 15:29:46 Sync up with NTP Server successfully, 2021-05-
09T15:29:46Z.
{Firewall} 05-09-2021 22:04:25 DoS attack: TCP Port Scan from source:
5.188.119.200:43093
{Firewall} 05-09-2021 22:04:25 drop this packet for psd
{Firewall} 05-09-2021 22:40:16 DoS attack: TCP Port Scan from source:
188.124.36.163:42902
{Firewall} 05-09-2021 22:40:16 drop this packet for psd
{System} 05-10-2021 00:03:03 Requested to reboot by web client 192.168.1.66.
{System} 05-10-2021 00:03:43 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 30840 seconds
{System} 05-10-2021 00:04:12 Sync up with NTP Server successfully, 2021-05-
10T00:04:11Z.
{System} 05-10-2021 00:04:14 TR069 connects to ACS server success.
{System} 05-10-2021 00:41:39 GPIO_Protect abnormal!!! tx power off
{System} 05-10-2021 00:41:54 Sync up with NTP Server successfully, 2021-05-
10T00:41:54Z.
{System} 05-10-2021 00:46:50 Requested to reboot by web client 192.168.1.69.
{System} 05-10-2021 00:47:28 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 2580 seconds
{System} 05-10-2021 00:47:58 Sync up with NTP Server successfully, 2021-05-
10T00:47:58Z.
{System} 05-10-2021 00:48:02 TR069 connects to ACS server success.
{Firewall} 05-10-2021 00:48:27 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.64 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-10-2021 03:57:46 DoS attack: TCP Port Scan from source:
5.188.159.218:42983
{Firewall} 05-10-2021 03:57:46 drop this packet for psd
{Firewall} 05-10-2021 04:05:07 DoS attack: TCP Port Scan from source:
5.188.119.205:43124
{Firewall} 05-10-2021 04:05:07 drop this packet for psd
{Firewall} 05-10-2021 06:22:40 DoS attack: TCP Port Scan from source:
5.188.119.88:43014
{Firewall} 05-10-2021 06:22:40 drop this packet for psd
{Firewall} 05-10-2021 12:21:30 DoS attack: TCP Port Scan from source:
5.188.119.204:41906
{Firewall} 05-10-2021 12:21:30 drop this packet for psd
{System} 05-10-2021 13:34:42 Restore facroty defaults by Restore Button.
{System} 05-10-2021 13:35:14 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 46020 seconds
{GPON} 05-10-2021 13:35:21 OLT type changed to nokia.
{System} 05-10-2021 13:35:49 TR069 connects to ACS server success.
{System} 05-10-2021 13:35:52 Sync up with NTP Server successfully, 2021-05-
10T13:35:52Z.
{Firewall} 05-10-2021 13:55:08 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 05-10-2021 14:04:22 DoS attack: TCP Port Scan from source:
45.146.165.209:54221
{Firewall} 05-10-2021 14:04:22 drop this packet for psd
{Firewall} 05-10-2021 14:15:11 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 05-10-2021 14:26:40 Login Password changed Successfully by web client
192.168.1.65(MAC:34-F3-9A-9F-88-E1 Host Name: ARP_DELL).
{Firewall} 05-10-2021 14:37:41 UDP flood attack from LAN has been detected,
SRC=192.168.1.68 DST=192.168.1.254 PROTO=UDP SPT=51212 DPT=53 LEN=51
{Firewall} 05-10-2021 17:22:01 DoS attack: TCP Port Scan from source:
5.188.119.157:41945
{Firewall} 05-10-2021 17:22:01 drop this packet for psd
{Firewall} 05-10-2021 17:37:47 DoS attack: TCP Port Scan from source:
5.188.159.218:41860
{Firewall} 05-10-2021 17:37:47 drop this packet for psd
{Firewall} 05-10-2021 17:58:39 DoS attack: TCP Port Scan from source:
5.188.119.204:41906
{Firewall} 05-10-2021 17:58:39 drop this packet for psd
{Firewall} 05-10-2021 18:44:08 DoS attack: TCP Port Scan from source:
5.188.119.200:41960
{Firewall} 05-10-2021 18:44:08 drop this packet for psd
{Firewall} 05-10-2021 19:08:11 DoS attack: TCP Port Scan from source:
188.124.36.118:41798
{Firewall} 05-10-2021 19:08:11 drop this packet for psd
{Firewall} 05-10-2021 19:21:58 DoS attack: TCP Port Scan from source:
5.188.119.88:41892
{Firewall} 05-10-2021 19:21:58 drop this packet for psd
{Firewall} 05-10-2021 19:27:04 DoS attack: TCP Port Scan from source:
188.124.36.158:42854
{Firewall} 05-10-2021 19:27:04 drop this packet for psd
{Firewall} 05-11-2021 09:51:52 DoS attack: TCP Port Scan from source:
89.248.165.204:49854
{Firewall} 05-11-2021 09:51:52 drop this packet for psd
{Firewall} 05-11-2021 11:26:36 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 05-11-2021 11:26:36 drop this packet for psd
{System} 05-11-2021 16:03:05 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-11-2021 16:03:34 Sync up with NTP Server successfully, 2021-05-
11T16:03:34Z.
{System} 05-11-2021 16:03:35 TR069 connects to ACS server success.
{Firewall} 05-12-2021 18:44:09 DoS attack: TCP Port Scan from source:
192.53.173.193:53471
{Firewall} 05-12-2021 18:44:09 drop this packet for psd
{Firewall} 05-13-2021 08:56:31 DoS attack: TCP Port Scan from source:
193.29.13.29:65530
{Firewall} 05-13-2021 08:56:31 drop this packet for psd
{Firewall} 05-16-2021 21:08:35 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 05-16-2021 21:08:35 drop this packet for psd
{Firewall} 05-18-2021 13:22:00 DoS attack: UDP Port Scan from source:
193.46.255.106:5229
{Firewall} 05-18-2021 13:22:00 drop this packet for psd
{Firewall} 05-18-2021 21:38:53 DoS attack: TCP Port Scan from source:
193.29.13.29:65533
{Firewall} 05-18-2021 21:38:53 drop this packet for psd
{Firewall} 05-20-2021 11:46:10 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.77 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 05-21-2021 20:00:24 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 05-21-2021 20:01:23 Sync up with NTP Server successfully, 2021-05-
21T20:01:22Z.
{System} 05-21-2021 20:01:25 TR069 connects to ACS server success.
{Firewall} 05-21-2021 20:18:25 DoS attack: TCP Port Scan from source:
45.146.165.209:57107
{Firewall} 05-21-2021 20:18:25 drop this packet for psd
{Firewall} 05-21-2021 20:33:34 DoS attack: TCP Port Scan from source:
45.143.203.2:41736
{Firewall} 05-21-2021 20:33:34 drop this packet for psd
{Firewall} 05-21-2021 20:34:48 DoS attack: TCP Port Scan from source:
205.205.150.57:49010
{Firewall} 05-21-2021 20:34:48 drop this packet for psd
{Firewall} 05-21-2021 20:53:43 DoS attack: TCP Port Scan from source:
3.17.47.176:61000
{Firewall} 05-21-2021 20:53:43 drop this packet for psd
{Firewall} 05-21-2021 22:09:34 DoS attack: TCP Port Scan from source:
135.181.110.223:52890
{Firewall} 05-21-2021 22:09:34 drop this packet for psd
{Firewall} 05-22-2021 01:53:40 DoS attack: TCP Port Scan from source:
5.188.119.157:57308
{Firewall} 05-22-2021 01:53:40 drop this packet for psd
{Firewall} 05-22-2021 02:10:25 DoS attack: TCP Port Scan from source:
185.212.131.64:50720
{Firewall} 05-22-2021 02:10:25 drop this packet for psd
{Firewall} 05-22-2021 07:01:12 DoS attack: TCP Port Scan from source:
89.248.165.199:50491
{Firewall} 05-22-2021 07:01:12 drop this packet for psd
{Firewall} 05-22-2021 14:28:50 DoS attack: TCP Port Scan from source:
183.136.225.42:43462
{Firewall} 05-22-2021 14:28:50 drop this packet for psd
{Firewall} 05-25-2021 01:24:39 DoS attack: TCP Port Scan from source:
60.211.181.178:6000
{Firewall} 05-25-2021 01:24:39 drop this packet for psd
{Firewall} 05-27-2021 22:22:58 DoS attack: TCP Port Scan from source:
89.248.165.6:59944
{Firewall} 05-27-2021 22:22:58 drop this packet for psd
{System} 06-01-2021 09:52:16 Sync up with NTP Server successfully, 2021-06-
01T09:52:16Z.
{Firewall} 06-06-2021 05:46:57 DoS attack: TCP Port Scan from source:
61.142.20.9:63278
{Firewall} 06-06-2021 05:46:57 drop this packet for psd
{System} 06-06-2021 07:27:51 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 06-06-2021 07:29:16 Sync up with NTP Server successfully, 2021-06-
06T07:29:16Z.
{System} 06-06-2021 07:29:18 TR069 connects to ACS server success.
{Firewall} 06-06-2021 08:14:07 DoS attack: TCP Port Scan from source:
3.17.47.176:61000
{Firewall} 06-06-2021 08:14:07 drop this packet for psd
{Firewall} 06-07-2021 02:58:26 DoS attack: TCP Port Scan from source:
89.248.165.201:56450
{Firewall} 06-07-2021 02:58:26 drop this packet for psd
{Firewall} 06-07-2021 19:02:22 DoS attack: TCP Port Scan from source:
185.117.154.155:34118
{Firewall} 06-07-2021 19:02:22 drop this packet for psd
{Firewall} 06-09-2021 08:09:22 DoS attack: UDP Port Scan from source:
77.247.108.229:5067
{Firewall} 06-09-2021 08:09:22 drop this packet for psd
{Firewall} 06-09-2021 10:33:31 DoS attack: TCP Port Scan from source:
104.131.107.50:55162
{Firewall} 06-09-2021 10:33:31 drop this packet for psd
{Firewall} 06-17-2021 05:39:26 DoS attack: TCP Port Scan from source:
141.98.9.155:65530
{Firewall} 06-17-2021 05:39:26 drop this packet for psd
{System} 06-18-2021 04:32:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 06-18-2021 04:33:15 Sync up with NTP Server successfully, 2021-06-
18T04:33:13Z.
{System} 06-18-2021 04:33:16 TR069 connects to ACS server success.
{Firewall} 06-18-2021 21:14:03 DoS attack: TCP Port Scan from source:
188.124.36.158:54341
{Firewall} 06-18-2021 21:14:03 drop this packet for psd
{Firewall} 06-19-2021 09:39:00 DoS attack: TCP Port Scan from source:
92.63.197.94:58203
{Firewall} 06-19-2021 09:39:00 drop this packet for psd
{Firewall} 06-19-2021 12:53:55 DoS attack: TCP Port Scan from source:
89.248.165.6:46490
{Firewall} 06-19-2021 12:53:55 drop this packet for psd
{Firewall} 06-19-2021 16:19:48 DoS attack: TCP Port Scan from source:
92.63.197.71:55484
{Firewall} 06-19-2021 16:19:48 drop this packet for psd
{System} 06-20-2021 07:25:59 Sync up with NTP Server successfully, 2021-06-
20T07:25:58Z.
{Firewall} 06-22-2021 02:39:06 DoS attack: TCP Port Scan from source:
182.92.122.79:54816
{Firewall} 06-22-2021 02:39:06 drop this packet for psd
{Firewall} 06-25-2021 22:43:23 DoS attack: TCP Port Scan from source:
47.110.239.235:43980
{Firewall} 06-25-2021 22:43:23 drop this packet for psd
{Firewall} 06-28-2021 02:49:02 DoS attack: TCP Port Scan from source:
52.67.129.70:48970
{Firewall} 06-28-2021 02:49:02 drop this packet for psd
{Firewall} 06-28-2021 22:21:33 DoS attack: TCP Port Scan from source:
89.248.165.6:60600
{Firewall} 06-28-2021 22:21:33 drop this packet for psd
{System} 06-29-2021 11:45:24 The vgw_app process has been dead ! we restart the
process!
{System} 06-29-2021 11:45:32 The voip_monitor process has been dead ! we restart
the process!
{System} 07-01-2021 09:58:09 Sync up with NTP Server successfully, 2021-07-
01T09:58:09Z.
{System} 07-01-2021 12:43:01 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 07-01-2021 12:44:01 Sync up with NTP Server successfully, 2021-07-
01T12:44:10Z.
{System} 07-01-2021 12:44:05 TR069 connects to ACS server success.
{Firewall} 07-01-2021 12:58:20 DoS attack: TCP Port Scan from source:
94.102.59.97:41285
{Firewall} 07-01-2021 12:58:20 drop this packet for psd
{Firewall} 07-01-2021 12:58:50 DoS attack: TCP Port Scan from source:
80.82.79.194:44630
{Firewall} 07-01-2021 12:58:50 drop this packet for psd
{Firewall} 07-01-2021 16:01:33 DoS attack: TCP Port Scan from source:
5.188.119.204:49579
{Firewall} 07-01-2021 16:01:33 drop this packet for psd
{Firewall} 07-01-2021 17:56:51 DoS attack: TCP Port Scan from source:
91.206.14.241:49449
{Firewall} 07-01-2021 17:56:51 drop this packet for psd
{Firewall} 07-01-2021 18:25:50 DoS attack: TCP Port Scan from source:
188.124.36.118:49428
{Firewall} 07-01-2021 18:25:50 drop this packet for psd
{Firewall} 07-02-2021 04:13:46 DoS attack: TCP Port Scan from source:
185.191.34.207:44187
{Firewall} 07-02-2021 04:13:46 drop this packet for psd
{Firewall} 07-03-2021 13:19:11 DoS attack: TCP Port Scan from source:
185.156.73.12:48550
{Firewall} 07-03-2021 13:19:11 drop this packet for psd
{Firewall} 07-04-2021 14:27:30 DoS attack: UDP Port Scan from source:
45.95.147.59:6235
{Firewall} 07-04-2021 14:27:30 drop this packet for psd
{System} 07-05-2021 17:53:38 Sync up with NTP Server successfully, 2021-07-
05T17:53:47Z.
{Firewall} 07-06-2021 10:17:17 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.73 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 07-07-2021 20:06:39 DoS attack: TCP Port Scan from source:
89.248.165.100:46401
{Firewall} 07-07-2021 20:06:39 drop this packet for psd
{System} 07-09-2021 16:49:45 Sync up with NTP Server successfully, 2021-07-
09T16:49:54Z.
{System} 07-09-2021 16:53:24 Sync up with NTP Server successfully, 2021-07-
09T16:53:34Z.
{System} 07-10-2021 10:16:09 Sync up with NTP Server successfully, 2021-07-
10T10:16:19Z.
{System} 07-10-2021 10:36:58 Sync up with NTP Server successfully, 2021-07-
10T10:37:08Z.
{System} 07-11-2021 19:45:49 Sync up with NTP Server successfully, 2021-07-
11T19:45:59Z.
{Firewall} 07-17-2021 15:21:39 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 07-17-2021 15:21:39 drop this packet for psd
{Firewall} 07-18-2021 01:14:05 DoS attack: TCP Port Scan from source:
118.190.104.47:38712
{Firewall} 07-18-2021 01:14:05 drop this packet for psd
{Firewall} 07-18-2021 03:40:10 DoS attack: TCP Port Scan from source:
89.248.165.6:32878
{Firewall} 07-18-2021 03:40:10 drop this packet for psd
{Firewall} 07-18-2021 22:09:33 DoS attack: UDP Port Scan from source:
46.8.19.204:5060
{Firewall} 07-18-2021 22:09:33 drop this packet for psd
{Firewall} 07-19-2021 21:28:57 DoS attack: TCP Port Scan from source:
141.98.9.155:65531
{Firewall} 07-19-2021 21:28:57 drop this packet for psd
{Firewall} 07-21-2021 06:17:39 DoS attack: UDP Port Scan from source:
91.132.58.45:5069
{Firewall} 07-21-2021 06:17:39 drop this packet for psd
{Firewall} 07-23-2021 23:55:38 DoS attack: TCP Port Scan from source:
185.20.226.243:53138
{Firewall} 07-23-2021 23:55:38 drop this packet for psd
{System} 07-29-2021 18:50:18 TR069 connects to ACS server success.
{System} 07-29-2021 18:50:22 TR069 connects to ACS server success.
{System} 07-30-2021 01:50:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:50:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:51:06 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:51:39 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:52:32 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 01:54:19 TR069 connects to ACS server failed, couldn't resolve.
{Firewall} 07-30-2021 01:55:42 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=46554 DPT=53 LEN=44
{System} 07-30-2021 01:57:12 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 02:02:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 07-30-2021 02:10:14 TR069 connects to ACS server success.
{System} 07-30-2021 02:10:18 Sync up with NTP Server successfully, 2021-07-
30T02:10:25Z.
{System} 07-30-2021 04:50:13 TR069 connects to ACS server failed, http error 500.
{System} 08-03-2021 11:01:46 Sync up with NTP Server successfully, 2021-08-
03T11:01:46Z.
{System} 08-04-2021 04:50:14 TR069 connects to ACS server failed, http error 500.
{Firewall} 08-04-2021 10:53:57 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.74 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 08-04-2021 15:44:09 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 08-04-2021 15:44:43 TR069 connects to ACS server success.
{System} 08-04-2021 15:44:43 Sync up with NTP Server successfully, 2021-08-
04T15:44:43Z.
{Firewall} 08-04-2021 15:54:09 DoS attack: TCP Port Scan from source:
89.248.165.73:58112
{Firewall} 08-04-2021 15:54:09 drop this packet for psd
{Firewall} 08-04-2021 16:18:45 DoS attack: TCP Port Scan from source:
222.175.199.222:23456
{Firewall} 08-04-2021 16:18:45 drop this packet for psd
{Firewall} 08-04-2021 19:03:47 DoS attack: TCP Port Scan from source:
91.206.14.241:49664
{Firewall} 08-04-2021 19:03:47 drop this packet for psd
{Firewall} 08-04-2021 19:03:49 DoS attack: TCP Port Scan from source:
188.124.36.161:50008
{Firewall} 08-04-2021 19:03:49 drop this packet for psd
{System} 08-04-2021 19:33:53 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
[GPON] 08-04-2021 19:33:53 Starting GPON interface OK.
[System] 08-04-2021 19:33:53 Register watchdog (umcid)
[System] 08-04-2021 19:33:53 Register watchdog (network_manager)
[GPON] 08-04-2021 19:33:54 OLT reset the OMCI mib.
[System] 08-04-2021 19:33:54 OLT Deactivate ONT
[System] 08-04-2021 19:33:54 Link state transition [O1 - O2]
[System] 08-04-2021 19:33:55 OLT Deactivate ONT
[System] 08-04-2021 19:33:55 Link state transition [O2 - O4]
[Firewall] 08-04-2021 19:33:56 Firewall Block Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Spoof Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 UDP Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 ICMP Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP SYN Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP FIN Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 Port Scan Per IP Flood Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Land Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 IP Broadcast Source Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP Syn With Data Detect has been enabled.
[Firewall] 08-04-2021 19:33:56 TCP Syn With Data Detect has been disabled.
[IPTV] 08-04-2021 19:33:56 Start IPTV OK
[System] 08-04-2021 19:33:56 OLT Deactivate ONT
[System] 08-04-2021 19:33:56 Link state transition [O4 - O3]
[System] 08-04-2021 19:33:57 OLT Deactivate ONT
[System] 08-04-2021 19:33:57 Link state transition [O3 - O2]
[IPTV] 08-04-2021 19:33:57 LAN send out a general query.
[System] 08-04-2021 19:33:58 OLT Deactivate ONT
[System] 08-04-2021 19:33:58 Link state transition [O2 - O3]
[System] 08-04-2021 19:33:59 OLT Deactivate ONT
[System] 08-04-2021 19:33:59 Link state transition [O3 - O2]
[VoIP] 08-04-2021 19:34:00 Info Center Config Init...
[VoIP] 08-04-2021 19:34:00 FXS_Number=*1
[System] 08-04-2021 19:34:00 Register watchdog (vgw_app)
[VoIP] 08-04-2021 19:34:00 Failed to open ringing schedule configuration file
[System] 08-04-2021 19:34:00 Starting VoIP OK..
[System] 08-04-2021 19:34:00 OLT Deactivate ONT
[System] 08-04-2021 19:34:00 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:01 Register watchdog (voip_monitor)
[WIFI] 08-04-2021 19:34:01 WiFi Init..
[System] 08-04-2021 19:34:01 OLT Deactivate ONT
[System] 08-04-2021 19:34:01 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:02 OLT Deactivate ONT
[System] 08-04-2021 19:34:02 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:03 OLT Deactivate ONT
[System] 08-04-2021 19:34:03 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:04 OLT Deactivate ONT
[System] 08-04-2021 19:34:04 Link state transition [O2 - O3]
[VoIP] 08-04-2021 19:34:05 Starting VoIP OK.
[VoIP] 08-04-2021 19:34:05 VoIP call manager v02.01.00_03.13a.2020-12-09,03:12
[VoIP] 08-04-2021 19:34:05 VoIP service running at Jan 1 00:00:24 1970
[System] 08-04-2021 19:34:05 OLT Deactivate ONT
[System] 08-04-2021 19:34:05 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:06 OLT Deactivate ONT
[System] 08-04-2021 19:34:06 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:07 OLT Deactivate ONT
[System] 08-04-2021 19:34:07 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:08 Register watchdog (temp_monitor)
[System] 08-04-2021 19:34:08 Register watchdog (optical_monitor)
[Firewall] 08-04-2021 19:34:09 Fireall Level has been set to Medium.
[Firewall] 08-04-2021 19:34:09 Local UDP Flood Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local ICMP Flood Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local Winnuke Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local LAN Source Detect has been enabled.
[Firewall] 08-04-2021 19:34:09 Local Smurf Detect has been enabled on LAN.
[Firewall] 08-04-2021 19:34:09 Local Frament Flood Detect has been enabled on LAN.
[LAN] 08-04-2021 19:34:09 DHCP Server Started
[IPTV] 08-04-2021 19:34:09 LAN send out a general query.
[System] 08-04-2021 19:34:09 OLT Deactivate ONT
[System] 08-04-2021 19:34:09 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:11 OLT Deactivate ONT
[System] 08-04-2021 19:34:11 Link state transition [O3 - O2]
[WIFI] 08-04-2021 19:34:11 channel score,che03a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che06a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che08a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che09b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che13a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che16a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che18a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che19b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che23a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che26a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che28a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che29b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che33a:bss0 intfadj0 cns-96 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che36a:bss0 intfadj0 cns-95 tol0
[WIFI] 08-04-2021 19:34:11 channel score,che39b:bss0 intfadj0 cns-94 tol0
[WIFI] 08-04-2021 19:34:11 5G select auto channel :52
[System] 08-04-2021 19:34:12 OLT Deactivate ONT
[System] 08-04-2021 19:34:12 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:13 OLT Deactivate ONT
[System] 08-04-2021 19:34:13 Link state transition [O3 - O2]
[UPnP] 08-04-2021 19:34:13 HTTP listening on port 49152
[UPnP] 08-04-2021 19:34:13 Starting UPnP IGD OK.
[System] 08-04-2021 19:34:14 OLT Deactivate ONT
[System] 08-04-2021 19:34:14 Link state transition [O2 - O3]
[WIFI] 08-04-2021 19:34:14 channel score,ch1001:bss20 intfadj50 cns-81 tol-70
[WIFI] 08-04-2021 19:34:14 channel score,ch1006:bss17 intfadj24 cns-78 tol-41
[WIFI] 08-04-2021 19:34:14 channel score,ch100b:bss12 intfadj13 cns-78 tol-25
[WIFI] 08-04-2021 19:34:14 2.4G select auto channel :11
[WIFI] 08-04-2021 19:34:14 acsd run
[System] 08-04-2021 19:34:15 OLT Deactivate ONT
[System] 08-04-2021 19:34:15 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:16 OLT Deactivate ONT
[System] 08-04-2021 19:34:16 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:17 OLT Deactivate ONT
[System] 08-04-2021 19:34:17 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:18 OLT Deactivate ONT
[System] 08-04-2021 19:34:18 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:19 OLT Deactivate ONT
[System] 08-04-2021 19:34:19 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:20 OLT Deactivate ONT
[System] 08-04-2021 19:34:20 Link state transition [O2 - O3]
[System] 08-04-2021 19:34:21 OLT Deactivate ONT
[System] 08-04-2021 19:34:21 Link state transition [O3 - O2]
[System] 08-04-2021 19:34:22 OLT Active ONT
[System] 08-04-2021 19:34:22 Link state transition [O2 - O5]
[GPON] 08-04-2021 19:34:26 Apply OMCI configuration.
[IPTV] 08-04-2021 19:34:27 LAN send out a general query.
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 ASSOC(8) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 DISASSOC(12) reason8 send to sta:14:cc:20:3f:a6:21 intf
wl1
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 AUTH(4) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:27 ASSOC(8) send to sta:14:cc:20:3f:a6:21
[WIFI] 08-04-2021 19:34:28 Authorized sta:14:cc:20:3f:a6:21 intf wl1
[IPTV] 08-04-2021 19:34:28 IPTV Configure file changed, reload IPTV config
[WAN] 08-04-2021 19:34:29 LCP Termination request has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:29 PPPOE PADT has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:29 PPPOE PADI has been sent from WAN WAN1
[IPTV] 08-04-2021 19:34:29 LAN send out a general query.
[WAN] 08-04-2021 19:34:30 PPPOE PADI has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:32 PPPOE PADI has been sent from WAN WAN1
[WAN] 08-04-2021 19:34:36 PPPOE PADI has been sent from WAN WAN1
[WIFI] 08-04-2021 19:34:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:34:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:34:36 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:34:38 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:34:38 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:38 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:38 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:39 Send OFFER of ip [192.168.1.71] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:40 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:40 Successfully assign IP [192.168.1.71] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[LAN] 08-04-2021 19:34:41 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 19:34:41 Request IP [192.168.1.64] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:34:42 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[WIFI] 08-04-2021 19:34:42 AUTH(4) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 AUTH(4) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 ASSOC(8) send to sta:d0:77:14:ce:bd:ae
[WIFI] 08-04-2021 19:34:42 Authorized sta:d0:77:14:ce:bd:ae intf wl1
[LAN] 08-04-2021 19:34:42 Received DISCOVER from client mac [d0:77:14:ce:bd:ae]
[WAN] 08-04-2021 19:34:43 PPPOE PADO has been received from WAN WAN1, BRAS name is
ipdsl-mex-ctsj-56.
[WAN] 08-04-2021 19:34:43 PPPOE PADR has been sent from WAN WAN1
[LAN] 08-04-2021 19:34:43 Send OFFER of ip [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae]
[LAN] 08-04-2021 19:34:43 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 19:34:43 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-04-2021 19:34:43 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:ce:bd:ae]
[WAN] 08-04-2021 19:34:43 PPPOE PADS has been received from WAN WAN1
[LAN] 08-04-2021 19:34:43 Successfully assign IP [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae], lease time [86400]
[WAN] 08-04-2021 19:34:46 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:34:47 DEAUTH(5) reason7 from sta:4c:c9:5e:29:00:fc intf wl1
[LAN] 08-04-2021 19:34:47 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[WAN] 08-04-2021 19:34:48 PPP PAP authentication is successful on WAN WAN1
[LAN] 08-04-2021 19:34:48 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:48 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[Firewall] 08-04-2021 19:34:49 Local UDP Flood Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Forward UDP Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local ICMP Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local TCP SYN Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local TCP FIN Flood Detect has been enabled on WAN
ppp1.
[Firewall] 08-04-2021 19:34:49 Local Winnuke Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Local Smurf Detect has been enabled on WAN ppp1.
[Firewall] 08-04-2021 19:34:49 Local Fraggle Flood detect has been enabled on WAN
ppp1.
[LAN] 08-04-2021 19:34:49 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:49 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:50 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:50 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Send OFFER of ip [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 19:34:51 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 19:34:51 Successfully assign IP [192.168.1.66] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[System] 08-04-2021 19:34:52 DNSMasq proxy server enable
[System] 08-04-2021 19:34:52 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:53 DNSMasq proxy server enable
[System] 08-04-2021 19:34:54 VoIP wan up, bind wan interface ppp1, notify interface
ppp1.
[VoIP] 08-04-2021 19:34:54 WAN Interface UP with new bind interface:
187.221.151.105,ppp1
[WIFI] 08-04-2021 19:34:54 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:34:54 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:54 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:34:54 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
{System} 08-04-2021 19:34:55 Sync up with NTP Server successfully, 2021-08-
04T19:34:55Z.
[LAN] 08-04-2021 19:34:55 Send OFFER of ip [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:34:55 Successfully assign IP [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 19:34:56 LCP echo-reply has been received from WAN WAN1
[WAN] 08-04-2021 19:34:56 Start DHCPv6 Client OK
{System} 08-04-2021 19:34:56 TR069 connects to ACS server success.
[VoIP] 08-04-2021 19:34:59 Switch to primary proxy server vims-h.telmex.com on line
0
[System] 08-04-2021 19:35:01 DNSMasq proxy server enable
[System] 08-04-2021 19:35:01 DNSMasq proxy server enable
[WIFI] 08-04-2021 19:35:10 WiFi Scheduler Time ON
[WIFI] 08-04-2021 19:35:52 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 ASSOC(8) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 19:35:52 Authorized sta:a8:7d:12:27:ab:de intf wl0
[LAN] 08-04-2021 19:35:52 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Send NAK to client ip [0.0.0.0] mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Send NAK to client ip [0.0.0.0] mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:52 Received DISCOVER from client mac [a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:53 Send OFFER of ip [192.168.1.68] to client mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:53 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-04-2021 19:35:54 Successfully assign IP [192.168.1.68] to client mac
[a8:7d:12:27:ab:de], lease time [86400]
[WIFI] 08-04-2021 19:36:00 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 19:36:00 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:36:00 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:36:00 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:36:06 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 ASSOC(8) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-04-2021 19:36:06 Authorized sta:10:c7:53:2a:c5:98 intf wl1
[LAN] 08-04-2021 19:36:07 Received DISCOVER from client mac [10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Send OFFER of ip [192.168.1.69] to client mac
[10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Received REQUEST from client ip [0.0.0.0] mac
[10:c7:53:2a:c5:98]
[LAN] 08-04-2021 19:36:08 Successfully assign IP [192.168.1.69] to client mac
[10:c7:53:2a:c5:98], lease time [86400]
[IPTV] 08-04-2021 19:36:34 LAN send out a general query.
[IPTV] 08-04-2021 19:38:39 LAN send out a general query.
[WAN] 08-04-2021 19:39:46 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:39:47 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 19:39:47 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 19:39:54 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:39:54 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 19:39:54 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-04-2021 19:39:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 19:40:44 LAN send out a general query.
[IPTV] 08-04-2021 19:42:49 LAN send out a general query.
[IPTV] 08-04-2021 19:44:54 LAN send out a general query.
[WAN] 08-04-2021 19:44:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 19:45:07 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 19:46:34 DEAUTH(5) reason7 from sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 19:46:59 LAN send out a general query.
[WIFI] 08-04-2021 19:47:20 DEAUTH(5) reason4 from sta:a8:7d:12:27:ab:de intf wl0
[WIFI] 08-04-2021 19:47:20 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl0
[IPTV] 08-04-2021 19:49:04 LAN send out a general query.
[VoIP] 08-04-2021 19:50:00 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-04-2021 19:50:00 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:00 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:01 Authorized sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:50:01 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:01 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:01 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:03 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:04 Send OFFER of ip [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:05 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:05 Successfully assign IP [192.168.1.67] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 19:50:07 LCP echo-request has been send from WAN WAN1
[WIFI] 08-04-2021 19:50:09 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[WIFI] 08-04-2021 19:50:09 DEAUTH(5) reason7 from sta:0c:7a:15:9c:f8:5b intf wl1
[LAN] 08-04-2021 19:50:11 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:11 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:11 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:12 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:12 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 19:50:13 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:17 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[WAN] 08-04-2021 19:50:17 LCP echo-reply has been received from WAN WAN1
[LAN] 08-04-2021 19:50:18 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:20 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:21 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WIFI] 08-04-2021 19:50:37 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 ASSOC(8) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:37 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:50:37 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:37 Send NAK to client ip [0.0.0.0] mac [0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:37 Received DISCOVER from client mac [0c:7a:15:9c:f8:5b]
{Firewall} 08-04-2021 19:50:38 DoS attack: TCP Port Scan from source:
89.248.165.73:58112
{Firewall} 08-04-2021 19:50:38 drop this packet for psd
[LAN] 08-04-2021 19:50:38 Send OFFER of ip [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:38 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:38 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[UPnP] 08-04-2021 19:50:41 Add Port Mapping: Teredo 192.168.1.70:61494->61494
UDP UDP 61494 to 192.168.1.70:61494 Success.
[UPnP] 08-04-2021 19:50:47 Delete Port Mapping: '':UDP 61494 to all Success.
[WIFI] 08-04-2021 19:50:53 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 19:50:53 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 19:50:54 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:54 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:50:55 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:50:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:50:55 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 19:51:09 LAN send out a general query.
[WIFI] 08-04-2021 19:51:09 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 19:51:09 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 19:51:19 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 ASSOC(8) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 19:51:19 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 19:51:19 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 19:51:19 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 19:53:14 LAN send out a general query.
[WAN] 08-04-2021 19:55:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 19:55:17 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 19:55:19 LAN send out a general query.
[IPTV] 08-04-2021 19:57:24 LAN send out a general query.
[Firewall] 08-04-2021 19:58:24, DROP SRC=187.191.62.174 DST=187.221.151.105
PROTO=TCP SPT=53770 DPT=445
[IPTV] 08-04-2021 19:59:29 LAN send out a general query.
[WAN] 08-04-2021 20:00:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:00:28 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 20:00:33, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=39499 DPT=53 LEN=38
[IPTV] 08-04-2021 20:01:34 LAN send out a general query.
[Firewall] 08-04-2021 20:01:40, DROP SRC=187.187.199.19 DST=187.221.151.105
PROTO=TCP SPT=59210 DPT=445
[Firewall] 08-04-2021 20:01:43, DROP SRC=187.187.199.19 DST=187.221.151.105
PROTO=TCP SPT=59210 DPT=445
[WIFI] 08-04-2021 20:01:51 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 20:01:51 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:51 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:51 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:52 Send OFFER of ip [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:53 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 20:01:53 Successfully assign IP [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[Firewall] 08-04-2021 20:03:29, DROP SRC=181.226.45.201 DST=187.221.151.105
PROTO=TCP SPT=55818 DPT=445
[IPTV] 08-04-2021 20:03:39 LAN send out a general query.
[WAN] 08-04-2021 20:05:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:05:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:05:44 LAN send out a general query.
[Firewall] 08-04-2021 20:06:15, DROP SRC=121.43.96.36 DST=187.221.151.105 PROTO=TCP
SPT=46964 DPT=445
[IPTV] 08-04-2021 20:07:49 LAN send out a general query.
[IPTV] 08-04-2021 20:09:54 LAN send out a general query.
[WAN] 08-04-2021 20:10:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:10:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:11:59 LAN send out a general query.
[Firewall] 08-04-2021 20:12:40, DROP SRC=201.210.87.59 DST=187.221.151.105
PROTO=TCP SPT=53092 DPT=445
[Firewall] 08-04-2021 20:12:43, DROP SRC=201.210.87.59 DST=187.221.151.105
PROTO=TCP SPT=53092 DPT=445
[Firewall] 08-04-2021 20:13:33, DROP SRC=186.94.40.33 DST=187.221.151.105 PROTO=TCP
SPT=60927 DPT=445
[IPTV] 08-04-2021 20:14:04 LAN send out a general query.
[WAN] 08-04-2021 20:15:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:15:49 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:16:09 LAN send out a general query.
[IPTV] 08-04-2021 20:18:14 LAN send out a general query.
[VoIP] 08-04-2021 20:20:03 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 20:20:19 LAN send out a general query.
[Firewall] 08-04-2021 20:20:44, DROP SRC=113.163.215.70 DST=187.221.151.105
PROTO=TCP SPT=46104 DPT=445
[WAN] 08-04-2021 20:20:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:20:59 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 20:21:18, DROP SRC=88.80.186.137 DST=187.221.151.105
PROTO=UDP SPT=20338 DPT=53 LEN=36
[WIFI] 08-04-2021 20:21:34 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 20:21:34 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 20:21:35 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:21:35 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[LAN] 08-04-2021 20:21:35 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[WIFI] 08-04-2021 20:21:35 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 20:21:35 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
{Firewall} 08-04-2021 20:22:01 DoS attack: TCP Port Scan from source:
222.175.199.222:23456
{Firewall} 08-04-2021 20:22:01 drop this packet for psd
[IPTV] 08-04-2021 20:22:24 LAN send out a general query.
[IPTV] 08-04-2021 20:24:29 LAN send out a general query.
[WAN] 08-04-2021 20:25:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:25:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:26:34 LAN send out a general query.
[Firewall] 08-04-2021 20:27:39, DROP SRC=14.249.111.254 DST=187.221.151.105
PROTO=TCP SPT=54430 DPT=445
[IPTV] 08-04-2021 20:28:39 LAN send out a general query.
[IPTV] 08-04-2021 20:30:44 LAN send out a general query.
[WAN] 08-04-2021 20:31:00 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:31:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:32:49 LAN send out a general query.
[Firewall] 08-04-2021 20:34:01, DROP SRC=110.39.23.154 DST=187.221.151.105
PROTO=TCP SPT=52010 DPT=445
[IPTV] 08-04-2021 20:34:54 LAN send out a general query.
[WAN] 08-04-2021 20:36:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:36:20 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:36:59 LAN send out a general query.
[IPTV] 08-04-2021 20:39:04 LAN send out a general query.
[WIFI] 08-04-2021 20:40:56 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:40:56 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:40:56 Authorized sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 20:41:09 LAN send out a general query.
[WAN] 08-04-2021 20:41:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:41:20 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 20:41:54 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl1
[WIFI] 08-04-2021 20:41:54 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:41:54 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-04-2021 20:41:54 Authorized sta:a8:7d:12:27:ab:de intf wl1
[IPTV] 08-04-2021 20:43:14 LAN send out a general query.
[IPTV] 08-04-2021 20:45:19 LAN send out a general query.
[WAN] 08-04-2021 20:46:21 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:46:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:47:24 LAN send out a general query.
[WIFI] 08-04-2021 20:47:36 DEAUTH(5) reason4 from sta:a8:7d:12:27:ab:de intf wl1
[WIFI] 08-04-2021 20:47:36 DISASSOC(12) reason8 send to sta:a8:7d:12:27:ab:de intf
wl1
[Firewall] 08-04-2021 20:48:14, DROP SRC=209.141.59.224 DST=187.221.151.105
PROTO=UDP SPT=41934 DPT=53 LEN=38
[IPTV] 08-04-2021 20:49:29 LAN send out a general query.
[VoIP] 08-04-2021 20:50:07 receive response of OPTIONS message, rspcode is:200
[WAN] 08-04-2021 20:51:31 LCP echo-request has been send from WAN WAN1
[IPTV] 08-04-2021 20:51:34 LAN send out a general query.
[WAN] 08-04-2021 20:51:41 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 20:51:44 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 20:51:44 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 20:51:44 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:51:44 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 20:51:44 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 20:51:44 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 20:51:44 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-04-2021 20:53:19, DROP SRC=74.120.14.28 DST=187.221.151.105 PROTO=UDP
SPT=64115 DPT=53 LEN=53
[WIFI] 08-04-2021 20:53:37 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 20:53:37 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 20:53:39 LAN send out a general query.
[IPTV] 08-04-2021 20:55:44 LAN send out a general query.
[WAN] 08-04-2021 20:56:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 20:56:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 20:57:49 LAN send out a general query.
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:56 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 20:58:59 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 20:59:54 LAN send out a general query.
[Firewall] 08-04-2021 21:01:14, DROP SRC=14.190.18.107 DST=187.221.151.105
PROTO=TCP SPT=57056 DPT=445
[WAN] 08-04-2021 21:01:42 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:01:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:01:59 LAN send out a general query.
[IPTV] 08-04-2021 21:04:04 LAN send out a general query.
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:12 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:12 Send NAK to client ip [0.0.0.0] mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:16 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:16 Request IP [192.168.1.66] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:05:17 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:17 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:18 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:18 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:19 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:19 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Send OFFER of ip [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-04-2021 21:05:20 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-04-2021 21:05:20 Successfully assign IP [192.168.1.71] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[Firewall] 08-04-2021 21:05:34, DROP SRC=74.82.47.6 DST=187.221.151.105 PROTO=UDP
SPT=55765 DPT=53 LEN=50
[IPTV] 08-04-2021 21:06:09 LAN send out a general query.
[WAN] 08-04-2021 21:06:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:07:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:08:14 LAN send out a general query.
[WIFI] 08-04-2021 21:08:41 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:08:41 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 21:08:44 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 21:10:19 LAN send out a general query.
[WAN] 08-04-2021 21:11:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:12:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:12:24 LAN send out a general query.
[IPTV] 08-04-2021 21:14:29 LAN send out a general query.
[WIFI] 08-04-2021 21:15:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:15:36 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-04-2021 21:15:36 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-04-2021 21:15:36 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-04-2021 21:16:34 LAN send out a general query.
[WAN] 08-04-2021 21:17:03 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:17:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:18:39 LAN send out a general query.
[VoIP] 08-04-2021 21:20:10 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 21:20:44 LAN send out a general query.
[WIFI] 08-04-2021 21:21:53 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 21:21:53 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 21:21:53 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:21:53 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:21:53 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 21:21:53 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 21:21:53 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-04-2021 21:22:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:22:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:22:49 LAN send out a general query.
[IPTV] 08-04-2021 21:24:54 LAN send out a general query.
[IPTV] 08-04-2021 21:26:59 LAN send out a general query.
[WAN] 08-04-2021 21:27:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:27:23 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 21:28:54 AUTH(4) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:54 AUTH(4) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:54 ASSOC(8) send to sta:d0:77:14:c5:70:66
[WIFI] 08-04-2021 21:28:55 Authorized sta:d0:77:14:c5:70:66 intf wl1
[LAN] 08-04-2021 21:28:56 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 21:28:57 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[IPTV] 08-04-2021 21:29:04 LAN send out a general query.
[WIFI] 08-04-2021 21:30:18 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:30:18 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 21:31:09 LAN send out a general query.
[GPON] 08-04-2021 21:32:17 Transmit omci packet over time! sec=3757575748064378880
nsec=2668463181004800
[WAN] 08-04-2021 21:32:24 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:32:34 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:33:14 LAN send out a general query.
[WIFI] 08-04-2021 21:35:06 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 21:35:06 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:35:06 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:06 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 21:35:07 Send OFFER of ip [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:10 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Send OFFER of ip [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 21:35:11 Successfully assign IP [192.168.1.72] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-04-2021 21:35:19 LAN send out a general query.
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:31 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:32 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:32 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:35:35 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 21:37:24 LAN send out a general query.
[WAN] 08-04-2021 21:37:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:37:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:39:29 LAN send out a general query.
[WIFI] 08-04-2021 21:39:48 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 21:39:48 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-04-2021 21:41:34 LAN send out a general query.
[Firewall] 08-04-2021 21:42:06, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:06, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:07, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:07, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:08, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:08, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59023 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:09, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=59024 DPT=445
[Firewall] 08-04-2021 21:42:12, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:13, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:14, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[Firewall] 08-04-2021 21:42:15, DROP SRC=125.164.7.250 DST=187.221.151.105
PROTO=TCP SPT=60181 DPT=445
[WAN] 08-04-2021 21:42:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:42:44 LCP echo-reply has been received from WAN WAN1
[UPnP] 08-04-2021 21:42:54 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954567 Success.
[UPnP] 08-04-2021 21:42:54 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:42:54 upnp_event_send: msg: NOTIFY /upnp/eventing/rbigrhotiv
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954567SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:42:59 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309523c6 Success.
[UPnP] 08-04-2021 21:42:59 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:42:59 upnp_event_send: msg: NOTIFY /upnp/eventing/zxcaifpyek
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309523c6SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[Firewall] 08-04-2021 21:43:16, DROP SRC=167.248.133.24 DST=187.221.151.105
PROTO=UDP SPT=17207 DPT=53 LEN=53
[UPnP] 08-04-2021 21:43:17 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830959869 Success.
[UPnP] 08-04-2021 21:43:17 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:17 upnp_event_send: msg: NOTIFY /upnp/eventing/qzyadasgyq
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830959869SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:17 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954873 Success.
[UPnP] 08-04-2021 21:43:17 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:17 upnp_event_send: msg: NOTIFY /upnp/eventing/msnigjdtmc
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954873SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:25 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095dc51 Success.
[UPnP] 08-04-2021 21:43:25 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:25 upnp_event_send: msg: NOTIFY /upnp/eventing/tujzxuquno
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a1683095dc51SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:43:25 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830955cff Success.
[UPnP] 08-04-2021 21:43:25 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:43:25 upnp_event_send: msg: NOTIFY /upnp/eventing/uclushlscr
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830955cffSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 08-04-2021 21:43:39 LAN send out a general query.
[IPTV] 08-04-2021 21:45:44 LAN send out a general query.
[UPnP] 08-04-2021 21:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095944a Success.
[UPnP] 08-04-2021 21:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309558ec Success.
[UPnP] 08-04-2021 21:46:04 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830951f29 Success.
[UPnP] 08-04-2021 21:46:04 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830957ccd Success.
[Firewall] 08-04-2021 21:46:09, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21934 DPT=445
[WAN] 08-04-2021 21:47:44 LCP echo-request has been send from WAN WAN1
[IPTV] 08-04-2021 21:47:49 LAN send out a general query.
[WAN] 08-04-2021 21:47:54 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 21:49:50 DEAUTH(5) reason4 from sta:d0:77:14:c5:70:66 intf wl1
[WIFI] 08-04-2021 21:49:50 DISASSOC(12) reason8 send to sta:d0:77:14:c5:70:66 intf
wl1
[IPTV] 08-04-2021 21:49:54 LAN send out a general query.
[VoIP] 08-04-2021 21:50:15 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 21:51:59 LAN send out a general query.
[WIFI] 08-04-2021 21:52:02 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 21:52:02 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 21:52:03 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:52:03 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 21:52:03 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 21:52:03 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 21:52:03 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-04-2021 21:52:48, DROP SRC=146.88.240.4 DST=187.221.151.105 PROTO=UDP
SPT=51783 DPT=137 LEN=58
[WAN] 08-04-2021 21:52:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:53:05 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 21:53:32, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=36658 DPT=53 LEN=38
[IPTV] 08-04-2021 21:54:04 LAN send out a general query.
[IPTV] 08-04-2021 21:56:09 LAN send out a general query.
[Firewall] 08-04-2021 21:57:07, DROP SRC=125.25.158.174 DST=187.221.151.105
PROTO=TCP SPT=64623 DPT=445
[WIFI] 08-04-2021 21:57:09 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:57:09 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 21:57:09 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-04-2021 21:57:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 21:58:05 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 21:58:14 LAN send out a general query.
[UPnP] 08-04-2021 21:59:20 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309558ba Success.
[UPnP] 08-04-2021 21:59:20 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:59:20 upnp_event_send: msg: NOTIFY /upnp/eventing/yoooaqtmwp
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309558baSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 08-04-2021 21:59:24 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095d7ab Success.
[UPnP] 08-04-2021 21:59:24 upnp_event_send: sending event notify message to
192.168.1.72::2869
[UPnP] 08-04-2021 21:59:24 upnp_event_send: msg: NOTIFY /upnp/eventing/sfjdabfnbh
HTTP/1.1Host: 192.168.1.72:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a1683095d7abSEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 08-04-2021 22:00:19 LAN send out a general query.
[IPTV] 08-04-2021 22:02:24 LAN send out a general query.
[WAN] 08-04-2021 22:03:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:03:15 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:04:29 LAN send out a general query.
[Firewall] 08-04-2021 22:05:22, DROP SRC=129.250.206.86 DST=187.221.151.105
PROTO=UDP SPT=13959 DPT=53 LEN=55
[IPTV] 08-04-2021 22:06:34 LAN send out a general query.
[Firewall] 08-04-2021 22:08:08, DROP SRC=187.190.95.149 DST=187.221.151.105
PROTO=TCP SPT=8220 DPT=445
[WAN] 08-04-2021 22:08:16 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:08:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:08:39 LAN send out a general query.
[IPTV] 08-04-2021 22:10:44 LAN send out a general query.
[IPTV] 08-04-2021 22:12:49 LAN send out a general query.
[WAN] 08-04-2021 22:13:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:13:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:14:54 LAN send out a general query.
[Firewall] 08-04-2021 22:16:54, DROP SRC=113.175.129.42 DST=187.221.151.105
PROTO=TCP SPT=53724 DPT=445
[IPTV] 08-04-2021 22:16:59 LAN send out a general query.
[WIFI] 08-04-2021 22:17:58 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 22:17:58 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WAN] 08-04-2021 22:18:36 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:18:36 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:19:04 LAN send out a general query.
[WIFI] 08-04-2021 22:19:58 DEAUTH(5) reason7 from sta:d0:77:14:c5:70:66 intf wl1
[LAN] 08-04-2021 22:20:00 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 22:20:01 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[VoIP] 08-04-2021 22:20:19 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 22:21:09 LAN send out a general query.
[WIFI] 08-04-2021 22:22:11 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 22:22:11 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 22:22:11 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:22:11 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:22:11 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 22:22:11 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 22:22:11 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 22:23:14 LAN send out a general query.
[WAN] 08-04-2021 22:23:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:23:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:25:19 LAN send out a general query.
[Firewall] 08-04-2021 22:26:30, DROP SRC=128.14.209.253 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-04-2021 22:27:24 LAN send out a general query.
[WAN] 08-04-2021 22:28:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:28:57 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:29:29 LAN send out a general query.
[IPTV] 08-04-2021 22:31:34 LAN send out a general query.
[IPTV] 08-04-2021 22:33:39 LAN send out a general query.
[WAN] 08-04-2021 22:33:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:33:57 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:35:44 LAN send out a general query.
[Firewall] 08-04-2021 22:36:32, DROP SRC=180.152.9.86 DST=187.221.151.105 PROTO=TCP
SPT=63222 DPT=445
[IPTV] 08-04-2021 22:37:49 LAN send out a general query.
[WAN] 08-04-2021 22:39:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:39:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:39:54 LAN send out a general query.
[IPTV] 08-04-2021 22:41:59 LAN send out a general query.
[IPTV] 08-04-2021 22:44:04 LAN send out a general query.
[WAN] 08-04-2021 22:44:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:44:18 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:46:09 LAN send out a general query.
[WIFI] 08-04-2021 22:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 22:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 22:47:27 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-04-2021 22:48:14 LAN send out a general query.
[WAN] 08-04-2021 22:49:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:49:28 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:50:19 LAN send out a general query.
[VoIP] 08-04-2021 22:50:23 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-04-2021 22:52:20 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 22:52:20 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 22:52:20 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:52:20 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 22:52:20 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 22:52:20 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 22:52:20 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 22:52:24 LAN send out a general query.
[IPTV] 08-04-2021 22:54:29 LAN send out a general query.
[WAN] 08-04-2021 22:54:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:54:39 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 22:56:34 LAN send out a general query.
[IPTV] 08-04-2021 22:58:39 LAN send out a general query.
[WAN] 08-04-2021 22:59:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 22:59:49 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:00:24, DROP SRC=202.163.101.11 DST=187.221.151.105
PROTO=TCP SPT=55187 DPT=445
[IPTV] 08-04-2021 23:00:44 LAN send out a general query.
[LAN] 08-04-2021 23:01:47 Received DISCOVER from client mac [d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:48 Send OFFER of ip [192.168.1.66] to client mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:49 Received REQUEST from client ip [0.0.0.0] mac
[d0:77:14:c5:70:66]
[LAN] 08-04-2021 23:01:49 Successfully assign IP [192.168.1.66] to client mac
[d0:77:14:c5:70:66], lease time [86400]
[IPTV] 08-04-2021 23:02:49 LAN send out a general query.
[Firewall] 08-04-2021 23:04:28, DROP SRC=192.241.207.141 DST=187.221.151.105
PROTO=TCP SPT=60355 DPT=139
[Firewall] 08-04-2021 23:04:48, DROP SRC=58.9.45.27 DST=187.221.151.105 PROTO=TCP
SPT=48908 DPT=445
[IPTV] 08-04-2021 23:04:54 LAN send out a general query.
[WAN] 08-04-2021 23:04:59 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:04:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:06:59 LAN send out a general query.
[IPTV] 08-04-2021 23:09:04 LAN send out a general query.
[WAN] 08-04-2021 23:10:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:10:10 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:10:37, DROP SRC=192.35.168.154 DST=187.221.151.105
PROTO=UDP SPT=56339 DPT=53 LEN=37
[IPTV] 08-04-2021 23:11:09 LAN send out a general query.
[IPTV] 08-04-2021 23:13:14 LAN send out a general query.
[IPTV] 08-04-2021 23:15:19 LAN send out a general query.
[WAN] 08-04-2021 23:15:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:15:20 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-04-2021 23:16:31, DROP SRC=187.217.115.162 DST=187.221.151.105
PROTO=TCP SPT=62972 DPT=445
[IPTV] 08-04-2021 23:17:24 LAN send out a general query.
[IPTV] 08-04-2021 23:19:29 LAN send out a general query.
[WAN] 08-04-2021 23:20:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:20:20 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-04-2021 23:20:27 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 23:21:34 LAN send out a general query.
[WIFI] 08-04-2021 23:22:29 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 23:22:29 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 23:22:29 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:22:29 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:22:29 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 23:22:29 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 23:22:29 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 23:23:39 LAN send out a general query.
[WAN] 08-04-2021 23:25:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:25:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:25:44 LAN send out a general query.
[IPTV] 08-04-2021 23:27:49 LAN send out a general query.
[IPTV] 08-04-2021 23:29:54 LAN send out a general query.
[WAN] 08-04-2021 23:30:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:30:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:31:59 LAN send out a general query.
[IPTV] 08-04-2021 23:34:04 LAN send out a general query.
[Firewall] 08-04-2021 23:34:16, DROP SRC=43.249.52.185 DST=187.221.151.105
PROTO=TCP SPT=59282 DPT=445
[WAN] 08-04-2021 23:35:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:35:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:36:09 LAN send out a general query.
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[WIFI] 08-04-2021 23:37:35 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-04-2021 23:37:35 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:35 Request IP [192.168.1.72] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 23:37:35 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:36 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:36 Request IP [192.168.1.72] is in used, reserving it for
[3600] seconds
[LAN] 08-04-2021 23:37:37 Send OFFER of ip [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:37 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-04-2021 23:37:37 Successfully assign IP [192.168.1.67] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-04-2021 23:38:14 LAN send out a general query.
[IPTV] 08-04-2021 23:40:19 LAN send out a general query.
[WAN] 08-04-2021 23:40:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:40:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:42:24 LAN send out a general query.
[WIFI] 08-04-2021 23:43:31 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:43:31 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:43:50 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:43:50 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:43:50 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[Firewall] 08-04-2021 23:44:02, DROP SRC=103.164.98.138 DST=187.221.151.105
PROTO=TCP SPT=54421 DPT=445
[Firewall] 08-04-2021 23:44:23, DROP SRC=62.141.75.108 DST=187.221.151.105
PROTO=TCP SPT=41626 DPT=445
[IPTV] 08-04-2021 23:44:29 LAN send out a general query.
[Firewall] 08-04-2021 23:45:58, DROP SRC=144.172.83.87 DST=187.221.151.105
PROTO=UDP SPT=59001 DPT=53 LEN=38
[WAN] 08-04-2021 23:46:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:46:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:46:34 LAN send out a general query.
[WIFI] 08-04-2021 23:47:26 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:26 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:47:27 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:47:27 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:52 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:47:52 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-04-2021 23:48:19 DEAUTH(5) reason4 from sta:10:c7:53:2a:c5:98 intf wl1
[WIFI] 08-04-2021 23:48:19 DISASSOC(12) reason8 send to sta:10:c7:53:2a:c5:98 intf
wl1
[IPTV] 08-04-2021 23:48:39 LAN send out a general query.
[VoIP] 08-04-2021 23:50:28 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-04-2021 23:50:44 LAN send out a general query.
[WAN] 08-04-2021 23:51:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:51:02 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-04-2021 23:52:38 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-04-2021 23:52:38 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-04-2021 23:52:39 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:52:39 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-04-2021 23:52:39 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-04-2021 23:52:39 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-04-2021 23:52:39 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-04-2021 23:52:49 LAN send out a general query.
[Firewall] 08-04-2021 23:53:42, DROP SRC=187.254.96.60 DST=187.221.151.105
PROTO=TCP SPT=53103 DPT=445
[Firewall] 08-04-2021 23:53:43, DROP SRC=187.254.96.60 DST=187.221.151.105
PROTO=TCP SPT=53103 DPT=445
[IPTV] 08-04-2021 23:54:54 LAN send out a general query.
[WIFI] 08-04-2021 23:54:55 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 ASSOC(8) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-04-2021 23:54:55 Authorized sta:64:1c:ae:07:d8:ab intf wl0
[LAN] 08-04-2021 23:54:56 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:54:56 Send NAK to client ip [0.0.0.0] mac [64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:54:59 Received DISCOVER from client mac [64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:00 Send OFFER of ip [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:01 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-04-2021 23:55:01 Successfully assign IP [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab], lease time [86400]
[WIFI] 08-04-2021 23:55:48 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:55:48 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-04-2021 23:55:48 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:55:51 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-04-2021 23:55:51 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WAN] 08-04-2021 23:56:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-04-2021 23:56:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-04-2021 23:56:59 LAN send out a general query.
[IPTV] 08-04-2021 23:59:04 LAN send out a general query.
[IPTV] 08-05-2021 00:01:09 LAN send out a general query.
[WAN] 08-05-2021 00:01:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:01:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:03:14 LAN send out a general query.
[IPTV] 08-05-2021 00:05:19 LAN send out a general query.
[WAN] 08-05-2021 00:06:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:06:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:07:24 LAN send out a general query.
[WIFI] 08-05-2021 00:08:29 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:08:29 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:08:29 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 00:09:29 LAN send out a general query.
[Firewall] 08-05-2021 00:09:52, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=48044 DPT=53 LEN=38
[WAN] 08-05-2021 00:11:34 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:11:34 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:11:34 LAN send out a general query.
[IPTV] 08-05-2021 00:13:39 LAN send out a general query.
[LAN] 08-05-2021 00:13:52 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:13:52 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:15:44 LAN send out a general query.
[WAN] 08-05-2021 00:16:44 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:16:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:17:49 LAN send out a general query.
{Firewall} 08-05-2021 00:19:48 DoS attack: TCP Port Scan from source:
188.124.36.118:44452
{Firewall} 08-05-2021 00:19:48 drop this packet for psd
[IPTV] 08-05-2021 00:19:54 LAN send out a general query.
[VoIP] 08-05-2021 00:20:33 receive response of OPTIONS message, rspcode is:200
[WIFI] 08-05-2021 00:20:33 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:33 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[WIFI] 08-05-2021 00:20:48 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:50 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:20:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:20:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:20:51 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:21:02 DEAUTH(5) reason3 from sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-05-2021 00:21:44 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:21:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:21:59 LAN send out a general query.
[WIFI] 08-05-2021 00:22:48 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 00:22:48 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 00:22:48 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:22:48 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:22:48 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 00:22:48 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 00:22:48 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 00:24:04 LAN send out a general query.
[WIFI] 08-05-2021 00:25:30 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 ASSOC(8) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:25:30 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-05-2021 00:25:30 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:25:30 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[WIFI] 08-05-2021 00:25:51 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:25:51 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 00:26:09 LAN send out a general query.
[WAN] 08-05-2021 00:26:55 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:26:55 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:28:14 LAN send out a general query.
[WIFI] 08-05-2021 00:28:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:28:51 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:28:51 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 00:30:19 LAN send out a general query.
[WAN] 08-05-2021 00:32:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:32:05 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:32:24 LAN send out a general query.
[WIFI] 08-05-2021 00:33:12 DEAUTH(5) reason4 from sta:64:1c:ae:07:d8:ab intf wl0
[WIFI] 08-05-2021 00:33:12 DISASSOC(12) reason8 send to sta:64:1c:ae:07:d8:ab intf
wl0
[IPTV] 08-05-2021 00:34:29 LAN send out a general query.
[IPTV] 08-05-2021 00:36:34 LAN send out a general query.
[WAN] 08-05-2021 00:37:05 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:37:05 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 00:37:33 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:37:33 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[Firewall] 08-05-2021 00:37:33, DROP SRC=113.184.25.201 DST=187.221.151.105
PROTO=TCP SPT=52535 DPT=445
[IPTV] 08-05-2021 00:38:39 LAN send out a general query.
[WIFI] 08-05-2021 00:39:05 DEAUTH(5) reason7 from sta:c8:1e:e7:02:80:c6 intf wl1
[LAN] 08-05-2021 00:39:06 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:06 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:06 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:08 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:08 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:08 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:10 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:10 Request IP [192.168.1.65] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:39:11 Send OFFER of ip [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:12 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:13 Send OFFER of ip [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:14 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:39:14 Successfully assign IP [192.168.1.73] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:40:44 LAN send out a general query.
[WIFI] 08-05-2021 00:41:14 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:41:14 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 00:41:14 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[WAN] 08-05-2021 00:42:16 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:42:16 LCP echo-reply has been received from WAN WAN1
[LAN] 08-05-2021 00:42:34 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:34 Request IP [192.168.1.73] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:42:34 Send NAK to client ip [0.0.0.0] mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:40 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:40 Request IP [192.168.1.73] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 00:42:41 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:42 Received DISCOVER from client mac [c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:43 Send OFFER of ip [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:44 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:44 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-05-2021 00:42:45 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:46 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[LAN] 08-05-2021 00:42:47 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:47 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[IPTV] 08-05-2021 00:42:49 LAN send out a general query.
[LAN] 08-05-2021 00:42:51 Received REQUEST from client ip [0.0.0.0] mac
[c8:1e:e7:02:80:c6]
[LAN] 08-05-2021 00:42:51 Successfully assign IP [192.168.1.65] to client mac
[c8:1e:e7:02:80:c6], lease time [86400]
[WIFI] 08-05-2021 00:43:34 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 00:43:34 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 00:44:54 LAN send out a general query.
[Firewall] 08-05-2021 00:45:04, DROP SRC=183.136.225.42 DST=187.221.151.105
PROTO=UDP SPT=6828 DPT=53 LEN=38
[IPTV] 08-05-2021 00:46:59 LAN send out a general query.
[WAN] 08-05-2021 00:47:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:47:26 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:49:04 LAN send out a general query.
[VoIP] 08-05-2021 00:50:34 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 00:51:09 LAN send out a general query.
[WAN] 08-05-2021 00:52:26 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:52:26 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 00:52:56 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 00:52:56 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 00:52:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:52:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 00:52:56 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 00:52:56 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 00:52:56 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 00:53:14 LAN send out a general query.
[IPTV] 08-05-2021 00:55:19 LAN send out a general query.
[IPTV] 08-05-2021 00:57:24 LAN send out a general query.
[WAN] 08-05-2021 00:57:37 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 00:57:37 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 00:59:29 LAN send out a general query.
{Firewall} 08-05-2021 01:01:15 DoS attack: TCP Port Scan from source:
188.124.36.163:44435
{Firewall} 08-05-2021 01:01:15 drop this packet for psd
[IPTV] 08-05-2021 01:01:34 LAN send out a general query.
[WAN] 08-05-2021 01:02:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:02:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:03:39 LAN send out a general query.
[IPTV] 08-05-2021 01:05:44 LAN send out a general query.
{Firewall} 08-05-2021 01:07:45 DoS attack: UDP Port Scan from source:
146.88.240.4:42987
{Firewall} 08-05-2021 01:07:45 drop this packet for psd
[WAN] 08-05-2021 01:07:47 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:07:47 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:07:49 LAN send out a general query.
[IPTV] 08-05-2021 01:09:54 LAN send out a general query.
[IPTV] 08-05-2021 01:11:59 LAN send out a general query.
[WAN] 08-05-2021 01:12:58 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:12:58 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:14:04 LAN send out a general query.
[Firewall] 08-05-2021 01:14:09, DROP SRC=36.27.214.242 DST=187.221.151.105
PROTO=UDP SPT=43638 DPT=53 LEN=39
[WIFI] 08-05-2021 01:15:18 DEAUTH(5) reason7 from sta:4c:c9:5e:29:00:fc intf wl1
[LAN] 08-05-2021 01:15:19 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:19 Request IP [192.168.1.71] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 01:15:20 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:20 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:21 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:21 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:22 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:22 Received DISCOVER from client mac [4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Send OFFER of ip [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[LAN] 08-05-2021 01:15:23 Received REQUEST from client ip [0.0.0.0] mac
[4c:c9:5e:29:00:fc]
[LAN] 08-05-2021 01:15:23 Successfully assign IP [192.168.1.73] to client mac
[4c:c9:5e:29:00:fc], lease time [86400]
[IPTV] 08-05-2021 01:16:09 LAN send out a general query.
[Firewall] 08-05-2021 01:17:55, DROP SRC=2.89.171.218 DST=187.221.151.105 PROTO=TCP
SPT=41337 DPT=445
[WAN] 08-05-2021 01:18:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:18:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:18:14 LAN send out a general query.
[IPTV] 08-05-2021 01:20:19 LAN send out a general query.
[VoIP] 08-05-2021 01:20:35 receive response of OPTIONS message, rspcode is:200
[Firewall] 08-05-2021 01:21:43, DROP SRC=203.159.80.142 DST=187.221.151.105
PROTO=UDP SPT=45622 DPT=53 LEN=20
[IPTV] 08-05-2021 01:22:24 LAN send out a general query.
[WIFI] 08-05-2021 01:23:05 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 01:23:05 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 01:23:05 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:23:05 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:23:05 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 01:23:06 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 01:23:06 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-05-2021 01:23:08 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:23:08 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:24:29 LAN send out a general query.
[IPTV] 08-05-2021 01:26:34 LAN send out a general query.
[WAN] 08-05-2021 01:28:19 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:28:19 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:28:39 LAN send out a general query.
[Firewall] 08-05-2021 01:30:27, DROP SRC=23.94.188.98 DST=187.221.151.105 PROTO=TCP
SPT=41186 DPT=445
[IPTV] 08-05-2021 01:30:44 LAN send out a general query.
[Firewall] 08-05-2021 01:32:17, DROP SRC=185.180.143.32 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 01:32:49 LAN send out a general query.
[WAN] 08-05-2021 01:33:29 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:33:29 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:34:54 LAN send out a general query.
[IPTV] 08-05-2021 01:36:59 LAN send out a general query.
[WAN] 08-05-2021 01:38:29 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:38:29 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:39:04 LAN send out a general query.
[Firewall] 08-05-2021 01:39:51, DROP SRC=203.160.187.102 DST=187.221.151.105
PROTO=TCP SPT=60580 DPT=445
[IPTV] 08-05-2021 01:41:09 LAN send out a general query.
[Firewall] 08-05-2021 01:41:59, DROP SRC=186.153.121.253 DST=187.221.151.105
PROTO=TCP SPT=59733 DPT=445
[IPTV] 08-05-2021 01:43:14 LAN send out a general query.
[WAN] 08-05-2021 01:43:40 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:43:40 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:45:19 LAN send out a general query.
[IPTV] 08-05-2021 01:47:24 LAN send out a general query.
[Firewall] 08-05-2021 01:47:30, DROP SRC=115.78.129.37 DST=187.221.151.105
PROTO=TCP SPT=42364 DPT=445
[WAN] 08-05-2021 01:48:50 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:48:50 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:49:29 LAN send out a general query.
[VoIP] 08-05-2021 01:50:37 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 01:51:34 LAN send out a general query.
[WIFI] 08-05-2021 01:53:14 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 01:53:14 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 01:53:14 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:53:14 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 01:53:14 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 01:53:14 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 01:53:14 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 01:53:39 LAN send out a general query.
[WAN] 08-05-2021 01:53:50 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:53:50 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:55:44 LAN send out a general query.
[IPTV] 08-05-2021 01:57:49 LAN send out a general query.
[WAN] 08-05-2021 01:59:01 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 01:59:01 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 01:59:54 LAN send out a general query.
[Firewall] 08-05-2021 02:00:57, DROP SRC=117.247.82.217 DST=187.221.151.105
PROTO=TCP SPT=51585 DPT=445
[Firewall] 08-05-2021 02:01:49, DROP SRC=114.35.78.235 DST=187.221.151.105
PROTO=TCP SPT=48118 DPT=445
[IPTV] 08-05-2021 02:01:59 LAN send out a general query.
{Firewall} 08-05-2021 02:03:07 DoS attack: TCP Port Scan from source:
91.206.14.241:49664
{Firewall} 08-05-2021 02:03:07 drop this packet for psd
[IPTV] 08-05-2021 02:04:04 LAN send out a general query.
[WAN] 08-05-2021 02:04:11 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:04:11 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 02:05:24, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=49109 DPT=53 LEN=38
[Firewall] 08-05-2021 02:05:53, DROP SRC=5.110.95.96 DST=187.221.151.105 PROTO=TCP
SPT=9272 DPT=445
[Firewall] 08-05-2021 02:05:56, DROP SRC=5.110.95.96 DST=187.221.151.105 PROTO=TCP
SPT=9272 DPT=445
[IPTV] 08-05-2021 02:06:09 LAN send out a general query.
[IPTV] 08-05-2021 02:08:14 LAN send out a general query.
[WAN] 08-05-2021 02:09:11 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:09:11 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:10:19 LAN send out a general query.
[IPTV] 08-05-2021 02:12:24 LAN send out a general query.
[WAN] 08-05-2021 02:14:22 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:14:22 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:14:29 LAN send out a general query.
[Firewall] 08-05-2021 02:15:54, DROP SRC=172.104.143.39 DST=187.221.151.105
PROTO=TCP SPT=60659 DPT=53
[IPTV] 08-05-2021 02:16:34 LAN send out a general query.
[IPTV] 08-05-2021 02:18:39 LAN send out a general query.
[WAN] 08-05-2021 02:19:32 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:19:32 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 02:20:38 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 02:20:44 LAN send out a general query.
[IPTV] 08-05-2021 02:22:49 LAN send out a general query.
[WIFI] 08-05-2021 02:23:46 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 02:23:46 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 02:23:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:23:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:23:46 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 02:23:46 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 02:23:46 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WAN] 08-05-2021 02:24:32 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:24:32 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:24:54 LAN send out a general query.
[IPTV] 08-05-2021 02:26:59 LAN send out a general query.
[Firewall] 08-05-2021 02:28:44, DROP SRC=41.38.45.99 DST=187.221.151.105 PROTO=TCP
SPT=60339 DPT=445
[IPTV] 08-05-2021 02:29:04 LAN send out a general query.
[WAN] 08-05-2021 02:29:43 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:29:43 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:31:09 LAN send out a general query.
[IPTV] 08-05-2021 02:33:14 LAN send out a general query.
[WAN] 08-05-2021 02:34:53 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:34:53 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:35:19 LAN send out a general query.
[IPTV] 08-05-2021 02:37:24 LAN send out a general query.
[WIFI] 08-05-2021 02:37:43 DEAUTH(5) reason7 from sta:34:f3:9a:9f:88:e1 intf wl1
[LAN] 08-05-2021 02:37:43 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:43 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 02:37:43 Send NAK to client ip [0.0.0.0] mac [34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:44 Received DISCOVER from client mac [34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:44 Request IP [192.168.1.67] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 02:37:45 Send OFFER of ip [192.168.1.71] to client mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:45 Received REQUEST from client ip [0.0.0.0] mac
[34:f3:9a:9f:88:e1]
[LAN] 08-05-2021 02:37:45 Successfully assign IP [192.168.1.71] to client mac
[34:f3:9a:9f:88:e1], lease time [86400]
[IPTV] 08-05-2021 02:39:29 LAN send out a general query.
[WAN] 08-05-2021 02:39:53 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:39:53 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:41:34 LAN send out a general query.
[IPTV] 08-05-2021 02:43:39 LAN send out a general query.
[WAN] 08-05-2021 02:45:04 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:45:04 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 02:45:43, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[IPTV] 08-05-2021 02:45:44 LAN send out a general query.
[Firewall] 08-05-2021 02:45:46, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[UPnP] 08-05-2021 02:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309541f2 Success.
[Firewall] 08-05-2021 02:45:52, DROP SRC=113.99.72.151 DST=187.221.151.105
PROTO=TCP SPT=51798 DPT=445
[UPnP] 08-05-2021 02:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830951efb Success.
[IPTV] 08-05-2021 02:47:49 LAN send out a general query.
[IPTV] 08-05-2021 02:49:54 LAN send out a general query.
[WAN] 08-05-2021 02:50:14 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:50:14 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 02:50:39 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 02:51:59 LAN send out a general query.
[WIFI] 08-05-2021 02:53:55 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 02:53:55 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 02:53:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:53:56 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 02:53:56 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 02:53:56 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 02:53:56 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 02:54:04 LAN send out a general query.
[WAN] 08-05-2021 02:55:14 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 02:55:14 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 02:56:09 LAN send out a general query.
[IPTV] 08-05-2021 02:58:14 LAN send out a general query.
[Firewall] 08-05-2021 02:59:12, DROP SRC=71.6.232.6 DST=187.221.151.105 PROTO=TCP
SPT=60816 DPT=445
[IPTV] 08-05-2021 03:00:19 LAN send out a general query.
[WAN] 08-05-2021 03:00:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:00:25 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:02:24 LAN send out a general query.
[IPTV] 08-05-2021 03:04:29 LAN send out a general query.
[WAN] 08-05-2021 03:05:35 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:05:35 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:06:34 LAN send out a general query.
[IPTV] 08-05-2021 03:08:39 LAN send out a general query.
[WAN] 08-05-2021 03:10:35 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:10:35 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:10:44 LAN send out a general query.
[IPTV] 08-05-2021 03:12:49 LAN send out a general query.
[Firewall] 08-05-2021 03:14:24, DROP SRC=122.187.95.118 DST=187.221.151.105
PROTO=TCP SPT=52550 DPT=445
[Firewall] 08-05-2021 03:14:27, DROP SRC=122.187.95.118 DST=187.221.151.105
PROTO=TCP SPT=52550 DPT=445
[IPTV] 08-05-2021 03:14:54 LAN send out a general query.
[WAN] 08-05-2021 03:15:45 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:15:45 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:16:59 LAN send out a general query.
[Firewall] 08-05-2021 03:17:37, DROP SRC=213.154.48.70 DST=187.221.151.105
PROTO=TCP SPT=6912 DPT=445
[IPTV] 08-05-2021 03:19:04 LAN send out a general query.
[VoIP] 08-05-2021 03:20:41 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 03:20:56 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:20:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:21:09 LAN send out a general query.
[Firewall] 08-05-2021 03:22:53, DROP SRC=220.189.119.47 DST=187.221.151.105
PROTO=TCP SPT=12218 DPT=445
[IPTV] 08-05-2021 03:23:14 LAN send out a general query.
[WIFI] 08-05-2021 03:24:05 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 03:24:05 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 03:24:06 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:24:06 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:24:06 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 03:24:06 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 03:24:06 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 03:25:19 LAN send out a general query.
[WAN] 08-05-2021 03:25:56 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:25:56 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:27:24 LAN send out a general query.
[IPTV] 08-05-2021 03:29:29 LAN send out a general query.
[WAN] 08-05-2021 03:31:06 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:31:06 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:31:34 LAN send out a general query.
[IPTV] 08-05-2021 03:33:39 LAN send out a general query.
[GPON] 08-05-2021 03:34:12 Transmit omci packet over time! sec=4087619073951662080
nsec=2668463181004800
[IPTV] 08-05-2021 03:35:44 LAN send out a general query.
[WAN] 08-05-2021 03:36:17 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:36:17 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:37:49 LAN send out a general query.
[IPTV] 08-05-2021 03:39:54 LAN send out a general query.
[WAN] 08-05-2021 03:41:27 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:41:27 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:41:59 LAN send out a general query.
[IPTV] 08-05-2021 03:44:04 LAN send out a general query.
[IPTV] 08-05-2021 03:46:09 LAN send out a general query.
[WAN] 08-05-2021 03:46:27 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:46:27 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:48:14 LAN send out a general query.
[IPTV] 08-05-2021 03:50:19 LAN send out a general query.
[VoIP] 08-05-2021 03:50:44 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 03:51:38 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:51:38 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:52:24 LAN send out a general query.
[WIFI] 08-05-2021 03:54:15 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 03:54:15 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 03:54:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:54:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 03:54:15 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 03:54:15 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 03:54:15 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 03:54:29 LAN send out a general query.
[Firewall] 08-05-2021 03:55:46, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=47791 DPT=53 LEN=38
[IPTV] 08-05-2021 03:56:34 LAN send out a general query.
[WAN] 08-05-2021 03:56:48 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 03:56:48 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 03:58:39 LAN send out a general query.
[IPTV] 08-05-2021 04:00:44 LAN send out a general query.
[WAN] 08-05-2021 04:01:48 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:01:48 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:02:49 LAN send out a general query.
[Firewall] 08-05-2021 04:04:33, DROP SRC=81.18.134.18 DST=187.221.151.105 PROTO=TCP
SPT=54345 DPT=445
[IPTV] 08-05-2021 04:04:54 LAN send out a general query.
[WAN] 08-05-2021 04:06:59 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:06:59 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:06:59 LAN send out a general query.
[IPTV] 08-05-2021 04:09:04 LAN send out a general query.
[IPTV] 08-05-2021 04:11:09 LAN send out a general query.
[WAN] 08-05-2021 04:12:09 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:12:09 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:13:14 LAN send out a general query.
[Firewall] 08-05-2021 04:14:49, DROP SRC=85.101.11.161 DST=187.221.151.105
PROTO=TCP SPT=54229 DPT=445
[Firewall] 08-05-2021 04:14:52, DROP SRC=85.101.11.161 DST=187.221.151.105
PROTO=TCP SPT=54229 DPT=445
[IPTV] 08-05-2021 04:15:19 LAN send out a general query.
[WAN] 08-05-2021 04:17:09 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:17:09 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:17:24 LAN send out a general query.
[IPTV] 08-05-2021 04:19:29 LAN send out a general query.
[VoIP] 08-05-2021 04:20:44 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 04:21:34 LAN send out a general query.
[WAN] 08-05-2021 04:22:20 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:22:20 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:23:39 LAN send out a general query.
[WIFI] 08-05-2021 04:25:27 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 04:25:27 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 04:25:27 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:25:27 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:25:27 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 04:25:27 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 04:25:27 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 04:25:44 LAN send out a general query.
[WAN] 08-05-2021 04:27:30 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:27:30 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:27:49 LAN send out a general query.
[IPTV] 08-05-2021 04:29:54 LAN send out a general query.
[IPTV] 08-05-2021 04:31:59 LAN send out a general query.
[WAN] 08-05-2021 04:32:30 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:32:30 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:34:04 LAN send out a general query.
[IPTV] 08-05-2021 04:36:09 LAN send out a general query.
[WAN] 08-05-2021 04:37:41 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:37:41 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:38:14 LAN send out a general query.
[IPTV] 08-05-2021 04:40:19 LAN send out a general query.
[IPTV] 08-05-2021 04:42:24 LAN send out a general query.
[Firewall] 08-05-2021 04:42:44, DROP SRC=222.67.247.104 DST=187.221.151.105
PROTO=TCP SPT=40033 DPT=445
[WAN] 08-05-2021 04:42:51 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:42:51 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:44:29 LAN send out a general query.
[IPTV] 08-05-2021 04:46:34 LAN send out a general query.
[WAN] 08-05-2021 04:47:51 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:47:51 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:48:39 LAN send out a general query.
[Firewall] 08-05-2021 04:49:37, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21209 DPT=139
[Firewall] 08-05-2021 04:49:40, DROP SRC=158.140.184.116 DST=187.221.151.105
PROTO=TCP SPT=21209 DPT=139
[Firewall] 08-05-2021 04:50:35, DROP SRC=185.180.143.16 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 04:50:44 LAN send out a general query.
[VoIP] 08-05-2021 04:50:45 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 04:52:49 LAN send out a general query.
[WAN] 08-05-2021 04:53:02 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:53:02 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:54:54 LAN send out a general query.
[WIFI] 08-05-2021 04:55:36 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 04:55:36 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 04:55:36 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:55:36 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 04:55:36 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 04:55:36 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 04:55:36 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 04:56:59 LAN send out a general query.
[WAN] 08-05-2021 04:58:12 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 04:58:12 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 04:59:04 LAN send out a general query.
[IPTV] 08-05-2021 05:01:09 LAN send out a general query.
[WAN] 08-05-2021 05:03:12 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:03:12 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:03:14 LAN send out a general query.
[IPTV] 08-05-2021 05:05:19 LAN send out a general query.
[Firewall] 08-05-2021 05:05:48, DROP SRC=81.91.235.146 DST=187.221.151.105
PROTO=TCP SPT=61697 DPT=445
[IPTV] 08-05-2021 05:07:24 LAN send out a general query.
[WAN] 08-05-2021 05:08:23 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:08:23 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:09:29 LAN send out a general query.
[IPTV] 08-05-2021 05:11:34 LAN send out a general query.
[WAN] 08-05-2021 05:13:33 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:13:33 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:13:39 LAN send out a general query.
[IPTV] 08-05-2021 05:15:44 LAN send out a general query.
[IPTV] 08-05-2021 05:17:49 LAN send out a general query.
[WAN] 08-05-2021 05:18:33 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:18:33 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:19:54 LAN send out a general query.
[VoIP] 08-05-2021 05:20:49 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 05:21:59 LAN send out a general query.
[WAN] 08-05-2021 05:23:43 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:23:44 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:24:04 LAN send out a general query.
[WIFI] 08-05-2021 05:25:45 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 05:25:45 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 05:25:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:25:46 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:25:46 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 05:25:46 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 05:25:46 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 05:26:09 LAN send out a general query.
[IPTV] 08-05-2021 05:28:14 LAN send out a general query.
[WAN] 08-05-2021 05:28:54 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:28:54 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:30:19 LAN send out a general query.
[IPTV] 08-05-2021 05:32:24 LAN send out a general query.
[WAN] 08-05-2021 05:33:54 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:33:54 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:34:29 LAN send out a general query.
[IPTV] 08-05-2021 05:36:34 LAN send out a general query.
[Firewall] 08-05-2021 05:36:50, DROP SRC=185.53.90.85 DST=187.221.151.105 PROTO=UDP
SPT=56555 DPT=53 LEN=38
[IPTV] 08-05-2021 05:38:39 LAN send out a general query.
[WAN] 08-05-2021 05:39:04 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:39:04 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:40:44 LAN send out a general query.
[IPTV] 08-05-2021 05:42:49 LAN send out a general query.
[WAN] 08-05-2021 05:44:15 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:44:15 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:44:54 LAN send out a general query.
[IPTV] 08-05-2021 05:46:59 LAN send out a general query.
[IPTV] 08-05-2021 05:49:04 LAN send out a general query.
[WAN] 08-05-2021 05:49:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:49:25 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 05:50:49 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 05:51:09 LAN send out a general query.
[Firewall] 08-05-2021 05:51:34, DROP SRC=113.161.78.238 DST=187.221.151.105
PROTO=TCP SPT=56594 DPT=445
[IPTV] 08-05-2021 05:53:14 LAN send out a general query.
[WAN] 08-05-2021 05:54:25 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:54:25 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 05:55:19 LAN send out a general query.
[WIFI] 08-05-2021 05:55:54 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 05:55:54 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 05:55:55 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:55:55 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 05:55:55 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 05:55:55 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 05:55:55 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[Firewall] 08-05-2021 05:56:05, DROP SRC=180.211.162.198 DST=187.221.151.105
PROTO=TCP SPT=47642 DPT=445
[IPTV] 08-05-2021 05:57:24 LAN send out a general query.
[IPTV] 08-05-2021 05:59:29 LAN send out a general query.
[WAN] 08-05-2021 05:59:36 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 05:59:36 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:01:34 LAN send out a general query.
[IPTV] 08-05-2021 06:03:39 LAN send out a general query.
[WAN] 08-05-2021 06:04:46 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:04:46 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:05:44 LAN send out a general query.
[IPTV] 08-05-2021 06:07:49 LAN send out a general query.
[WAN] 08-05-2021 06:09:46 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:09:46 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:09:54 LAN send out a general query.
[IPTV] 08-05-2021 06:11:59 LAN send out a general query.
[Firewall] 08-05-2021 06:12:07, DROP SRC=117.205.99.128 DST=187.221.151.105
PROTO=TCP SPT=63056 DPT=445
[IPTV] 08-05-2021 06:14:04 LAN send out a general query.
[WAN] 08-05-2021 06:14:57 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:14:57 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 06:15:06, DROP SRC=58.40.21.224 DST=187.221.151.105 PROTO=TCP
SPT=51175 DPT=445
[IPTV] 08-05-2021 06:16:09 LAN send out a general query.
[IPTV] 08-05-2021 06:18:14 LAN send out a general query.
[WAN] 08-05-2021 06:20:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:20:07 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:20:19 LAN send out a general query.
[VoIP] 08-05-2021 06:20:53 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 06:22:24 LAN send out a general query.
[IPTV] 08-05-2021 06:24:29 LAN send out a general query.
[WAN] 08-05-2021 06:25:07 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:25:07 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 06:26:14 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 06:26:14 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:26:15 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 06:26:15 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 06:26:15 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 06:26:15 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 06:26:34 LAN send out a general query.
[IPTV] 08-05-2021 06:28:39 LAN send out a general query.
[WAN] 08-05-2021 06:30:18 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:30:18 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:30:44 LAN send out a general query.
[Firewall] 08-05-2021 06:31:25, DROP SRC=185.94.111.1 DST=187.221.151.105 PROTO=UDP
SPT=43295 DPT=137 LEN=58
[IPTV] 08-05-2021 06:32:49 LAN send out a general query.
[Firewall] 08-05-2021 06:33:43, DROP SRC=147.203.255.20 DST=187.221.151.105
PROTO=UDP SPT=41013 DPT=53 LEN=38
[GPON] 08-05-2021 06:34:21 Transmit omci packet over time! sec=3700085291525079040
nsec=2668463181004800
[IPTV] 08-05-2021 06:34:54 LAN send out a general query.
[WAN] 08-05-2021 06:35:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:35:28 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:36:59 LAN send out a general query.
[IPTV] 08-05-2021 06:39:04 LAN send out a general query.
[WAN] 08-05-2021 06:40:28 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:40:28 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=1777 DPT=445
[Firewall] 08-05-2021 06:41:06, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:07, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:08, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[Firewall] 08-05-2021 06:41:09, DROP SRC=110.138.91.43 DST=187.221.151.105
PROTO=TCP SPT=61558 DPT=445
[IPTV] 08-05-2021 06:41:09 LAN send out a general query.
[IPTV] 08-05-2021 06:43:14 LAN send out a general query.
[IPTV] 08-05-2021 06:45:19 LAN send out a general query.
[WAN] 08-05-2021 06:45:39 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:45:39 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 06:47:24 LAN send out a general query.
[IPTV] 08-05-2021 06:49:29 LAN send out a general query.
[WAN] 08-05-2021 06:50:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:50:49 LCP echo-reply has been received from WAN WAN1
[VoIP] 08-05-2021 06:50:54 receive response of OPTIONS message, rspcode is:200
[IPTV] 08-05-2021 06:51:34 LAN send out a general query.
[Firewall] 08-05-2021 06:53:16, DROP SRC=58.34.159.197 DST=187.221.151.105
PROTO=TCP SPT=59638 DPT=445
[IPTV] 08-05-2021 06:53:39 LAN send out a general query.
[IPTV] 08-05-2021 06:55:44 LAN send out a general query.
[WAN] 08-05-2021 06:55:49 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 06:55:49 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 06:56:23 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 06:56:23 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 06:56:23 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:56:23 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 06:56:23 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 06:56:26 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 06:56:26 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 06:57:49 LAN send out a general query.
[IPTV] 08-05-2021 06:59:54 LAN send out a general query.
[WAN] 08-05-2021 07:01:00 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:01:00 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 07:01:06 DEAUTH(5) reason4 from sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 07:01:06 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[IPTV] 08-05-2021 07:01:59 LAN send out a general query.
[IPTV] 08-05-2021 07:04:04 LAN send out a general query.
[Firewall] 08-05-2021 07:05:55, DROP SRC=128.14.209.147 DST=187.221.151.105
PROTO=TCP SPT=41517 DPT=53
[IPTV] 08-05-2021 07:06:09 LAN send out a general query.
[WAN] 08-05-2021 07:06:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:06:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:08:14 LAN send out a general query.
[IPTV] 08-05-2021 07:10:19 LAN send out a general query.
[WAN] 08-05-2021 07:11:10 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:11:10 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:12:24 LAN send out a general query.
[IPTV] 08-05-2021 07:14:29 LAN send out a general query.
[WAN] 08-05-2021 07:16:21 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:16:21 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:16:34 LAN send out a general query.
[IPTV] 08-05-2021 07:18:39 LAN send out a general query.
[IPTV] 08-05-2021 07:20:44 LAN send out a general query.
[VoIP] 08-05-2021 07:20:54 receive response of OPTIONS message, rspcode is:200
[WAN] 08-05-2021 07:21:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:21:31 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:22:49 LAN send out a general query.
[IPTV] 08-05-2021 07:24:54 LAN send out a general query.
[WAN] 08-05-2021 07:26:31 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:26:31 LCP echo-reply has been received from WAN WAN1
[WIFI] 08-05-2021 07:26:32 DEAUTH(6) reason1 send to sta:0c:7a:15:9c:f8:5b intf wl0
[WIFI] 08-05-2021 07:26:32 DISASSOC(12) reason8 send to sta:0c:7a:15:9c:f8:5b intf
wl0
[WIFI] 08-05-2021 07:26:33 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 07:26:33 AUTH(4) send to sta:0c:7a:15:9c:f8:5b
[WIFI] 08-05-2021 07:26:33 Authorized sta:0c:7a:15:9c:f8:5b intf wl0
[LAN] 08-05-2021 07:26:33 Received REQUEST from client ip [0.0.0.0] mac
[0c:7a:15:9c:f8:5b]
[LAN] 08-05-2021 07:26:33 Successfully assign IP [192.168.1.70] to client mac
[0c:7a:15:9c:f8:5b], lease time [86400]
[IPTV] 08-05-2021 07:26:59 LAN send out a general query.
[IPTV] 08-05-2021 07:29:04 LAN send out a general query.
[IPTV] 08-05-2021 07:31:09 LAN send out a general query.
[WAN] 08-05-2021 07:31:42 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:31:42 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:33:14 LAN send out a general query.
[WIFI] 08-05-2021 07:34:22 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:22 AUTH(4) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:22 ASSOC(8) send to sta:10:c7:53:2a:c5:98
[WIFI] 08-05-2021 07:34:25 Authorized sta:10:c7:53:2a:c5:98 intf wl1
[LAN] 08-05-2021 07:34:25 Received DISCOVER from client mac [10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Send OFFER of ip [192.168.1.69] to client mac
[10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Received REQUEST from client ip [0.0.0.0] mac
[10:c7:53:2a:c5:98]
[LAN] 08-05-2021 07:34:25 Successfully assign IP [192.168.1.69] to client mac
[10:c7:53:2a:c5:98], lease time [86400]
[LAN] 08-05-2021 07:34:43 Received REQUEST from client ip [192.168.1.64] mac
[d0:77:14:ce:bd:ae]
[LAN] 08-05-2021 07:34:43 Successfully assign IP [192.168.1.64] to client mac
[d0:77:14:ce:bd:ae], lease time [86400]
[IPTV] 08-05-2021 07:35:19 LAN send out a general query.
[LAN] 08-05-2021 07:35:54 Received REQUEST from client ip [192.168.1.68] mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:54 Request IP [192.168.1.68] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 07:35:54 Send NAK to client ip [192.168.1.68] mac
[a8:7d:12:27:ab:de]
[WIFI] 08-05-2021 07:35:57 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 AUTH(4) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 ASSOC(8) send to sta:a8:7d:12:27:ab:de
[WIFI] 08-05-2021 07:35:57 Authorized sta:a8:7d:12:27:ab:de intf wl0
[LAN] 08-05-2021 07:35:57 Received DISCOVER from client mac [a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:57 Request IP [192.168.1.68] is in used, reserving it for
[3600] seconds
[LAN] 08-05-2021 07:35:58 Send OFFER of ip [192.168.1.67] to client mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:58 Received REQUEST from client ip [0.0.0.0] mac
[a8:7d:12:27:ab:de]
[LAN] 08-05-2021 07:35:58 Successfully assign IP [192.168.1.67] to client mac
[a8:7d:12:27:ab:de], lease time [86400]
[WAN] 08-05-2021 07:36:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:36:52 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:37:24 LAN send out a general query.
[WIFI] 08-05-2021 07:39:16 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 07:39:16 AUTH(4) send to sta:c8:1e:e7:02:80:c6
[WIFI] 08-05-2021 07:39:16 Authorized sta:c8:1e:e7:02:80:c6 intf wl1
[IPTV] 08-05-2021 07:39:29 LAN send out a general query.
[IPTV] 08-05-2021 07:41:34 LAN send out a general query.
[WAN] 08-05-2021 07:41:52 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:41:52 LCP echo-reply has been received from WAN WAN1
[Firewall] 08-05-2021 07:43:18, DROP SRC=185.162.192.32 DST=187.221.151.105
PROTO=TCP SPT=47697 DPT=445
[IPTV] 08-05-2021 07:43:39 LAN send out a general query.
[WIFI] 08-05-2021 07:44:04 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 AUTH(4) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 ASSOC(8) send to sta:64:1c:ae:07:d8:ab
[WIFI] 08-05-2021 07:44:04 Authorized sta:64:1c:ae:07:d8:ab intf wl0
[LAN] 08-05-2021 07:44:04 Received REQUEST from client ip [0.0.0.0] mac
[64:1c:ae:07:d8:ab]
[LAN] 08-05-2021 07:44:04 Successfully assign IP [192.168.1.72] to client mac
[64:1c:ae:07:d8:ab], lease time [86400]
[IPTV] 08-05-2021 07:45:44 LAN send out a general query.
[UPnP] 08-05-2021 07:45:48 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095a9e3 Success.
[UPnP] 08-05-2021 07:45:52 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095e146 Success.
[UPnP] 08-05-2021 07:46:00 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a1683095007c Success.
[UPnP] 08-05-2021 07:46:00 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309562c2 Success.
[WAN] 08-05-2021 07:47:03 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:47:03 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:47:49 LAN send out a general query.
[WIFI] 08-05-2021 07:48:30 DEAUTH(6) reason7 send to sta:c8:1e:e7:02:80:c6 intf wl1
[WIFI] 08-05-2021 07:48:30 DISASSOC(12) reason8 send to sta:c8:1e:e7:02:80:c6 intf
wl1
[Firewall] 08-05-2021 07:48:54, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:54, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:55, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:55, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:56, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:56, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53166 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:48:57, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=53167 DPT=445
[Firewall] 08-05-2021 07:49:00, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:01, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:02, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[Firewall] 08-05-2021 07:49:03, DROP SRC=180.252.167.49 DST=187.221.151.105
PROTO=TCP SPT=54385 DPT=445
[IPTV] 08-05-2021 07:49:54 LAN send out a general query.
[VoIP] 08-05-2021 07:50:55 receive response of OPTIONS message, rspcode is:200
[Firewall] 08-05-2021 07:51:47, DROP SRC=181.44.118.39 DST=187.221.151.105
PROTO=TCP SPT=38357 DPT=445
[IPTV] 08-05-2021 07:51:59 LAN send out a general query.
[WAN] 08-05-2021 07:52:13 LCP echo-request has been send from WAN WAN1
[WAN] 08-05-2021 07:52:13 LCP echo-reply has been received from WAN WAN1
[IPTV] 08-05-2021 07:54:04 LAN send out a general query.
[System] 08-05-2021 07:54:14 User 'TELMEX' login failed via HTTP from
192.168.1.70(MAC: 0C-7A-15-9C-F8-5B Host Name: MX-5CG0010WNN)
[System] 08-05-2021 07:54:21 User 'TELMEX' login successfully via HTTP from
192.168.1.70(MAC: 0C-7A-15-9C-F8-5B Host Name: MX-5CG0010WNN)
[System] 08-05-2021 07:55:26 Download Event Log by web client 192.168.1.70(MAC:0C-
7A-15-9C-F8-5B Host Name: MX-5CG0010WNN).