zilexa

AGH log

Nov 2nd, 2020 (edited)
115
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 305.54 KB | None | 0 0
  1. 2020/11/02 16:28:23 3419665#20 [info] AdGuard Home, version 0.104.0, channel release, arch linux amd64
  2. 2020/11/02 16:28:23 3419665#20 [debug] Current working directory is /opt/AdGuardHome
  3. 2020/11/02 16:28:23 3419665#20 [info] AdGuard Home is running as a service
  4. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.upgradeConfig(): got schema version 7
  5. 2020/11/02 16:28:23 3419665#20 [debug] Reading config file: /opt/AdGuardHome/AdGuardHome.yaml
  6. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: loading hosts from file /etc/hosts
  7. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added 127.0.0.1 -> localhost
  8. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address 127.0.0.1 -> localhost
  9. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added 127.0.1.1 -> Obelix
  10. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address 127.0.1.1 -> Obelix
  11. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ::1 -> ip6-localhost
  12. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ::1 -> ip6-localhost
  13. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ::1 -> ip6-loopback
  14. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added fe00:: -> ip6-localnet
  15. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address fe00:: -> ip6-localnet
  16. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff00:: -> ip6-mcastprefix
  17. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff00:: -> ip6-mcastprefix
  18. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff02::1 -> ip6-allnodes
  19. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff02::1 -> ip6-allnodes
  20. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff02::2 -> ip6-allrouters
  21. 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff02::2 -> ip6-allrouters
  22. 2020/11/02 16:28:23 3419665#20 [debug] Clients: removed 0 client aliases
  23. 2020/11/02 16:28:23 3419665#20 [debug] Clients: added 0 client aliases from DHCP
  24. 2020/11/02 16:28:23 3419665#20 [debug] Writing YAML file: /opt/AdGuardHome/AdGuardHome.yaml
  25. 2020/11/02 16:28:23 3419665#20 [info] Initializing auth module: /opt/AdGuardHome/data/sessions.db
  26. 2020/11/02 16:28:23 3419665#20 [debug] Auth: loaded 2 sessions from DB (removed 0 expired)
  27. 2020/11/02 16:28:23 3419665#20 [info] Auth: initialized. users:1 sessions:2
  28. 2020/11/02 16:28:23 3419665#20 [info] Initialize web module
  29. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).dbOpen(): db.Open...
  30. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).dbOpen(): db.Open
  31. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
  32. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
  33. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.createObject(): Deleting old units...
  34. 2020/11/02 16:28:23 3419665#20 [debug] Stats: initialized
  35. 2020/11/02 16:28:23 3419665#20 [debug] DNS: added 0 A/PTR entries from DHCP
  36. 2020/11/02 16:28:23 3419665#20 [debug] IPSET: added 0 hosts
  37. 2020/11/02 16:28:23 3419665#20 [debug] Bootstraps: [9.9.9.10 149.112.112.10 2620:fe::10 2620:fe::fe:10]
  38. 2020/11/02 16:28:23 3419665#20 [debug] Upstream 0: 127.0.0.1:5335
  39. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): Loading filter 1 contents to: /opt/AdGuardHome/data/filters/1.txt
  40. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): File /opt/AdGuardHome/data/filters/1.txt, id 1, length 720573
  41. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): Loading filter 1604323042 contents to: /opt/AdGuardHome/data/filters/1604323042.txt
  42. 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): File /opt/AdGuardHome/data/filters/1604323042.txt, id 1604323042, length 7883284
  43. 2020/11/02 16:28:24 3419665#20 [debug] Web: applying new TLS configuration
  44. 2020/11/02 16:28:24 3419665#20 [debug] Start AutoHosts module
  45. 2020/11/02 16:28:24 3419665#20 [info] AdGuard Home is available on the following addresses:
  46. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: loading hosts from file /etc/hosts
  47. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added 127.0.0.1 -> localhost
  48. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address 127.0.0.1 -> localhost
  49. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added 127.0.1.1 -> Obelix
  50. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address 127.0.1.1 -> Obelix
  51. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ::1 -> ip6-localhost
  52. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ::1 -> ip6-localhost
  53. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ::1 -> ip6-loopback
  54. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added fe00:: -> ip6-localnet
  55. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address fe00:: -> ip6-localnet
  56. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff00:: -> ip6-mcastprefix
  57. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff00:: -> ip6-mcastprefix
  58. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff02::1 -> ip6-allnodes
  59. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff02::1 -> ip6-allnodes
  60. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff02::2 -> ip6-allrouters
  61. 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff02::2 -> ip6-allrouters
  62. 2020/11/02 16:28:24 3419665#24 [debug] Clients: removed 0 client aliases
  63. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '::1' -> 'ip6-localhost' [1]
  64. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'fe00::' -> 'ip6-localnet' [2]
  65. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff00::' -> 'ip6-mcastprefix' [3]
  66. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff02::1' -> 'ip6-allnodes' [4]
  67. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff02::2' -> 'ip6-allrouters' [5]
  68. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '127.0.0.1' -> 'localhost' [6]
  69. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '127.0.1.1' -> 'Obelix' [7]
  70. 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 7 client aliases from system hosts-file
  71. 2020/11/02 16:28:24 3419665#20 [info] Go to http://127.0.0.1:3000
  72. 2020/11/02 16:28:24 3419665#20 [info] Go to http://[::1]:3000
  73. 2020/11/02 16:28:24 3419665#20 [info] Go to http://192.168.88.10:3000
  74. 2020/11/02 16:28:24 3419665#20 [info] Go to http://172.19.0.1:3000
  75. 2020/11/02 16:28:24 3419665#20 [info] Go to http://172.17.0.1:3000
  76. 2020/11/02 16:28:24 3419665#20 [info] Go to http://192.168.88.96:3000
  77. 2020/11/02 16:28:24 3419665#20 [info] Go to http://10.6.0.1:3000
  78. 2020/11/02 16:28:25 3419665#26 [debug] initialized filtering engine
  79. 2020/11/02 16:28:25 3419665#26 [info] Starting the DNS proxy server
  80. 2020/11/02 16:28:25 3419665#26 [info] Ratelimit is enabled and set to 20 rps
  81. 2020/11/02 16:28:25 3419665#26 [info] The server is configured to refuse ANY requests
  82. 2020/11/02 16:28:25 3419665#26 [info] DNS cache is enabled
  83. 2020/11/02 16:28:25 3419665#26 [info] MaxGoroutines is set to 50
  84. 2020/11/02 16:28:25 3419665#26 [info] Creating the UDP server socket
  85. 2020/11/02 16:28:25 3419665#12 [debug] github.com/AdguardTeam/AdGuardHome/home.(*clientsContainer).addFromSystemARP(): executing /usr/sbin/arp [arp -a]
  86. 2020/11/02 16:28:25 3419665#26 [info] Listening to udp://[::]:53
  87. 2020/11/02 16:28:25 3419665#26 [info] Creating a TCP server socket
  88. 2020/11/02 16:28:25 3419665#26 [info] Listening to tcp://[::]:53
  89. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
  90. 2020/11/02 16:28:25 3419665#13 [info] Entering the UDP listener loop on [::]:53
  91. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
  92. 2020/11/02 16:28:25 3419665#14 [info] Entering the tcp listener loop on [::]:53
  93. 2020/11/02 16:28:25 3419665#16 [debug] Filters: updating...
  94. 2020/11/02 16:28:25 3419665#16 [debug] Filters: update finished
  95. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.10
  96. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.24
  97. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.36
  98. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 10.6.0.3
  99. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.25
  100. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.35
  101. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.16
  102. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.1
  103. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 172.19.0.2
  104. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.30
  105. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.17
  106. 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 172.19.0.17
  107. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.10
  108. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 10.88.168.192.in-addr.arpa.
  109. 2020/11/02 16:28:25 3419665#50 [debug] querylog: the oldest log entry: 2020-11-02T14:54:33.589222042+01:00
  110. 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48922
  111. 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 17506
  112. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  113.  
  114. ;; QUESTION SECTION:
  115. ;36.88.168.192.in-addr.arpa. IN PTR
  116.  
  117. 2020/11/02 16:28:25 3419665#34 [debug] DNS: Adding OPT record with DNSSEC flag
  118. 2020/11/02 16:28:25 3419665#34 [debug] 127.0.0.1:5335: sending request PTR 36.88.168.192.in-addr.arpa.
  119. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  120. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;10.88.168.192.in-addr.arpa. IN PTR. Elapsed 1 ms.
  121. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  122. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.10
  123. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.24
  124. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 24.88.168.192.in-addr.arpa.
  125. 2020/11/02 16:28:25 3419665#34 [debug] 127.0.0.1:5335: response: ok
  126. 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;36.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  127. 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  128. 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 17506
  129. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  130.  
  131. ;; QUESTION SECTION:
  132. ;36.88.168.192.in-addr.arpa. IN PTR
  133.  
  134. ;; AUTHORITY SECTION:
  135. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  136.  
  137. ;; ADDITIONAL SECTION:
  138.  
  139. ;; OPT PSEUDOSECTION:
  140. ; EDNS: version 0; flags: do; udp: 1232
  141.  
  142. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  143. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;24.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  144. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  145. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.24
  146. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.36
  147. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 36.88.168.192.in-addr.arpa.
  148. 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:44713
  149. 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48684
  150. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  151.  
  152. ;; QUESTION SECTION:
  153. ;15.88.168.192.in-addr.arpa. IN PTR
  154.  
  155. 2020/11/02 16:28:25 3419665#65 [debug] DNS: Adding OPT record with DNSSEC flag
  156. 2020/11/02 16:28:25 3419665#65 [debug] 127.0.0.1:5335: sending request PTR 15.88.168.192.in-addr.arpa.
  157. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  158. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;36.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  159. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  160. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.36
  161. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 10.6.0.3
  162. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 3.0.6.10.in-addr.arpa.
  163. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  164. 2020/11/02 16:28:25 3419665#65 [debug] 127.0.0.1:5335: response: ok
  165. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;3.0.6.10.in-addr.arpa. IN PTR. Elapsed 0 ms.
  166. 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;15.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  167. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  168. 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  169. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 10.6.0.3
  170. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.25
  171. 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 48684
  172. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  173.  
  174. ;; QUESTION SECTION:
  175. ;15.88.168.192.in-addr.arpa. IN PTR
  176.  
  177. ;; AUTHORITY SECTION:
  178. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  179.  
  180. ;; ADDITIONAL SECTION:
  181.  
  182. ;; OPT PSEUDOSECTION:
  183. ; EDNS: version 0; flags: do; udp: 1232
  184.  
  185. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 25.88.168.192.in-addr.arpa.
  186. 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:34202
  187. 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 56646
  188. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  189.  
  190. ;; QUESTION SECTION:
  191. ;20.88.168.192.in-addr.arpa. IN PTR
  192.  
  193. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  194. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;25.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  195. 2020/11/02 16:28:25 3419665#51 [debug] DNS: Adding OPT record with DNSSEC flag
  196. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  197. 2020/11/02 16:28:25 3419665#51 [debug] 127.0.0.1:5335: sending request PTR 20.88.168.192.in-addr.arpa.
  198. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.25
  199. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.35
  200. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 35.88.168.192.in-addr.arpa.
  201. 2020/11/02 16:28:25 3419665#51 [debug] 127.0.0.1:5335: response: ok
  202. 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;20.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  203. 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  204. 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 56646
  205. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  206.  
  207. ;; QUESTION SECTION:
  208. ;20.88.168.192.in-addr.arpa. IN PTR
  209.  
  210. ;; AUTHORITY SECTION:
  211. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  212.  
  213. ;; ADDITIONAL SECTION:
  214.  
  215. ;; OPT PSEUDOSECTION:
  216. ; EDNS: version 0; flags: do; udp: 1232
  217.  
  218. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  219. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;35.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  220. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  221. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.35
  222. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.16
  223. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 16.88.168.192.in-addr.arpa.
  224. 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48908
  225. 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 22431
  226. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  227.  
  228. ;; QUESTION SECTION:
  229. ;25.88.168.192.in-addr.arpa. IN PTR
  230.  
  231. 2020/11/02 16:28:25 3419665#66 [debug] DNS: Adding OPT record with DNSSEC flag
  232. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  233. 2020/11/02 16:28:25 3419665#66 [debug] 127.0.0.1:5335: sending request PTR 25.88.168.192.in-addr.arpa.
  234. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  235. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  236. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.16
  237. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.1
  238. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 1.88.168.192.in-addr.arpa.
  239. 2020/11/02 16:28:25 3419665#66 [debug] 127.0.0.1:5335: response: ok
  240. 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;25.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  241. 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  242. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  243. 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 22431
  244. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  245.  
  246. ;; QUESTION SECTION:
  247. ;25.88.168.192.in-addr.arpa. IN PTR
  248.  
  249. ;; AUTHORITY SECTION:
  250. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  251.  
  252. ;; ADDITIONAL SECTION:
  253.  
  254. ;; OPT PSEUDOSECTION:
  255. ; EDNS: version 0; flags: do; udp: 1232
  256.  
  257. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;1.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  258. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  259. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.1
  260. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 172.19.0.2
  261. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 2.0.19.172.in-addr.arpa.
  262. 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55862
  263. 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8140
  264. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  265.  
  266. ;; QUESTION SECTION:
  267. ;30.88.168.192.in-addr.arpa. IN PTR
  268.  
  269. 2020/11/02 16:28:25 3419665#67 [debug] DNS: Adding OPT record with DNSSEC flag
  270. 2020/11/02 16:28:25 3419665#67 [debug] 127.0.0.1:5335: sending request PTR 30.88.168.192.in-addr.arpa.
  271. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  272. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;2.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  273. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  274. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 172.19.0.2
  275. 2020/11/02 16:28:25 3419665#67 [debug] 127.0.0.1:5335: response: ok
  276. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.30
  277. 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;30.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  278. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 30.88.168.192.in-addr.arpa.
  279. 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  280. 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 8140
  281. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  282.  
  283. ;; QUESTION SECTION:
  284. ;30.88.168.192.in-addr.arpa. IN PTR
  285.  
  286. ;; AUTHORITY SECTION:
  287. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  288.  
  289. ;; ADDITIONAL SECTION:
  290.  
  291. ;; OPT PSEUDOSECTION:
  292. ; EDNS: version 0; flags: do; udp: 1232
  293.  
  294. 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48805
  295. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  296. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;30.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  297. 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13300
  298. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  299.  
  300. ;; QUESTION SECTION:
  301. ;99.88.168.192.in-addr.arpa. IN PTR
  302.  
  303. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  304. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.30
  305. 2020/11/02 16:28:25 3419665#68 [debug] DNS: Adding OPT record with DNSSEC flag
  306. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.17
  307. 2020/11/02 16:28:25 3419665#68 [debug] 127.0.0.1:5335: sending request PTR 99.88.168.192.in-addr.arpa.
  308. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 17.88.168.192.in-addr.arpa.
  309. 2020/11/02 16:28:25 3419665#68 [debug] 127.0.0.1:5335: response: ok
  310. 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;99.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  311. 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  312. 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 13300
  313. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  314.  
  315. ;; QUESTION SECTION:
  316. ;99.88.168.192.in-addr.arpa. IN PTR
  317.  
  318. ;; AUTHORITY SECTION:
  319. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  320.  
  321. ;; ADDITIONAL SECTION:
  322.  
  323. ;; OPT PSEUDOSECTION:
  324. ; EDNS: version 0; flags: do; udp: 1232
  325.  
  326. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  327. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  328. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  329. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.17
  330. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 172.19.0.17
  331. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 17.0.19.172.in-addr.arpa.
  332. 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46867
  333. 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2242
  334. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  335.  
  336. ;; QUESTION SECTION:
  337. ;35.88.168.192.in-addr.arpa. IN PTR
  338.  
  339. 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
  340. 2020/11/02 16:28:25 3419665#52 [debug] DNS: Adding OPT record with DNSSEC flag
  341. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  342. 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  343. 2020/11/02 16:28:25 3419665#52 [debug] 127.0.0.1:5335: sending request PTR 35.88.168.192.in-addr.arpa.
  344. 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 172.19.0.17
  345. 2020/11/02 16:28:25 3419665#52 [debug] 127.0.0.1:5335: response: ok
  346. 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;35.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  347. 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  348. 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 2242
  349. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  350.  
  351. ;; QUESTION SECTION:
  352. ;35.88.168.192.in-addr.arpa. IN PTR
  353.  
  354. ;; AUTHORITY SECTION:
  355. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  356.  
  357. ;; ADDITIONAL SECTION:
  358.  
  359. ;; OPT PSEUDOSECTION:
  360. ; EDNS: version 0; flags: do; udp: 1232
  361.  
  362. 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54676
  363. 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11032
  364. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  365.  
  366. ;; QUESTION SECTION:
  367. ;11.0.19.172.in-addr.arpa. IN PTR
  368.  
  369. 2020/11/02 16:28:25 3419665#53 [debug] DNS: Adding OPT record with DNSSEC flag
  370. 2020/11/02 16:28:25 3419665#53 [debug] 127.0.0.1:5335: sending request PTR 11.0.19.172.in-addr.arpa.
  371. 2020/11/02 16:28:25 3419665#53 [debug] 127.0.0.1:5335: response: ok
  372. 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;11.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  373. 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  374. 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11032
  375. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  376.  
  377. ;; QUESTION SECTION:
  378. ;11.0.19.172.in-addr.arpa. IN PTR
  379.  
  380. ;; AUTHORITY SECTION:
  381. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  382.  
  383. ;; ADDITIONAL SECTION:
  384.  
  385. ;; OPT PSEUDOSECTION:
  386. ; EDNS: version 0; flags: do; udp: 1232
  387.  
  388. 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35452
  389. 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61117
  390. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  391.  
  392. ;; QUESTION SECTION:
  393. ;8.0.19.172.in-addr.arpa. IN PTR
  394.  
  395. 2020/11/02 16:28:25 3419665#54 [debug] DNS: Adding OPT record with DNSSEC flag
  396. 2020/11/02 16:28:25 3419665#54 [debug] 127.0.0.1:5335: sending request PTR 8.0.19.172.in-addr.arpa.
  397. 2020/11/02 16:28:25 3419665#54 [debug] 127.0.0.1:5335: response: ok
  398. 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;8.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  399. 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  400. 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 61117
  401. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  402.  
  403. ;; QUESTION SECTION:
  404. ;8.0.19.172.in-addr.arpa. IN PTR
  405.  
  406. ;; AUTHORITY SECTION:
  407. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  408.  
  409. ;; ADDITIONAL SECTION:
  410.  
  411. ;; OPT PSEUDOSECTION:
  412. ; EDNS: version 0; flags: do; udp: 1232
  413.  
  414. 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60422
  415. 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29356
  416. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  417.  
  418. ;; QUESTION SECTION:
  419. ;16.88.168.192.in-addr.arpa. IN PTR
  420.  
  421. 2020/11/02 16:28:25 3419665#55 [debug] DNS: Adding OPT record with DNSSEC flag
  422. 2020/11/02 16:28:25 3419665#55 [debug] 127.0.0.1:5335: sending request PTR 16.88.168.192.in-addr.arpa.
  423. 2020/11/02 16:28:25 3419665#55 [debug] 127.0.0.1:5335: response: ok
  424. 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  425. 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  426. 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 29356
  427. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  428.  
  429. ;; QUESTION SECTION:
  430. ;16.88.168.192.in-addr.arpa. IN PTR
  431.  
  432. ;; AUTHORITY SECTION:
  433. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  434.  
  435. ;; ADDITIONAL SECTION:
  436.  
  437. ;; OPT PSEUDOSECTION:
  438. ; EDNS: version 0; flags: do; udp: 1232
  439.  
  440. 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51662
  441. 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2637
  442. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  443.  
  444. ;; QUESTION SECTION:
  445. ;24.88.168.192.in-addr.arpa. IN PTR
  446.  
  447. 2020/11/02 16:28:25 3419665#56 [debug] DNS: Adding OPT record with DNSSEC flag
  448. 2020/11/02 16:28:25 3419665#56 [debug] 127.0.0.1:5335: sending request PTR 24.88.168.192.in-addr.arpa.
  449. 2020/11/02 16:28:25 3419665#56 [debug] 127.0.0.1:5335: response: ok
  450. 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;24.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  451. 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  452. 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 2637
  453. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  454.  
  455. ;; QUESTION SECTION:
  456. ;24.88.168.192.in-addr.arpa. IN PTR
  457.  
  458. ;; AUTHORITY SECTION:
  459. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  460.  
  461. ;; ADDITIONAL SECTION:
  462.  
  463. ;; OPT PSEUDOSECTION:
  464. ; EDNS: version 0; flags: do; udp: 1232
  465.  
  466. 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42204
  467. 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36904
  468. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  469.  
  470. ;; QUESTION SECTION:
  471. ;2.0.19.172.in-addr.arpa. IN PTR
  472.  
  473. 2020/11/02 16:28:25 3419665#57 [debug] DNS: Adding OPT record with DNSSEC flag
  474. 2020/11/02 16:28:25 3419665#57 [debug] 127.0.0.1:5335: sending request PTR 2.0.19.172.in-addr.arpa.
  475. 2020/11/02 16:28:25 3419665#57 [debug] 127.0.0.1:5335: response: ok
  476. 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;2.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  477. 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  478. 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 36904
  479. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  480.  
  481. ;; QUESTION SECTION:
  482. ;2.0.19.172.in-addr.arpa. IN PTR
  483.  
  484. ;; AUTHORITY SECTION:
  485. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  486.  
  487. ;; ADDITIONAL SECTION:
  488.  
  489. ;; OPT PSEUDOSECTION:
  490. ; EDNS: version 0; flags: do; udp: 1232
  491.  
  492. 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50132
  493. 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1229
  494. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  495.  
  496. ;; QUESTION SECTION:
  497. ;7.0.19.172.in-addr.arpa. IN PTR
  498.  
  499. 2020/11/02 16:28:25 3419665#58 [debug] DNS: Adding OPT record with DNSSEC flag
  500. 2020/11/02 16:28:25 3419665#58 [debug] 127.0.0.1:5335: sending request PTR 7.0.19.172.in-addr.arpa.
  501. 2020/11/02 16:28:25 3419665#58 [debug] 127.0.0.1:5335: response: ok
  502. 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;7.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  503. 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  504. 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 1229
  505. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  506.  
  507. ;; QUESTION SECTION:
  508. ;7.0.19.172.in-addr.arpa. IN PTR
  509.  
  510. ;; AUTHORITY SECTION:
  511. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  512.  
  513. ;; ADDITIONAL SECTION:
  514.  
  515. ;; OPT PSEUDOSECTION:
  516. ; EDNS: version 0; flags: do; udp: 1232
  517.  
  518. 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54815
  519. 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11066
  520. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  521.  
  522. ;; QUESTION SECTION:
  523. ;17.88.168.192.in-addr.arpa. IN PTR
  524.  
  525. 2020/11/02 16:28:25 3419665#59 [debug] DNS: Adding OPT record with DNSSEC flag
  526. 2020/11/02 16:28:25 3419665#59 [debug] 127.0.0.1:5335: sending request PTR 17.88.168.192.in-addr.arpa.
  527. 2020/11/02 16:28:25 3419665#59 [debug] 127.0.0.1:5335: response: ok
  528. 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  529. 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  530. 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11066
  531. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  532.  
  533. ;; QUESTION SECTION:
  534. ;17.88.168.192.in-addr.arpa. IN PTR
  535.  
  536. ;; AUTHORITY SECTION:
  537. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  538.  
  539. ;; ADDITIONAL SECTION:
  540.  
  541. ;; OPT PSEUDOSECTION:
  542. ; EDNS: version 0; flags: do; udp: 1232
  543.  
  544. 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50288
  545. 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39077
  546. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  547.  
  548. ;; QUESTION SECTION:
  549. ;14.0.19.172.in-addr.arpa. IN PTR
  550.  
  551. 2020/11/02 16:28:25 3419665#60 [debug] DNS: Adding OPT record with DNSSEC flag
  552. 2020/11/02 16:28:25 3419665#60 [debug] 127.0.0.1:5335: sending request PTR 14.0.19.172.in-addr.arpa.
  553. 2020/11/02 16:28:25 3419665#60 [debug] 127.0.0.1:5335: response: ok
  554. 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;14.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  555. 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  556. 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 39077
  557. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  558.  
  559. ;; QUESTION SECTION:
  560. ;14.0.19.172.in-addr.arpa. IN PTR
  561.  
  562. ;; AUTHORITY SECTION:
  563. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  564.  
  565. ;; ADDITIONAL SECTION:
  566.  
  567. ;; OPT PSEUDOSECTION:
  568. ; EDNS: version 0; flags: do; udp: 1232
  569.  
  570. 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53293
  571. 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10319
  572. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  573.  
  574. ;; QUESTION SECTION:
  575. ;16.0.19.172.in-addr.arpa. IN PTR
  576.  
  577. 2020/11/02 16:28:25 3419665#61 [debug] DNS: Adding OPT record with DNSSEC flag
  578. 2020/11/02 16:28:25 3419665#61 [debug] 127.0.0.1:5335: sending request PTR 16.0.19.172.in-addr.arpa.
  579. 2020/11/02 16:28:25 3419665#61 [debug] 127.0.0.1:5335: response: ok
  580. 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  581. 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  582. 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 10319
  583. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  584.  
  585. ;; QUESTION SECTION:
  586. ;16.0.19.172.in-addr.arpa. IN PTR
  587.  
  588. ;; AUTHORITY SECTION:
  589. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  590.  
  591. ;; ADDITIONAL SECTION:
  592.  
  593. ;; OPT PSEUDOSECTION:
  594. ; EDNS: version 0; flags: do; udp: 1232
  595.  
  596. 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49174
  597. 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 12619
  598. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  599.  
  600. ;; QUESTION SECTION:
  601. ;100.88.168.192.in-addr.arpa. IN PTR
  602.  
  603. 2020/11/02 16:28:25 3419665#62 [debug] DNS: Adding OPT record with DNSSEC flag
  604. 2020/11/02 16:28:25 3419665#62 [debug] 127.0.0.1:5335: sending request PTR 100.88.168.192.in-addr.arpa.
  605. 2020/11/02 16:28:25 3419665#62 [debug] 127.0.0.1:5335: response: ok
  606. 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;100.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  607. 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  608. 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 12619
  609. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  610.  
  611. ;; QUESTION SECTION:
  612. ;100.88.168.192.in-addr.arpa. IN PTR
  613.  
  614. ;; AUTHORITY SECTION:
  615. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  616.  
  617. ;; ADDITIONAL SECTION:
  618.  
  619. ;; OPT PSEUDOSECTION:
  620. ; EDNS: version 0; flags: do; udp: 1232
  621.  
  622. 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54530
  623. 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42020
  624. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  625.  
  626. ;; QUESTION SECTION:
  627. ;89.88.168.192.in-addr.arpa. IN PTR
  628.  
  629. 2020/11/02 16:28:25 3419665#63 [debug] DNS: Adding OPT record with DNSSEC flag
  630. 2020/11/02 16:28:25 3419665#63 [debug] 127.0.0.1:5335: sending request PTR 89.88.168.192.in-addr.arpa.
  631. 2020/11/02 16:28:25 3419665#63 [debug] 127.0.0.1:5335: response: ok
  632. 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;89.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  633. 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  634. 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 42020
  635. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  636.  
  637. ;; QUESTION SECTION:
  638. ;89.88.168.192.in-addr.arpa. IN PTR
  639.  
  640. ;; AUTHORITY SECTION:
  641. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  642.  
  643. ;; ADDITIONAL SECTION:
  644.  
  645. ;; OPT PSEUDOSECTION:
  646. ; EDNS: version 0; flags: do; udp: 1232
  647.  
  648. 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49104
  649. 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31088
  650. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  651.  
  652. ;; QUESTION SECTION:
  653. ;3.0.19.172.in-addr.arpa. IN PTR
  654.  
  655. 2020/11/02 16:28:25 3419665#64 [debug] DNS: Adding OPT record with DNSSEC flag
  656. 2020/11/02 16:28:25 3419665#64 [debug] 127.0.0.1:5335: sending request PTR 3.0.19.172.in-addr.arpa.
  657. 2020/11/02 16:28:25 3419665#64 [debug] 127.0.0.1:5335: response: ok
  658. 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;3.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  659. 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  660. 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 31088
  661. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  662.  
  663. ;; QUESTION SECTION:
  664. ;3.0.19.172.in-addr.arpa. IN PTR
  665.  
  666. ;; AUTHORITY SECTION:
  667. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  668.  
  669. ;; ADDITIONAL SECTION:
  670.  
  671. ;; OPT PSEUDOSECTION:
  672. ; EDNS: version 0; flags: do; udp: 1232
  673.  
  674. 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:33816
  675. 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 40006
  676. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  677.  
  678. ;; QUESTION SECTION:
  679. ;1.88.168.192.in-addr.arpa. IN PTR
  680.  
  681. 2020/11/02 16:28:25 3419665#81 [debug] DNS: Adding OPT record with DNSSEC flag
  682. 2020/11/02 16:28:25 3419665#81 [debug] 127.0.0.1:5335: sending request PTR 1.88.168.192.in-addr.arpa.
  683. 2020/11/02 16:28:25 3419665#81 [debug] 127.0.0.1:5335: response: ok
  684. 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;1.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
  685. 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  686. 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 40006
  687. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  688.  
  689. ;; QUESTION SECTION:
  690. ;1.88.168.192.in-addr.arpa. IN PTR
  691.  
  692. ;; AUTHORITY SECTION:
  693. 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  694.  
  695. ;; ADDITIONAL SECTION:
  696.  
  697. ;; OPT PSEUDOSECTION:
  698. ; EDNS: version 0; flags: do; udp: 1232
  699.  
  700. 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38322
  701. 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55762
  702. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  703.  
  704. ;; QUESTION SECTION:
  705. ;5.0.19.172.in-addr.arpa. IN PTR
  706.  
  707. 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:38322 based on IP only
  708. 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38322
  709. 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55762
  710. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  711.  
  712. ;; QUESTION SECTION:
  713. ;5.0.19.172.in-addr.arpa. IN PTR
  714.  
  715. 2020/11/02 16:28:30 3419665#69 [debug] DNS: Adding OPT record with DNSSEC flag
  716. 2020/11/02 16:28:30 3419665#69 [debug] 127.0.0.1:5335: sending request PTR 5.0.19.172.in-addr.arpa.
  717. 2020/11/02 16:28:30 3419665#69 [debug] 127.0.0.1:5335: response: ok
  718. 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;5.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  719. 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  720. 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 55762
  721. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  722.  
  723. ;; QUESTION SECTION:
  724. ;5.0.19.172.in-addr.arpa. IN PTR
  725.  
  726. ;; AUTHORITY SECTION:
  727. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  728.  
  729. ;; ADDITIONAL SECTION:
  730.  
  731. ;; OPT PSEUDOSECTION:
  732. ; EDNS: version 0; flags: do; udp: 1232
  733.  
  734. 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43254
  735. 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7954
  736. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  737.  
  738. ;; QUESTION SECTION:
  739. ;15.0.19.172.in-addr.arpa. IN PTR
  740.  
  741. 2020/11/02 16:28:30 3419665#70 [debug] DNS: Adding OPT record with DNSSEC flag
  742. 2020/11/02 16:28:30 3419665#70 [debug] 127.0.0.1:5335: sending request PTR 15.0.19.172.in-addr.arpa.
  743. 2020/11/02 16:28:30 3419665#70 [debug] 127.0.0.1:5335: response: ok
  744. 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;15.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  745. 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  746. 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 7954
  747. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  748.  
  749. ;; QUESTION SECTION:
  750. ;15.0.19.172.in-addr.arpa. IN PTR
  751.  
  752. ;; AUTHORITY SECTION:
  753. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  754.  
  755. ;; ADDITIONAL SECTION:
  756.  
  757. ;; OPT PSEUDOSECTION:
  758. ; EDNS: version 0; flags: do; udp: 1232
  759.  
  760. 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42480
  761. 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 27226
  762. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  763.  
  764. ;; QUESTION SECTION:
  765. ;17.0.19.172.in-addr.arpa. IN PTR
  766.  
  767. 2020/11/02 16:28:30 3419665#71 [debug] DNS: Adding OPT record with DNSSEC flag
  768. 2020/11/02 16:28:30 3419665#71 [debug] 127.0.0.1:5335: sending request PTR 17.0.19.172.in-addr.arpa.
  769. 2020/11/02 16:28:30 3419665#71 [debug] 127.0.0.1:5335: response: ok
  770. 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
  771. 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  772. 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 27226
  773. ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  774.  
  775. ;; QUESTION SECTION:
  776. ;17.0.19.172.in-addr.arpa. IN PTR
  777.  
  778. ;; AUTHORITY SECTION:
  779. 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
  780.  
  781. ;; ADDITIONAL SECTION:
  782.  
  783. ;; OPT PSEUDOSECTION:
  784. ; EDNS: version 0; flags: do; udp: 1232
  785.  
  786. 2020/11/02 16:28:30 3419665#12 [debug] Clients: removed 0 client aliases
  787. 2020/11/02 16:28:30 3419665#12 [debug] Clients: added 0 client aliases from 'arp -a' command output
  788. 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:41522
  789. 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42866
  790. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  791.  
  792. ;; QUESTION SECTION:
  793. ;connectivitycheck.gstatic.com. IN AAAA
  794.  
  795. 2020/11/02 16:28:33 3419665#31 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  796. 2020/11/02 16:28:33 3419665#31 [debug] DNS: Adding OPT record with DNSSEC flag
  797. 2020/11/02 16:28:33 3419665#31 [debug] 127.0.0.1:5335: sending request AAAA connectivitycheck.gstatic.com.
  798. 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:41522
  799. 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52088
  800. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  801.  
  802. ;; QUESTION SECTION:
  803. ;connectivitycheck.gstatic.com. IN A
  804.  
  805. 2020/11/02 16:28:33 3419665#30 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  806. 2020/11/02 16:28:33 3419665#30 [debug] DNS: Adding OPT record with DNSSEC flag
  807. 2020/11/02 16:28:33 3419665#30 [debug] 127.0.0.1:5335: sending request A connectivitycheck.gstatic.com.
  808. 2020/11/02 16:28:33 3419665#31 [debug] 127.0.0.1:5335: response: ok
  809. 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN AAAA. Elapsed 0 ms.
  810. 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  811. 2020/11/02 16:28:33 3419665#31 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
  812. 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 42866
  813. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  814.  
  815. ;; QUESTION SECTION:
  816. ;connectivitycheck.gstatic.com. IN AAAA
  817.  
  818. ;; ANSWER SECTION:
  819. connectivitycheck.gstatic.com. 91 IN AAAA 2a00:1450:400e:80e::2003
  820.  
  821. ;; ADDITIONAL SECTION:
  822.  
  823. ;; OPT PSEUDOSECTION:
  824. ; EDNS: version 0; flags: do; udp: 1232
  825.  
  826. 2020/11/02 16:28:33 3419665#30 [debug] 127.0.0.1:5335: response: ok
  827. 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN A. Elapsed 0 ms.
  828. 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  829. 2020/11/02 16:28:33 3419665#30 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
  830. 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52088
  831. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  832.  
  833. ;; QUESTION SECTION:
  834. ;connectivitycheck.gstatic.com. IN A
  835.  
  836. ;; ANSWER SECTION:
  837. connectivitycheck.gstatic.com. 91 IN A 142.250.74.195
  838.  
  839. ;; ADDITIONAL SECTION:
  840.  
  841. ;; OPT PSEUDOSECTION:
  842. ; EDNS: version 0; flags: do; udp: 1232
  843.  
  844. 2020/11/02 16:28:37 3419665#32 [debug] GET /control/querylog?search=&response_status=&older_than=&limit=20
  845. 2020/11/02 16:28:37 3419665#32 [debug] QueryLog: prepared data (20/45) older than 0001-01-01 00:00:00 +0000 UTC in 799.546µs
  846. 2020/11/02 16:28:37 3419665#98 [debug] GET /control/access/list
  847. 2020/11/02 16:28:37 3419665#100 [debug] GET /control/stats_info
  848. 2020/11/02 16:28:37 3419665#99 [debug] GET /control/stats
  849. 2020/11/02 16:28:37 3419665#99 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
  850. 2020/11/02 16:28:37 3419665#99 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
  851. 2020/11/02 16:28:37 3419665#99 [debug] Stats: prepared data in 502.977µs
  852. 2020/11/02 16:28:37 3419665#99 [debug] GET /control/clients/find?ip0=192.168.0.0
  853. 2020/11/02 16:28:37 3419665#99 [debug] GET /control/clients/find?ip0=192.168.88.10&ip1=192.168.88.24&ip2=192.168.88.36&ip3=10.6.0.3&ip4=192.168.88.25&ip5=192.168.88.35&ip6=192.168.88.16&ip7=192.168.88.1&ip8=172.19.0.2&ip9=192.168.0.0&ip10=192.168.88.30&ip11=192.168.88.17&ip12=172.19.0.17
  854. 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.17:40436
  855. 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18852
  856. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  857.  
  858. ;; QUESTION SECTION:
  859. ;device-metrics-us.amazon.com. IN A
  860.  
  861. 2020/11/02 16:28:58 3419665#74 [debug] AutoHosts: answer: device-metrics-us.amazon.com -> []
  862. 2020/11/02 16:28:58 3419665#74 [debug] Filtering: found rule for host 'device-metrics-us.amazon.com': '||device-metrics-*.amazon.com^' list_id: 1
  863. 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host device-metrics-us.amazon.com is filtered, reason - 'FilteredBlackList', matched rule: '||device-metrics-*.amazon.com^'
  864. 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18852
  865. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  866.  
  867. ;; QUESTION SECTION:
  868. ;device-metrics-us.amazon.com. IN A
  869.  
  870. ;; ANSWER SECTION:
  871. device-metrics-us.amazon.com. 10 IN A 0.0.0.0
  872.  
  873. 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:58233
  874. 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 43311
  875. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  876.  
  877. ;; QUESTION SECTION:
  878. ;connectivitycheck.gstatic.com. IN A
  879.  
  880. 2020/11/02 16:29:33 3419665#85 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  881. 2020/11/02 16:29:33 3419665#85 [debug] DNS: Adding OPT record with DNSSEC flag
  882. 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:58233
  883. 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8827
  884. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  885.  
  886. ;; QUESTION SECTION:
  887. ;connectivitycheck.gstatic.com. IN AAAA
  888.  
  889. 2020/11/02 16:29:33 3419665#75 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  890. 2020/11/02 16:29:33 3419665#85 [debug] Serving response from general cache
  891. 2020/11/02 16:29:33 3419665#75 [debug] DNS: Adding OPT record with DNSSEC flag
  892. 2020/11/02 16:29:33 3419665#85 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
  893. 2020/11/02 16:29:33 3419665#75 [debug] Serving response from general cache
  894. 2020/11/02 16:29:33 3419665#75 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
  895. 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 43311
  896. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  897.  
  898. ;; QUESTION SECTION:
  899. ;connectivitycheck.gstatic.com. IN A
  900.  
  901. ;; ANSWER SECTION:
  902. connectivitycheck.gstatic.com. 31 IN A 142.250.74.195
  903.  
  904. ;; ADDITIONAL SECTION:
  905.  
  906. ;; OPT PSEUDOSECTION:
  907. ; EDNS: version 0; flags: do; udp: 1232
  908.  
  909. 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 8827
  910. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  911.  
  912. ;; QUESTION SECTION:
  913. ;connectivitycheck.gstatic.com. IN AAAA
  914.  
  915. ;; ANSWER SECTION:
  916. connectivitycheck.gstatic.com. 31 IN AAAA 2a00:1450:400e:80e::2003
  917.  
  918. ;; ADDITIONAL SECTION:
  919.  
  920. ;; OPT PSEUDOSECTION:
  921. ; EDNS: version 0; flags: do; udp: 1232
  922.  
  923. 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:45903
  924. 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58207
  925. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  926.  
  927. ;; QUESTION SECTION:
  928. ;android.googleapis.com. IN A
  929.  
  930. 2020/11/02 16:29:35 3419665#102 [debug] AutoHosts: answer: android.googleapis.com -> []
  931. 2020/11/02 16:29:35 3419665#102 [debug] DNS: Adding OPT record with DNSSEC flag
  932. 2020/11/02 16:29:35 3419665#102 [debug] 127.0.0.1:5335: sending request A android.googleapis.com.
  933. 2020/11/02 16:29:35 3419665#102 [debug] 127.0.0.1:5335: response: ok
  934. 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;android.googleapis.com. IN A. Elapsed 0 ms.
  935. 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  936. 2020/11/02 16:29:35 3419665#102 [debug] DNSFwd: Checking record A (172.217.17.74) for android.googleapis.com.
  937. 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58207
  938. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  939.  
  940. ;; QUESTION SECTION:
  941. ;android.googleapis.com. IN A
  942.  
  943. ;; ANSWER SECTION:
  944. android.googleapis.com. 30 IN A 172.217.17.74
  945.  
  946. ;; ADDITIONAL SECTION:
  947.  
  948. ;; OPT PSEUDOSECTION:
  949. ; EDNS: version 0; flags: do; udp: 1232
  950.  
  951. 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:38157
  952. 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 40649
  953. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  954.  
  955. ;; QUESTION SECTION:
  956. ;fcm.googleapis.com. IN A
  957.  
  958. 2020/11/02 16:29:35 3419665#103 [debug] AutoHosts: answer: fcm.googleapis.com -> []
  959. 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:38157
  960. 2020/11/02 16:29:35 3419665#103 [debug] DNS: Adding OPT record with DNSSEC flag
  961. 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 27719
  962. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  963.  
  964. ;; QUESTION SECTION:
  965. ;fcm.googleapis.com. IN AAAA
  966.  
  967. 2020/11/02 16:29:35 3419665#103 [debug] 127.0.0.1:5335: sending request A fcm.googleapis.com.
  968. 2020/11/02 16:29:35 3419665#76 [debug] AutoHosts: answer: fcm.googleapis.com -> []
  969. 2020/11/02 16:29:35 3419665#76 [debug] DNS: Adding OPT record with DNSSEC flag
  970. 2020/11/02 16:29:35 3419665#76 [debug] 127.0.0.1:5335: sending request AAAA fcm.googleapis.com.
  971. 2020/11/02 16:29:35 3419665#103 [debug] 127.0.0.1:5335: response: ok
  972. 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fcm.googleapis.com. IN A. Elapsed 0 ms.
  973. 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  974. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.42) for fcm.googleapis.com.
  975. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.74) for fcm.googleapis.com.
  976. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.168.234) for fcm.googleapis.com.
  977. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.19.202) for fcm.googleapis.com.
  978. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.20.106) for fcm.googleapis.com.
  979. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.20.74) for fcm.googleapis.com.
  980. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.208.106) for fcm.googleapis.com.
  981. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.214.10) for fcm.googleapis.com.
  982. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.211.106) for fcm.googleapis.com.
  983. 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.138) for fcm.googleapis.com.
  984. 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 40649
  985. ;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 1
  986.  
  987. ;; QUESTION SECTION:
  988. ;fcm.googleapis.com. IN A
  989.  
  990. ;; ANSWER SECTION:
  991. fcm.googleapis.com. 30 IN A 172.217.17.42
  992. fcm.googleapis.com. 30 IN A 172.217.17.74
  993. fcm.googleapis.com. 30 IN A 172.217.168.234
  994. fcm.googleapis.com. 30 IN A 172.217.19.202
  995. fcm.googleapis.com. 30 IN A 172.217.20.106
  996. fcm.googleapis.com. 30 IN A 172.217.20.74
  997. fcm.googleapis.com. 30 IN A 216.58.208.106
  998. fcm.googleapis.com. 30 IN A 216.58.214.10
  999. fcm.googleapis.com. 30 IN A 216.58.211.106
  1000. fcm.googleapis.com. 30 IN A 172.217.17.138
  1001.  
  1002. ;; ADDITIONAL SECTION:
  1003.  
  1004. ;; OPT PSEUDOSECTION:
  1005. ; EDNS: version 0; flags: do; udp: 1232
  1006.  
  1007. 2020/11/02 16:29:35 3419665#76 [debug] 127.0.0.1:5335: response: ok
  1008. 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fcm.googleapis.com. IN AAAA. Elapsed 1 ms.
  1009. 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  1010. 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:808::200a) for fcm.googleapis.com.
  1011. 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:801::200a) for fcm.googleapis.com.
  1012. 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:814::200a) for fcm.googleapis.com.
  1013. 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:802::200a) for fcm.googleapis.com.
  1014. 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 27719
  1015. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  1016.  
  1017. ;; QUESTION SECTION:
  1018. ;fcm.googleapis.com. IN AAAA
  1019.  
  1020. ;; ANSWER SECTION:
  1021. fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:808::200a
  1022. fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:801::200a
  1023. fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:814::200a
  1024. fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:802::200a
  1025.  
  1026. ;; ADDITIONAL SECTION:
  1027.  
  1028. ;; OPT PSEUDOSECTION:
  1029. ; EDNS: version 0; flags: do; udp: 1232
  1030.  
  1031. 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:64019
  1032. 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48815
  1033. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1034.  
  1035. ;; QUESTION SECTION:
  1036. ;lamssettings-pa.googleapis.com. IN A
  1037.  
  1038. 2020/11/02 16:29:36 3419665#104 [debug] AutoHosts: answer: lamssettings-pa.googleapis.com -> []
  1039. 2020/11/02 16:29:36 3419665#104 [debug] DNS: Adding OPT record with DNSSEC flag
  1040. 2020/11/02 16:29:36 3419665#104 [debug] 127.0.0.1:5335: sending request A lamssettings-pa.googleapis.com.
  1041. 2020/11/02 16:29:36 3419665#104 [debug] 127.0.0.1:5335: response: ok
  1042. 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;lamssettings-pa.googleapis.com. IN A. Elapsed 38 ms.
  1043. 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
  1044. 2020/11/02 16:29:36 3419665#104 [debug] DNSFwd: Checking record A (172.217.17.42) for lamssettings-pa.googleapis.com.
  1045. 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48815
  1046. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  1047.  
  1048. ;; QUESTION SECTION:
  1049. ;lamssettings-pa.googleapis.com. IN A
  1050.  
  1051. ;; ANSWER SECTION:
  1052. lamssettings-pa.googleapis.com. 300 IN A 172.217.17.42
  1053.  
  1054. ;; ADDITIONAL SECTION:
  1055.  
  1056. ;; OPT PSEUDOSECTION:
  1057. ; EDNS: version 0; flags: do; udp: 1232
  1058.  
  1059. 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47443
  1060. 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 44920
  1061. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1062.  
  1063. ;; QUESTION SECTION:
  1064. ;www.google.com. IN A
  1065.  
  1066. 2020/11/02 16:29:43 3419665#77 [debug] AutoHosts: answer: www.google.com -> []
  1067. 2020/11/02 16:29:43 3419665#77 [debug] DNS: Adding OPT record with DNSSEC flag
  1068. 2020/11/02 16:29:43 3419665#77 [debug] 127.0.0.1:5335: sending request A www.google.com.
  1069. 2020/11/02 16:29:43 3419665#77 [debug] 127.0.0.1:5335: response: ok
  1070. 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.google.com. IN A. Elapsed 1 ms.
  1071. 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  1072. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
  1073. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
  1074. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
  1075. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
  1076. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
  1077. 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
  1078. 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 44920
  1079. ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
  1080.  
  1081. ;; QUESTION SECTION:
  1082. ;www.google.com. IN A
  1083.  
  1084. ;; ANSWER SECTION:
  1085. www.google.com. 30 IN A 142.250.27.99
  1086. www.google.com. 30 IN A 142.250.27.103
  1087. www.google.com. 30 IN A 142.250.27.106
  1088. www.google.com. 30 IN A 142.250.27.147
  1089. www.google.com. 30 IN A 142.250.27.104
  1090. www.google.com. 30 IN A 142.250.27.105
  1091.  
  1092. ;; ADDITIONAL SECTION:
  1093.  
  1094. ;; OPT PSEUDOSECTION:
  1095. ; EDNS: version 0; flags: do; udp: 1232
  1096.  
  1097. 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59897
  1098. 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8327
  1099. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1100.  
  1101. ;; QUESTION SECTION:
  1102. ;pastebin.com. IN AAAA
  1103.  
  1104. 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59897
  1105. 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16258
  1106. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1107.  
  1108. ;; QUESTION SECTION:
  1109. ;pastebin.com. IN A
  1110.  
  1111. 2020/11/02 16:29:44 3419665#79 [debug] AutoHosts: answer: pastebin.com -> []
  1112. 2020/11/02 16:29:44 3419665#78 [debug] AutoHosts: answer: pastebin.com -> []
  1113. 2020/11/02 16:29:44 3419665#79 [debug] DNS: Adding OPT record with DNSSEC flag
  1114. 2020/11/02 16:29:44 3419665#79 [debug] 127.0.0.1:5335: sending request AAAA pastebin.com.
  1115. 2020/11/02 16:29:44 3419665#78 [debug] DNS: Adding OPT record with DNSSEC flag
  1116. 2020/11/02 16:29:44 3419665#78 [debug] 127.0.0.1:5335: sending request A pastebin.com.
  1117. 2020/11/02 16:29:44 3419665#79 [debug] 127.0.0.1:5335: response: ok
  1118. 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;pastebin.com. IN AAAA. Elapsed 38 ms.
  1119. 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
  1120. 2020/11/02 16:29:44 3419665#79 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:62be) for pastebin.com.
  1121. 2020/11/02 16:29:44 3419665#79 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:63be) for pastebin.com.
  1122. 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 8327
  1123. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1124.  
  1125. ;; QUESTION SECTION:
  1126. ;pastebin.com. IN AAAA
  1127.  
  1128. ;; ANSWER SECTION:
  1129. pastebin.com. 300 IN AAAA 2606:4700:10::6817:62be
  1130. pastebin.com. 300 IN AAAA 2606:4700:10::6817:63be
  1131.  
  1132. ;; ADDITIONAL SECTION:
  1133.  
  1134. ;; OPT PSEUDOSECTION:
  1135. ; EDNS: version 0; flags: do; udp: 1232
  1136.  
  1137. 2020/11/02 16:29:44 3419665#78 [debug] 127.0.0.1:5335: response: ok
  1138. 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;pastebin.com. IN A. Elapsed 38 ms.
  1139. 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
  1140. 2020/11/02 16:29:44 3419665#78 [debug] DNSFwd: Checking record A (104.23.98.190) for pastebin.com.
  1141. 2020/11/02 16:29:44 3419665#78 [debug] DNSFwd: Checking record A (104.23.99.190) for pastebin.com.
  1142. 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16258
  1143. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1144.  
  1145. ;; QUESTION SECTION:
  1146. ;pastebin.com. IN A
  1147.  
  1148. ;; ANSWER SECTION:
  1149. pastebin.com. 300 IN A 104.23.98.190
  1150. pastebin.com. 300 IN A 104.23.99.190
  1151.  
  1152. ;; ADDITIONAL SECTION:
  1153.  
  1154. ;; OPT PSEUDOSECTION:
  1155. ; EDNS: version 0; flags: do; udp: 1232
  1156.  
  1157. 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52544
  1158. 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42270
  1159. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1160.  
  1161. ;; QUESTION SECTION:
  1162. ;incoming.telemetry.mozilla.org. IN A
  1163.  
  1164. 2020/11/02 16:29:44 3419665#105 [debug] AutoHosts: answer: incoming.telemetry.mozilla.org -> []
  1165. 2020/11/02 16:29:44 3419665#105 [debug] Filtering: found rule for host 'incoming.telemetry.mozilla.org': '@@||incoming.telemetry.mozilla.org^$important' list_id: 0
  1166. 2020/11/02 16:29:44 3419665#105 [debug] DNS: Adding OPT record with DNSSEC flag
  1167. 2020/11/02 16:29:44 3419665#105 [debug] 127.0.0.1:5335: sending request A incoming.telemetry.mozilla.org.
  1168. 2020/11/02 16:29:44 3419665#105 [debug] 127.0.0.1:5335: response: ok
  1169. 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;incoming.telemetry.mozilla.org. IN A. Elapsed 0 ms.
  1170. 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1171. 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 42270
  1172. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1173.  
  1174. ;; QUESTION SECTION:
  1175. ;incoming.telemetry.mozilla.org. IN A
  1176.  
  1177. ;; ANSWER SECTION:
  1178. incoming.telemetry.mozilla.org. 30 IN CNAME telemetry-incoming.r53-2.services.mozilla.com.
  1179. telemetry-incoming.r53-2.services.mozilla.com. 30 IN CNAME prod.data-ingestion.prod.dataops.mozgcp.net.
  1180. prod.data-ingestion.prod.dataops.mozgcp.net. 30 IN A 35.244.247.133
  1181.  
  1182. ;; ADDITIONAL SECTION:
  1183.  
  1184. ;; OPT PSEUDOSECTION:
  1185. ; EDNS: version 0; flags: do; udp: 1232
  1186.  
  1187. 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55857
  1188. 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 59615
  1189. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1190.  
  1191. ;; QUESTION SECTION:
  1192. ;pastebin.com. IN A
  1193.  
  1194. 2020/11/02 16:29:44 3419665#106 [debug] AutoHosts: answer: pastebin.com -> []
  1195. 2020/11/02 16:29:44 3419665#106 [debug] DNS: Adding OPT record with DNSSEC flag
  1196. 2020/11/02 16:29:44 3419665#106 [debug] Serving response from general cache
  1197. 2020/11/02 16:29:44 3419665#106 [debug] DNSFwd: Checking record A (104.23.98.190) for pastebin.com.
  1198. 2020/11/02 16:29:44 3419665#106 [debug] DNSFwd: Checking record A (104.23.99.190) for pastebin.com.
  1199. 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 59615
  1200. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1201.  
  1202. ;; QUESTION SECTION:
  1203. ;pastebin.com. IN A
  1204.  
  1205. ;; ANSWER SECTION:
  1206. pastebin.com. 300 IN A 104.23.98.190
  1207. pastebin.com. 300 IN A 104.23.99.190
  1208.  
  1209. ;; ADDITIONAL SECTION:
  1210.  
  1211. ;; OPT PSEUDOSECTION:
  1212. ; EDNS: version 0; flags: do; udp: 1232
  1213.  
  1214. 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55857
  1215. 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 41948
  1216. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1217.  
  1218. ;; QUESTION SECTION:
  1219. ;pastebin.com. IN AAAA
  1220.  
  1221. 2020/11/02 16:29:44 3419665#80 [debug] AutoHosts: answer: pastebin.com -> []
  1222. 2020/11/02 16:29:44 3419665#80 [debug] DNS: Adding OPT record with DNSSEC flag
  1223. 2020/11/02 16:29:44 3419665#80 [debug] Serving response from general cache
  1224. 2020/11/02 16:29:44 3419665#80 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:62be) for pastebin.com.
  1225. 2020/11/02 16:29:44 3419665#80 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:63be) for pastebin.com.
  1226. 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 41948
  1227. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1228.  
  1229. ;; QUESTION SECTION:
  1230. ;pastebin.com. IN AAAA
  1231.  
  1232. ;; ANSWER SECTION:
  1233. pastebin.com. 300 IN AAAA 2606:4700:10::6817:62be
  1234. pastebin.com. 300 IN AAAA 2606:4700:10::6817:63be
  1235.  
  1236. ;; ADDITIONAL SECTION:
  1237.  
  1238. ;; OPT PSEUDOSECTION:
  1239. ; EDNS: version 0; flags: do; udp: 1232
  1240.  
  1241. 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:44467
  1242. 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24890
  1243. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1244.  
  1245. ;; QUESTION SECTION:
  1246. ;www.nu.nl. IN A
  1247.  
  1248. 2020/11/02 16:30:02 3419665#107 [debug] AutoHosts: answer: www.nu.nl -> []
  1249. 2020/11/02 16:30:02 3419665#107 [debug] DNS: Adding OPT record with DNSSEC flag
  1250. 2020/11/02 16:30:02 3419665#107 [debug] 127.0.0.1:5335: sending request A www.nu.nl.
  1251. 2020/11/02 16:30:02 3419665#107 [debug] 127.0.0.1:5335: response: ok
  1252. 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.nu.nl. IN A. Elapsed 2 ms.
  1253. 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 2 ms
  1254. 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking CNAME d319isq1sikamv.cloudfront.net. for www.nu.nl.
  1255. 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.37) for d319isq1sikamv.cloudfront.net.
  1256. 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.94) for d319isq1sikamv.cloudfront.net.
  1257. 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.121) for d319isq1sikamv.cloudfront.net.
  1258. 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.67) for d319isq1sikamv.cloudfront.net.
  1259. 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24890
  1260. ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
  1261.  
  1262. ;; QUESTION SECTION:
  1263. ;www.nu.nl. IN A
  1264.  
  1265. ;; ANSWER SECTION:
  1266. www.nu.nl. 30 IN CNAME d319isq1sikamv.cloudfront.net.
  1267. d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.37
  1268. d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.94
  1269. d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.121
  1270. d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.67
  1271.  
  1272. ;; ADDITIONAL SECTION:
  1273.  
  1274. ;; OPT PSEUDOSECTION:
  1275. ; EDNS: version 0; flags: do; udp: 1232
  1276.  
  1277. 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35958
  1278. 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 54894
  1279. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1280.  
  1281. ;; QUESTION SECTION:
  1282. ;cdn.cookielaw.org. IN A
  1283.  
  1284. 2020/11/02 16:30:02 3419665#108 [debug] AutoHosts: answer: cdn.cookielaw.org -> []
  1285. 2020/11/02 16:30:02 3419665#108 [debug] DNS: Adding OPT record with DNSSEC flag
  1286. 2020/11/02 16:30:02 3419665#108 [debug] 127.0.0.1:5335: sending request A cdn.cookielaw.org.
  1287. 2020/11/02 16:30:02 3419665#108 [debug] 127.0.0.1:5335: response: ok
  1288. 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdn.cookielaw.org. IN A. Elapsed 0 ms.
  1289. 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1290. 2020/11/02 16:30:02 3419665#108 [debug] DNSFwd: Checking record A (104.16.148.64) for cdn.cookielaw.org.
  1291. 2020/11/02 16:30:02 3419665#108 [debug] DNSFwd: Checking record A (104.16.149.64) for cdn.cookielaw.org.
  1292. 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 54894
  1293. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1294.  
  1295. ;; QUESTION SECTION:
  1296. ;cdn.cookielaw.org. IN A
  1297.  
  1298. ;; ANSWER SECTION:
  1299. cdn.cookielaw.org. 30 IN A 104.16.148.64
  1300. cdn.cookielaw.org. 30 IN A 104.16.149.64
  1301.  
  1302. ;; ADDITIONAL SECTION:
  1303.  
  1304. ;; OPT PSEUDOSECTION:
  1305. ; EDNS: version 0; flags: do; udp: 1232
  1306.  
  1307. 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:58125
  1308. 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62299
  1309. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1310.  
  1311. ;; QUESTION SECTION:
  1312. ;content.jwplatform.com. IN A
  1313.  
  1314. 2020/11/02 16:30:02 3419665#109 [debug] AutoHosts: answer: content.jwplatform.com -> []
  1315. 2020/11/02 16:30:02 3419665#109 [debug] DNS: Adding OPT record with DNSSEC flag
  1316. 2020/11/02 16:30:02 3419665#109 [debug] 127.0.0.1:5335: sending request A content.jwplatform.com.
  1317. 2020/11/02 16:30:02 3419665#109 [debug] 127.0.0.1:5335: response: ok
  1318. 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;content.jwplatform.com. IN A. Elapsed 0 ms.
  1319. 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1320. 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.46) for content.jwplatform.com.
  1321. 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.40) for content.jwplatform.com.
  1322. 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.89) for content.jwplatform.com.
  1323. 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.74) for content.jwplatform.com.
  1324. 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62299
  1325. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  1326.  
  1327. ;; QUESTION SECTION:
  1328. ;content.jwplatform.com. IN A
  1329.  
  1330. ;; ANSWER SECTION:
  1331. content.jwplatform.com. 30 IN A 13.32.240.46
  1332. content.jwplatform.com. 30 IN A 13.32.240.40
  1333. content.jwplatform.com. 30 IN A 13.32.240.89
  1334. content.jwplatform.com. 30 IN A 13.32.240.74
  1335.  
  1336. ;; ADDITIONAL SECTION:
  1337.  
  1338. ;; OPT PSEUDOSECTION:
  1339. ; EDNS: version 0; flags: do; udp: 1232
  1340.  
  1341. 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37875
  1342. 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 32657
  1343. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1344.  
  1345. ;; QUESTION SECTION:
  1346. ;consent.313.nl. IN A
  1347.  
  1348. 2020/11/02 16:30:02 3419665#110 [debug] AutoHosts: answer: consent.313.nl -> []
  1349. 2020/11/02 16:30:02 3419665#110 [debug] DNS: Adding OPT record with DNSSEC flag
  1350. 2020/11/02 16:30:02 3419665#110 [debug] 127.0.0.1:5335: sending request A consent.313.nl.
  1351. 2020/11/02 16:30:02 3419665#110 [debug] 127.0.0.1:5335: response: ok
  1352. 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;consent.313.nl. IN A. Elapsed 0 ms.
  1353. 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1354. 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking CNAME new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. for consent.313.nl.
  1355. 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.51) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
  1356. 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.24) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
  1357. 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.86) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
  1358. 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.19) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
  1359. 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 32657
  1360. ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
  1361.  
  1362. ;; QUESTION SECTION:
  1363. ;consent.313.nl. IN A
  1364.  
  1365. ;; ANSWER SECTION:
  1366. consent.313.nl. 30 IN CNAME new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
  1367. new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.51
  1368. new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.24
  1369. new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.86
  1370. new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.19
  1371.  
  1372. ;; ADDITIONAL SECTION:
  1373.  
  1374. ;; OPT PSEUDOSECTION:
  1375. ; EDNS: version 0; flags: do; udp: 1232
  1376.  
  1377. 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53974
  1378. 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4351
  1379. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1380.  
  1381. ;; QUESTION SECTION:
  1382. ;cdns.eu1.gigya.com. IN A
  1383.  
  1384. 2020/11/02 16:30:02 3419665#111 [debug] AutoHosts: answer: cdns.eu1.gigya.com -> []
  1385. 2020/11/02 16:30:02 3419665#111 [debug] DNS: Adding OPT record with DNSSEC flag
  1386. 2020/11/02 16:30:02 3419665#111 [debug] 127.0.0.1:5335: sending request A cdns.eu1.gigya.com.
  1387. 2020/11/02 16:30:02 3419665#111 [debug] 127.0.0.1:5335: response: ok
  1388. 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdns.eu1.gigya.com. IN A. Elapsed 0 ms.
  1389. 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1390. 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking CNAME cdns.gigya.com.edgekey.net. for cdns.eu1.gigya.com.
  1391. 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking CNAME e8333.g.akamaiedge.net. for cdns.gigya.com.edgekey.net.
  1392. 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53889
  1393. 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 60153
  1394. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1395.  
  1396. ;; QUESTION SECTION:
  1397. ;account.sanomaservices.nl. IN A
  1398.  
  1399. 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking record A (23.40.113.37) for e8333.g.akamaiedge.net.
  1400. 2020/11/02 16:30:02 3419665#87 [debug] AutoHosts: answer: account.sanomaservices.nl -> []
  1401. 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4351
  1402. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1403.  
  1404. ;; QUESTION SECTION:
  1405. ;cdns.eu1.gigya.com. IN A
  1406.  
  1407. ;; ANSWER SECTION:
  1408. cdns.eu1.gigya.com. 30 IN CNAME cdns.gigya.com.edgekey.net.
  1409. cdns.gigya.com.edgekey.net. 20117 IN CNAME e8333.g.akamaiedge.net.
  1410. e8333.g.akamaiedge.net. 30 IN A 23.40.113.37
  1411.  
  1412. ;; ADDITIONAL SECTION:
  1413.  
  1414. ;; OPT PSEUDOSECTION:
  1415. ; EDNS: version 0; flags: do; udp: 1232
  1416.  
  1417. 2020/11/02 16:30:02 3419665#87 [debug] DNS: Adding OPT record with DNSSEC flag
  1418. 2020/11/02 16:30:02 3419665#87 [debug] 127.0.0.1:5335: sending request A account.sanomaservices.nl.
  1419. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53974
  1420. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29411
  1421. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1422.  
  1423. ;; QUESTION SECTION:
  1424. ;cdns.eu1.gigya.com. IN AAAA
  1425.  
  1426. 2020/11/02 16:30:02 3419665#86 [debug] AutoHosts: answer: cdns.eu1.gigya.com -> []
  1427. 2020/11/02 16:30:02 3419665#86 [debug] DNS: Adding OPT record with DNSSEC flag
  1428. 2020/11/02 16:30:02 3419665#86 [debug] 127.0.0.1:5335: sending request AAAA cdns.eu1.gigya.com.
  1429. 2020/11/02 16:30:02 3419665#87 [debug] 127.0.0.1:5335: response: ok
  1430. 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;account.sanomaservices.nl. IN A. Elapsed 0 ms.
  1431. 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1432. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking CNAME cloudfront-gatekeeper-production.aws.sanomaservices.nl. for account.sanomaservices.nl.
  1433. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking CNAME d2nhjsxrtzxhzh.cloudfront.net. for cloudfront-gatekeeper-production.aws.sanomaservices.nl.
  1434. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.8) for d2nhjsxrtzxhzh.cloudfront.net.
  1435. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.26) for d2nhjsxrtzxhzh.cloudfront.net.
  1436. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.93) for d2nhjsxrtzxhzh.cloudfront.net.
  1437. 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.114) for d2nhjsxrtzxhzh.cloudfront.net.
  1438. 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 60153
  1439. ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
  1440.  
  1441. ;; QUESTION SECTION:
  1442. ;account.sanomaservices.nl. IN A
  1443.  
  1444. ;; ANSWER SECTION:
  1445. account.sanomaservices.nl. 1301 IN CNAME cloudfront-gatekeeper-production.aws.sanomaservices.nl.
  1446. cloudfront-gatekeeper-production.aws.sanomaservices.nl. 30 IN CNAME d2nhjsxrtzxhzh.cloudfront.net.
  1447. d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.8
  1448. d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.26
  1449. d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.93
  1450. d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.114
  1451.  
  1452. ;; ADDITIONAL SECTION:
  1453.  
  1454. ;; OPT PSEUDOSECTION:
  1455. ; EDNS: version 0; flags: do; udp: 1232
  1456.  
  1457. 2020/11/02 16:30:02 3419665#86 [debug] 127.0.0.1:5335: response: ok
  1458. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdns.eu1.gigya.com. IN AAAA. Elapsed 83 ms.
  1459. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 83 ms
  1460. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cdns.eu1.gigya.com.: refusing to cache a response with no A and AAAA answers
  1461. 2020/11/02 16:30:02 3419665#86 [debug] DNSFwd: Checking CNAME cdns.gigya.com.edgekey.net. for cdns.eu1.gigya.com.
  1462. 2020/11/02 16:30:02 3419665#86 [debug] DNSFwd: Checking CNAME e8333.g.akamaiedge.net. for cdns.gigya.com.edgekey.net.
  1463. 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 29411
  1464. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
  1465.  
  1466. ;; QUESTION SECTION:
  1467. ;cdns.eu1.gigya.com. IN AAAA
  1468.  
  1469. ;; ANSWER SECTION:
  1470. cdns.eu1.gigya.com. 300 IN CNAME cdns.gigya.com.edgekey.net.
  1471. cdns.gigya.com.edgekey.net. 20117 IN CNAME e8333.g.akamaiedge.net.
  1472.  
  1473. ;; AUTHORITY SECTION:
  1474. g.akamaiedge.net. 718 IN SOA n0g.akamaiedge.net. hostmaster.akamai.com. 1604330720 1000 1000 1000 1800
  1475.  
  1476. ;; ADDITIONAL SECTION:
  1477.  
  1478. ;; OPT PSEUDOSECTION:
  1479. ; EDNS: version 0; flags: do; udp: 1232
  1480.  
  1481. 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:33134
  1482. 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52638
  1483. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1484.  
  1485. ;; QUESTION SECTION:
  1486. ;fonts.gstatic.com. IN A
  1487.  
  1488. 2020/11/02 16:30:02 3419665#113 [debug] AutoHosts: answer: fonts.gstatic.com -> []
  1489. 2020/11/02 16:30:02 3419665#113 [debug] DNS: Adding OPT record with DNSSEC flag
  1490. 2020/11/02 16:30:02 3419665#113 [debug] 127.0.0.1:5335: sending request A fonts.gstatic.com.
  1491. 2020/11/02 16:30:02 3419665#113 [debug] 127.0.0.1:5335: response: ok
  1492. 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fonts.gstatic.com. IN A. Elapsed 0 ms.
  1493. 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1494. 2020/11/02 16:30:02 3419665#113 [debug] DNSFwd: Checking CNAME gstaticadssl.l.google.com. for fonts.gstatic.com.
  1495. 2020/11/02 16:30:02 3419665#113 [debug] DNSFwd: Checking record A (216.58.214.3) for gstaticadssl.l.google.com.
  1496. 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52638
  1497. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1498.  
  1499. ;; QUESTION SECTION:
  1500. ;fonts.gstatic.com. IN A
  1501.  
  1502. ;; ANSWER SECTION:
  1503. fonts.gstatic.com. 30 IN CNAME gstaticadssl.l.google.com.
  1504. gstaticadssl.l.google.com. 30 IN A 216.58.214.3
  1505.  
  1506. ;; ADDITIONAL SECTION:
  1507.  
  1508. ;; OPT PSEUDOSECTION:
  1509. ; EDNS: version 0; flags: do; udp: 1232
  1510.  
  1511. 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42462
  1512. 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55953
  1513. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1514.  
  1515. ;; QUESTION SECTION:
  1516. ;media.nu.nl. IN A
  1517.  
  1518. 2020/11/02 16:30:03 3419665#88 [debug] AutoHosts: answer: media.nu.nl -> []
  1519. 2020/11/02 16:30:03 3419665#88 [debug] DNS: Adding OPT record with DNSSEC flag
  1520. 2020/11/02 16:30:03 3419665#88 [debug] 127.0.0.1:5335: sending request A media.nu.nl.
  1521. 2020/11/02 16:30:03 3419665#88 [debug] 127.0.0.1:5335: response: ok
  1522. 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;media.nu.nl. IN A. Elapsed 0 ms.
  1523. 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1524. 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking CNAME d28whc3ikaahls.cloudfront.net. for media.nu.nl.
  1525. 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.68) for d28whc3ikaahls.cloudfront.net.
  1526. 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.45) for d28whc3ikaahls.cloudfront.net.
  1527. 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.64) for d28whc3ikaahls.cloudfront.net.
  1528. 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.59) for d28whc3ikaahls.cloudfront.net.
  1529. 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55953
  1530. ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
  1531.  
  1532. ;; QUESTION SECTION:
  1533. ;media.nu.nl. IN A
  1534.  
  1535. ;; ANSWER SECTION:
  1536. media.nu.nl. 30 IN CNAME d28whc3ikaahls.cloudfront.net.
  1537. d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.68
  1538. d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.45
  1539. d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.64
  1540. d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.59
  1541.  
  1542. ;; ADDITIONAL SECTION:
  1543.  
  1544. ;; OPT PSEUDOSECTION:
  1545. ; EDNS: version 0; flags: do; udp: 1232
  1546.  
  1547. 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:58107
  1548. 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36720
  1549. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1550.  
  1551. ;; QUESTION SECTION:
  1552. ;config.dpns-notifications.com. IN A
  1553.  
  1554. 2020/11/02 16:30:03 3419665#89 [debug] AutoHosts: answer: config.dpns-notifications.com -> []
  1555. 2020/11/02 16:30:03 3419665#89 [debug] DNS: Adding OPT record with DNSSEC flag
  1556. 2020/11/02 16:30:03 3419665#89 [debug] 127.0.0.1:5335: sending request A config.dpns-notifications.com.
  1557. 2020/11/02 16:30:03 3419665#89 [debug] 127.0.0.1:5335: response: ok
  1558. 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;config.dpns-notifications.com. IN A. Elapsed 0 ms.
  1559. 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1560. 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking CNAME d1277s10x719q6.cloudfront.net. for config.dpns-notifications.com.
  1561. 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.8) for d1277s10x719q6.cloudfront.net.
  1562. 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.116) for d1277s10x719q6.cloudfront.net.
  1563. 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.97) for d1277s10x719q6.cloudfront.net.
  1564. 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.74) for d1277s10x719q6.cloudfront.net.
  1565. 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 36720
  1566. ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
  1567.  
  1568. ;; QUESTION SECTION:
  1569. ;config.dpns-notifications.com. IN A
  1570.  
  1571. ;; ANSWER SECTION:
  1572. config.dpns-notifications.com. 30 IN CNAME d1277s10x719q6.cloudfront.net.
  1573. d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.8
  1574. d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.116
  1575. d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.97
  1576. d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.74
  1577.  
  1578. ;; ADDITIONAL SECTION:
  1579.  
  1580. ;; OPT PSEUDOSECTION:
  1581. ; EDNS: version 0; flags: do; udp: 1232
  1582.  
  1583. 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53108
  1584. 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21771
  1585. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1586.  
  1587. ;; QUESTION SECTION:
  1588. ;code.jquery.com. IN A
  1589.  
  1590. 2020/11/02 16:30:05 3419665#90 [debug] AutoHosts: answer: code.jquery.com -> []
  1591. 2020/11/02 16:30:05 3419665#90 [debug] DNS: Adding OPT record with DNSSEC flag
  1592. 2020/11/02 16:30:05 3419665#90 [debug] 127.0.0.1:5335: sending request A code.jquery.com.
  1593. 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53108
  1594. 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16396
  1595. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1596.  
  1597. ;; QUESTION SECTION:
  1598. ;code.jquery.com. IN AAAA
  1599.  
  1600. 2020/11/02 16:30:05 3419665#90 [debug] 127.0.0.1:5335: response: ok
  1601. 2020/11/02 16:30:05 3419665#114 [debug] AutoHosts: answer: code.jquery.com -> []
  1602. 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;code.jquery.com. IN A. Elapsed 0 ms.
  1603. 2020/11/02 16:30:05 3419665#114 [debug] DNS: Adding OPT record with DNSSEC flag
  1604. 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1605. 2020/11/02 16:30:05 3419665#114 [debug] 127.0.0.1:5335: sending request AAAA code.jquery.com.
  1606. 2020/11/02 16:30:05 3419665#90 [debug] DNSFwd: Checking CNAME cds.s5x3j6q5.hwcdn.net. for code.jquery.com.
  1607. 2020/11/02 16:30:05 3419665#90 [debug] DNSFwd: Checking record A (209.197.3.24) for cds.s5x3j6q5.hwcdn.net.
  1608. 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21771
  1609. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  1610.  
  1611. ;; QUESTION SECTION:
  1612. ;code.jquery.com. IN A
  1613.  
  1614. ;; ANSWER SECTION:
  1615. code.jquery.com. 30 IN CNAME cds.s5x3j6q5.hwcdn.net.
  1616. cds.s5x3j6q5.hwcdn.net. 30 IN A 209.197.3.24
  1617.  
  1618. ;; ADDITIONAL SECTION:
  1619.  
  1620. ;; OPT PSEUDOSECTION:
  1621. ; EDNS: version 0; flags: do; udp: 1232
  1622.  
  1623. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45148
  1624. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 23641
  1625. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1626.  
  1627. ;; QUESTION SECTION:
  1628. ;tags.tiqcdn.com. IN AAAA
  1629.  
  1630. 2020/11/02 16:30:05 3419665#92 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
  1631. 2020/11/02 16:30:05 3419665#92 [debug] DNS: Adding OPT record with DNSSEC flag
  1632. 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45148
  1633. 2020/11/02 16:30:05 3419665#92 [debug] 127.0.0.1:5335: sending request AAAA tags.tiqcdn.com.
  1634. 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 14431
  1635. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1636.  
  1637. ;; QUESTION SECTION:
  1638. ;tags.tiqcdn.com. IN A
  1639.  
  1640. 2020/11/02 16:30:05 3419665#91 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
  1641. 2020/11/02 16:30:05 3419665#91 [debug] DNS: Adding OPT record with DNSSEC flag
  1642. 2020/11/02 16:30:05 3419665#91 [debug] 127.0.0.1:5335: sending request A tags.tiqcdn.com.
  1643. 2020/11/02 16:30:05 3419665#91 [debug] 127.0.0.1:5335: response: ok
  1644. 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN A. Elapsed 0 ms.
  1645. 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1646. 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
  1647. 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
  1648. 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking record A (23.206.93.85) for e8091.a.akamaiedge.net.
  1649. 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 14431
  1650. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1651.  
  1652. ;; QUESTION SECTION:
  1653. ;tags.tiqcdn.com. IN A
  1654.  
  1655. ;; ANSWER SECTION:
  1656. tags.tiqcdn.com. 30 IN CNAME tags.tiqcdn.com.edgekey.net.
  1657. tags.tiqcdn.com.edgekey.net. 30 IN CNAME e8091.a.akamaiedge.net.
  1658. e8091.a.akamaiedge.net. 30 IN A 23.206.93.85
  1659.  
  1660. ;; ADDITIONAL SECTION:
  1661.  
  1662. ;; OPT PSEUDOSECTION:
  1663. ; EDNS: version 0; flags: do; udp: 1232
  1664.  
  1665. 2020/11/02 16:30:05 3419665#114 [debug] 127.0.0.1:5335: response: ok
  1666. 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;code.jquery.com. IN AAAA. Elapsed 78 ms.
  1667. 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 78 ms
  1668. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking CNAME cds.s5x3j6q5.hwcdn.net. for code.jquery.com.
  1669. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2a) for cds.s5x3j6q5.hwcdn.net.
  1670. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3b) for cds.s5x3j6q5.hwcdn.net.
  1671. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1a) for cds.s5x3j6q5.hwcdn.net.
  1672. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2b) for cds.s5x3j6q5.hwcdn.net.
  1673. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1b) for cds.s5x3j6q5.hwcdn.net.
  1674. 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3a) for cds.s5x3j6q5.hwcdn.net.
  1675. 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16396
  1676. ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1
  1677.  
  1678. ;; QUESTION SECTION:
  1679. ;code.jquery.com. IN AAAA
  1680.  
  1681. ;; ANSWER SECTION:
  1682. code.jquery.com. 300 IN CNAME cds.s5x3j6q5.hwcdn.net.
  1683. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:2a
  1684. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:3b
  1685. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:1a
  1686. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:2b
  1687. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:1b
  1688. cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:3a
  1689.  
  1690. ;; ADDITIONAL SECTION:
  1691.  
  1692. ;; OPT PSEUDOSECTION:
  1693. ; EDNS: version 0; flags: do; udp: 1232
  1694.  
  1695. 2020/11/02 16:30:05 3419665#92 [debug] 127.0.0.1:5335: response: ok
  1696. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN AAAA. Elapsed 77 ms.
  1697. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 77 ms
  1698. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): tags.tiqcdn.com.: refusing to cache a response with no A and AAAA answers
  1699. 2020/11/02 16:30:05 3419665#92 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
  1700. 2020/11/02 16:30:05 3419665#92 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
  1701. 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 23641
  1702. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
  1703.  
  1704. ;; QUESTION SECTION:
  1705. ;tags.tiqcdn.com. IN AAAA
  1706.  
  1707. ;; ANSWER SECTION:
  1708. tags.tiqcdn.com. 300 IN CNAME tags.tiqcdn.com.edgekey.net.
  1709. tags.tiqcdn.com.edgekey.net. 300 IN CNAME e8091.a.akamaiedge.net.
  1710.  
  1711. ;; AUTHORITY SECTION:
  1712. a.akamaiedge.net. 476 IN SOA n0a.akamaiedge.net. hostmaster.akamai.com. 1604330481 1000 1000 1000 1800
  1713.  
  1714. ;; ADDITIONAL SECTION:
  1715.  
  1716. ;; OPT PSEUDOSECTION:
  1717. ; EDNS: version 0; flags: do; udp: 1232
  1718.  
  1719. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49808
  1720. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3825
  1721. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1722.  
  1723. ;; QUESTION SECTION:
  1724. ;tags.tiqcdn.com. IN AAAA
  1725.  
  1726. 2020/11/02 16:30:05 3419665#129 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
  1727. 2020/11/02 16:30:05 3419665#129 [debug] DNS: Adding OPT record with DNSSEC flag
  1728. 2020/11/02 16:30:05 3419665#129 [debug] 127.0.0.1:5335: sending request AAAA tags.tiqcdn.com.
  1729. 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49808
  1730. 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10997
  1731. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1732.  
  1733. ;; QUESTION SECTION:
  1734. ;tags.tiqcdn.com. IN A
  1735.  
  1736. 2020/11/02 16:30:05 3419665#112 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
  1737. 2020/11/02 16:30:05 3419665#112 [debug] DNS: Adding OPT record with DNSSEC flag
  1738. 2020/11/02 16:30:05 3419665#112 [debug] Serving response from general cache
  1739. 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
  1740. 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
  1741. 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking record A (23.206.93.85) for e8091.a.akamaiedge.net.
  1742. 2020/11/02 16:30:05 3419665#129 [debug] 127.0.0.1:5335: response: ok
  1743. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN AAAA. Elapsed 0 ms.
  1744. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1745. 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 10997
  1746. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1747.  
  1748. ;; QUESTION SECTION:
  1749. ;tags.tiqcdn.com. IN A
  1750.  
  1751. ;; ANSWER SECTION:
  1752. tags.tiqcdn.com. 30 IN CNAME tags.tiqcdn.com.edgekey.net.
  1753. tags.tiqcdn.com.edgekey.net. 30 IN CNAME e8091.a.akamaiedge.net.
  1754. e8091.a.akamaiedge.net. 30 IN A 23.206.93.85
  1755.  
  1756. ;; ADDITIONAL SECTION:
  1757.  
  1758. ;; OPT PSEUDOSECTION:
  1759. ; EDNS: version 0; flags: do; udp: 1232
  1760.  
  1761. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): tags.tiqcdn.com.: refusing to cache a response with no A and AAAA answers
  1762. 2020/11/02 16:30:05 3419665#129 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
  1763. 2020/11/02 16:30:05 3419665#129 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
  1764. 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 3825
  1765. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
  1766.  
  1767. ;; QUESTION SECTION:
  1768. ;tags.tiqcdn.com. IN AAAA
  1769.  
  1770. ;; ANSWER SECTION:
  1771. tags.tiqcdn.com. 300 IN CNAME tags.tiqcdn.com.edgekey.net.
  1772. tags.tiqcdn.com.edgekey.net. 300 IN CNAME e8091.a.akamaiedge.net.
  1773.  
  1774. ;; AUTHORITY SECTION:
  1775. a.akamaiedge.net. 476 IN SOA n0a.akamaiedge.net. hostmaster.akamai.com. 1604330481 1000 1000 1000 1800
  1776.  
  1777. ;; ADDITIONAL SECTION:
  1778.  
  1779. ;; OPT PSEUDOSECTION:
  1780. ; EDNS: version 0; flags: do; udp: 1232
  1781.  
  1782. 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35034
  1783. 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4158
  1784. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1785.  
  1786. ;; QUESTION SECTION:
  1787. ;dev.visualwebsiteoptimizer.com. IN A
  1788.  
  1789. 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35034
  1790. 2020/11/02 16:30:05 3419665#93 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
  1791. 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52793
  1792. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1793.  
  1794. ;; QUESTION SECTION:
  1795. ;dev.visualwebsiteoptimizer.com. IN AAAA
  1796.  
  1797. 2020/11/02 16:30:05 3419665#94 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
  1798. 2020/11/02 16:30:05 3419665#93 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
  1799. 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
  1800. 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4158
  1801. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  1802.  
  1803. ;; QUESTION SECTION:
  1804. ;dev.visualwebsiteoptimizer.com. IN A
  1805.  
  1806. ;; ANSWER SECTION:
  1807. dev.visualwebsiteoptimizer.com. 10 IN A 0.0.0.0
  1808.  
  1809. 2020/11/02 16:30:05 3419665#94 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
  1810. 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
  1811. 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52793
  1812. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  1813.  
  1814. ;; QUESTION SECTION:
  1815. ;dev.visualwebsiteoptimizer.com. IN AAAA
  1816.  
  1817. ;; ANSWER SECTION:
  1818. dev.visualwebsiteoptimizer.com. 10 IN AAAA ::
  1819.  
  1820. 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.36:63049
  1821. 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21291
  1822. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1823.  
  1824. ;; QUESTION SECTION:
  1825. ;noam.presence.teams.microsoft.com. IN A
  1826.  
  1827. 2020/11/02 16:30:06 3419665#95 [debug] AutoHosts: answer: noam.presence.teams.microsoft.com -> []
  1828. 2020/11/02 16:30:06 3419665#95 [debug] DNS: Adding OPT record with DNSSEC flag
  1829. 2020/11/02 16:30:06 3419665#95 [debug] 127.0.0.1:5335: sending request A noam.presence.teams.microsoft.com.
  1830. 2020/11/02 16:30:06 3419665#95 [debug] 127.0.0.1:5335: response: ok
  1831. 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;noam.presence.teams.microsoft.com. IN A. Elapsed 0 ms.
  1832. 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1833. 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking CNAME noam.presence.services.sfb.trafficmanager.net. for noam.presence.teams.microsoft.com.
  1834. 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking CNAME a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com. for noam.presence.services.sfb.trafficmanager.net.
  1835. 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking record A (52.114.128.87) for a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com.
  1836. 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21291
  1837. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1838.  
  1839. ;; QUESTION SECTION:
  1840. ;noam.presence.teams.microsoft.com. IN A
  1841.  
  1842. ;; ANSWER SECTION:
  1843. noam.presence.teams.microsoft.com. 1615 IN CNAME noam.presence.services.sfb.trafficmanager.net.
  1844. noam.presence.services.sfb.trafficmanager.net. 30 IN CNAME a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com.
  1845. a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com. 30 IN A 52.114.128.87
  1846.  
  1847. ;; ADDITIONAL SECTION:
  1848.  
  1849. ;; OPT PSEUDOSECTION:
  1850. ; EDNS: version 0; flags: do; udp: 1232
  1851.  
  1852. 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42698
  1853. 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62471
  1854. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1855.  
  1856. ;; QUESTION SECTION:
  1857. ;dev.visualwebsiteoptimizer.com. IN AAAA
  1858.  
  1859. 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42698
  1860. 2020/11/02 16:30:06 3419665#145 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
  1861. 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 64259
  1862. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1863.  
  1864. ;; QUESTION SECTION:
  1865. ;dev.visualwebsiteoptimizer.com. IN A
  1866.  
  1867. 2020/11/02 16:30:06 3419665#96 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
  1868. 2020/11/02 16:30:06 3419665#145 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
  1869. 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
  1870. 2020/11/02 16:30:06 3419665#96 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
  1871. 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62471
  1872. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  1873.  
  1874. ;; QUESTION SECTION:
  1875. ;dev.visualwebsiteoptimizer.com. IN AAAA
  1876.  
  1877. ;; ANSWER SECTION:
  1878. dev.visualwebsiteoptimizer.com. 10 IN AAAA ::
  1879.  
  1880. 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
  1881. 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 64259
  1882. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  1883.  
  1884. ;; QUESTION SECTION:
  1885. ;dev.visualwebsiteoptimizer.com. IN A
  1886.  
  1887. ;; ANSWER SECTION:
  1888. dev.visualwebsiteoptimizer.com. 10 IN A 0.0.0.0
  1889.  
  1890. 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:34644
  1891. 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 12174
  1892. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1893.  
  1894. ;; QUESTION SECTION:
  1895. ;detectportal.firefox.com. IN A
  1896.  
  1897. 2020/11/02 16:30:06 3419665#130 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  1898. 2020/11/02 16:30:06 3419665#130 [debug] DNS: Adding OPT record with DNSSEC flag
  1899. 2020/11/02 16:30:06 3419665#130 [debug] 127.0.0.1:5335: sending request A detectportal.firefox.com.
  1900. 2020/11/02 16:30:06 3419665#130 [debug] 127.0.0.1:5335: response: ok
  1901. 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;detectportal.firefox.com. IN A. Elapsed 0 ms.
  1902. 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1903. 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  1904. 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  1905. 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
  1906. 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 12174
  1907. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  1908.  
  1909. ;; QUESTION SECTION:
  1910. ;detectportal.firefox.com. IN A
  1911.  
  1912. ;; ANSWER SECTION:
  1913. detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
  1914. detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  1915. prod.detectportal.prod.cloudops.mozgcp.net. 1178 IN A 34.107.221.82
  1916.  
  1917. ;; ADDITIONAL SECTION:
  1918.  
  1919. ;; OPT PSEUDOSECTION:
  1920. ; EDNS: version 0; flags: do; udp: 1232
  1921.  
  1922. 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39690
  1923. 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1698
  1924. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1925.  
  1926. ;; QUESTION SECTION:
  1927. ;mozilla.org. IN A
  1928.  
  1929. 2020/11/02 16:30:06 3419665#131 [debug] AutoHosts: answer: mozilla.org -> []
  1930. 2020/11/02 16:30:06 3419665#131 [debug] DNS: Adding OPT record with DNSSEC flag
  1931. 2020/11/02 16:30:06 3419665#131 [debug] 127.0.0.1:5335: sending request A mozilla.org.
  1932. 2020/11/02 16:30:06 3419665#131 [debug] 127.0.0.1:5335: response: ok
  1933. 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN A. Elapsed 0 ms.
  1934. 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  1935. 2020/11/02 16:30:06 3419665#131 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
  1936. 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 1698
  1937. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  1938.  
  1939. ;; QUESTION SECTION:
  1940. ;mozilla.org. IN A
  1941.  
  1942. ;; ANSWER SECTION:
  1943. mozilla.org. 30 IN A 63.245.208.195
  1944.  
  1945. ;; ADDITIONAL SECTION:
  1946.  
  1947. ;; OPT PSEUDOSECTION:
  1948. ; EDNS: version 0; flags: do; udp: 1232
  1949.  
  1950. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40485
  1951. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61567
  1952. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1953.  
  1954. ;; QUESTION SECTION:
  1955. ;mozilla.org. IN AAAA
  1956.  
  1957. 2020/11/02 16:30:06 3419665#133 [debug] AutoHosts: answer: mozilla.org -> []
  1958. 2020/11/02 16:30:06 3419665#133 [debug] DNS: Adding OPT record with DNSSEC flag
  1959. 2020/11/02 16:30:06 3419665#133 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
  1960. 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40485
  1961. 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 33405
  1962. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1963.  
  1964. ;; QUESTION SECTION:
  1965. ;mozilla.org. IN A
  1966.  
  1967. 2020/11/02 16:30:06 3419665#132 [debug] AutoHosts: answer: mozilla.org -> []
  1968. 2020/11/02 16:30:06 3419665#132 [debug] DNS: Adding OPT record with DNSSEC flag
  1969. 2020/11/02 16:30:06 3419665#132 [debug] Serving response from general cache
  1970. 2020/11/02 16:30:06 3419665#132 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
  1971. 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 33405
  1972. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  1973.  
  1974. ;; QUESTION SECTION:
  1975. ;mozilla.org. IN A
  1976.  
  1977. ;; ANSWER SECTION:
  1978. mozilla.org. 30 IN A 63.245.208.195
  1979.  
  1980. ;; ADDITIONAL SECTION:
  1981.  
  1982. ;; OPT PSEUDOSECTION:
  1983. ; EDNS: version 0; flags: do; udp: 1232
  1984.  
  1985. 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52878
  1986. 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18217
  1987. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  1988.  
  1989. ;; QUESTION SECTION:
  1990. ;detectportal.firefox.com. IN A
  1991.  
  1992. 2020/11/02 16:30:06 3419665#134 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  1993. 2020/11/02 16:30:06 3419665#134 [debug] DNS: Adding OPT record with DNSSEC flag
  1994. 2020/11/02 16:30:06 3419665#134 [debug] Serving response from general cache
  1995. 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  1996. 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  1997. 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
  1998. 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18217
  1999. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  2000.  
  2001. ;; QUESTION SECTION:
  2002. ;detectportal.firefox.com. IN A
  2003.  
  2004. ;; ANSWER SECTION:
  2005. detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
  2006. detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  2007. prod.detectportal.prod.cloudops.mozgcp.net. 30 IN A 34.107.221.82
  2008.  
  2009. ;; ADDITIONAL SECTION:
  2010.  
  2011. ;; OPT PSEUDOSECTION:
  2012. ; EDNS: version 0; flags: do; udp: 1232
  2013.  
  2014. 2020/11/02 16:30:06 3419665#133 [debug] 127.0.0.1:5335: response: ok
  2015. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
  2016. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2017. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
  2018. 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61567
  2019. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  2020.  
  2021. ;; QUESTION SECTION:
  2022. ;mozilla.org. IN AAAA
  2023.  
  2024. ;; AUTHORITY SECTION:
  2025. mozilla.org. 30 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
  2026.  
  2027. ;; ADDITIONAL SECTION:
  2028.  
  2029. ;; OPT PSEUDOSECTION:
  2030. ; EDNS: version 0; flags: do; udp: 1232
  2031.  
  2032. 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41699
  2033. 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13907
  2034. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2035.  
  2036. ;; QUESTION SECTION:
  2037. ;detectportal.firefox.com. IN AAAA
  2038.  
  2039. 2020/11/02 16:30:06 3419665#136 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  2040. 2020/11/02 16:30:06 3419665#136 [debug] DNS: Adding OPT record with DNSSEC flag
  2041. 2020/11/02 16:30:06 3419665#136 [debug] 127.0.0.1:5335: sending request AAAA detectportal.firefox.com.
  2042. 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41699
  2043. 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 49233
  2044. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2045.  
  2046. ;; QUESTION SECTION:
  2047. ;detectportal.firefox.com. IN A
  2048.  
  2049. 2020/11/02 16:30:06 3419665#135 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  2050. 2020/11/02 16:30:06 3419665#135 [debug] DNS: Adding OPT record with DNSSEC flag
  2051. 2020/11/02 16:30:06 3419665#135 [debug] Serving response from general cache
  2052. 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  2053. 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  2054. 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
  2055. 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 49233
  2056. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  2057.  
  2058. ;; QUESTION SECTION:
  2059. ;detectportal.firefox.com. IN A
  2060.  
  2061. ;; ANSWER SECTION:
  2062. detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
  2063. detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  2064. prod.detectportal.prod.cloudops.mozgcp.net. 30 IN A 34.107.221.82
  2065.  
  2066. ;; ADDITIONAL SECTION:
  2067.  
  2068. ;; OPT PSEUDOSECTION:
  2069. ; EDNS: version 0; flags: do; udp: 1232
  2070.  
  2071. 2020/11/02 16:30:06 3419665#136 [debug] 127.0.0.1:5335: response: ok
  2072. 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;detectportal.firefox.com. IN AAAA. Elapsed 0 ms.
  2073. 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2074. 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  2075. 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  2076. 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking record AAAA (2600:1901:0:38d7::) for prod.detectportal.prod.cloudops.mozgcp.net.
  2077. 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13907
  2078. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  2079.  
  2080. ;; QUESTION SECTION:
  2081. ;detectportal.firefox.com. IN AAAA
  2082.  
  2083. ;; ANSWER SECTION:
  2084. detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
  2085. detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  2086. prod.detectportal.prod.cloudops.mozgcp.net. 38 IN AAAA 2600:1901:0:38d7::
  2087.  
  2088. ;; ADDITIONAL SECTION:
  2089.  
  2090. ;; OPT PSEUDOSECTION:
  2091. ; EDNS: version 0; flags: do; udp: 1232
  2092.  
  2093. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:57107
  2094. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61650
  2095. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2096.  
  2097. ;; QUESTION SECTION:
  2098. ;mozilla.org. IN AAAA
  2099.  
  2100. 2020/11/02 16:30:06 3419665#138 [debug] AutoHosts: answer: mozilla.org -> []
  2101. 2020/11/02 16:30:06 3419665#138 [debug] DNS: Adding OPT record with DNSSEC flag
  2102. 2020/11/02 16:30:06 3419665#138 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
  2103. 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:57107
  2104. 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57041
  2105. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2106.  
  2107. ;; QUESTION SECTION:
  2108. ;mozilla.org. IN A
  2109.  
  2110. 2020/11/02 16:30:06 3419665#137 [debug] AutoHosts: answer: mozilla.org -> []
  2111. 2020/11/02 16:30:06 3419665#137 [debug] DNS: Adding OPT record with DNSSEC flag
  2112. 2020/11/02 16:30:06 3419665#137 [debug] Serving response from general cache
  2113. 2020/11/02 16:30:06 3419665#137 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
  2114. 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 57041
  2115. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  2116.  
  2117. ;; QUESTION SECTION:
  2118. ;mozilla.org. IN A
  2119.  
  2120. ;; ANSWER SECTION:
  2121. mozilla.org. 30 IN A 63.245.208.195
  2122.  
  2123. ;; ADDITIONAL SECTION:
  2124.  
  2125. ;; OPT PSEUDOSECTION:
  2126. ; EDNS: version 0; flags: do; udp: 1232
  2127.  
  2128. 2020/11/02 16:30:06 3419665#138 [debug] 127.0.0.1:5335: response: ok
  2129. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
  2130. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2131. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
  2132. 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61650
  2133. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  2134.  
  2135. ;; QUESTION SECTION:
  2136. ;mozilla.org. IN AAAA
  2137.  
  2138. ;; AUTHORITY SECTION:
  2139. mozilla.org. 30 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
  2140.  
  2141. ;; ADDITIONAL SECTION:
  2142.  
  2143. ;; OPT PSEUDOSECTION:
  2144. ; EDNS: version 0; flags: do; udp: 1232
  2145.  
  2146. 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
  2147. 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55976
  2148. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2149.  
  2150. ;; QUESTION SECTION:
  2151. ;tentacles.smartocto.com. IN AAAA
  2152.  
  2153. 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
  2154. 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65207
  2155. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2156.  
  2157. ;; QUESTION SECTION:
  2158. ;tentacles.smartocto.com. IN A
  2159.  
  2160. 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40199 based on IP only
  2161. 2020/11/02 16:30:06 3419665#116 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
  2162. 2020/11/02 16:30:06 3419665#116 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
  2163. 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
  2164. 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55976
  2165. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2166.  
  2167. ;; QUESTION SECTION:
  2168. ;tentacles.smartocto.com. IN AAAA
  2169.  
  2170. ;; ANSWER SECTION:
  2171. tentacles.smartocto.com. 10 IN AAAA ::
  2172.  
  2173. 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52920
  2174. 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15629
  2175. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2176.  
  2177. ;; QUESTION SECTION:
  2178. ;sb.scorecardresearch.com. IN A
  2179.  
  2180. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52920
  2181. 2020/11/02 16:30:06 3419665#117 [debug] AutoHosts: answer: sb.scorecardresearch.com -> []
  2182. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 28937
  2183. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2184.  
  2185. ;; QUESTION SECTION:
  2186. ;sb.scorecardresearch.com. IN AAAA
  2187.  
  2188. 2020/11/02 16:30:06 3419665#118 [debug] AutoHosts: answer: sb.scorecardresearch.com -> []
  2189. 2020/11/02 16:30:06 3419665#117 [debug] DNS: Adding OPT record with DNSSEC flag
  2190. 2020/11/02 16:30:06 3419665#117 [debug] 127.0.0.1:5335: sending request A sb.scorecardresearch.com.
  2191. 2020/11/02 16:30:06 3419665#118 [debug] DNS: Adding OPT record with DNSSEC flag
  2192. 2020/11/02 16:30:06 3419665#118 [debug] 127.0.0.1:5335: sending request AAAA sb.scorecardresearch.com.
  2193. 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41194
  2194. 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4635
  2195. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2196.  
  2197. ;; QUESTION SECTION:
  2198. ;static.hotjar.com. IN A
  2199.  
  2200. 2020/11/02 16:30:06 3419665#119 [debug] AutoHosts: answer: static.hotjar.com -> []
  2201. 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41194
  2202. 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18692
  2203. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2204.  
  2205. ;; QUESTION SECTION:
  2206. ;static.hotjar.com. IN AAAA
  2207.  
  2208. 2020/11/02 16:30:06 3419665#139 [debug] AutoHosts: answer: static.hotjar.com -> []
  2209. 2020/11/02 16:30:06 3419665#119 [debug] Filtering: found rule for host 'static.hotjar.com': '||hotjar.com^' list_id: 1
  2210. 2020/11/02 16:30:06 3419665#139 [debug] Filtering: found rule for host 'static.hotjar.com': '||hotjar.com^' list_id: 1
  2211. 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host static.hotjar.com is filtered, reason - 'FilteredBlackList', matched rule: '||hotjar.com^'
  2212. 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host static.hotjar.com is filtered, reason - 'FilteredBlackList', matched rule: '||hotjar.com^'
  2213. 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4635
  2214. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2215.  
  2216. ;; QUESTION SECTION:
  2217. ;static.hotjar.com. IN A
  2218.  
  2219. ;; ANSWER SECTION:
  2220. static.hotjar.com. 10 IN A 0.0.0.0
  2221.  
  2222. 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18692
  2223. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2224.  
  2225. ;; QUESTION SECTION:
  2226. ;static.hotjar.com. IN AAAA
  2227.  
  2228. ;; ANSWER SECTION:
  2229. static.hotjar.com. 10 IN AAAA ::
  2230.  
  2231. 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
  2232. 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
  2233. 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2743
  2234. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2235.  
  2236. ;; QUESTION SECTION:
  2237. ;csm.cxpublic.com. IN A
  2238.  
  2239. 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:56554 based on IP only
  2240. 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1449
  2241. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2242.  
  2243. ;; QUESTION SECTION:
  2244. ;csm.cxpublic.com. IN AAAA
  2245.  
  2246. 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:56554 based on IP only
  2247. 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
  2248. 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 38425
  2249. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2250.  
  2251. ;; QUESTION SECTION:
  2252. ;cdn.krxd.net. IN A
  2253.  
  2254. 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:60540 based on IP only
  2255. 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
  2256. 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 26909
  2257. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2258.  
  2259. ;; QUESTION SECTION:
  2260. ;cdn.krxd.net. IN AAAA
  2261.  
  2262. 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:60540 based on IP only
  2263. 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  2264. 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  2265. 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
  2266. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2267.  
  2268. ;; QUESTION SECTION:
  2269. ;sat.public.bd.313.nl. IN A
  2270.  
  2271. 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
  2272. 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
  2273. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2274.  
  2275. ;; QUESTION SECTION:
  2276. ;sat.public.bd.313.nl. IN AAAA
  2277.  
  2278. 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
  2279. 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
  2280. 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62595
  2281. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2282.  
  2283. ;; QUESTION SECTION:
  2284. ;scdn.cxense.com. IN A
  2285.  
  2286. 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
  2287. 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
  2288. 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
  2289. 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 133
  2290. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2291.  
  2292. ;; QUESTION SECTION:
  2293. ;scdn.cxense.com. IN AAAA
  2294.  
  2295. 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35059
  2296. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2297.  
  2298. ;; QUESTION SECTION:
  2299. ;beak.bd.313.nl. IN A
  2300.  
  2301. 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
  2302. 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
  2303. 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
  2304. 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31472
  2305. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2306.  
  2307. ;; QUESTION SECTION:
  2308. ;beak.bd.313.nl. IN AAAA
  2309.  
  2310. 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
  2311. 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
  2312. 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6893
  2313. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2314.  
  2315. ;; QUESTION SECTION:
  2316. ;d20kyoxkb5vbjm.cloudfront.net. IN A
  2317.  
  2318. 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
  2319. 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
  2320. 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57071
  2321. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2322.  
  2323. ;; QUESTION SECTION:
  2324. ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
  2325.  
  2326. 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
  2327. 2020/11/02 16:30:06 3419665#117 [debug] 127.0.0.1:5335: response: ok
  2328. 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sb.scorecardresearch.com. IN A. Elapsed 76 ms.
  2329. 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 76 ms
  2330. 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking CNAME sb.scorecardresearch.com.edgekey.net. for sb.scorecardresearch.com.
  2331. 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking CNAME e8736.e7.akamaiedge.net. for sb.scorecardresearch.com.edgekey.net.
  2332. 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking record A (2.20.130.64) for e8736.e7.akamaiedge.net.
  2333. 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 15629
  2334. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  2335.  
  2336. ;; QUESTION SECTION:
  2337. ;sb.scorecardresearch.com. IN A
  2338.  
  2339. ;; ANSWER SECTION:
  2340. sb.scorecardresearch.com. 2946 IN CNAME sb.scorecardresearch.com.edgekey.net.
  2341. sb.scorecardresearch.com.edgekey.net. 300 IN CNAME e8736.e7.akamaiedge.net.
  2342. e8736.e7.akamaiedge.net. 300 IN A 2.20.130.64
  2343.  
  2344. ;; ADDITIONAL SECTION:
  2345.  
  2346. ;; OPT PSEUDOSECTION:
  2347. ; EDNS: version 0; flags: do; udp: 1232
  2348.  
  2349. 2020/11/02 16:30:06 3419665#118 [debug] 127.0.0.1:5335: response: ok
  2350. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sb.scorecardresearch.com. IN AAAA. Elapsed 79 ms.
  2351. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 79 ms
  2352. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): sb.scorecardresearch.com.: refusing to cache a response with no A and AAAA answers
  2353. 2020/11/02 16:30:06 3419665#118 [debug] DNSFwd: Checking CNAME sb.scorecardresearch.com.edgekey.net. for sb.scorecardresearch.com.
  2354. 2020/11/02 16:30:06 3419665#118 [debug] DNSFwd: Checking CNAME e8736.e7.akamaiedge.net. for sb.scorecardresearch.com.edgekey.net.
  2355. 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 28937
  2356. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
  2357.  
  2358. ;; QUESTION SECTION:
  2359. ;sb.scorecardresearch.com. IN AAAA
  2360.  
  2361. ;; ANSWER SECTION:
  2362. sb.scorecardresearch.com. 2946 IN CNAME sb.scorecardresearch.com.edgekey.net.
  2363. sb.scorecardresearch.com.edgekey.net. 300 IN CNAME e8736.e7.akamaiedge.net.
  2364.  
  2365. ;; AUTHORITY SECTION:
  2366. e7.akamaiedge.net. 1000 IN SOA n0e7.akamaiedge.net. hostmaster.akamai.com. 1604331006 1000 1000 1000 1800
  2367.  
  2368. ;; ADDITIONAL SECTION:
  2369.  
  2370. ;; OPT PSEUDOSECTION:
  2371. ; EDNS: version 0; flags: do; udp: 1232
  2372.  
  2373. 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54011
  2374. 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24441
  2375. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2376.  
  2377. ;; QUESTION SECTION:
  2378. ;w.usabilla.com. IN AAAA
  2379.  
  2380. 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54011
  2381. 2020/11/02 16:30:06 3419665#163 [debug] AutoHosts: answer: w.usabilla.com -> []
  2382. 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52325
  2383. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2384.  
  2385. ;; QUESTION SECTION:
  2386. ;w.usabilla.com. IN A
  2387.  
  2388. 2020/11/02 16:30:06 3419665#162 [debug] AutoHosts: answer: w.usabilla.com -> []
  2389. 2020/11/02 16:30:06 3419665#163 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
  2390. 2020/11/02 16:30:06 3419665#162 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
  2391. 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
  2392. 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
  2393. 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24441
  2394. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2395.  
  2396. ;; QUESTION SECTION:
  2397. ;w.usabilla.com. IN AAAA
  2398.  
  2399. ;; ANSWER SECTION:
  2400. w.usabilla.com. 10 IN AAAA ::
  2401.  
  2402. 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52325
  2403. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2404.  
  2405. ;; QUESTION SECTION:
  2406. ;w.usabilla.com. IN A
  2407.  
  2408. ;; ANSWER SECTION:
  2409. w.usabilla.com. 10 IN A 0.0.0.0
  2410.  
  2411. 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
  2412. 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15909
  2413. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2414.  
  2415. ;; QUESTION SECTION:
  2416. ;w.usabilla.com. IN AAAA
  2417.  
  2418. 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
  2419. 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
  2420. 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29990
  2421. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2422.  
  2423. ;; QUESTION SECTION:
  2424. ;w.usabilla.com. IN A
  2425.  
  2426. 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
  2427. 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
  2428. 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65207
  2429. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2430.  
  2431. ;; QUESTION SECTION:
  2432. ;tentacles.smartocto.com. IN A
  2433.  
  2434. 2020/11/02 16:30:11 3419665#166 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
  2435. 2020/11/02 16:30:11 3419665#166 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
  2436. 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
  2437. 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 65207
  2438. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2439.  
  2440. ;; QUESTION SECTION:
  2441. ;tentacles.smartocto.com. IN A
  2442.  
  2443. ;; ANSWER SECTION:
  2444. tentacles.smartocto.com. 10 IN A 0.0.0.0
  2445.  
  2446. 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
  2447. 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55976
  2448. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2449.  
  2450. ;; QUESTION SECTION:
  2451. ;tentacles.smartocto.com. IN AAAA
  2452.  
  2453. 2020/11/02 16:30:11 3419665#149 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
  2454. 2020/11/02 16:30:11 3419665#149 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
  2455. 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
  2456. 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55976
  2457. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2458.  
  2459. ;; QUESTION SECTION:
  2460. ;tentacles.smartocto.com. IN AAAA
  2461.  
  2462. ;; ANSWER SECTION:
  2463. tentacles.smartocto.com. 10 IN AAAA ::
  2464.  
  2465. 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41137
  2466. 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58965
  2467. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2468.  
  2469. ;; QUESTION SECTION:
  2470. ;telef.Obelix. IN A
  2471.  
  2472. 2020/11/02 16:30:11 3419665#150 [debug] AutoHosts: answer: telef.obelix -> []
  2473. 2020/11/02 16:30:11 3419665#150 [debug] DNS: Adding OPT record with DNSSEC flag
  2474. 2020/11/02 16:30:11 3419665#150 [debug] 127.0.0.1:5335: sending request A telef.Obelix.
  2475. 2020/11/02 16:30:11 3419665#150 [debug] 127.0.0.1:5335: response: ok
  2476. 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef.Obelix. IN A. Elapsed 0 ms.
  2477. 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2478. 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2479. 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  2480. 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2481. 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 58965
  2482. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2483.  
  2484. ;; QUESTION SECTION:
  2485. ;telef.Obelix. IN A
  2486.  
  2487. ;; AUTHORITY SECTION:
  2488. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2489. nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
  2490. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2491.  
  2492. ;; ADDITIONAL SECTION:
  2493.  
  2494. ;; OPT PSEUDOSECTION:
  2495. ; EDNS: version 0; flags: do; udp: 1232
  2496.  
  2497. 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41137
  2498. 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6990
  2499. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2500.  
  2501. ;; QUESTION SECTION:
  2502. ;telef.Obelix. IN AAAA
  2503.  
  2504. 2020/11/02 16:30:11 3419665#151 [debug] AutoHosts: answer: telef.obelix -> []
  2505. 2020/11/02 16:30:11 3419665#151 [debug] DNS: Adding OPT record with DNSSEC flag
  2506. 2020/11/02 16:30:11 3419665#151 [debug] 127.0.0.1:5335: sending request AAAA telef.Obelix.
  2507. 2020/11/02 16:30:11 3419665#151 [debug] 127.0.0.1:5335: response: ok
  2508. 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef.Obelix. IN AAAA. Elapsed 0 ms.
  2509. 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2510. 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2511. 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  2512. 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2513. 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 6990
  2514. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2515.  
  2516. ;; QUESTION SECTION:
  2517. ;telef.Obelix. IN AAAA
  2518.  
  2519. ;; AUTHORITY SECTION:
  2520. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2521. nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
  2522. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2523.  
  2524. ;; ADDITIONAL SECTION:
  2525.  
  2526. ;; OPT PSEUDOSECTION:
  2527. ; EDNS: version 0; flags: do; udp: 1232
  2528.  
  2529. 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41371
  2530. 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13371
  2531. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2532.  
  2533. ;; QUESTION SECTION:
  2534. ;telef. IN A
  2535.  
  2536. 2020/11/02 16:30:11 3419665#152 [debug] AutoHosts: answer: telef -> []
  2537. 2020/11/02 16:30:11 3419665#152 [debug] DNS: Adding OPT record with DNSSEC flag
  2538. 2020/11/02 16:30:11 3419665#152 [debug] 127.0.0.1:5335: sending request A telef.
  2539. 2020/11/02 16:30:11 3419665#152 [debug] 127.0.0.1:5335: response: ok
  2540. 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef. IN A. Elapsed 18 ms.
  2541. 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 18 ms
  2542. 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2543. 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: tel. 86400 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
  2544. 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2545. 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 13371
  2546. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2547.  
  2548. ;; QUESTION SECTION:
  2549. ;telef. IN A
  2550.  
  2551. ;; AUTHORITY SECTION:
  2552. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2553. tel. 86400 IN NSEC temasek. NS DS RRSIG NSEC
  2554. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2555.  
  2556. ;; ADDITIONAL SECTION:
  2557.  
  2558. ;; OPT PSEUDOSECTION:
  2559. ; EDNS: version 0; flags: do; udp: 1232
  2560.  
  2561. 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41371
  2562. 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62776
  2563. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2564.  
  2565. ;; QUESTION SECTION:
  2566. ;telef. IN AAAA
  2567.  
  2568. 2020/11/02 16:30:11 3419665#153 [debug] AutoHosts: answer: telef -> []
  2569. 2020/11/02 16:30:11 3419665#153 [debug] DNS: Adding OPT record with DNSSEC flag
  2570. 2020/11/02 16:30:11 3419665#153 [debug] 127.0.0.1:5335: sending request AAAA telef.
  2571. 2020/11/02 16:30:11 3419665#153 [debug] 127.0.0.1:5335: response: ok
  2572. 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef. IN AAAA. Elapsed 0 ms.
  2573. 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  2574. 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2575. 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: tel. 86400 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
  2576. 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2577. 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 62776
  2578. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2579.  
  2580. ;; QUESTION SECTION:
  2581. ;telef. IN AAAA
  2582.  
  2583. ;; AUTHORITY SECTION:
  2584. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2585. tel. 86400 IN NSEC temasek. NS DS RRSIG NSEC
  2586. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2587.  
  2588. ;; ADDITIONAL SECTION:
  2589.  
  2590. ;; OPT PSEUDOSECTION:
  2591. ; EDNS: version 0; flags: do; udp: 1232
  2592.  
  2593. 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52121
  2594. 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 23693
  2595. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2596.  
  2597. ;; QUESTION SECTION:
  2598. ;telef.Obelix. IN A
  2599.  
  2600. 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52121
  2601. 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 247
  2602. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2603.  
  2604. ;; QUESTION SECTION:
  2605. ;telef.Obelix. IN AAAA
  2606.  
  2607. 2020/11/02 16:30:11 3419665#154 [debug] AutoHosts: answer: telef.obelix -> []
  2608. 2020/11/02 16:30:11 3419665#155 [debug] AutoHosts: answer: telef.obelix -> []
  2609. 2020/11/02 16:30:11 3419665#154 [debug] DNS: Adding OPT record with DNSSEC flag
  2610. 2020/11/02 16:30:11 3419665#154 [debug] Serving response from general cache
  2611. 2020/11/02 16:30:11 3419665#155 [debug] DNS: Adding OPT record with DNSSEC flag
  2612. 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2613. 2020/11/02 16:30:11 3419665#155 [debug] Serving response from general cache
  2614. 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  2615. 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2616. 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2617. 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  2618. 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2619. 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 23693
  2620. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2621.  
  2622. ;; QUESTION SECTION:
  2623. ;telef.Obelix. IN A
  2624.  
  2625. ;; AUTHORITY SECTION:
  2626. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2627. nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
  2628. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2629.  
  2630. ;; ADDITIONAL SECTION:
  2631.  
  2632. ;; OPT PSEUDOSECTION:
  2633. ; EDNS: version 0; flags: do; udp: 1232
  2634.  
  2635. 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 247
  2636. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2637.  
  2638. ;; QUESTION SECTION:
  2639. ;telef.Obelix. IN AAAA
  2640.  
  2641. ;; AUTHORITY SECTION:
  2642. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2643. nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
  2644. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2645.  
  2646. ;; ADDITIONAL SECTION:
  2647.  
  2648. ;; OPT PSEUDOSECTION:
  2649. ; EDNS: version 0; flags: do; udp: 1232
  2650.  
  2651. 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35525
  2652. 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35525
  2653. 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 30913
  2654. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2655.  
  2656. ;; QUESTION SECTION:
  2657. ;telef. IN A
  2658.  
  2659. 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58819
  2660. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2661.  
  2662. ;; QUESTION SECTION:
  2663. ;telef. IN AAAA
  2664.  
  2665. 2020/11/02 16:30:11 3419665#156 [debug] AutoHosts: answer: telef -> []
  2666. 2020/11/02 16:30:11 3419665#157 [debug] AutoHosts: answer: telef -> []
  2667. 2020/11/02 16:30:11 3419665#156 [debug] DNS: Adding OPT record with DNSSEC flag
  2668. 2020/11/02 16:30:11 3419665#157 [debug] DNS: Adding OPT record with DNSSEC flag
  2669. 2020/11/02 16:30:11 3419665#156 [debug] Serving response from general cache
  2670. 2020/11/02 16:30:11 3419665#157 [debug] Serving response from general cache
  2671. 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2672. 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2673. 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: tel. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
  2674. 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: tel. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
  2675. 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  2676. 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 58819
  2677. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2678.  
  2679. ;; QUESTION SECTION:
  2680. ;telef. IN AAAA
  2681.  
  2682. ;; AUTHORITY SECTION:
  2683. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2684. tel. 3168 IN NSEC temasek. NS DS RRSIG NSEC
  2685. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2686.  
  2687. ;; ADDITIONAL SECTION:
  2688.  
  2689. ;; OPT PSEUDOSECTION:
  2690. ; EDNS: version 0; flags: do; udp: 1232
  2691.  
  2692. 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  2693. 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 30913
  2694. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  2695.  
  2696. ;; QUESTION SECTION:
  2697. ;telef. IN A
  2698.  
  2699. ;; AUTHORITY SECTION:
  2700. . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  2701. tel. 3168 IN NSEC temasek. NS DS RRSIG NSEC
  2702. . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  2703.  
  2704. ;; ADDITIONAL SECTION:
  2705.  
  2706. ;; OPT PSEUDOSECTION:
  2707. ; EDNS: version 0; flags: do; udp: 1232
  2708.  
  2709. 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41203
  2710. 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 25742
  2711. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2712.  
  2713. ;; QUESTION SECTION:
  2714. ;www.google.com. IN A
  2715.  
  2716. 2020/11/02 16:30:11 3419665#167 [debug] AutoHosts: answer: www.google.com -> []
  2717. 2020/11/02 16:30:11 3419665#167 [debug] DNS: Adding OPT record with DNSSEC flag
  2718. 2020/11/02 16:30:11 3419665#167 [debug] Serving response from general cache
  2719. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
  2720. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
  2721. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
  2722. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
  2723. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
  2724. 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
  2725. 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 25742
  2726. ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
  2727.  
  2728. ;; QUESTION SECTION:
  2729. ;www.google.com. IN A
  2730.  
  2731. ;; ANSWER SECTION:
  2732. www.google.com. 2 IN A 142.250.27.99
  2733. www.google.com. 2 IN A 142.250.27.103
  2734. www.google.com. 2 IN A 142.250.27.106
  2735. www.google.com. 2 IN A 142.250.27.147
  2736. www.google.com. 2 IN A 142.250.27.104
  2737. www.google.com. 2 IN A 142.250.27.105
  2738.  
  2739. ;; ADDITIONAL SECTION:
  2740.  
  2741. ;; OPT PSEUDOSECTION:
  2742. ; EDNS: version 0; flags: do; udp: 1232
  2743.  
  2744. 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47584
  2745. 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 25414
  2746. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2747.  
  2748. ;; QUESTION SECTION:
  2749. ;www.google.com. IN AAAA
  2750.  
  2751. 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47584
  2752. 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48452
  2753. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2754.  
  2755. ;; QUESTION SECTION:
  2756. ;www.google.com. IN A
  2757.  
  2758. 2020/11/02 16:30:11 3419665#169 [debug] AutoHosts: answer: www.google.com -> []
  2759. 2020/11/02 16:30:11 3419665#169 [debug] DNS: Adding OPT record with DNSSEC flag
  2760. 2020/11/02 16:30:11 3419665#168 [debug] AutoHosts: answer: www.google.com -> []
  2761. 2020/11/02 16:30:11 3419665#169 [debug] 127.0.0.1:5335: sending request AAAA www.google.com.
  2762. 2020/11/02 16:30:11 3419665#168 [debug] DNS: Adding OPT record with DNSSEC flag
  2763. 2020/11/02 16:30:11 3419665#168 [debug] Serving response from general cache
  2764. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
  2765. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
  2766. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
  2767. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
  2768. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
  2769. 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
  2770. 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48452
  2771. ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
  2772.  
  2773. ;; QUESTION SECTION:
  2774. ;www.google.com. IN A
  2775.  
  2776. ;; ANSWER SECTION:
  2777. www.google.com. 2 IN A 142.250.27.99
  2778. www.google.com. 2 IN A 142.250.27.103
  2779. www.google.com. 2 IN A 142.250.27.106
  2780. www.google.com. 2 IN A 142.250.27.147
  2781. www.google.com. 2 IN A 142.250.27.104
  2782. www.google.com. 2 IN A 142.250.27.105
  2783.  
  2784. ;; ADDITIONAL SECTION:
  2785.  
  2786. ;; OPT PSEUDOSECTION:
  2787. ; EDNS: version 0; flags: do; udp: 1232
  2788.  
  2789. 2020/11/02 16:30:11 3419665#169 [debug] 127.0.0.1:5335: response: ok
  2790. 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.google.com. IN AAAA. Elapsed 16 ms.
  2791. 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 16 ms
  2792. 2020/11/02 16:30:11 3419665#169 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80b::2004) for www.google.com.
  2793. 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 25414
  2794. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  2795.  
  2796. ;; QUESTION SECTION:
  2797. ;www.google.com. IN AAAA
  2798.  
  2799. ;; ANSWER SECTION:
  2800. www.google.com. 300 IN AAAA 2a00:1450:400e:80b::2004
  2801.  
  2802. ;; ADDITIONAL SECTION:
  2803.  
  2804. ;; OPT PSEUDOSECTION:
  2805. ; EDNS: version 0; flags: do; udp: 1232
  2806.  
  2807. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52883
  2808. 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52883
  2809. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 19617
  2810. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2811.  
  2812. ;; QUESTION SECTION:
  2813. ;telegraaf.nl. IN AAAA
  2814.  
  2815. 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13738
  2816. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2817.  
  2818. ;; QUESTION SECTION:
  2819. ;telegraaf.nl. IN A
  2820.  
  2821. 2020/11/02 16:30:11 3419665#158 [debug] AutoHosts: answer: telegraaf.nl -> []
  2822. 2020/11/02 16:30:11 3419665#159 [debug] AutoHosts: answer: telegraaf.nl -> []
  2823. 2020/11/02 16:30:11 3419665#158 [debug] DNS: Adding OPT record with DNSSEC flag
  2824. 2020/11/02 16:30:11 3419665#158 [debug] 127.0.0.1:5335: sending request A telegraaf.nl.
  2825. 2020/11/02 16:30:11 3419665#159 [debug] DNS: Adding OPT record with DNSSEC flag
  2826. 2020/11/02 16:30:11 3419665#159 [debug] 127.0.0.1:5335: sending request AAAA telegraaf.nl.
  2827. 2020/11/02 16:30:11 3419665#159 [debug] 127.0.0.1:5335: response: ok
  2828. 2020/11/02 16:30:11 3419665#158 [debug] 127.0.0.1:5335: response: ok
  2829. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telegraaf.nl. IN AAAA. Elapsed 43 ms.
  2830. 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telegraaf.nl. IN A. Elapsed 43 ms.
  2831. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 43 ms
  2832. 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 43 ms
  2833. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): telegraaf.nl.: refusing to cache a NOERROR response with no answers
  2834. 2020/11/02 16:30:11 3419665#158 [debug] DNSFwd: Checking record A (83.96.244.140) for telegraaf.nl.
  2835. 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 19617
  2836. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  2837.  
  2838. ;; QUESTION SECTION:
  2839. ;telegraaf.nl. IN AAAA
  2840.  
  2841. ;; AUTHORITY SECTION:
  2842. telegraaf.nl. 3600 IN SOA donna.ns.cloudflare.com. dns.cloudflare.com. 2035566889 10000 2400 604800 3600
  2843.  
  2844. ;; ADDITIONAL SECTION:
  2845.  
  2846. ;; OPT PSEUDOSECTION:
  2847. ; EDNS: version 0; flags: do; udp: 1232
  2848.  
  2849. 2020/11/02 16:30:11 3419665#158 [debug] DNSFwd: Checking record A (83.96.244.141) for telegraaf.nl.
  2850. 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13738
  2851. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  2852.  
  2853. ;; QUESTION SECTION:
  2854. ;telegraaf.nl. IN A
  2855.  
  2856. ;; ANSWER SECTION:
  2857. telegraaf.nl. 300 IN A 83.96.244.140
  2858. telegraaf.nl. 300 IN A 83.96.244.141
  2859.  
  2860. ;; ADDITIONAL SECTION:
  2861.  
  2862. ;; OPT PSEUDOSECTION:
  2863. ; EDNS: version 0; flags: do; udp: 1232
  2864.  
  2865. 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
  2866. 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
  2867. 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2743
  2868. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2869.  
  2870. ;; QUESTION SECTION:
  2871. ;csm.cxpublic.com. IN A
  2872.  
  2873. 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1449
  2874. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2875.  
  2876. ;; QUESTION SECTION:
  2877. ;csm.cxpublic.com. IN AAAA
  2878.  
  2879. 2020/11/02 16:30:11 3419665#123 [debug] AutoHosts: answer: csm.cxpublic.com -> []
  2880. 2020/11/02 16:30:11 3419665#124 [debug] AutoHosts: answer: csm.cxpublic.com -> []
  2881. 2020/11/02 16:30:11 3419665#123 [debug] Filtering: found rule for host 'csm.cxpublic.com': '||cxpublic.com^' list_id: 1604323042
  2882. 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host csm.cxpublic.com is filtered, reason - 'FilteredBlackList', matched rule: '||cxpublic.com^'
  2883. 2020/11/02 16:30:11 3419665#124 [debug] Filtering: found rule for host 'csm.cxpublic.com': '||cxpublic.com^' list_id: 1604323042
  2884. 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 2743
  2885. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2886.  
  2887. ;; QUESTION SECTION:
  2888. ;csm.cxpublic.com. IN A
  2889.  
  2890. ;; ANSWER SECTION:
  2891. csm.cxpublic.com. 10 IN A 0.0.0.0
  2892.  
  2893. 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host csm.cxpublic.com is filtered, reason - 'FilteredBlackList', matched rule: '||cxpublic.com^'
  2894. 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 1449
  2895. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2896.  
  2897. ;; QUESTION SECTION:
  2898. ;csm.cxpublic.com. IN AAAA
  2899.  
  2900. ;; ANSWER SECTION:
  2901. csm.cxpublic.com. 10 IN AAAA ::
  2902.  
  2903. 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  2904. 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
  2905. 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
  2906. 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  2907. 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 38425
  2908. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2909.  
  2910. ;; QUESTION SECTION:
  2911. ;cdn.krxd.net. IN A
  2912.  
  2913. 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 26909
  2914. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2915.  
  2916. ;; QUESTION SECTION:
  2917. ;cdn.krxd.net. IN AAAA
  2918.  
  2919. 2020/11/02 16:30:11 3419665#125 [debug] AutoHosts: answer: cdn.krxd.net -> []
  2920. 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
  2921. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2922.  
  2923. ;; QUESTION SECTION:
  2924. ;sat.public.bd.313.nl. IN A
  2925.  
  2926. 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
  2927. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2928.  
  2929. ;; QUESTION SECTION:
  2930. ;sat.public.bd.313.nl. IN AAAA
  2931.  
  2932. 2020/11/02 16:30:11 3419665#127 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
  2933. 2020/11/02 16:30:11 3419665#126 [debug] AutoHosts: answer: cdn.krxd.net -> []
  2934. 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
  2935. 2020/11/02 16:30:11 3419665#127 [debug] DNS: Adding OPT record with DNSSEC flag
  2936. 2020/11/02 16:30:11 3419665#127 [debug] 127.0.0.1:5335: sending request A sat.public.bd.313.nl.
  2937. 2020/11/02 16:30:11 3419665#125 [debug] Filtering: found rule for host 'cdn.krxd.net': '||cdn.krxd.net^' list_id: 1604323042
  2938. 2020/11/02 16:30:11 3419665#126 [debug] Filtering: found rule for host 'cdn.krxd.net': '||cdn.krxd.net^' list_id: 1604323042
  2939. 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host cdn.krxd.net is filtered, reason - 'FilteredBlackList', matched rule: '||cdn.krxd.net^'
  2940. 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host cdn.krxd.net is filtered, reason - 'FilteredBlackList', matched rule: '||cdn.krxd.net^'
  2941. 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 38425
  2942. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2943.  
  2944. ;; QUESTION SECTION:
  2945. ;cdn.krxd.net. IN A
  2946.  
  2947. ;; ANSWER SECTION:
  2948. cdn.krxd.net. 10 IN A 0.0.0.0
  2949.  
  2950. 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 26909
  2951. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  2952.  
  2953. ;; QUESTION SECTION:
  2954. ;cdn.krxd.net. IN AAAA
  2955.  
  2956. ;; ANSWER SECTION:
  2957. cdn.krxd.net. 10 IN AAAA ::
  2958.  
  2959. 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
  2960. 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
  2961. 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57071
  2962. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2963.  
  2964. ;; QUESTION SECTION:
  2965. ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
  2966.  
  2967. 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62595
  2968. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2969.  
  2970. ;; QUESTION SECTION:
  2971. ;scdn.cxense.com. IN A
  2972.  
  2973. 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
  2974. 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
  2975. 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
  2976. 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
  2977. 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 133
  2978. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2979.  
  2980. ;; QUESTION SECTION:
  2981. ;scdn.cxense.com. IN AAAA
  2982.  
  2983. 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6893
  2984. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2985.  
  2986. ;; QUESTION SECTION:
  2987. ;d20kyoxkb5vbjm.cloudfront.net. IN A
  2988.  
  2989. 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
  2990. 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
  2991. 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
  2992. 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
  2993. 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35016
  2994. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  2995.  
  2996. ;; QUESTION SECTION:
  2997. ;www.telegraaf.nl. IN AAAA
  2998.  
  2999. 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3778
  3000. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3001.  
  3002. ;; QUESTION SECTION:
  3003. ;www.telegraaf.nl. IN A
  3004.  
  3005. 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:53629 based on IP only
  3006. 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:53629 based on IP only
  3007. 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
  3008. 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31472
  3009. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3010.  
  3011. ;; QUESTION SECTION:
  3012. ;beak.bd.313.nl. IN AAAA
  3013.  
  3014. 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
  3015. 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
  3016. 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35059
  3017. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3018.  
  3019. ;; QUESTION SECTION:
  3020. ;beak.bd.313.nl. IN A
  3021.  
  3022. 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
  3023. 2020/11/02 16:30:11 3419665#127 [debug] 127.0.0.1:5335: response: ok
  3024. 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sat.public.bd.313.nl. IN A. Elapsed 31 ms.
  3025. 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 31 ms
  3026. 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (52.51.30.134) for sat.public.bd.313.nl.
  3027. 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (54.72.70.5) for sat.public.bd.313.nl.
  3028. 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (18.203.10.86) for sat.public.bd.313.nl.
  3029. 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 31981
  3030. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  3031.  
  3032. ;; QUESTION SECTION:
  3033. ;sat.public.bd.313.nl. IN A
  3034.  
  3035. ;; ANSWER SECTION:
  3036. sat.public.bd.313.nl. 300 IN A 52.51.30.134
  3037. sat.public.bd.313.nl. 300 IN A 54.72.70.5
  3038. sat.public.bd.313.nl. 300 IN A 18.203.10.86
  3039.  
  3040. ;; ADDITIONAL SECTION:
  3041.  
  3042. ;; OPT PSEUDOSECTION:
  3043. ; EDNS: version 0; flags: do; udp: 1232
  3044.  
  3045. 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
  3046. 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
  3047. 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15909
  3048. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3049.  
  3050. ;; QUESTION SECTION:
  3051. ;w.usabilla.com. IN AAAA
  3052.  
  3053. 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
  3054. 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29990
  3055. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3056.  
  3057. ;; QUESTION SECTION:
  3058. ;w.usabilla.com. IN A
  3059.  
  3060. 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
  3061. 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  3062. 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
  3063. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3064.  
  3065. ;; QUESTION SECTION:
  3066. ;sat.public.bd.313.nl. IN A
  3067.  
  3068. 2020/11/02 16:30:16 3419665#38 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
  3069. 2020/11/02 16:30:16 3419665#38 [debug] DNS: Adding OPT record with DNSSEC flag
  3070. 2020/11/02 16:30:16 3419665#38 [debug] Serving response from general cache
  3071. 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (52.51.30.134) for sat.public.bd.313.nl.
  3072. 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (54.72.70.5) for sat.public.bd.313.nl.
  3073. 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (18.203.10.86) for sat.public.bd.313.nl.
  3074. 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 31981
  3075. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  3076.  
  3077. ;; QUESTION SECTION:
  3078. ;sat.public.bd.313.nl. IN A
  3079.  
  3080. ;; ANSWER SECTION:
  3081. sat.public.bd.313.nl. 295 IN A 52.51.30.134
  3082. sat.public.bd.313.nl. 295 IN A 54.72.70.5
  3083. sat.public.bd.313.nl. 295 IN A 18.203.10.86
  3084.  
  3085. ;; ADDITIONAL SECTION:
  3086.  
  3087. ;; OPT PSEUDOSECTION:
  3088. ; EDNS: version 0; flags: do; udp: 1232
  3089.  
  3090. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
  3091. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
  3092. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3093.  
  3094. ;; QUESTION SECTION:
  3095. ;sat.public.bd.313.nl. IN AAAA
  3096.  
  3097. 2020/11/02 16:30:16 3419665#39 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
  3098. 2020/11/02 16:30:16 3419665#39 [debug] DNS: Adding OPT record with DNSSEC flag
  3099. 2020/11/02 16:30:16 3419665#39 [debug] 127.0.0.1:5335: sending request AAAA sat.public.bd.313.nl.
  3100. 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46892
  3101. 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42750
  3102. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3103.  
  3104. ;; QUESTION SECTION:
  3105. ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A
  3106.  
  3107. 2020/11/02 16:30:16 3419665#40 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net.obelix -> []
  3108. 2020/11/02 16:30:16 3419665#40 [debug] DNS: Adding OPT record with DNSSEC flag
  3109. 2020/11/02 16:30:16 3419665#40 [debug] 127.0.0.1:5335: sending request A d20kyoxkb5vbjm.cloudfront.net.Obelix.
  3110. 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55260
  3111. 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55260
  3112. 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 19574
  3113. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3114.  
  3115. ;; QUESTION SECTION:
  3116. ;scdn.cxense.com.Obelix. IN A
  3117.  
  3118. 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65390
  3119. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3120.  
  3121. ;; QUESTION SECTION:
  3122. ;scdn.cxense.com.Obelix. IN AAAA
  3123.  
  3124. 2020/11/02 16:30:16 3419665#41 [debug] AutoHosts: answer: scdn.cxense.com.obelix -> []
  3125. 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46892
  3126. 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61939
  3127. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3128.  
  3129. ;; QUESTION SECTION:
  3130. ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA
  3131.  
  3132. 2020/11/02 16:30:16 3419665#40 [debug] 127.0.0.1:5335: response: ok
  3133. 2020/11/02 16:30:16 3419665#42 [debug] AutoHosts: answer: scdn.cxense.com.obelix -> []
  3134. 2020/11/02 16:30:16 3419665#41 [debug] DNS: Adding OPT record with DNSSEC flag
  3135. 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A. Elapsed 0 ms.
  3136. 2020/11/02 16:30:16 3419665#43 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net.obelix -> []
  3137. 2020/11/02 16:30:16 3419665#42 [debug] DNS: Adding OPT record with DNSSEC flag
  3138. 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  3139. 2020/11/02 16:30:16 3419665#41 [debug] 127.0.0.1:5335: sending request A scdn.cxense.com.Obelix.
  3140. 2020/11/02 16:30:16 3419665#42 [debug] 127.0.0.1:5335: sending request AAAA scdn.cxense.com.Obelix.
  3141. 2020/11/02 16:30:16 3419665#43 [debug] DNS: Adding OPT record with DNSSEC flag
  3142. 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3143. 2020/11/02 16:30:16 3419665#43 [debug] 127.0.0.1:5335: sending request AAAA d20kyoxkb5vbjm.cloudfront.net.Obelix.
  3144. 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3145. 2020/11/02 16:30:16 3419665#41 [debug] 127.0.0.1:5335: response: ok
  3146. 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;scdn.cxense.com.Obelix. IN A. Elapsed 0 ms.
  3147. 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3148. 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  3149. 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3150. 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 42750
  3151. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3152.  
  3153. ;; QUESTION SECTION:
  3154. ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A
  3155.  
  3156. ;; AUTHORITY SECTION:
  3157. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3158. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3159. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3160.  
  3161. ;; ADDITIONAL SECTION:
  3162.  
  3163. ;; OPT PSEUDOSECTION:
  3164. ; EDNS: version 0; flags: do; udp: 1232
  3165.  
  3166. 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3167. 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3168. 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 19574
  3169. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3170.  
  3171. ;; QUESTION SECTION:
  3172. ;scdn.cxense.com.Obelix. IN A
  3173.  
  3174. ;; AUTHORITY SECTION:
  3175. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3176. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3177. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3178.  
  3179. ;; ADDITIONAL SECTION:
  3180.  
  3181. ;; OPT PSEUDOSECTION:
  3182. ; EDNS: version 0; flags: do; udp: 1232
  3183.  
  3184. 2020/11/02 16:30:16 3419665#43 [debug] 127.0.0.1:5335: response: ok
  3185. 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA. Elapsed 0 ms.
  3186. 2020/11/02 16:30:16 3419665#42 [debug] 127.0.0.1:5335: response: ok
  3187. 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  3188. 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;scdn.cxense.com.Obelix. IN AAAA. Elapsed 1 ms.
  3189. 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3190. 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  3191. 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3192. 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3193. 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3194. 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3195. 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 61939
  3196. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3197.  
  3198. ;; QUESTION SECTION:
  3199. ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA
  3200.  
  3201. ;; AUTHORITY SECTION:
  3202. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3203. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3204. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3205.  
  3206. ;; ADDITIONAL SECTION:
  3207.  
  3208. ;; OPT PSEUDOSECTION:
  3209. ; EDNS: version 0; flags: do; udp: 1232
  3210.  
  3211. 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3212. 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 65390
  3213. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3214.  
  3215. ;; QUESTION SECTION:
  3216. ;scdn.cxense.com.Obelix. IN AAAA
  3217.  
  3218. ;; AUTHORITY SECTION:
  3219. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3220. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3221. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3222.  
  3223. ;; ADDITIONAL SECTION:
  3224.  
  3225. ;; OPT PSEUDOSECTION:
  3226. ; EDNS: version 0; flags: do; udp: 1232
  3227.  
  3228. 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50366
  3229. 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36569
  3230. 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35291
  3231. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3232.  
  3233. ;; QUESTION SECTION:
  3234. ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
  3235.  
  3236. 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 54589
  3237. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3238.  
  3239. ;; QUESTION SECTION:
  3240. ;scdn.cxense.com. IN AAAA
  3241.  
  3242. 2020/11/02 16:30:16 3419665#45 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net -> []
  3243. 2020/11/02 16:30:16 3419665#186 [debug] AutoHosts: answer: scdn.cxense.com -> []
  3244. 2020/11/02 16:30:16 3419665#45 [debug] DNS: Adding OPT record with DNSSEC flag
  3245. 2020/11/02 16:30:16 3419665#45 [debug] 127.0.0.1:5335: sending request AAAA d20kyoxkb5vbjm.cloudfront.net.
  3246. 2020/11/02 16:30:16 3419665#186 [debug] Filtering: found rule for host 'scdn.cxense.com': '||scdn.cxense.com^' list_id: 1604323042
  3247. 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host scdn.cxense.com is filtered, reason - 'FilteredBlackList', matched rule: '||scdn.cxense.com^'
  3248. 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36569
  3249. 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62522
  3250. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3251.  
  3252. ;; QUESTION SECTION:
  3253. ;scdn.cxense.com. IN A
  3254.  
  3255. 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 54589
  3256. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3257.  
  3258. ;; QUESTION SECTION:
  3259. ;scdn.cxense.com. IN AAAA
  3260.  
  3261. ;; ANSWER SECTION:
  3262. scdn.cxense.com. 10 IN AAAA ::
  3263.  
  3264. 2020/11/02 16:30:16 3419665#185 [debug] AutoHosts: answer: scdn.cxense.com -> []
  3265. 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43785
  3266. 2020/11/02 16:30:16 3419665#185 [debug] Filtering: found rule for host 'scdn.cxense.com': '||scdn.cxense.com^' list_id: 1604323042
  3267. 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 5888
  3268. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3269.  
  3270. ;; QUESTION SECTION:
  3271. ;beak.bd.313.nl.Obelix. IN AAAA
  3272.  
  3273. 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host scdn.cxense.com is filtered, reason - 'FilteredBlackList', matched rule: '||scdn.cxense.com^'
  3274. 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62522
  3275. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3276.  
  3277. ;; QUESTION SECTION:
  3278. ;scdn.cxense.com. IN A
  3279.  
  3280. ;; ANSWER SECTION:
  3281. scdn.cxense.com. 10 IN A 0.0.0.0
  3282.  
  3283. 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43785
  3284. 2020/11/02 16:30:16 3419665#188 [debug] AutoHosts: answer: beak.bd.313.nl.obelix -> []
  3285. 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 37404
  3286. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3287.  
  3288. ;; QUESTION SECTION:
  3289. ;beak.bd.313.nl.Obelix. IN A
  3290.  
  3291. 2020/11/02 16:30:16 3419665#187 [debug] AutoHosts: answer: beak.bd.313.nl.obelix -> []
  3292. 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50366
  3293. 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
  3294. 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 32231
  3295. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3296.  
  3297. ;; QUESTION SECTION:
  3298. ;d20kyoxkb5vbjm.cloudfront.net. IN A
  3299.  
  3300. 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3778
  3301. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3302.  
  3303. ;; QUESTION SECTION:
  3304. ;www.telegraaf.nl. IN A
  3305.  
  3306. 2020/11/02 16:30:16 3419665#44 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net -> []
  3307. 2020/11/02 16:30:16 3419665#160 [debug] AutoHosts: answer: www.telegraaf.nl -> []
  3308. 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
  3309. 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35016
  3310. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3311.  
  3312. ;; QUESTION SECTION:
  3313. ;www.telegraaf.nl. IN AAAA
  3314.  
  3315. 2020/11/02 16:30:16 3419665#193 [debug] AutoHosts: answer: www.telegraaf.nl -> []
  3316. 2020/11/02 16:30:16 3419665#44 [debug] DNS: Adding OPT record with DNSSEC flag
  3317. 2020/11/02 16:30:16 3419665#193 [debug] DNS: Adding OPT record with DNSSEC flag
  3318. 2020/11/02 16:30:16 3419665#44 [debug] 127.0.0.1:5335: sending request A d20kyoxkb5vbjm.cloudfront.net.
  3319. 2020/11/02 16:30:16 3419665#193 [debug] 127.0.0.1:5335: sending request AAAA www.telegraaf.nl.
  3320. 2020/11/02 16:30:16 3419665#187 [debug] DNS: Adding OPT record with DNSSEC flag
  3321. 2020/11/02 16:30:16 3419665#188 [debug] DNS: Adding OPT record with DNSSEC flag
  3322. 2020/11/02 16:30:16 3419665#187 [debug] 127.0.0.1:5335: sending request A beak.bd.313.nl.Obelix.
  3323. 2020/11/02 16:30:16 3419665#160 [debug] DNS: Adding OPT record with DNSSEC flag
  3324. 2020/11/02 16:30:16 3419665#188 [debug] 127.0.0.1:5335: sending request AAAA beak.bd.313.nl.Obelix.
  3325. 2020/11/02 16:30:16 3419665#160 [debug] 127.0.0.1:5335: sending request A www.telegraaf.nl.
  3326. 2020/11/02 16:30:16 3419665#187 [debug] 127.0.0.1:5335: response: ok
  3327. 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;beak.bd.313.nl.Obelix. IN A. Elapsed 1 ms.
  3328. 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  3329. 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3330. 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3331. 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3332. 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 37404
  3333. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3334.  
  3335. ;; QUESTION SECTION:
  3336. ;beak.bd.313.nl.Obelix. IN A
  3337.  
  3338. ;; AUTHORITY SECTION:
  3339. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3340. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3341. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3342.  
  3343. ;; ADDITIONAL SECTION:
  3344.  
  3345. ;; OPT PSEUDOSECTION:
  3346. ; EDNS: version 0; flags: do; udp: 1232
  3347.  
  3348. 2020/11/02 16:30:16 3419665#188 [debug] 127.0.0.1:5335: response: ok
  3349. 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;beak.bd.313.nl.Obelix. IN AAAA. Elapsed 1 ms.
  3350. 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  3351. 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3352. 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3353. 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3354. 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 5888
  3355. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3356.  
  3357. ;; QUESTION SECTION:
  3358. ;beak.bd.313.nl.Obelix. IN AAAA
  3359.  
  3360. ;; AUTHORITY SECTION:
  3361. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3362. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3363. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3364.  
  3365. ;; ADDITIONAL SECTION:
  3366.  
  3367. ;; OPT PSEUDOSECTION:
  3368. ; EDNS: version 0; flags: do; udp: 1232
  3369.  
  3370. 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36136
  3371. 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36136
  3372. 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61745
  3373. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3374.  
  3375. ;; QUESTION SECTION:
  3376. ;beak.bd.313.nl. IN AAAA
  3377.  
  3378. 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48956
  3379. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3380.  
  3381. ;; QUESTION SECTION:
  3382. ;beak.bd.313.nl. IN A
  3383.  
  3384. 2020/11/02 16:30:16 3419665#171 [debug] AutoHosts: answer: beak.bd.313.nl -> []
  3385. 2020/11/02 16:30:16 3419665#170 [debug] AutoHosts: answer: beak.bd.313.nl -> []
  3386. 2020/11/02 16:30:16 3419665#171 [debug] Filtering: found rule for host 'beak.bd.313.nl': '||beak.bd.313.nl^' list_id: 1
  3387. 2020/11/02 16:30:16 3419665#170 [debug] Filtering: found rule for host 'beak.bd.313.nl': '||beak.bd.313.nl^' list_id: 1
  3388. 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host beak.bd.313.nl is filtered, reason - 'FilteredBlackList', matched rule: '||beak.bd.313.nl^'
  3389. 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host beak.bd.313.nl is filtered, reason - 'FilteredBlackList', matched rule: '||beak.bd.313.nl^'
  3390. 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61745
  3391. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3392.  
  3393. ;; QUESTION SECTION:
  3394. ;beak.bd.313.nl. IN AAAA
  3395.  
  3396. ;; ANSWER SECTION:
  3397. beak.bd.313.nl. 10 IN AAAA ::
  3398.  
  3399. 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48956
  3400. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3401.  
  3402. ;; QUESTION SECTION:
  3403. ;beak.bd.313.nl. IN A
  3404.  
  3405. ;; ANSWER SECTION:
  3406. beak.bd.313.nl. 10 IN A 0.0.0.0
  3407.  
  3408. 2020/11/02 16:30:16 3419665#39 [debug] 127.0.0.1:5335: response: ok
  3409. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sat.public.bd.313.nl. IN AAAA. Elapsed 16 ms.
  3410. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 16 ms
  3411. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): sat.public.bd.313.nl.: refusing to cache a NOERROR response with no answers
  3412. 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 46994
  3413. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  3414.  
  3415. ;; QUESTION SECTION:
  3416. ;sat.public.bd.313.nl. IN AAAA
  3417.  
  3418. ;; AUTHORITY SECTION:
  3419. public.bd.313.nl. 900 IN SOA ns-1877.awsdns-42.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
  3420.  
  3421. ;; ADDITIONAL SECTION:
  3422.  
  3423. ;; OPT PSEUDOSECTION:
  3424. ; EDNS: version 0; flags: do; udp: 1232
  3425.  
  3426. 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51370
  3427. 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51370
  3428. 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11124
  3429. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3430.  
  3431. ;; QUESTION SECTION:
  3432. ;w.usabilla.com.Obelix. IN A
  3433.  
  3434. 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7538
  3435. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3436.  
  3437. ;; QUESTION SECTION:
  3438. ;w.usabilla.com.Obelix. IN AAAA
  3439.  
  3440. 2020/11/02 16:30:16 3419665#189 [debug] AutoHosts: answer: w.usabilla.com.obelix -> []
  3441. 2020/11/02 16:30:16 3419665#189 [debug] DNS: Adding OPT record with DNSSEC flag
  3442. 2020/11/02 16:30:16 3419665#189 [debug] 127.0.0.1:5335: sending request A w.usabilla.com.Obelix.
  3443. 2020/11/02 16:30:16 3419665#190 [debug] AutoHosts: answer: w.usabilla.com.obelix -> []
  3444. 2020/11/02 16:30:16 3419665#160 [debug] 127.0.0.1:5335: response: ok
  3445. 2020/11/02 16:30:16 3419665#190 [debug] DNS: Adding OPT record with DNSSEC flag
  3446. 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.telegraaf.nl. IN A. Elapsed 25 ms.
  3447. 2020/11/02 16:30:16 3419665#190 [debug] 127.0.0.1:5335: sending request AAAA w.usabilla.com.Obelix.
  3448. 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 25 ms
  3449. 2020/11/02 16:30:16 3419665#160 [debug] DNSFwd: Checking record A (104.18.20.245) for www.telegraaf.nl.
  3450. 2020/11/02 16:30:16 3419665#160 [debug] DNSFwd: Checking record A (104.18.21.245) for www.telegraaf.nl.
  3451. 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 3778
  3452. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  3453.  
  3454. ;; QUESTION SECTION:
  3455. ;www.telegraaf.nl. IN A
  3456.  
  3457. ;; ANSWER SECTION:
  3458. www.telegraaf.nl. 300 IN A 104.18.20.245
  3459. www.telegraaf.nl. 300 IN A 104.18.21.245
  3460.  
  3461. ;; ADDITIONAL SECTION:
  3462.  
  3463. ;; OPT PSEUDOSECTION:
  3464. ; EDNS: version 0; flags: do; udp: 1232
  3465.  
  3466. 2020/11/02 16:30:16 3419665#189 [debug] 127.0.0.1:5335: response: ok
  3467. 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;w.usabilla.com.Obelix. IN A. Elapsed 0 ms.
  3468. 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  3469. 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3470. 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3471. 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3472. 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11124
  3473. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3474.  
  3475. ;; QUESTION SECTION:
  3476. ;w.usabilla.com.Obelix. IN A
  3477.  
  3478. ;; AUTHORITY SECTION:
  3479. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3480. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3481. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3482.  
  3483. ;; ADDITIONAL SECTION:
  3484.  
  3485. ;; OPT PSEUDOSECTION:
  3486. ; EDNS: version 0; flags: do; udp: 1232
  3487.  
  3488. 2020/11/02 16:30:16 3419665#193 [debug] 127.0.0.1:5335: response: ok
  3489. 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.telegraaf.nl. IN AAAA. Elapsed 26 ms.
  3490. 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 26 ms
  3491. 2020/11/02 16:30:16 3419665#193 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:14f5) for www.telegraaf.nl.
  3492. 2020/11/02 16:30:16 3419665#193 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:15f5) for www.telegraaf.nl.
  3493. 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 35016
  3494. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  3495.  
  3496. ;; QUESTION SECTION:
  3497. ;www.telegraaf.nl. IN AAAA
  3498.  
  3499. ;; ANSWER SECTION:
  3500. www.telegraaf.nl. 300 IN AAAA 2606:4700::6812:14f5
  3501. www.telegraaf.nl. 300 IN AAAA 2606:4700::6812:15f5
  3502.  
  3503. ;; ADDITIONAL SECTION:
  3504.  
  3505. ;; OPT PSEUDOSECTION:
  3506. ; EDNS: version 0; flags: do; udp: 1232
  3507.  
  3508. 2020/11/02 16:30:16 3419665#190 [debug] 127.0.0.1:5335: response: ok
  3509. 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;w.usabilla.com.Obelix. IN AAAA. Elapsed 1 ms.
  3510. 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  3511. 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
  3512. 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
  3513. 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
  3514. 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 7538
  3515. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
  3516.  
  3517. ;; QUESTION SECTION:
  3518. ;w.usabilla.com.Obelix. IN AAAA
  3519.  
  3520. ;; AUTHORITY SECTION:
  3521. . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
  3522. nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
  3523. . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
  3524.  
  3525. ;; ADDITIONAL SECTION:
  3526.  
  3527. ;; OPT PSEUDOSECTION:
  3528. ; EDNS: version 0; flags: do; udp: 1232
  3529.  
  3530. 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45709
  3531. 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46522
  3532. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3533.  
  3534. ;; QUESTION SECTION:
  3535. ;w.usabilla.com. IN AAAA
  3536.  
  3537. 2020/11/02 16:30:16 3419665#192 [debug] AutoHosts: answer: w.usabilla.com -> []
  3538. 2020/11/02 16:30:16 3419665#192 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
  3539. 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
  3540. 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 46522
  3541. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3542.  
  3543. ;; QUESTION SECTION:
  3544. ;w.usabilla.com. IN AAAA
  3545.  
  3546. ;; ANSWER SECTION:
  3547. w.usabilla.com. 10 IN AAAA ::
  3548.  
  3549. 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45709
  3550. 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 9406
  3551. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3552.  
  3553. ;; QUESTION SECTION:
  3554. ;w.usabilla.com. IN A
  3555.  
  3556. 2020/11/02 16:30:16 3419665#191 [debug] AutoHosts: answer: w.usabilla.com -> []
  3557. 2020/11/02 16:30:16 3419665#191 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
  3558. 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
  3559. 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 9406
  3560. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3561.  
  3562. ;; QUESTION SECTION:
  3563. ;w.usabilla.com. IN A
  3564.  
  3565. ;; ANSWER SECTION:
  3566. w.usabilla.com. 10 IN A 0.0.0.0
  3567.  
  3568. 2020/11/02 16:30:16 3419665#45 [debug] 127.0.0.1:5335: response: ok
  3569. 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA. Elapsed 31 ms.
  3570. 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 31 ms
  3571. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:8200:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3572. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:2a00:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3573. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:e400:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3574. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:4600:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3575. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:8000:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3576. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:f000:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3577. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:d200:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3578. 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:2600:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
  3579. 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 35291
  3580. ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
  3581.  
  3582. ;; QUESTION SECTION:
  3583. ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
  3584.  
  3585. ;; ANSWER SECTION:
  3586. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:8200:1e:7bbf:4c80:21
  3587. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:2a00:1e:7bbf:4c80:21
  3588. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:e400:1e:7bbf:4c80:21
  3589. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:4600:1e:7bbf:4c80:21
  3590. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:8000:1e:7bbf:4c80:21
  3591. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:f000:1e:7bbf:4c80:21
  3592. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:d200:1e:7bbf:4c80:21
  3593. d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:2600:1e:7bbf:4c80:21
  3594.  
  3595. ;; ADDITIONAL SECTION:
  3596.  
  3597. ;; OPT PSEUDOSECTION:
  3598. ; EDNS: version 0; flags: do; udp: 1232
  3599.  
  3600. 2020/11/02 16:30:16 3419665#44 [debug] 127.0.0.1:5335: response: ok
  3601. 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net. IN A. Elapsed 29 ms.
  3602. 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 29 ms
  3603. 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.13) for d20kyoxkb5vbjm.cloudfront.net.
  3604. 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.189) for d20kyoxkb5vbjm.cloudfront.net.
  3605. 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.52) for d20kyoxkb5vbjm.cloudfront.net.
  3606. 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.143) for d20kyoxkb5vbjm.cloudfront.net.
  3607. 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 32231
  3608. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  3609.  
  3610. ;; QUESTION SECTION:
  3611. ;d20kyoxkb5vbjm.cloudfront.net. IN A
  3612.  
  3613. ;; ANSWER SECTION:
  3614. d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.13
  3615. d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.189
  3616. d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.52
  3617. d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.143
  3618.  
  3619. ;; ADDITIONAL SECTION:
  3620.  
  3621. ;; OPT PSEUDOSECTION:
  3622. ; EDNS: version 0; flags: do; udp: 1232
  3623.  
  3624. 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
  3625. 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 20956
  3626. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3627.  
  3628. ;; QUESTION SECTION:
  3629. ;www.telegraaf.nl. IN A
  3630.  
  3631. 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:36769 based on IP only
  3632. 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
  3633. 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29657
  3634. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3635.  
  3636. ;; QUESTION SECTION:
  3637. ;www.telegraaf.nl. IN AAAA
  3638.  
  3639. 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:36769 based on IP only
  3640. 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
  3641. 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
  3642. 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29657
  3643. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3644.  
  3645. ;; QUESTION SECTION:
  3646. ;www.telegraaf.nl. IN AAAA
  3647.  
  3648. 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 20956
  3649. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3650.  
  3651. ;; QUESTION SECTION:
  3652. ;www.telegraaf.nl. IN A
  3653.  
  3654. 2020/11/02 16:30:22 3419665#197 [debug] AutoHosts: answer: www.telegraaf.nl -> []
  3655. 2020/11/02 16:30:22 3419665#196 [debug] AutoHosts: answer: www.telegraaf.nl -> []
  3656. 2020/11/02 16:30:22 3419665#197 [debug] DNS: Adding OPT record with DNSSEC flag
  3657. 2020/11/02 16:30:22 3419665#196 [debug] DNS: Adding OPT record with DNSSEC flag
  3658. 2020/11/02 16:30:22 3419665#197 [debug] Serving response from general cache
  3659. 2020/11/02 16:30:22 3419665#196 [debug] Serving response from general cache
  3660. 2020/11/02 16:30:22 3419665#197 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:14f5) for www.telegraaf.nl.
  3661. 2020/11/02 16:30:22 3419665#196 [debug] DNSFwd: Checking record A (104.18.20.245) for www.telegraaf.nl.
  3662. 2020/11/02 16:30:22 3419665#197 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:15f5) for www.telegraaf.nl.
  3663. 2020/11/02 16:30:22 3419665#196 [debug] DNSFwd: Checking record A (104.18.21.245) for www.telegraaf.nl.
  3664. 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 20956
  3665. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  3666.  
  3667. ;; QUESTION SECTION:
  3668. ;www.telegraaf.nl. IN A
  3669.  
  3670. ;; ANSWER SECTION:
  3671. www.telegraaf.nl. 294 IN A 104.18.20.245
  3672. www.telegraaf.nl. 294 IN A 104.18.21.245
  3673.  
  3674. ;; ADDITIONAL SECTION:
  3675.  
  3676. ;; OPT PSEUDOSECTION:
  3677. ; EDNS: version 0; flags: do; udp: 1232
  3678.  
  3679. 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 29657
  3680. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  3681.  
  3682. ;; QUESTION SECTION:
  3683. ;www.telegraaf.nl. IN AAAA
  3684.  
  3685. ;; ANSWER SECTION:
  3686. www.telegraaf.nl. 294 IN AAAA 2606:4700::6812:14f5
  3687. www.telegraaf.nl. 294 IN AAAA 2606:4700::6812:15f5
  3688.  
  3689. ;; ADDITIONAL SECTION:
  3690.  
  3691. ;; OPT PSEUDOSECTION:
  3692. ; EDNS: version 0; flags: do; udp: 1232
  3693.  
  3694. 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41193
  3695. 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 51647
  3696. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3697.  
  3698. ;; QUESTION SECTION:
  3699. ;sdk.privacy-center.org. IN AAAA
  3700.  
  3701. 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41193
  3702. 2020/11/02 16:30:22 3419665#173 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
  3703. 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61092
  3704. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3705.  
  3706. ;; QUESTION SECTION:
  3707. ;sdk.privacy-center.org. IN A
  3708.  
  3709. 2020/11/02 16:30:22 3419665#172 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
  3710. 2020/11/02 16:30:22 3419665#173 [debug] DNS: Adding OPT record with DNSSEC flag
  3711. 2020/11/02 16:30:22 3419665#173 [debug] 127.0.0.1:5335: sending request AAAA sdk.privacy-center.org.
  3712. 2020/11/02 16:30:22 3419665#172 [debug] DNS: Adding OPT record with DNSSEC flag
  3713. 2020/11/02 16:30:22 3419665#172 [debug] 127.0.0.1:5335: sending request A sdk.privacy-center.org.
  3714. 2020/11/02 16:30:22 3419665#172 [debug] 127.0.0.1:5335: response: ok
  3715. 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sdk.privacy-center.org. IN A. Elapsed 60 ms.
  3716. 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 60 ms
  3717. 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.69) for sdk.privacy-center.org.
  3718. 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.124) for sdk.privacy-center.org.
  3719. 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.18) for sdk.privacy-center.org.
  3720. 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.34) for sdk.privacy-center.org.
  3721. 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61092
  3722. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  3723.  
  3724. ;; QUESTION SECTION:
  3725. ;sdk.privacy-center.org. IN A
  3726.  
  3727. ;; ANSWER SECTION:
  3728. sdk.privacy-center.org. 300 IN A 13.249.11.69
  3729. sdk.privacy-center.org. 300 IN A 13.249.11.124
  3730. sdk.privacy-center.org. 300 IN A 13.249.11.18
  3731. sdk.privacy-center.org. 300 IN A 13.249.11.34
  3732.  
  3733. ;; ADDITIONAL SECTION:
  3734.  
  3735. ;; OPT PSEUDOSECTION:
  3736. ; EDNS: version 0; flags: do; udp: 1232
  3737.  
  3738. 2020/11/02 16:30:22 3419665#173 [debug] 127.0.0.1:5335: response: ok
  3739. 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sdk.privacy-center.org. IN AAAA. Elapsed 60 ms.
  3740. 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 60 ms
  3741. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:f400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3742. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:4e00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3743. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:7800:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3744. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3745. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:600:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3746. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:8000:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3747. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3748. 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3749. 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 51647
  3750. ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
  3751.  
  3752. ;; QUESTION SECTION:
  3753. ;sdk.privacy-center.org. IN AAAA
  3754.  
  3755. ;; ANSWER SECTION:
  3756. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:f400:5:b7cc:d3c0:93a1
  3757. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:4e00:5:b7cc:d3c0:93a1
  3758. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:7800:5:b7cc:d3c0:93a1
  3759. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3c00:5:b7cc:d3c0:93a1
  3760. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:600:5:b7cc:d3c0:93a1
  3761. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:8000:5:b7cc:d3c0:93a1
  3762. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:c00:5:b7cc:d3c0:93a1
  3763. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3400:5:b7cc:d3c0:93a1
  3764.  
  3765. ;; ADDITIONAL SECTION:
  3766.  
  3767. ;; OPT PSEUDOSECTION:
  3768. ; EDNS: version 0; flags: do; udp: 1232
  3769.  
  3770. 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38518
  3771. 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11641
  3772. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3773.  
  3774. ;; QUESTION SECTION:
  3775. ;sdk.privacy-center.org. IN A
  3776.  
  3777. 2020/11/02 16:30:22 3419665#174 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
  3778. 2020/11/02 16:30:22 3419665#174 [debug] DNS: Adding OPT record with DNSSEC flag
  3779. 2020/11/02 16:30:22 3419665#174 [debug] Serving response from general cache
  3780. 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.69) for sdk.privacy-center.org.
  3781. 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.124) for sdk.privacy-center.org.
  3782. 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.18) for sdk.privacy-center.org.
  3783. 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.34) for sdk.privacy-center.org.
  3784. 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 11641
  3785. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  3786.  
  3787. ;; QUESTION SECTION:
  3788. ;sdk.privacy-center.org. IN A
  3789.  
  3790. ;; ANSWER SECTION:
  3791. sdk.privacy-center.org. 300 IN A 13.249.11.69
  3792. sdk.privacy-center.org. 300 IN A 13.249.11.124
  3793. sdk.privacy-center.org. 300 IN A 13.249.11.18
  3794. sdk.privacy-center.org. 300 IN A 13.249.11.34
  3795.  
  3796. ;; ADDITIONAL SECTION:
  3797.  
  3798. ;; OPT PSEUDOSECTION:
  3799. ; EDNS: version 0; flags: do; udp: 1232
  3800.  
  3801. 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38518
  3802. 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39550
  3803. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3804.  
  3805. ;; QUESTION SECTION:
  3806. ;sdk.privacy-center.org. IN AAAA
  3807.  
  3808. 2020/11/02 16:30:22 3419665#209 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
  3809. 2020/11/02 16:30:22 3419665#209 [debug] DNS: Adding OPT record with DNSSEC flag
  3810. 2020/11/02 16:30:22 3419665#209 [debug] Serving response from general cache
  3811. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:f400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3812. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:4e00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3813. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:7800:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3814. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3815. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:600:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3816. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:8000:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3817. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3818. 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
  3819. 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 39550
  3820. ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
  3821.  
  3822. ;; QUESTION SECTION:
  3823. ;sdk.privacy-center.org. IN AAAA
  3824.  
  3825. ;; ANSWER SECTION:
  3826. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:f400:5:b7cc:d3c0:93a1
  3827. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:4e00:5:b7cc:d3c0:93a1
  3828. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:7800:5:b7cc:d3c0:93a1
  3829. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3c00:5:b7cc:d3c0:93a1
  3830. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:600:5:b7cc:d3c0:93a1
  3831. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:8000:5:b7cc:d3c0:93a1
  3832. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:c00:5:b7cc:d3c0:93a1
  3833. sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3400:5:b7cc:d3c0:93a1
  3834.  
  3835. ;; ADDITIONAL SECTION:
  3836.  
  3837. ;; OPT PSEUDOSECTION:
  3838. ; EDNS: version 0; flags: do; udp: 1232
  3839.  
  3840. 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49481
  3841. 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58331
  3842. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3843.  
  3844. ;; QUESTION SECTION:
  3845. ;cdnjs.cloudflare.com. IN A
  3846.  
  3847. 2020/11/02 16:30:22 3419665#175 [debug] AutoHosts: answer: cdnjs.cloudflare.com -> []
  3848. 2020/11/02 16:30:22 3419665#175 [debug] DNS: Adding OPT record with DNSSEC flag
  3849. 2020/11/02 16:30:22 3419665#175 [debug] 127.0.0.1:5335: sending request A cdnjs.cloudflare.com.
  3850. 2020/11/02 16:30:22 3419665#175 [debug] 127.0.0.1:5335: response: ok
  3851. 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdnjs.cloudflare.com. IN A. Elapsed 0 ms.
  3852. 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  3853. 2020/11/02 16:30:22 3419665#175 [debug] Removing RRSIG record from response: cdnjs.cloudflare.com. 30 IN RRSIG A 13 3 300 20201103161516 20201101141516 34505 cdnjs.cloudflare.com. mY4MMVCppYgU5Kui5t/eXmHZ04J9YImL22mgKXq2jIi28HOUN8b3qOLpZcOjFyhHjmHg+xfxj7Ra3n1qhXWR4g==
  3854. 2020/11/02 16:30:22 3419665#175 [debug] DNSFwd: Checking record A (104.16.19.94) for cdnjs.cloudflare.com.
  3855. 2020/11/02 16:30:22 3419665#175 [debug] DNSFwd: Checking record A (104.16.18.94) for cdnjs.cloudflare.com.
  3856. 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58331
  3857. ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  3858.  
  3859. ;; QUESTION SECTION:
  3860. ;cdnjs.cloudflare.com. IN A
  3861.  
  3862. ;; ANSWER SECTION:
  3863. cdnjs.cloudflare.com. 30 IN A 104.16.19.94
  3864. cdnjs.cloudflare.com. 30 IN A 104.16.18.94
  3865.  
  3866. ;; ADDITIONAL SECTION:
  3867.  
  3868. ;; OPT PSEUDOSECTION:
  3869. ; EDNS: version 0; flags: do; udp: 1232
  3870.  
  3871. 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42840
  3872. 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 34576
  3873. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3874.  
  3875. ;; QUESTION SECTION:
  3876. ;fonts.googleapis.com. IN A
  3877.  
  3878. 2020/11/02 16:30:22 3419665#176 [debug] AutoHosts: answer: fonts.googleapis.com -> []
  3879. 2020/11/02 16:30:22 3419665#176 [debug] DNS: Adding OPT record with DNSSEC flag
  3880. 2020/11/02 16:30:22 3419665#176 [debug] 127.0.0.1:5335: sending request A fonts.googleapis.com.
  3881. 2020/11/02 16:30:22 3419665#176 [debug] 127.0.0.1:5335: response: ok
  3882. 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fonts.googleapis.com. IN A. Elapsed 0 ms.
  3883. 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  3884. 2020/11/02 16:30:22 3419665#176 [debug] DNSFwd: Checking record A (216.58.207.42) for fonts.googleapis.com.
  3885. 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 34576
  3886. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  3887.  
  3888. ;; QUESTION SECTION:
  3889. ;fonts.googleapis.com. IN A
  3890.  
  3891. ;; ANSWER SECTION:
  3892. fonts.googleapis.com. 30 IN A 216.58.207.42
  3893.  
  3894. ;; ADDITIONAL SECTION:
  3895.  
  3896. ;; OPT PSEUDOSECTION:
  3897. ; EDNS: version 0; flags: do; udp: 1232
  3898.  
  3899. 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 10.6.0.3:10038
  3900. 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58463
  3901. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3902.  
  3903. ;; QUESTION SECTION:
  3904. ;googleads.g.doubleclick.net. IN A
  3905.  
  3906. 2020/11/02 16:30:22 3419665#210 [debug] AutoHosts: answer: googleads.g.doubleclick.net -> []
  3907. 2020/11/02 16:30:22 3419665#210 [debug] Filtering: found rule for host 'googleads.g.doubleclick.net': '||googleads.g.doubleclick.net^' list_id: 1604323042
  3908. 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host googleads.g.doubleclick.net is filtered, reason - 'FilteredBlackList', matched rule: '||googleads.g.doubleclick.net^'
  3909. 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58463
  3910. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3911.  
  3912. ;; QUESTION SECTION:
  3913. ;googleads.g.doubleclick.net. IN A
  3914.  
  3915. ;; ANSWER SECTION:
  3916. googleads.g.doubleclick.net. 10 IN A 0.0.0.0
  3917.  
  3918. 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45864
  3919. 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36885
  3920. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3921.  
  3922. ;; QUESTION SECTION:
  3923. ;api.privacy-center.org. IN AAAA
  3924.  
  3925. 2020/11/02 16:30:25 3419665#226 [debug] AutoHosts: answer: api.privacy-center.org -> []
  3926. 2020/11/02 16:30:25 3419665#226 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
  3927. 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
  3928. 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 36885
  3929. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3930.  
  3931. ;; QUESTION SECTION:
  3932. ;api.privacy-center.org. IN AAAA
  3933.  
  3934. ;; ANSWER SECTION:
  3935. api.privacy-center.org. 10 IN AAAA ::
  3936.  
  3937. 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45864
  3938. 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 22536
  3939. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3940.  
  3941. ;; QUESTION SECTION:
  3942. ;api.privacy-center.org. IN A
  3943.  
  3944. 2020/11/02 16:30:25 3419665#225 [debug] AutoHosts: answer: api.privacy-center.org -> []
  3945. 2020/11/02 16:30:25 3419665#225 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
  3946. 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
  3947. 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 22536
  3948. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3949.  
  3950. ;; QUESTION SECTION:
  3951. ;api.privacy-center.org. IN A
  3952.  
  3953. ;; ANSWER SECTION:
  3954. api.privacy-center.org. 10 IN A 0.0.0.0
  3955.  
  3956. 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52897
  3957. 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 51563
  3958. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3959.  
  3960. ;; QUESTION SECTION:
  3961. ;api.privacy-center.org. IN A
  3962.  
  3963. 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52897
  3964. 2020/11/02 16:30:25 3419665#46 [debug] AutoHosts: answer: api.privacy-center.org -> []
  3965. 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62054
  3966. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3967.  
  3968. ;; QUESTION SECTION:
  3969. ;api.privacy-center.org. IN AAAA
  3970.  
  3971. 2020/11/02 16:30:25 3419665#46 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
  3972. 2020/11/02 16:30:25 3419665#47 [debug] AutoHosts: answer: api.privacy-center.org -> []
  3973. 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
  3974. 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 51563
  3975. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3976.  
  3977. ;; QUESTION SECTION:
  3978. ;api.privacy-center.org. IN A
  3979.  
  3980. ;; ANSWER SECTION:
  3981. api.privacy-center.org. 10 IN A 0.0.0.0
  3982.  
  3983. 2020/11/02 16:30:25 3419665#47 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
  3984. 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
  3985. 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62054
  3986. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
  3987.  
  3988. ;; QUESTION SECTION:
  3989. ;api.privacy-center.org. IN AAAA
  3990.  
  3991. ;; ANSWER SECTION:
  3992. api.privacy-center.org. 10 IN AAAA ::
  3993.  
  3994. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41543
  3995. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48488
  3996. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  3997.  
  3998. ;; QUESTION SECTION:
  3999. ;mozilla.org. IN AAAA
  4000.  
  4001. 2020/11/02 16:30:25 3419665#241 [debug] AutoHosts: answer: mozilla.org -> []
  4002. 2020/11/02 16:30:25 3419665#241 [debug] DNS: Adding OPT record with DNSSEC flag
  4003. 2020/11/02 16:30:25 3419665#241 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
  4004. 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41543
  4005. 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7021
  4006. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4007.  
  4008. ;; QUESTION SECTION:
  4009. ;mozilla.org. IN A
  4010.  
  4011. 2020/11/02 16:30:25 3419665#48 [debug] AutoHosts: answer: mozilla.org -> []
  4012. 2020/11/02 16:30:25 3419665#48 [debug] DNS: Adding OPT record with DNSSEC flag
  4013. 2020/11/02 16:30:25 3419665#48 [debug] Serving response from general cache
  4014. 2020/11/02 16:30:25 3419665#48 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
  4015. 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7021
  4016. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  4017.  
  4018. ;; QUESTION SECTION:
  4019. ;mozilla.org. IN A
  4020.  
  4021. ;; ANSWER SECTION:
  4022. mozilla.org. 11 IN A 63.245.208.195
  4023.  
  4024. ;; ADDITIONAL SECTION:
  4025.  
  4026. ;; OPT PSEUDOSECTION:
  4027. ; EDNS: version 0; flags: do; udp: 1232
  4028.  
  4029. 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41190
  4030. 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24540
  4031. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4032.  
  4033. ;; QUESTION SECTION:
  4034. ;detectportal.firefox.com. IN AAAA
  4035.  
  4036. 2020/11/02 16:30:25 3419665#243 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  4037. 2020/11/02 16:30:25 3419665#243 [debug] DNS: Adding OPT record with DNSSEC flag
  4038. 2020/11/02 16:30:25 3419665#243 [debug] Serving response from general cache
  4039. 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  4040. 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  4041. 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking record AAAA (2600:1901:0:38d7::) for prod.detectportal.prod.cloudops.mozgcp.net.
  4042. 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24540
  4043. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  4044.  
  4045. ;; QUESTION SECTION:
  4046. ;detectportal.firefox.com. IN AAAA
  4047.  
  4048. ;; ANSWER SECTION:
  4049. detectportal.firefox.com. 11 IN CNAME detectportal.prod.mozaws.net.
  4050. detectportal.prod.mozaws.net. 11 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  4051. prod.detectportal.prod.cloudops.mozgcp.net. 11 IN AAAA 2600:1901:0:38d7::
  4052.  
  4053. ;; ADDITIONAL SECTION:
  4054.  
  4055. ;; OPT PSEUDOSECTION:
  4056. ; EDNS: version 0; flags: do; udp: 1232
  4057.  
  4058. 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41190
  4059. 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62497
  4060. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4061.  
  4062. ;; QUESTION SECTION:
  4063. ;detectportal.firefox.com. IN A
  4064.  
  4065. 2020/11/02 16:30:25 3419665#242 [debug] AutoHosts: answer: detectportal.firefox.com -> []
  4066. 2020/11/02 16:30:25 3419665#242 [debug] DNS: Adding OPT record with DNSSEC flag
  4067. 2020/11/02 16:30:25 3419665#242 [debug] Serving response from general cache
  4068. 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
  4069. 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
  4070. 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
  4071. 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62497
  4072. ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
  4073.  
  4074. ;; QUESTION SECTION:
  4075. ;detectportal.firefox.com. IN A
  4076.  
  4077. ;; ANSWER SECTION:
  4078. detectportal.firefox.com. 11 IN CNAME detectportal.prod.mozaws.net.
  4079. detectportal.prod.mozaws.net. 11 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
  4080. prod.detectportal.prod.cloudops.mozgcp.net. 11 IN A 34.107.221.82
  4081.  
  4082. ;; ADDITIONAL SECTION:
  4083.  
  4084. ;; OPT PSEUDOSECTION:
  4085. ; EDNS: version 0; flags: do; udp: 1232
  4086.  
  4087. 2020/11/02 16:30:25 3419665#241 [debug] 127.0.0.1:5335: response: ok
  4088. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
  4089. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4090. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
  4091. 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48488
  4092. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  4093.  
  4094. ;; QUESTION SECTION:
  4095. ;mozilla.org. IN AAAA
  4096.  
  4097. ;; AUTHORITY SECTION:
  4098. mozilla.org. 281 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
  4099.  
  4100. ;; ADDITIONAL SECTION:
  4101.  
  4102. ;; OPT PSEUDOSECTION:
  4103. ; EDNS: version 0; flags: do; udp: 1232
  4104.  
  4105. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37330
  4106. 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37330
  4107. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 56179
  4108. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4109.  
  4110. ;; QUESTION SECTION:
  4111. ;mozilla.org. IN AAAA
  4112.  
  4113. 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10609
  4114. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4115.  
  4116. ;; QUESTION SECTION:
  4117. ;mozilla.org. IN A
  4118.  
  4119. 2020/11/02 16:30:25 3419665#228 [debug] AutoHosts: answer: mozilla.org -> []
  4120. 2020/11/02 16:30:25 3419665#227 [debug] AutoHosts: answer: mozilla.org -> []
  4121. 2020/11/02 16:30:25 3419665#228 [debug] DNS: Adding OPT record with DNSSEC flag
  4122. 2020/11/02 16:30:25 3419665#227 [debug] DNS: Adding OPT record with DNSSEC flag
  4123. 2020/11/02 16:30:25 3419665#228 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
  4124. 2020/11/02 16:30:25 3419665#227 [debug] Serving response from general cache
  4125. 2020/11/02 16:30:25 3419665#227 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
  4126. 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 10609
  4127. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  4128.  
  4129. ;; QUESTION SECTION:
  4130. ;mozilla.org. IN A
  4131.  
  4132. ;; ANSWER SECTION:
  4133. mozilla.org. 11 IN A 63.245.208.195
  4134.  
  4135. ;; ADDITIONAL SECTION:
  4136.  
  4137. ;; OPT PSEUDOSECTION:
  4138. ; EDNS: version 0; flags: do; udp: 1232
  4139.  
  4140. 2020/11/02 16:30:25 3419665#228 [debug] 127.0.0.1:5335: response: ok
  4141. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
  4142. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4143. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
  4144. 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 56179
  4145. ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
  4146.  
  4147. ;; QUESTION SECTION:
  4148. ;mozilla.org. IN AAAA
  4149.  
  4150. ;; AUTHORITY SECTION:
  4151. mozilla.org. 281 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
  4152.  
  4153. ;; ADDITIONAL SECTION:
  4154.  
  4155. ;; OPT PSEUDOSECTION:
  4156. ; EDNS: version 0; flags: do; udp: 1232
  4157.  
  4158. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39668
  4159. 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39668
  4160. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2421
  4161. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4162.  
  4163. ;; QUESTION SECTION:
  4164. ;cd.tnet.nl. IN AAAA
  4165.  
  4166. 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57718
  4167. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4168.  
  4169. ;; QUESTION SECTION:
  4170. ;cd.tnet.nl. IN A
  4171.  
  4172. 2020/11/02 16:30:25 3419665#230 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4173. 2020/11/02 16:30:25 3419665#229 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4174. 2020/11/02 16:30:25 3419665#229 [debug] DNS: Adding OPT record with DNSSEC flag
  4175. 2020/11/02 16:30:25 3419665#229 [debug] 127.0.0.1:5335: sending request A cd.tnet.nl.
  4176. 2020/11/02 16:30:25 3419665#230 [debug] DNS: Adding OPT record with DNSSEC flag
  4177. 2020/11/02 16:30:25 3419665#230 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
  4178. 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37278
  4179. 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 47447
  4180. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4181.  
  4182. ;; QUESTION SECTION:
  4183. ;shared.mediahuis.be. IN A
  4184.  
  4185. 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37278
  4186. 2020/11/02 16:30:25 3419665#198 [debug] AutoHosts: answer: shared.mediahuis.be -> []
  4187. 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48986
  4188. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4189.  
  4190. ;; QUESTION SECTION:
  4191. ;shared.mediahuis.be. IN AAAA
  4192.  
  4193. 2020/11/02 16:30:25 3419665#199 [debug] AutoHosts: answer: shared.mediahuis.be -> []
  4194. 2020/11/02 16:30:25 3419665#198 [debug] DNS: Adding OPT record with DNSSEC flag
  4195. 2020/11/02 16:30:25 3419665#198 [debug] 127.0.0.1:5335: sending request A shared.mediahuis.be.
  4196. 2020/11/02 16:30:25 3419665#199 [debug] DNS: Adding OPT record with DNSSEC flag
  4197. 2020/11/02 16:30:25 3419665#199 [debug] 127.0.0.1:5335: sending request AAAA shared.mediahuis.be.
  4198. 2020/11/02 16:30:25 3419665#198 [debug] 127.0.0.1:5335: response: ok
  4199. 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;shared.mediahuis.be. IN A. Elapsed 143 ms.
  4200. 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 143 ms
  4201. 2020/11/02 16:30:25 3419665#198 [debug] DNSFwd: Checking record A (104.18.73.21) for shared.mediahuis.be.
  4202. 2020/11/02 16:30:25 3419665#198 [debug] DNSFwd: Checking record A (104.16.208.34) for shared.mediahuis.be.
  4203. 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 47447
  4204. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  4205.  
  4206. ;; QUESTION SECTION:
  4207. ;shared.mediahuis.be. IN A
  4208.  
  4209. ;; ANSWER SECTION:
  4210. shared.mediahuis.be. 300 IN A 104.18.73.21
  4211. shared.mediahuis.be. 300 IN A 104.16.208.34
  4212.  
  4213. ;; ADDITIONAL SECTION:
  4214.  
  4215. ;; OPT PSEUDOSECTION:
  4216. ; EDNS: version 0; flags: do; udp: 1232
  4217.  
  4218. 2020/11/02 16:30:25 3419665#230 [debug] 127.0.0.1:5335: response: ok
  4219. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 197 ms.
  4220. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 197 ms
  4221. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
  4222. 2020/11/02 16:30:25 3419665#230 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4223. 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 2421
  4224. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
  4225.  
  4226. ;; QUESTION SECTION:
  4227. ;cd.tnet.nl. IN AAAA
  4228.  
  4229. ;; ANSWER SECTION:
  4230. cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4231.  
  4232. ;; AUTHORITY SECTION:
  4233. tmgcloud.nl. 600 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
  4234.  
  4235. ;; ADDITIONAL SECTION:
  4236.  
  4237. ;; OPT PSEUDOSECTION:
  4238. ; EDNS: version 0; flags: do; udp: 1232
  4239.  
  4240. 2020/11/02 16:30:25 3419665#229 [debug] 127.0.0.1:5335: response: ok
  4241. 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN A. Elapsed 198 ms.
  4242. 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 198 ms
  4243. 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4244. 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4245. 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4246. 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4247. 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 57718
  4248. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  4249.  
  4250. ;; QUESTION SECTION:
  4251. ;cd.tnet.nl. IN A
  4252.  
  4253. ;; ANSWER SECTION:
  4254. cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4255. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.87.109
  4256. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.87.164
  4257. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.84.219
  4258.  
  4259. ;; ADDITIONAL SECTION:
  4260.  
  4261. ;; OPT PSEUDOSECTION:
  4262. ; EDNS: version 0; flags: do; udp: 1232
  4263.  
  4264. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47295
  4265. 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47295
  4266. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7495
  4267. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4268.  
  4269. ;; QUESTION SECTION:
  4270. ;cd.tnet.nl. IN AAAA
  4271.  
  4272. 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 9082
  4273. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4274.  
  4275. ;; QUESTION SECTION:
  4276. ;cd.tnet.nl. IN A
  4277.  
  4278. 2020/11/02 16:30:25 3419665#200 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4279. 2020/11/02 16:30:25 3419665#201 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4280. 2020/11/02 16:30:25 3419665#200 [debug] DNS: Adding OPT record with DNSSEC flag
  4281. 2020/11/02 16:30:25 3419665#201 [debug] DNS: Adding OPT record with DNSSEC flag
  4282. 2020/11/02 16:30:25 3419665#201 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
  4283. 2020/11/02 16:30:25 3419665#200 [debug] Serving response from general cache
  4284. 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4285. 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4286. 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4287. 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4288. 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 9082
  4289. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  4290.  
  4291. ;; QUESTION SECTION:
  4292. ;cd.tnet.nl. IN A
  4293.  
  4294. ;; ANSWER SECTION:
  4295. cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4296. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.87.109
  4297. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.87.164
  4298. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.84.219
  4299.  
  4300. ;; ADDITIONAL SECTION:
  4301.  
  4302. ;; OPT PSEUDOSECTION:
  4303. ; EDNS: version 0; flags: do; udp: 1232
  4304.  
  4305. 2020/11/02 16:30:25 3419665#201 [debug] 127.0.0.1:5335: response: ok
  4306. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 0 ms.
  4307. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4308. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
  4309. 2020/11/02 16:30:25 3419665#201 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4310. 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7495
  4311. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
  4312.  
  4313. ;; QUESTION SECTION:
  4314. ;cd.tnet.nl. IN AAAA
  4315.  
  4316. ;; ANSWER SECTION:
  4317. cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4318.  
  4319. ;; AUTHORITY SECTION:
  4320. tmgcloud.nl. 600 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
  4321.  
  4322. ;; ADDITIONAL SECTION:
  4323.  
  4324. ;; OPT PSEUDOSECTION:
  4325. ; EDNS: version 0; flags: do; udp: 1232
  4326.  
  4327. 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50425
  4328. 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58119
  4329. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4330.  
  4331. ;; QUESTION SECTION:
  4332. ;ocsp.usertrust.com. IN A
  4333.  
  4334. 2020/11/02 16:30:25 3419665#202 [debug] AutoHosts: answer: ocsp.usertrust.com -> []
  4335. 2020/11/02 16:30:25 3419665#202 [debug] DNS: Adding OPT record with DNSSEC flag
  4336. 2020/11/02 16:30:25 3419665#202 [debug] 127.0.0.1:5335: sending request A ocsp.usertrust.com.
  4337. 2020/11/02 16:30:25 3419665#199 [debug] 127.0.0.1:5335: response: ok
  4338. 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;shared.mediahuis.be. IN AAAA. Elapsed 206 ms.
  4339. 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 207 ms
  4340. 2020/11/02 16:30:25 3419665#199 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:4915) for shared.mediahuis.be.
  4341. 2020/11/02 16:30:25 3419665#199 [debug] DNSFwd: Checking record AAAA (2606:4700::6810:d022) for shared.mediahuis.be.
  4342. 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48986
  4343. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  4344.  
  4345. ;; QUESTION SECTION:
  4346. ;shared.mediahuis.be. IN AAAA
  4347.  
  4348. ;; ANSWER SECTION:
  4349. shared.mediahuis.be. 300 IN AAAA 2606:4700::6812:4915
  4350. shared.mediahuis.be. 300 IN AAAA 2606:4700::6810:d022
  4351.  
  4352. ;; ADDITIONAL SECTION:
  4353.  
  4354. ;; OPT PSEUDOSECTION:
  4355. ; EDNS: version 0; flags: do; udp: 1232
  4356.  
  4357. 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42461
  4358. 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39017
  4359. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4360.  
  4361. ;; QUESTION SECTION:
  4362. ;shared.mediahuis.be. IN AAAA
  4363.  
  4364. 2020/11/02 16:30:25 3419665#204 [debug] AutoHosts: answer: shared.mediahuis.be -> []
  4365. 2020/11/02 16:30:25 3419665#204 [debug] DNS: Adding OPT record with DNSSEC flag
  4366. 2020/11/02 16:30:25 3419665#204 [debug] Serving response from general cache
  4367. 2020/11/02 16:30:25 3419665#204 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:4915) for shared.mediahuis.be.
  4368. 2020/11/02 16:30:25 3419665#204 [debug] DNSFwd: Checking record AAAA (2606:4700::6810:d022) for shared.mediahuis.be.
  4369. 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 39017
  4370. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  4371.  
  4372. ;; QUESTION SECTION:
  4373. ;shared.mediahuis.be. IN AAAA
  4374.  
  4375. ;; ANSWER SECTION:
  4376. shared.mediahuis.be. 300 IN AAAA 2606:4700::6812:4915
  4377. shared.mediahuis.be. 300 IN AAAA 2606:4700::6810:d022
  4378.  
  4379. ;; ADDITIONAL SECTION:
  4380.  
  4381. ;; OPT PSEUDOSECTION:
  4382. ; EDNS: version 0; flags: do; udp: 1232
  4383.  
  4384. 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42461
  4385. 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7027
  4386. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4387.  
  4388. ;; QUESTION SECTION:
  4389. ;shared.mediahuis.be. IN A
  4390.  
  4391. 2020/11/02 16:30:25 3419665#203 [debug] AutoHosts: answer: shared.mediahuis.be -> []
  4392. 2020/11/02 16:30:25 3419665#203 [debug] DNS: Adding OPT record with DNSSEC flag
  4393. 2020/11/02 16:30:25 3419665#203 [debug] Serving response from general cache
  4394. 2020/11/02 16:30:25 3419665#203 [debug] DNSFwd: Checking record A (104.18.73.21) for shared.mediahuis.be.
  4395. 2020/11/02 16:30:25 3419665#203 [debug] DNSFwd: Checking record A (104.16.208.34) for shared.mediahuis.be.
  4396. 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7027
  4397. ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
  4398.  
  4399. ;; QUESTION SECTION:
  4400. ;shared.mediahuis.be. IN A
  4401.  
  4402. ;; ANSWER SECTION:
  4403. shared.mediahuis.be. 300 IN A 104.18.73.21
  4404. shared.mediahuis.be. 300 IN A 104.16.208.34
  4405.  
  4406. ;; ADDITIONAL SECTION:
  4407.  
  4408. ;; OPT PSEUDOSECTION:
  4409. ; EDNS: version 0; flags: do; udp: 1232
  4410.  
  4411. 2020/11/02 16:30:25 3419665#202 [debug] 127.0.0.1:5335: response: ok
  4412. 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;ocsp.usertrust.com. IN A. Elapsed 105 ms.
  4413. 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 105 ms
  4414. 2020/11/02 16:30:25 3419665#202 [debug] DNSFwd: Checking record A (151.139.128.14) for ocsp.usertrust.com.
  4415. 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58119
  4416. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  4417.  
  4418. ;; QUESTION SECTION:
  4419. ;ocsp.usertrust.com. IN A
  4420.  
  4421. ;; ANSWER SECTION:
  4422. ocsp.usertrust.com. 1139 IN A 151.139.128.14
  4423.  
  4424. ;; ADDITIONAL SECTION:
  4425.  
  4426. ;; OPT PSEUDOSECTION:
  4427. ; EDNS: version 0; flags: do; udp: 1232
  4428.  
  4429. 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50425
  4430. 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 37378
  4431. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4432.  
  4433. ;; QUESTION SECTION:
  4434. ;ocsp.usertrust.com. IN AAAA
  4435.  
  4436. 2020/11/02 16:30:25 3419665#231 [debug] AutoHosts: answer: ocsp.usertrust.com -> []
  4437. 2020/11/02 16:30:25 3419665#231 [debug] DNS: Adding OPT record with DNSSEC flag
  4438. 2020/11/02 16:30:25 3419665#231 [debug] 127.0.0.1:5335: sending request AAAA ocsp.usertrust.com.
  4439. 2020/11/02 16:30:25 3419665#231 [debug] 127.0.0.1:5335: response: ok
  4440. 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;ocsp.usertrust.com. IN AAAA. Elapsed 21 ms.
  4441. 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 21 ms
  4442. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2a) for ocsp.usertrust.com.
  4443. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3a) for ocsp.usertrust.com.
  4444. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2b) for ocsp.usertrust.com.
  4445. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1b) for ocsp.usertrust.com.
  4446. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3b) for ocsp.usertrust.com.
  4447. 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1a) for ocsp.usertrust.com.
  4448. 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 37378
  4449. ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
  4450.  
  4451. ;; QUESTION SECTION:
  4452. ;ocsp.usertrust.com. IN AAAA
  4453.  
  4454. ;; ANSWER SECTION:
  4455. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:2a
  4456. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:3a
  4457. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:2b
  4458. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:1b
  4459. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:3b
  4460. ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:1a
  4461.  
  4462. ;; ADDITIONAL SECTION:
  4463.  
  4464. ;; OPT PSEUDOSECTION:
  4465. ; EDNS: version 0; flags: do; udp: 1232
  4466.  
  4467. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38572
  4468. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21988
  4469. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4470.  
  4471. ;; QUESTION SECTION:
  4472. ;cd.tnet.nl. IN AAAA
  4473.  
  4474. 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38572
  4475. 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 45048
  4476. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4477.  
  4478. ;; QUESTION SECTION:
  4479. ;cd.tnet.nl. IN A
  4480.  
  4481. 2020/11/02 16:30:27 3419665#233 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4482. 2020/11/02 16:30:27 3419665#233 [debug] DNS: Adding OPT record with DNSSEC flag
  4483. 2020/11/02 16:30:27 3419665#232 [debug] AutoHosts: answer: cd.tnet.nl -> []
  4484. 2020/11/02 16:30:27 3419665#233 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
  4485. 2020/11/02 16:30:27 3419665#232 [debug] DNS: Adding OPT record with DNSSEC flag
  4486. 2020/11/02 16:30:27 3419665#232 [debug] Serving response from general cache
  4487. 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4488. 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4489. 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4490. 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4491. 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 45048
  4492. ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
  4493.  
  4494. ;; QUESTION SECTION:
  4495. ;cd.tnet.nl. IN A
  4496.  
  4497. ;; ANSWER SECTION:
  4498. cd.tnet.nl. 298 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4499. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.87.109
  4500. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.87.164
  4501. production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.84.219
  4502.  
  4503. ;; ADDITIONAL SECTION:
  4504.  
  4505. ;; OPT PSEUDOSECTION:
  4506. ; EDNS: version 0; flags: do; udp: 1232
  4507.  
  4508. 2020/11/02 16:30:27 3419665#233 [debug] 127.0.0.1:5335: response: ok
  4509. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 0 ms.
  4510. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4511. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
  4512. 2020/11/02 16:30:27 3419665#233 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
  4513. 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21988
  4514. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
  4515.  
  4516. ;; QUESTION SECTION:
  4517. ;cd.tnet.nl. IN AAAA
  4518.  
  4519. ;; ANSWER SECTION:
  4520. cd.tnet.nl. 298 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
  4521.  
  4522. ;; AUTHORITY SECTION:
  4523. tmgcloud.nl. 598 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
  4524.  
  4525. ;; ADDITIONAL SECTION:
  4526.  
  4527. ;; OPT PSEUDOSECTION:
  4528. ; EDNS: version 0; flags: do; udp: 1232
  4529.  
  4530. 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:55234
  4531. 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16036
  4532. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4533.  
  4534. ;; QUESTION SECTION:
  4535. ;connectivitycheck.gstatic.com. IN A
  4536.  
  4537. 2020/11/02 16:30:33 3419665#244 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  4538. 2020/11/02 16:30:33 3419665#244 [debug] DNS: Adding OPT record with DNSSEC flag
  4539. 2020/11/02 16:30:33 3419665#244 [debug] 127.0.0.1:5335: sending request A connectivitycheck.gstatic.com.
  4540. 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:55234
  4541. 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13115
  4542. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4543.  
  4544. ;; QUESTION SECTION:
  4545. ;connectivitycheck.gstatic.com. IN AAAA
  4546.  
  4547. 2020/11/02 16:30:33 3419665#234 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
  4548. 2020/11/02 16:30:33 3419665#234 [debug] DNS: Adding OPT record with DNSSEC flag
  4549. 2020/11/02 16:30:33 3419665#234 [debug] 127.0.0.1:5335: sending request AAAA connectivitycheck.gstatic.com.
  4550. 2020/11/02 16:30:33 3419665#244 [debug] 127.0.0.1:5335: response: ok
  4551. 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN A. Elapsed 0 ms.
  4552. 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4553. 2020/11/02 16:30:33 3419665#244 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
  4554. 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16036
  4555. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  4556.  
  4557. ;; QUESTION SECTION:
  4558. ;connectivitycheck.gstatic.com. IN A
  4559.  
  4560. ;; ANSWER SECTION:
  4561. connectivitycheck.gstatic.com. 30 IN A 142.250.74.195
  4562.  
  4563. ;; ADDITIONAL SECTION:
  4564.  
  4565. ;; OPT PSEUDOSECTION:
  4566. ; EDNS: version 0; flags: do; udp: 1232
  4567.  
  4568. 2020/11/02 16:30:33 3419665#234 [debug] 127.0.0.1:5335: response: ok
  4569. 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN AAAA. Elapsed 0 ms.
  4570. 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
  4571. 2020/11/02 16:30:33 3419665#234 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
  4572. 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13115
  4573. ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
  4574.  
  4575. ;; QUESTION SECTION:
  4576. ;connectivitycheck.gstatic.com. IN AAAA
  4577.  
  4578. ;; ANSWER SECTION:
  4579. connectivitycheck.gstatic.com. 30 IN AAAA 2a00:1450:400e:80e::2003
  4580.  
  4581. ;; ADDITIONAL SECTION:
  4582.  
  4583. ;; OPT PSEUDOSECTION:
  4584. ; EDNS: version 0; flags: do; udp: 1232
  4585.  
  4586. 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.30:42711
  4587. 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13302
  4588. ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
  4589.  
  4590. ;; QUESTION SECTION:
  4591. ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A
  4592.  
  4593. 2020/11/02 16:30:47 3419665#205 [debug] AutoHosts: answer: epdg.epc.mnc016.mcc204.pub.3gppnetwork.org -> []
  4594. 2020/11/02 16:30:47 3419665#205 [debug] DNS: Adding OPT record with DNSSEC flag
  4595. 2020/11/02 16:30:47 3419665#205 [debug] 127.0.0.1:5335: sending request A epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4596. 2020/11/02 16:30:47 3419665#205 [debug] 127.0.0.1:5335: response: ok
  4597. 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A. Elapsed 0 ms.
  4598. 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
  4599. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.205) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4600. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.221) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4601. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.222) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4602. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.202) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4603. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.203) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4604. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.204) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4605. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.217) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4606. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.220) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4607. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.218) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4608. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.206) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4609. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.201) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4610. 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.219) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
  4611. 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13302
  4612. ;; flags: qr rd ra; QUERY: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 1
  4613.  
  4614. ;; QUESTION SECTION:
  4615. ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A
  4616.  
  4617. ;; ANSWER SECTION:
  4618. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.205
  4619. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.221
  4620. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.222
  4621. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.202
  4622. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.203
  4623. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.204
  4624. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.217
  4625. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.220
  4626. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.218
  4627. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.206
  4628. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.201
  4629. epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.219
  4630.  
  4631. ;; ADDITIONAL SECTION:
  4632.  
  4633. ;; OPT PSEUDOSECTION:
  4634. ; EDNS: version 0; flags: do; udp: 1232
  4635.  
Add Comment
Please, Sign In to add comment