Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2020/11/02 16:28:23 3419665#20 [info] AdGuard Home, version 0.104.0, channel release, arch linux amd64
- 2020/11/02 16:28:23 3419665#20 [debug] Current working directory is /opt/AdGuardHome
- 2020/11/02 16:28:23 3419665#20 [info] AdGuard Home is running as a service
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.upgradeConfig(): got schema version 7
- 2020/11/02 16:28:23 3419665#20 [debug] Reading config file: /opt/AdGuardHome/AdGuardHome.yaml
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: loading hosts from file /etc/hosts
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added 127.0.0.1 -> localhost
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address 127.0.0.1 -> localhost
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added 127.0.1.1 -> Obelix
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address 127.0.1.1 -> Obelix
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ::1 -> ip6-localhost
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ::1 -> ip6-localhost
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ::1 -> ip6-loopback
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added fe00:: -> ip6-localnet
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address fe00:: -> ip6-localnet
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff00:: -> ip6-mcastprefix
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff00:: -> ip6-mcastprefix
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff02::1 -> ip6-allnodes
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff02::1 -> ip6-allnodes
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added ff02::2 -> ip6-allrouters
- 2020/11/02 16:28:23 3419665#20 [debug] AutoHosts: added reverse-address ff02::2 -> ip6-allrouters
- 2020/11/02 16:28:23 3419665#20 [debug] Clients: removed 0 client aliases
- 2020/11/02 16:28:23 3419665#20 [debug] Clients: added 0 client aliases from DHCP
- 2020/11/02 16:28:23 3419665#20 [debug] Writing YAML file: /opt/AdGuardHome/AdGuardHome.yaml
- 2020/11/02 16:28:23 3419665#20 [info] Initializing auth module: /opt/AdGuardHome/data/sessions.db
- 2020/11/02 16:28:23 3419665#20 [debug] Auth: loaded 2 sessions from DB (removed 0 expired)
- 2020/11/02 16:28:23 3419665#20 [info] Auth: initialized. users:1 sessions:2
- 2020/11/02 16:28:23 3419665#20 [info] Initialize web module
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).dbOpen(): db.Open...
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).dbOpen(): db.Open
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/stats.createObject(): Deleting old units...
- 2020/11/02 16:28:23 3419665#20 [debug] Stats: initialized
- 2020/11/02 16:28:23 3419665#20 [debug] DNS: added 0 A/PTR entries from DHCP
- 2020/11/02 16:28:23 3419665#20 [debug] IPSET: added 0 hosts
- 2020/11/02 16:28:23 3419665#20 [debug] Bootstraps: [9.9.9.10 149.112.112.10 2620:fe::10 2620:fe::fe:10]
- 2020/11/02 16:28:23 3419665#20 [debug] Upstream 0: 127.0.0.1:5335
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): Loading filter 1 contents to: /opt/AdGuardHome/data/filters/1.txt
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): File /opt/AdGuardHome/data/filters/1.txt, id 1, length 720573
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): Loading filter 1604323042 contents to: /opt/AdGuardHome/data/filters/1604323042.txt
- 2020/11/02 16:28:23 3419665#20 [debug] github.com/AdguardTeam/AdGuardHome/home.(*Filtering).load(): File /opt/AdGuardHome/data/filters/1604323042.txt, id 1604323042, length 7883284
- 2020/11/02 16:28:24 3419665#20 [debug] Web: applying new TLS configuration
- 2020/11/02 16:28:24 3419665#20 [debug] Start AutoHosts module
- 2020/11/02 16:28:24 3419665#20 [info] AdGuard Home is available on the following addresses:
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: loading hosts from file /etc/hosts
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added 127.0.0.1 -> localhost
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address 127.0.0.1 -> localhost
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added 127.0.1.1 -> Obelix
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address 127.0.1.1 -> Obelix
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ::1 -> ip6-localhost
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ::1 -> ip6-localhost
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ::1 -> ip6-loopback
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added fe00:: -> ip6-localnet
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address fe00:: -> ip6-localnet
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff00:: -> ip6-mcastprefix
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff00:: -> ip6-mcastprefix
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff02::1 -> ip6-allnodes
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff02::1 -> ip6-allnodes
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added ff02::2 -> ip6-allrouters
- 2020/11/02 16:28:24 3419665#24 [debug] AutoHosts: added reverse-address ff02::2 -> ip6-allrouters
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: removed 0 client aliases
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '::1' -> 'ip6-localhost' [1]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'fe00::' -> 'ip6-localnet' [2]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff00::' -> 'ip6-mcastprefix' [3]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff02::1' -> 'ip6-allnodes' [4]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 'ff02::2' -> 'ip6-allrouters' [5]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '127.0.0.1' -> 'localhost' [6]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added '127.0.1.1' -> 'Obelix' [7]
- 2020/11/02 16:28:24 3419665#24 [debug] Clients: added 7 client aliases from system hosts-file
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://127.0.0.1:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://[::1]:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://192.168.88.10:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://172.19.0.1:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://172.17.0.1:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://192.168.88.96:3000
- 2020/11/02 16:28:24 3419665#20 [info] Go to http://10.6.0.1:3000
- 2020/11/02 16:28:25 3419665#26 [debug] initialized filtering engine
- 2020/11/02 16:28:25 3419665#26 [info] Starting the DNS proxy server
- 2020/11/02 16:28:25 3419665#26 [info] Ratelimit is enabled and set to 20 rps
- 2020/11/02 16:28:25 3419665#26 [info] The server is configured to refuse ANY requests
- 2020/11/02 16:28:25 3419665#26 [info] DNS cache is enabled
- 2020/11/02 16:28:25 3419665#26 [info] MaxGoroutines is set to 50
- 2020/11/02 16:28:25 3419665#26 [info] Creating the UDP server socket
- 2020/11/02 16:28:25 3419665#12 [debug] github.com/AdguardTeam/AdGuardHome/home.(*clientsContainer).addFromSystemARP(): executing /usr/sbin/arp [arp -a]
- 2020/11/02 16:28:25 3419665#26 [info] Listening to udp://[::]:53
- 2020/11/02 16:28:25 3419665#26 [info] Creating a TCP server socket
- 2020/11/02 16:28:25 3419665#26 [info] Listening to tcp://[::]:53
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
- 2020/11/02 16:28:25 3419665#13 [info] Entering the UDP listener loop on [::]:53
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
- 2020/11/02 16:28:25 3419665#14 [info] Entering the tcp listener loop on [::]:53
- 2020/11/02 16:28:25 3419665#16 [debug] Filters: updating...
- 2020/11/02 16:28:25 3419665#16 [debug] Filters: update finished
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.10
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.24
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.36
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 10.6.0.3
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.25
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.35
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.16
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.1
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 172.19.0.2
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.30
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 192.168.88.17
- 2020/11/02 16:28:25 3419665#26 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).Begin(): rDNS: adding 172.19.0.17
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.10
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 10.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#50 [debug] querylog: the oldest log entry: 2020-11-02T14:54:33.589222042+01:00
- 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48922
- 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 17506
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;36.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#34 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#34 [debug] 127.0.0.1:5335: sending request PTR 36.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;10.88.168.192.in-addr.arpa. IN PTR. Elapsed 1 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.10
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.24
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 24.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#34 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;36.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#34 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 17506
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;36.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;24.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.24
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.36
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 36.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:44713
- 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48684
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;15.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#65 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#65 [debug] 127.0.0.1:5335: sending request PTR 15.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;36.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.36
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 10.6.0.3
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 3.0.6.10.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#65 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;3.0.6.10.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;15.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 10.6.0.3
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.25
- 2020/11/02 16:28:25 3419665#65 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 48684
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;15.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 25.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:34202
- 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 56646
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;20.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;25.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#51 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#51 [debug] 127.0.0.1:5335: sending request PTR 20.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.25
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.35
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 35.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#51 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;20.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#51 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 56646
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;20.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;35.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.35
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.16
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 16.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48908
- 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 22431
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;25.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#66 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#66 [debug] 127.0.0.1:5335: sending request PTR 25.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.16
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.1
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 1.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#66 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;25.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#66 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 22431
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;25.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;1.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.1
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 172.19.0.2
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 2.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55862
- 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8140
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;30.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#67 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#67 [debug] 127.0.0.1:5335: sending request PTR 30.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;2.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 172.19.0.2
- 2020/11/02 16:28:25 3419665#67 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.30
- 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;30.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 30.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#67 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 8140
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;30.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48805
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;30.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13300
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;99.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.30
- 2020/11/02 16:28:25 3419665#68 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 192.168.88.17
- 2020/11/02 16:28:25 3419665#68 [debug] 127.0.0.1:5335: sending request PTR 99.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 17.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#68 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;99.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#68 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 13300
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;99.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 192.168.88.17
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/AdGuardHome/home.(*RDNS).resolve(): Resolving host for 172.19.0.17
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: sending request PTR 17.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46867
- 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2242
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;35.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#10 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#52 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#10 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#52 [debug] 127.0.0.1:5335: sending request PTR 35.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#10 [debug] No answer for rDNS lookup of 172.19.0.17
- 2020/11/02 16:28:25 3419665#52 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;35.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#52 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 2242
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;35.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54676
- 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11032
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;11.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#53 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#53 [debug] 127.0.0.1:5335: sending request PTR 11.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#53 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;11.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#53 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11032
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;11.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35452
- 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61117
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;8.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#54 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#54 [debug] 127.0.0.1:5335: sending request PTR 8.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#54 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;8.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#54 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 61117
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;8.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60422
- 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29356
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;16.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#55 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#55 [debug] 127.0.0.1:5335: sending request PTR 16.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#55 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#55 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 29356
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;16.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51662
- 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2637
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;24.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#56 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#56 [debug] 127.0.0.1:5335: sending request PTR 24.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#56 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;24.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#56 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 2637
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;24.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42204
- 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36904
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;2.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#57 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#57 [debug] 127.0.0.1:5335: sending request PTR 2.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#57 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;2.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#57 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 36904
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;2.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50132
- 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1229
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;7.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#58 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#58 [debug] 127.0.0.1:5335: sending request PTR 7.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#58 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;7.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#58 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 1229
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;7.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54815
- 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11066
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;17.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#59 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#59 [debug] 127.0.0.1:5335: sending request PTR 17.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#59 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#59 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11066
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;17.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50288
- 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39077
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;14.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#60 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#60 [debug] 127.0.0.1:5335: sending request PTR 14.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#60 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;14.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#60 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 39077
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;14.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53293
- 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10319
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;16.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#61 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#61 [debug] 127.0.0.1:5335: sending request PTR 16.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#61 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;16.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#61 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 10319
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;16.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49174
- 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 12619
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;100.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#62 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#62 [debug] 127.0.0.1:5335: sending request PTR 100.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#62 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;100.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#62 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 12619
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;100.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54530
- 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42020
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;89.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#63 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#63 [debug] 127.0.0.1:5335: sending request PTR 89.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#63 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;89.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#63 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 42020
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;89.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49104
- 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31088
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;3.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#64 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#64 [debug] 127.0.0.1:5335: sending request PTR 3.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#64 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;3.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#64 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 31088
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;3.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:33816
- 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 40006
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;1.88.168.192.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#81 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:25 3419665#81 [debug] 127.0.0.1:5335: sending request PTR 1.88.168.192.in-addr.arpa.
- 2020/11/02 16:28:25 3419665#81 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;1.88.168.192.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:25 3419665#81 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 40006
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;1.88.168.192.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 168.192.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38322
- 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55762
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;5.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:25 3419665#82 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:38322 based on IP only
- 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38322
- 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55762
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;5.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:30 3419665#69 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:30 3419665#69 [debug] 127.0.0.1:5335: sending request PTR 5.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:30 3419665#69 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;5.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:30 3419665#69 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 55762
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;5.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43254
- 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7954
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;15.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:30 3419665#70 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:30 3419665#70 [debug] 127.0.0.1:5335: sending request PTR 15.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:30 3419665#70 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;15.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:30 3419665#70 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 7954
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;15.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42480
- 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 27226
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;17.0.19.172.in-addr.arpa. IN PTR
- 2020/11/02 16:28:30 3419665#71 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:30 3419665#71 [debug] 127.0.0.1:5335: sending request PTR 17.0.19.172.in-addr.arpa.
- 2020/11/02 16:28:30 3419665#71 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;17.0.19.172.in-addr.arpa. IN PTR. Elapsed 0 ms.
- 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:30 3419665#71 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 27226
- ;; flags: qr aa rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;17.0.19.172.in-addr.arpa. IN PTR
- ;; AUTHORITY SECTION:
- 19.172.in-addr.arpa. 10800 IN SOA localhost. nobody.invalid. 1 3600 1200 604800 10800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:30 3419665#12 [debug] Clients: removed 0 client aliases
- 2020/11/02 16:28:30 3419665#12 [debug] Clients: added 0 client aliases from 'arp -a' command output
- 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:41522
- 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42866
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- 2020/11/02 16:28:33 3419665#31 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:28:33 3419665#31 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:33 3419665#31 [debug] 127.0.0.1:5335: sending request AAAA connectivitycheck.gstatic.com.
- 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:41522
- 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52088
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- 2020/11/02 16:28:33 3419665#30 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:28:33 3419665#30 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:28:33 3419665#30 [debug] 127.0.0.1:5335: sending request A connectivitycheck.gstatic.com.
- 2020/11/02 16:28:33 3419665#31 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:33 3419665#31 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
- 2020/11/02 16:28:33 3419665#31 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 42866
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 91 IN AAAA 2a00:1450:400e:80e::2003
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:33 3419665#30 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:28:33 3419665#30 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
- 2020/11/02 16:28:33 3419665#30 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52088
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 91 IN A 142.250.74.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:28:37 3419665#32 [debug] GET /control/querylog?search=&response_status=&older_than=&limit=20
- 2020/11/02 16:28:37 3419665#32 [debug] QueryLog: prepared data (20/45) older than 0001-01-01 00:00:00 +0000 UTC in 799.546µs
- 2020/11/02 16:28:37 3419665#98 [debug] GET /control/access/list
- 2020/11/02 16:28:37 3419665#100 [debug] GET /control/stats_info
- 2020/11/02 16:28:37 3419665#99 [debug] GET /control/stats
- 2020/11/02 16:28:37 3419665#99 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin...
- 2020/11/02 16:28:37 3419665#99 [debug] github.com/AdguardTeam/AdGuardHome/stats.(*statsCtx).beginTxn(): db.Begin
- 2020/11/02 16:28:37 3419665#99 [debug] Stats: prepared data in 502.977µs
- 2020/11/02 16:28:37 3419665#99 [debug] GET /control/clients/find?ip0=192.168.0.0
- 2020/11/02 16:28:37 3419665#99 [debug] GET /control/clients/find?ip0=192.168.88.10&ip1=192.168.88.24&ip2=192.168.88.36&ip3=10.6.0.3&ip4=192.168.88.25&ip5=192.168.88.35&ip6=192.168.88.16&ip7=192.168.88.1&ip8=172.19.0.2&ip9=192.168.0.0&ip10=192.168.88.30&ip11=192.168.88.17&ip12=172.19.0.17
- 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.17:40436
- 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18852
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;device-metrics-us.amazon.com. IN A
- 2020/11/02 16:28:58 3419665#74 [debug] AutoHosts: answer: device-metrics-us.amazon.com -> []
- 2020/11/02 16:28:58 3419665#74 [debug] Filtering: found rule for host 'device-metrics-us.amazon.com': '||device-metrics-*.amazon.com^' list_id: 1
- 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host device-metrics-us.amazon.com is filtered, reason - 'FilteredBlackList', matched rule: '||device-metrics-*.amazon.com^'
- 2020/11/02 16:28:58 3419665#74 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18852
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;device-metrics-us.amazon.com. IN A
- ;; ANSWER SECTION:
- device-metrics-us.amazon.com. 10 IN A 0.0.0.0
- 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:58233
- 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 43311
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- 2020/11/02 16:29:33 3419665#85 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:29:33 3419665#85 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:58233
- 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8827
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- 2020/11/02 16:29:33 3419665#75 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:29:33 3419665#85 [debug] Serving response from general cache
- 2020/11/02 16:29:33 3419665#75 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:33 3419665#85 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
- 2020/11/02 16:29:33 3419665#75 [debug] Serving response from general cache
- 2020/11/02 16:29:33 3419665#75 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
- 2020/11/02 16:29:33 3419665#85 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 43311
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 31 IN A 142.250.74.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:33 3419665#75 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 8827
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 31 IN AAAA 2a00:1450:400e:80e::2003
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:45903
- 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58207
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;android.googleapis.com. IN A
- 2020/11/02 16:29:35 3419665#102 [debug] AutoHosts: answer: android.googleapis.com -> []
- 2020/11/02 16:29:35 3419665#102 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:35 3419665#102 [debug] 127.0.0.1:5335: sending request A android.googleapis.com.
- 2020/11/02 16:29:35 3419665#102 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;android.googleapis.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:29:35 3419665#102 [debug] DNSFwd: Checking record A (172.217.17.74) for android.googleapis.com.
- 2020/11/02 16:29:35 3419665#102 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58207
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;android.googleapis.com. IN A
- ;; ANSWER SECTION:
- android.googleapis.com. 30 IN A 172.217.17.74
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:38157
- 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 40649
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;fcm.googleapis.com. IN A
- 2020/11/02 16:29:35 3419665#103 [debug] AutoHosts: answer: fcm.googleapis.com -> []
- 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:38157
- 2020/11/02 16:29:35 3419665#103 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 27719
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;fcm.googleapis.com. IN AAAA
- 2020/11/02 16:29:35 3419665#103 [debug] 127.0.0.1:5335: sending request A fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#76 [debug] AutoHosts: answer: fcm.googleapis.com -> []
- 2020/11/02 16:29:35 3419665#76 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:35 3419665#76 [debug] 127.0.0.1:5335: sending request AAAA fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fcm.googleapis.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.42) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.74) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.168.234) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.19.202) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.20.106) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.20.74) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.208.106) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.214.10) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (216.58.211.106) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] DNSFwd: Checking record A (172.217.17.138) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#103 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 40649
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 10, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;fcm.googleapis.com. IN A
- ;; ANSWER SECTION:
- fcm.googleapis.com. 30 IN A 172.217.17.42
- fcm.googleapis.com. 30 IN A 172.217.17.74
- fcm.googleapis.com. 30 IN A 172.217.168.234
- fcm.googleapis.com. 30 IN A 172.217.19.202
- fcm.googleapis.com. 30 IN A 172.217.20.106
- fcm.googleapis.com. 30 IN A 172.217.20.74
- fcm.googleapis.com. 30 IN A 216.58.208.106
- fcm.googleapis.com. 30 IN A 216.58.214.10
- fcm.googleapis.com. 30 IN A 216.58.211.106
- fcm.googleapis.com. 30 IN A 172.217.17.138
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:35 3419665#76 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fcm.googleapis.com. IN AAAA. Elapsed 1 ms.
- 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:808::200a) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:801::200a) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:814::200a) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#76 [debug] DNSFwd: Checking record AAAA (2a00:1450:4001:802::200a) for fcm.googleapis.com.
- 2020/11/02 16:29:35 3419665#76 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 27719
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;fcm.googleapis.com. IN AAAA
- ;; ANSWER SECTION:
- fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:808::200a
- fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:801::200a
- fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:814::200a
- fcm.googleapis.com. 30 IN AAAA 2a00:1450:4001:802::200a
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:64019
- 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48815
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;lamssettings-pa.googleapis.com. IN A
- 2020/11/02 16:29:36 3419665#104 [debug] AutoHosts: answer: lamssettings-pa.googleapis.com -> []
- 2020/11/02 16:29:36 3419665#104 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:36 3419665#104 [debug] 127.0.0.1:5335: sending request A lamssettings-pa.googleapis.com.
- 2020/11/02 16:29:36 3419665#104 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;lamssettings-pa.googleapis.com. IN A. Elapsed 38 ms.
- 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
- 2020/11/02 16:29:36 3419665#104 [debug] DNSFwd: Checking record A (172.217.17.42) for lamssettings-pa.googleapis.com.
- 2020/11/02 16:29:36 3419665#104 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48815
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;lamssettings-pa.googleapis.com. IN A
- ;; ANSWER SECTION:
- lamssettings-pa.googleapis.com. 300 IN A 172.217.17.42
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47443
- 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 44920
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- 2020/11/02 16:29:43 3419665#77 [debug] AutoHosts: answer: www.google.com -> []
- 2020/11/02 16:29:43 3419665#77 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:43 3419665#77 [debug] 127.0.0.1:5335: sending request A www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.google.com. IN A. Elapsed 1 ms.
- 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
- 2020/11/02 16:29:43 3419665#77 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 44920
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- ;; ANSWER SECTION:
- www.google.com. 30 IN A 142.250.27.99
- www.google.com. 30 IN A 142.250.27.103
- www.google.com. 30 IN A 142.250.27.106
- www.google.com. 30 IN A 142.250.27.147
- www.google.com. 30 IN A 142.250.27.104
- www.google.com. 30 IN A 142.250.27.105
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59897
- 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 8327
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;pastebin.com. IN AAAA
- 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59897
- 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16258
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;pastebin.com. IN A
- 2020/11/02 16:29:44 3419665#79 [debug] AutoHosts: answer: pastebin.com -> []
- 2020/11/02 16:29:44 3419665#78 [debug] AutoHosts: answer: pastebin.com -> []
- 2020/11/02 16:29:44 3419665#79 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:44 3419665#79 [debug] 127.0.0.1:5335: sending request AAAA pastebin.com.
- 2020/11/02 16:29:44 3419665#78 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:44 3419665#78 [debug] 127.0.0.1:5335: sending request A pastebin.com.
- 2020/11/02 16:29:44 3419665#79 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;pastebin.com. IN AAAA. Elapsed 38 ms.
- 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
- 2020/11/02 16:29:44 3419665#79 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:62be) for pastebin.com.
- 2020/11/02 16:29:44 3419665#79 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:63be) for pastebin.com.
- 2020/11/02 16:29:44 3419665#79 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 8327
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;pastebin.com. IN AAAA
- ;; ANSWER SECTION:
- pastebin.com. 300 IN AAAA 2606:4700:10::6817:62be
- pastebin.com. 300 IN AAAA 2606:4700:10::6817:63be
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:44 3419665#78 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;pastebin.com. IN A. Elapsed 38 ms.
- 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 38 ms
- 2020/11/02 16:29:44 3419665#78 [debug] DNSFwd: Checking record A (104.23.98.190) for pastebin.com.
- 2020/11/02 16:29:44 3419665#78 [debug] DNSFwd: Checking record A (104.23.99.190) for pastebin.com.
- 2020/11/02 16:29:44 3419665#78 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16258
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;pastebin.com. IN A
- ;; ANSWER SECTION:
- pastebin.com. 300 IN A 104.23.98.190
- pastebin.com. 300 IN A 104.23.99.190
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52544
- 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42270
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;incoming.telemetry.mozilla.org. IN A
- 2020/11/02 16:29:44 3419665#105 [debug] AutoHosts: answer: incoming.telemetry.mozilla.org -> []
- 2020/11/02 16:29:44 3419665#105 [debug] Filtering: found rule for host 'incoming.telemetry.mozilla.org': '@@||incoming.telemetry.mozilla.org^$important' list_id: 0
- 2020/11/02 16:29:44 3419665#105 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:44 3419665#105 [debug] 127.0.0.1:5335: sending request A incoming.telemetry.mozilla.org.
- 2020/11/02 16:29:44 3419665#105 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;incoming.telemetry.mozilla.org. IN A. Elapsed 0 ms.
- 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:29:44 3419665#105 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 42270
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;incoming.telemetry.mozilla.org. IN A
- ;; ANSWER SECTION:
- incoming.telemetry.mozilla.org. 30 IN CNAME telemetry-incoming.r53-2.services.mozilla.com.
- telemetry-incoming.r53-2.services.mozilla.com. 30 IN CNAME prod.data-ingestion.prod.dataops.mozgcp.net.
- prod.data-ingestion.prod.dataops.mozgcp.net. 30 IN A 35.244.247.133
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55857
- 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 59615
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;pastebin.com. IN A
- 2020/11/02 16:29:44 3419665#106 [debug] AutoHosts: answer: pastebin.com -> []
- 2020/11/02 16:29:44 3419665#106 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:44 3419665#106 [debug] Serving response from general cache
- 2020/11/02 16:29:44 3419665#106 [debug] DNSFwd: Checking record A (104.23.98.190) for pastebin.com.
- 2020/11/02 16:29:44 3419665#106 [debug] DNSFwd: Checking record A (104.23.99.190) for pastebin.com.
- 2020/11/02 16:29:44 3419665#106 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 59615
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;pastebin.com. IN A
- ;; ANSWER SECTION:
- pastebin.com. 300 IN A 104.23.98.190
- pastebin.com. 300 IN A 104.23.99.190
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55857
- 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 41948
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;pastebin.com. IN AAAA
- 2020/11/02 16:29:44 3419665#80 [debug] AutoHosts: answer: pastebin.com -> []
- 2020/11/02 16:29:44 3419665#80 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:29:44 3419665#80 [debug] Serving response from general cache
- 2020/11/02 16:29:44 3419665#80 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:62be) for pastebin.com.
- 2020/11/02 16:29:44 3419665#80 [debug] DNSFwd: Checking record AAAA (2606:4700:10::6817:63be) for pastebin.com.
- 2020/11/02 16:29:44 3419665#80 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 41948
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;pastebin.com. IN AAAA
- ;; ANSWER SECTION:
- pastebin.com. 300 IN AAAA 2606:4700:10::6817:62be
- pastebin.com. 300 IN AAAA 2606:4700:10::6817:63be
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:44467
- 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24890
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.nu.nl. IN A
- 2020/11/02 16:30:02 3419665#107 [debug] AutoHosts: answer: www.nu.nl -> []
- 2020/11/02 16:30:02 3419665#107 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#107 [debug] 127.0.0.1:5335: sending request A www.nu.nl.
- 2020/11/02 16:30:02 3419665#107 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.nu.nl. IN A. Elapsed 2 ms.
- 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 2 ms
- 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking CNAME d319isq1sikamv.cloudfront.net. for www.nu.nl.
- 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.37) for d319isq1sikamv.cloudfront.net.
- 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.94) for d319isq1sikamv.cloudfront.net.
- 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.121) for d319isq1sikamv.cloudfront.net.
- 2020/11/02 16:30:02 3419665#107 [debug] DNSFwd: Checking record A (13.224.194.67) for d319isq1sikamv.cloudfront.net.
- 2020/11/02 16:30:02 3419665#107 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24890
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.nu.nl. IN A
- ;; ANSWER SECTION:
- www.nu.nl. 30 IN CNAME d319isq1sikamv.cloudfront.net.
- d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.37
- d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.94
- d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.121
- d319isq1sikamv.cloudfront.net. 30 IN A 13.224.194.67
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35958
- 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 54894
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.cookielaw.org. IN A
- 2020/11/02 16:30:02 3419665#108 [debug] AutoHosts: answer: cdn.cookielaw.org -> []
- 2020/11/02 16:30:02 3419665#108 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#108 [debug] 127.0.0.1:5335: sending request A cdn.cookielaw.org.
- 2020/11/02 16:30:02 3419665#108 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdn.cookielaw.org. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#108 [debug] DNSFwd: Checking record A (104.16.148.64) for cdn.cookielaw.org.
- 2020/11/02 16:30:02 3419665#108 [debug] DNSFwd: Checking record A (104.16.149.64) for cdn.cookielaw.org.
- 2020/11/02 16:30:02 3419665#108 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 54894
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cdn.cookielaw.org. IN A
- ;; ANSWER SECTION:
- cdn.cookielaw.org. 30 IN A 104.16.148.64
- cdn.cookielaw.org. 30 IN A 104.16.149.64
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:58125
- 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62299
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;content.jwplatform.com. IN A
- 2020/11/02 16:30:02 3419665#109 [debug] AutoHosts: answer: content.jwplatform.com -> []
- 2020/11/02 16:30:02 3419665#109 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#109 [debug] 127.0.0.1:5335: sending request A content.jwplatform.com.
- 2020/11/02 16:30:02 3419665#109 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;content.jwplatform.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.46) for content.jwplatform.com.
- 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.40) for content.jwplatform.com.
- 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.89) for content.jwplatform.com.
- 2020/11/02 16:30:02 3419665#109 [debug] DNSFwd: Checking record A (13.32.240.74) for content.jwplatform.com.
- 2020/11/02 16:30:02 3419665#109 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62299
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;content.jwplatform.com. IN A
- ;; ANSWER SECTION:
- content.jwplatform.com. 30 IN A 13.32.240.46
- content.jwplatform.com. 30 IN A 13.32.240.40
- content.jwplatform.com. 30 IN A 13.32.240.89
- content.jwplatform.com. 30 IN A 13.32.240.74
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37875
- 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 32657
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;consent.313.nl. IN A
- 2020/11/02 16:30:02 3419665#110 [debug] AutoHosts: answer: consent.313.nl -> []
- 2020/11/02 16:30:02 3419665#110 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#110 [debug] 127.0.0.1:5335: sending request A consent.313.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;consent.313.nl. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking CNAME new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. for consent.313.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.51) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.24) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.86) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] DNSFwd: Checking record A (13.227.209.19) for new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
- 2020/11/02 16:30:02 3419665#110 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 32657
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;consent.313.nl. IN A
- ;; ANSWER SECTION:
- consent.313.nl. 30 IN CNAME new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl.
- new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.51
- new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.24
- new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.86
- new-consent-production-cloudfront.182260396177.eu-west-1.ext.cloud.onenet.nl. 30 IN A 13.227.209.19
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53974
- 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4351
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdns.eu1.gigya.com. IN A
- 2020/11/02 16:30:02 3419665#111 [debug] AutoHosts: answer: cdns.eu1.gigya.com -> []
- 2020/11/02 16:30:02 3419665#111 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#111 [debug] 127.0.0.1:5335: sending request A cdns.eu1.gigya.com.
- 2020/11/02 16:30:02 3419665#111 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdns.eu1.gigya.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking CNAME cdns.gigya.com.edgekey.net. for cdns.eu1.gigya.com.
- 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking CNAME e8333.g.akamaiedge.net. for cdns.gigya.com.edgekey.net.
- 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53889
- 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 60153
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;account.sanomaservices.nl. IN A
- 2020/11/02 16:30:02 3419665#111 [debug] DNSFwd: Checking record A (23.40.113.37) for e8333.g.akamaiedge.net.
- 2020/11/02 16:30:02 3419665#87 [debug] AutoHosts: answer: account.sanomaservices.nl -> []
- 2020/11/02 16:30:02 3419665#111 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4351
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cdns.eu1.gigya.com. IN A
- ;; ANSWER SECTION:
- cdns.eu1.gigya.com. 30 IN CNAME cdns.gigya.com.edgekey.net.
- cdns.gigya.com.edgekey.net. 20117 IN CNAME e8333.g.akamaiedge.net.
- e8333.g.akamaiedge.net. 30 IN A 23.40.113.37
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#87 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#87 [debug] 127.0.0.1:5335: sending request A account.sanomaservices.nl.
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53974
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29411
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdns.eu1.gigya.com. IN AAAA
- 2020/11/02 16:30:02 3419665#86 [debug] AutoHosts: answer: cdns.eu1.gigya.com -> []
- 2020/11/02 16:30:02 3419665#86 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#86 [debug] 127.0.0.1:5335: sending request AAAA cdns.eu1.gigya.com.
- 2020/11/02 16:30:02 3419665#87 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;account.sanomaservices.nl. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking CNAME cloudfront-gatekeeper-production.aws.sanomaservices.nl. for account.sanomaservices.nl.
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking CNAME d2nhjsxrtzxhzh.cloudfront.net. for cloudfront-gatekeeper-production.aws.sanomaservices.nl.
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.8) for d2nhjsxrtzxhzh.cloudfront.net.
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.26) for d2nhjsxrtzxhzh.cloudfront.net.
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.93) for d2nhjsxrtzxhzh.cloudfront.net.
- 2020/11/02 16:30:02 3419665#87 [debug] DNSFwd: Checking record A (13.226.169.114) for d2nhjsxrtzxhzh.cloudfront.net.
- 2020/11/02 16:30:02 3419665#87 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 60153
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;account.sanomaservices.nl. IN A
- ;; ANSWER SECTION:
- account.sanomaservices.nl. 1301 IN CNAME cloudfront-gatekeeper-production.aws.sanomaservices.nl.
- cloudfront-gatekeeper-production.aws.sanomaservices.nl. 30 IN CNAME d2nhjsxrtzxhzh.cloudfront.net.
- d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.8
- d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.26
- d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.93
- d2nhjsxrtzxhzh.cloudfront.net. 30 IN A 13.226.169.114
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#86 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdns.eu1.gigya.com. IN AAAA. Elapsed 83 ms.
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 83 ms
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cdns.eu1.gigya.com.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:02 3419665#86 [debug] DNSFwd: Checking CNAME cdns.gigya.com.edgekey.net. for cdns.eu1.gigya.com.
- 2020/11/02 16:30:02 3419665#86 [debug] DNSFwd: Checking CNAME e8333.g.akamaiedge.net. for cdns.gigya.com.edgekey.net.
- 2020/11/02 16:30:02 3419665#86 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 29411
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cdns.eu1.gigya.com. IN AAAA
- ;; ANSWER SECTION:
- cdns.eu1.gigya.com. 300 IN CNAME cdns.gigya.com.edgekey.net.
- cdns.gigya.com.edgekey.net. 20117 IN CNAME e8333.g.akamaiedge.net.
- ;; AUTHORITY SECTION:
- g.akamaiedge.net. 718 IN SOA n0g.akamaiedge.net. hostmaster.akamai.com. 1604330720 1000 1000 1000 1800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:33134
- 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52638
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;fonts.gstatic.com. IN A
- 2020/11/02 16:30:02 3419665#113 [debug] AutoHosts: answer: fonts.gstatic.com -> []
- 2020/11/02 16:30:02 3419665#113 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:02 3419665#113 [debug] 127.0.0.1:5335: sending request A fonts.gstatic.com.
- 2020/11/02 16:30:02 3419665#113 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fonts.gstatic.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:02 3419665#113 [debug] DNSFwd: Checking CNAME gstaticadssl.l.google.com. for fonts.gstatic.com.
- 2020/11/02 16:30:02 3419665#113 [debug] DNSFwd: Checking record A (216.58.214.3) for gstaticadssl.l.google.com.
- 2020/11/02 16:30:02 3419665#113 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52638
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;fonts.gstatic.com. IN A
- ;; ANSWER SECTION:
- fonts.gstatic.com. 30 IN CNAME gstaticadssl.l.google.com.
- gstaticadssl.l.google.com. 30 IN A 216.58.214.3
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42462
- 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55953
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;media.nu.nl. IN A
- 2020/11/02 16:30:03 3419665#88 [debug] AutoHosts: answer: media.nu.nl -> []
- 2020/11/02 16:30:03 3419665#88 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:03 3419665#88 [debug] 127.0.0.1:5335: sending request A media.nu.nl.
- 2020/11/02 16:30:03 3419665#88 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;media.nu.nl. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking CNAME d28whc3ikaahls.cloudfront.net. for media.nu.nl.
- 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.68) for d28whc3ikaahls.cloudfront.net.
- 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.45) for d28whc3ikaahls.cloudfront.net.
- 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.64) for d28whc3ikaahls.cloudfront.net.
- 2020/11/02 16:30:03 3419665#88 [debug] DNSFwd: Checking record A (13.224.194.59) for d28whc3ikaahls.cloudfront.net.
- 2020/11/02 16:30:03 3419665#88 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55953
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;media.nu.nl. IN A
- ;; ANSWER SECTION:
- media.nu.nl. 30 IN CNAME d28whc3ikaahls.cloudfront.net.
- d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.68
- d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.45
- d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.64
- d28whc3ikaahls.cloudfront.net. 30 IN A 13.224.194.59
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:58107
- 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36720
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;config.dpns-notifications.com. IN A
- 2020/11/02 16:30:03 3419665#89 [debug] AutoHosts: answer: config.dpns-notifications.com -> []
- 2020/11/02 16:30:03 3419665#89 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:03 3419665#89 [debug] 127.0.0.1:5335: sending request A config.dpns-notifications.com.
- 2020/11/02 16:30:03 3419665#89 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;config.dpns-notifications.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking CNAME d1277s10x719q6.cloudfront.net. for config.dpns-notifications.com.
- 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.8) for d1277s10x719q6.cloudfront.net.
- 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.116) for d1277s10x719q6.cloudfront.net.
- 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.97) for d1277s10x719q6.cloudfront.net.
- 2020/11/02 16:30:03 3419665#89 [debug] DNSFwd: Checking record A (99.86.154.74) for d1277s10x719q6.cloudfront.net.
- 2020/11/02 16:30:03 3419665#89 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 36720
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 5, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;config.dpns-notifications.com. IN A
- ;; ANSWER SECTION:
- config.dpns-notifications.com. 30 IN CNAME d1277s10x719q6.cloudfront.net.
- d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.8
- d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.116
- d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.97
- d1277s10x719q6.cloudfront.net. 30 IN A 99.86.154.74
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53108
- 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21771
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;code.jquery.com. IN A
- 2020/11/02 16:30:05 3419665#90 [debug] AutoHosts: answer: code.jquery.com -> []
- 2020/11/02 16:30:05 3419665#90 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#90 [debug] 127.0.0.1:5335: sending request A code.jquery.com.
- 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53108
- 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16396
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;code.jquery.com. IN AAAA
- 2020/11/02 16:30:05 3419665#90 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:05 3419665#114 [debug] AutoHosts: answer: code.jquery.com -> []
- 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;code.jquery.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:05 3419665#114 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:05 3419665#114 [debug] 127.0.0.1:5335: sending request AAAA code.jquery.com.
- 2020/11/02 16:30:05 3419665#90 [debug] DNSFwd: Checking CNAME cds.s5x3j6q5.hwcdn.net. for code.jquery.com.
- 2020/11/02 16:30:05 3419665#90 [debug] DNSFwd: Checking record A (209.197.3.24) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#90 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21771
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;code.jquery.com. IN A
- ;; ANSWER SECTION:
- code.jquery.com. 30 IN CNAME cds.s5x3j6q5.hwcdn.net.
- cds.s5x3j6q5.hwcdn.net. 30 IN A 209.197.3.24
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45148
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 23641
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN AAAA
- 2020/11/02 16:30:05 3419665#92 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
- 2020/11/02 16:30:05 3419665#92 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45148
- 2020/11/02 16:30:05 3419665#92 [debug] 127.0.0.1:5335: sending request AAAA tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 14431
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN A
- 2020/11/02 16:30:05 3419665#91 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
- 2020/11/02 16:30:05 3419665#91 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#91 [debug] 127.0.0.1:5335: sending request A tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#91 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
- 2020/11/02 16:30:05 3419665#91 [debug] DNSFwd: Checking record A (23.206.93.85) for e8091.a.akamaiedge.net.
- 2020/11/02 16:30:05 3419665#91 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 14431
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN A
- ;; ANSWER SECTION:
- tags.tiqcdn.com. 30 IN CNAME tags.tiqcdn.com.edgekey.net.
- tags.tiqcdn.com.edgekey.net. 30 IN CNAME e8091.a.akamaiedge.net.
- e8091.a.akamaiedge.net. 30 IN A 23.206.93.85
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#114 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;code.jquery.com. IN AAAA. Elapsed 78 ms.
- 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 78 ms
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking CNAME cds.s5x3j6q5.hwcdn.net. for code.jquery.com.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2a) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3b) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1a) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2b) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1b) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3a) for cds.s5x3j6q5.hwcdn.net.
- 2020/11/02 16:30:05 3419665#114 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16396
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 7, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;code.jquery.com. IN AAAA
- ;; ANSWER SECTION:
- code.jquery.com. 300 IN CNAME cds.s5x3j6q5.hwcdn.net.
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:2a
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:3b
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:1a
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:2b
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:1b
- cds.s5x3j6q5.hwcdn.net. 300 IN AAAA 2001:4de0:ac19::1:b:3a
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#92 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN AAAA. Elapsed 77 ms.
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 77 ms
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): tags.tiqcdn.com.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:05 3419665#92 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#92 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
- 2020/11/02 16:30:05 3419665#92 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 23641
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN AAAA
- ;; ANSWER SECTION:
- tags.tiqcdn.com. 300 IN CNAME tags.tiqcdn.com.edgekey.net.
- tags.tiqcdn.com.edgekey.net. 300 IN CNAME e8091.a.akamaiedge.net.
- ;; AUTHORITY SECTION:
- a.akamaiedge.net. 476 IN SOA n0a.akamaiedge.net. hostmaster.akamai.com. 1604330481 1000 1000 1000 1800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49808
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3825
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN AAAA
- 2020/11/02 16:30:05 3419665#129 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
- 2020/11/02 16:30:05 3419665#129 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#129 [debug] 127.0.0.1:5335: sending request AAAA tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49808
- 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10997
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN A
- 2020/11/02 16:30:05 3419665#112 [debug] AutoHosts: answer: tags.tiqcdn.com -> []
- 2020/11/02 16:30:05 3419665#112 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:05 3419665#112 [debug] Serving response from general cache
- 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
- 2020/11/02 16:30:05 3419665#112 [debug] DNSFwd: Checking record A (23.206.93.85) for e8091.a.akamaiedge.net.
- 2020/11/02 16:30:05 3419665#129 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;tags.tiqcdn.com. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:05 3419665#112 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 10997
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN A
- ;; ANSWER SECTION:
- tags.tiqcdn.com. 30 IN CNAME tags.tiqcdn.com.edgekey.net.
- tags.tiqcdn.com.edgekey.net. 30 IN CNAME e8091.a.akamaiedge.net.
- e8091.a.akamaiedge.net. 30 IN A 23.206.93.85
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): tags.tiqcdn.com.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:05 3419665#129 [debug] DNSFwd: Checking CNAME tags.tiqcdn.com.edgekey.net. for tags.tiqcdn.com.
- 2020/11/02 16:30:05 3419665#129 [debug] DNSFwd: Checking CNAME e8091.a.akamaiedge.net. for tags.tiqcdn.com.edgekey.net.
- 2020/11/02 16:30:05 3419665#129 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 3825
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;tags.tiqcdn.com. IN AAAA
- ;; ANSWER SECTION:
- tags.tiqcdn.com. 300 IN CNAME tags.tiqcdn.com.edgekey.net.
- tags.tiqcdn.com.edgekey.net. 300 IN CNAME e8091.a.akamaiedge.net.
- ;; AUTHORITY SECTION:
- a.akamaiedge.net. 476 IN SOA n0a.akamaiedge.net. hostmaster.akamai.com. 1604330481 1000 1000 1000 1800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35034
- 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4158
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN A
- 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35034
- 2020/11/02 16:30:05 3419665#93 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
- 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52793
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN AAAA
- 2020/11/02 16:30:05 3419665#94 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
- 2020/11/02 16:30:05 3419665#93 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
- 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
- 2020/11/02 16:30:05 3419665#93 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4158
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN A
- ;; ANSWER SECTION:
- dev.visualwebsiteoptimizer.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:05 3419665#94 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
- 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
- 2020/11/02 16:30:05 3419665#94 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52793
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN AAAA
- ;; ANSWER SECTION:
- dev.visualwebsiteoptimizer.com. 10 IN AAAA ::
- 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.36:63049
- 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21291
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;noam.presence.teams.microsoft.com. IN A
- 2020/11/02 16:30:06 3419665#95 [debug] AutoHosts: answer: noam.presence.teams.microsoft.com -> []
- 2020/11/02 16:30:06 3419665#95 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#95 [debug] 127.0.0.1:5335: sending request A noam.presence.teams.microsoft.com.
- 2020/11/02 16:30:06 3419665#95 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;noam.presence.teams.microsoft.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking CNAME noam.presence.services.sfb.trafficmanager.net. for noam.presence.teams.microsoft.com.
- 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking CNAME a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com. for noam.presence.services.sfb.trafficmanager.net.
- 2020/11/02 16:30:06 3419665#95 [debug] DNSFwd: Checking record A (52.114.128.87) for a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com.
- 2020/11/02 16:30:06 3419665#95 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21291
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;noam.presence.teams.microsoft.com. IN A
- ;; ANSWER SECTION:
- noam.presence.teams.microsoft.com. 1615 IN CNAME noam.presence.services.sfb.trafficmanager.net.
- noam.presence.services.sfb.trafficmanager.net. 30 IN CNAME a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com.
- a-ups-presence6-prod-azsc.centralus.cloudapp.azure.com. 30 IN A 52.114.128.87
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42698
- 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62471
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN AAAA
- 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42698
- 2020/11/02 16:30:06 3419665#145 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
- 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 64259
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN A
- 2020/11/02 16:30:06 3419665#96 [debug] AutoHosts: answer: dev.visualwebsiteoptimizer.com -> []
- 2020/11/02 16:30:06 3419665#145 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
- 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
- 2020/11/02 16:30:06 3419665#96 [debug] Filtering: found rule for host 'dev.visualwebsiteoptimizer.com': '||dev.visualwebsiteoptimizer.com^' list_id: 1604323042
- 2020/11/02 16:30:06 3419665#145 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62471
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN AAAA
- ;; ANSWER SECTION:
- dev.visualwebsiteoptimizer.com. 10 IN AAAA ::
- 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host dev.visualwebsiteoptimizer.com is filtered, reason - 'FilteredBlackList', matched rule: '||dev.visualwebsiteoptimizer.com^'
- 2020/11/02 16:30:06 3419665#96 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 64259
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;dev.visualwebsiteoptimizer.com. IN A
- ;; ANSWER SECTION:
- dev.visualwebsiteoptimizer.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:34644
- 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 12174
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- 2020/11/02 16:30:06 3419665#130 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:06 3419665#130 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#130 [debug] 127.0.0.1:5335: sending request A detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#130 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;detectportal.firefox.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:06 3419665#130 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:06 3419665#130 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 12174
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- ;; ANSWER SECTION:
- detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 1178 IN A 34.107.221.82
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39690
- 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1698
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- 2020/11/02 16:30:06 3419665#131 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:06 3419665#131 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#131 [debug] 127.0.0.1:5335: sending request A mozilla.org.
- 2020/11/02 16:30:06 3419665#131 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#131 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
- 2020/11/02 16:30:06 3419665#131 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 1698
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- ;; ANSWER SECTION:
- mozilla.org. 30 IN A 63.245.208.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40485
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61567
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- 2020/11/02 16:30:06 3419665#133 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:06 3419665#133 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#133 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
- 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40485
- 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 33405
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- 2020/11/02 16:30:06 3419665#132 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:06 3419665#132 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#132 [debug] Serving response from general cache
- 2020/11/02 16:30:06 3419665#132 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
- 2020/11/02 16:30:06 3419665#132 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 33405
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- ;; ANSWER SECTION:
- mozilla.org. 30 IN A 63.245.208.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52878
- 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18217
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- 2020/11/02 16:30:06 3419665#134 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:06 3419665#134 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#134 [debug] Serving response from general cache
- 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:06 3419665#134 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:06 3419665#134 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18217
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- ;; ANSWER SECTION:
- detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 30 IN A 34.107.221.82
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#133 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:06 3419665#133 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61567
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- ;; AUTHORITY SECTION:
- mozilla.org. 30 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41699
- 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13907
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN AAAA
- 2020/11/02 16:30:06 3419665#136 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:06 3419665#136 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#136 [debug] 127.0.0.1:5335: sending request AAAA detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41699
- 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 49233
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- 2020/11/02 16:30:06 3419665#135 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:06 3419665#135 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#135 [debug] Serving response from general cache
- 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:06 3419665#135 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:06 3419665#135 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 49233
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- ;; ANSWER SECTION:
- detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 30 IN A 34.107.221.82
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#136 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;detectportal.firefox.com. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:06 3419665#136 [debug] DNSFwd: Checking record AAAA (2600:1901:0:38d7::) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:06 3419665#136 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13907
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN AAAA
- ;; ANSWER SECTION:
- detectportal.firefox.com. 30 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 30 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 38 IN AAAA 2600:1901:0:38d7::
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:57107
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61650
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- 2020/11/02 16:30:06 3419665#138 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:06 3419665#138 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#138 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
- 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:57107
- 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57041
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- 2020/11/02 16:30:06 3419665#137 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:06 3419665#137 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#137 [debug] Serving response from general cache
- 2020/11/02 16:30:06 3419665#137 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
- 2020/11/02 16:30:06 3419665#137 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 57041
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- ;; ANSWER SECTION:
- mozilla.org. 30 IN A 63.245.208.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#138 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:06 3419665#138 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61650
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- ;; AUTHORITY SECTION:
- mozilla.org. 30 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
- 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55976
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN AAAA
- 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
- 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65207
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN A
- 2020/11/02 16:30:06 3419665#115 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40199 based on IP only
- 2020/11/02 16:30:06 3419665#116 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
- 2020/11/02 16:30:06 3419665#116 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
- 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
- 2020/11/02 16:30:06 3419665#116 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55976
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN AAAA
- ;; ANSWER SECTION:
- tentacles.smartocto.com. 10 IN AAAA ::
- 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52920
- 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15629
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sb.scorecardresearch.com. IN A
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52920
- 2020/11/02 16:30:06 3419665#117 [debug] AutoHosts: answer: sb.scorecardresearch.com -> []
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 28937
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sb.scorecardresearch.com. IN AAAA
- 2020/11/02 16:30:06 3419665#118 [debug] AutoHosts: answer: sb.scorecardresearch.com -> []
- 2020/11/02 16:30:06 3419665#117 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#117 [debug] 127.0.0.1:5335: sending request A sb.scorecardresearch.com.
- 2020/11/02 16:30:06 3419665#118 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:06 3419665#118 [debug] 127.0.0.1:5335: sending request AAAA sb.scorecardresearch.com.
- 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41194
- 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 4635
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;static.hotjar.com. IN A
- 2020/11/02 16:30:06 3419665#119 [debug] AutoHosts: answer: static.hotjar.com -> []
- 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41194
- 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 18692
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;static.hotjar.com. IN AAAA
- 2020/11/02 16:30:06 3419665#139 [debug] AutoHosts: answer: static.hotjar.com -> []
- 2020/11/02 16:30:06 3419665#119 [debug] Filtering: found rule for host 'static.hotjar.com': '||hotjar.com^' list_id: 1
- 2020/11/02 16:30:06 3419665#139 [debug] Filtering: found rule for host 'static.hotjar.com': '||hotjar.com^' list_id: 1
- 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host static.hotjar.com is filtered, reason - 'FilteredBlackList', matched rule: '||hotjar.com^'
- 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host static.hotjar.com is filtered, reason - 'FilteredBlackList', matched rule: '||hotjar.com^'
- 2020/11/02 16:30:06 3419665#119 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 4635
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;static.hotjar.com. IN A
- ;; ANSWER SECTION:
- static.hotjar.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:06 3419665#139 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 18692
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;static.hotjar.com. IN AAAA
- ;; ANSWER SECTION:
- static.hotjar.com. 10 IN AAAA ::
- 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
- 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
- 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2743
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN A
- 2020/11/02 16:30:06 3419665#120 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:56554 based on IP only
- 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1449
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN AAAA
- 2020/11/02 16:30:06 3419665#121 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:56554 based on IP only
- 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
- 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 38425
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN A
- 2020/11/02 16:30:06 3419665#146 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:60540 based on IP only
- 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
- 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 26909
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN AAAA
- 2020/11/02 16:30:06 3419665#122 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:60540 based on IP only
- 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN A
- 2020/11/02 16:30:06 3419665#147 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
- 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN AAAA
- 2020/11/02 16:30:06 3419665#148 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
- 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
- 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62595
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN A
- 2020/11/02 16:30:06 3419665#140 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
- 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
- 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
- 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 133
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN AAAA
- 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35059
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN A
- 2020/11/02 16:30:06 3419665#143 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
- 2020/11/02 16:30:06 3419665#141 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
- 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
- 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31472
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN AAAA
- 2020/11/02 16:30:06 3419665#142 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
- 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
- 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6893
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN A
- 2020/11/02 16:30:06 3419665#144 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
- 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
- 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57071
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
- 2020/11/02 16:30:06 3419665#161 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
- 2020/11/02 16:30:06 3419665#117 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sb.scorecardresearch.com. IN A. Elapsed 76 ms.
- 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 76 ms
- 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking CNAME sb.scorecardresearch.com.edgekey.net. for sb.scorecardresearch.com.
- 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking CNAME e8736.e7.akamaiedge.net. for sb.scorecardresearch.com.edgekey.net.
- 2020/11/02 16:30:06 3419665#117 [debug] DNSFwd: Checking record A (2.20.130.64) for e8736.e7.akamaiedge.net.
- 2020/11/02 16:30:06 3419665#117 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 15629
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sb.scorecardresearch.com. IN A
- ;; ANSWER SECTION:
- sb.scorecardresearch.com. 2946 IN CNAME sb.scorecardresearch.com.edgekey.net.
- sb.scorecardresearch.com.edgekey.net. 300 IN CNAME e8736.e7.akamaiedge.net.
- e8736.e7.akamaiedge.net. 300 IN A 2.20.130.64
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#118 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sb.scorecardresearch.com. IN AAAA. Elapsed 79 ms.
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 79 ms
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): sb.scorecardresearch.com.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:06 3419665#118 [debug] DNSFwd: Checking CNAME sb.scorecardresearch.com.edgekey.net. for sb.scorecardresearch.com.
- 2020/11/02 16:30:06 3419665#118 [debug] DNSFwd: Checking CNAME e8736.e7.akamaiedge.net. for sb.scorecardresearch.com.edgekey.net.
- 2020/11/02 16:30:06 3419665#118 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 28937
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sb.scorecardresearch.com. IN AAAA
- ;; ANSWER SECTION:
- sb.scorecardresearch.com. 2946 IN CNAME sb.scorecardresearch.com.edgekey.net.
- sb.scorecardresearch.com.edgekey.net. 300 IN CNAME e8736.e7.akamaiedge.net.
- ;; AUTHORITY SECTION:
- e7.akamaiedge.net. 1000 IN SOA n0e7.akamaiedge.net. hostmaster.akamai.com. 1604331006 1000 1000 1000 1800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54011
- 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24441
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:54011
- 2020/11/02 16:30:06 3419665#163 [debug] AutoHosts: answer: w.usabilla.com -> []
- 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 52325
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- 2020/11/02 16:30:06 3419665#162 [debug] AutoHosts: answer: w.usabilla.com -> []
- 2020/11/02 16:30:06 3419665#163 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
- 2020/11/02 16:30:06 3419665#162 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
- 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
- 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
- 2020/11/02 16:30:06 3419665#163 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24441
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- ;; ANSWER SECTION:
- w.usabilla.com. 10 IN AAAA ::
- 2020/11/02 16:30:06 3419665#162 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 52325
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- ;; ANSWER SECTION:
- w.usabilla.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
- 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15909
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- 2020/11/02 16:30:06 3419665#165 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
- 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
- 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29990
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- 2020/11/02 16:30:06 3419665#164 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
- 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
- 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65207
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN A
- 2020/11/02 16:30:11 3419665#166 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
- 2020/11/02 16:30:11 3419665#166 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
- 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
- 2020/11/02 16:30:11 3419665#166 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 65207
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN A
- ;; ANSWER SECTION:
- tentacles.smartocto.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40199
- 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 55976
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN AAAA
- 2020/11/02 16:30:11 3419665#149 [debug] AutoHosts: answer: tentacles.smartocto.com -> []
- 2020/11/02 16:30:11 3419665#149 [debug] Filtering: found rule for host 'tentacles.smartocto.com': '||smartocto.com^' list_id: 1
- 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host tentacles.smartocto.com is filtered, reason - 'FilteredBlackList', matched rule: '||smartocto.com^'
- 2020/11/02 16:30:11 3419665#149 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 55976
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;tentacles.smartocto.com. IN AAAA
- ;; ANSWER SECTION:
- tentacles.smartocto.com. 10 IN AAAA ::
- 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41137
- 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58965
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef.Obelix. IN A
- 2020/11/02 16:30:11 3419665#150 [debug] AutoHosts: answer: telef.obelix -> []
- 2020/11/02 16:30:11 3419665#150 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#150 [debug] 127.0.0.1:5335: sending request A telef.Obelix.
- 2020/11/02 16:30:11 3419665#150 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef.Obelix. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:11 3419665#150 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#150 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 58965
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41137
- 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6990
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef.Obelix. IN AAAA
- 2020/11/02 16:30:11 3419665#151 [debug] AutoHosts: answer: telef.obelix -> []
- 2020/11/02 16:30:11 3419665#151 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#151 [debug] 127.0.0.1:5335: sending request AAAA telef.Obelix.
- 2020/11/02 16:30:11 3419665#151 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef.Obelix. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:11 3419665#151 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#151 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 6990
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41371
- 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13371
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef. IN A
- 2020/11/02 16:30:11 3419665#152 [debug] AutoHosts: answer: telef -> []
- 2020/11/02 16:30:11 3419665#152 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#152 [debug] 127.0.0.1:5335: sending request A telef.
- 2020/11/02 16:30:11 3419665#152 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef. IN A. Elapsed 18 ms.
- 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 18 ms
- 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: tel. 86400 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
- 2020/11/02 16:30:11 3419665#152 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#152 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 13371
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef. IN A
- ;; AUTHORITY SECTION:
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- tel. 86400 IN NSEC temasek. NS DS RRSIG NSEC
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41371
- 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62776
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef. IN AAAA
- 2020/11/02 16:30:11 3419665#153 [debug] AutoHosts: answer: telef -> []
- 2020/11/02 16:30:11 3419665#153 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#153 [debug] 127.0.0.1:5335: sending request AAAA telef.
- 2020/11/02 16:30:11 3419665#153 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telef. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: tel. 86400 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
- 2020/11/02 16:30:11 3419665#153 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#153 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 62776
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef. IN AAAA
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- tel. 86400 IN NSEC temasek. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52121
- 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 23693
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef.Obelix. IN A
- 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52121
- 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 247
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef.Obelix. IN AAAA
- 2020/11/02 16:30:11 3419665#154 [debug] AutoHosts: answer: telef.obelix -> []
- 2020/11/02 16:30:11 3419665#155 [debug] AutoHosts: answer: telef.obelix -> []
- 2020/11/02 16:30:11 3419665#154 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#154 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#155 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#155 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#154 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: nz. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:11 3419665#155 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#154 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 23693
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#155 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 247
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3168 IN NSEC obi. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35525
- 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35525
- 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 30913
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef. IN A
- 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58819
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telef. IN AAAA
- 2020/11/02 16:30:11 3419665#156 [debug] AutoHosts: answer: telef -> []
- 2020/11/02 16:30:11 3419665#157 [debug] AutoHosts: answer: telef -> []
- 2020/11/02 16:30:11 3419665#156 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#157 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#156 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#157 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: tel. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
- 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: tel. 3168 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . RYGw8TjZU0lnDlKnxaHZt3t/c2Ga1m+JHkkRfmuqlfdeIGnVUiGamx+a6bF/V6ZUWxHSrFdxIIHj8iju3ALldSseSjE0+M7tc03g5u43GTKVtFs5qQEUfJzjI3YFp1lTSVByd7txEu+11YmjnC5KFdoVRKOcqXWXYUa3G0sO2YBpQCroLve7uV9RLpV6SJApQJ6fRKyS6vaSnANsvvzWKrCh4+IKKQD1o5HpV9zAViNUWuC/pvbPlCmQ2+9mBRMbwRXmbs2P0HIny8ExZ62DsEEnl8xPX84cjtdHT1k6TIOW8F8qRiXZMkJ0lcv+0bkd5+vzWrnO0xJxy3LhrKvTaw==
- 2020/11/02 16:30:11 3419665#157 [debug] Removing RRSIG record from response: . 3168 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:11 3419665#157 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 58819
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef. IN AAAA
- ;; AUTHORITY SECTION:
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- tel. 3168 IN NSEC temasek. NS DS RRSIG NSEC
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#156 [debug] Removing RRSIG record from response: . 3168 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:11 3419665#156 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 30913
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telef. IN A
- ;; AUTHORITY SECTION:
- . 3168 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- tel. 3168 IN NSEC temasek. NS DS RRSIG NSEC
- . 3168 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41203
- 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 25742
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- 2020/11/02 16:30:11 3419665#167 [debug] AutoHosts: answer: www.google.com -> []
- 2020/11/02 16:30:11 3419665#167 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#167 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
- 2020/11/02 16:30:11 3419665#167 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 25742
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- ;; ANSWER SECTION:
- www.google.com. 2 IN A 142.250.27.99
- www.google.com. 2 IN A 142.250.27.103
- www.google.com. 2 IN A 142.250.27.106
- www.google.com. 2 IN A 142.250.27.147
- www.google.com. 2 IN A 142.250.27.104
- www.google.com. 2 IN A 142.250.27.105
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47584
- 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 25414
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.google.com. IN AAAA
- 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47584
- 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48452
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- 2020/11/02 16:30:11 3419665#169 [debug] AutoHosts: answer: www.google.com -> []
- 2020/11/02 16:30:11 3419665#169 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#168 [debug] AutoHosts: answer: www.google.com -> []
- 2020/11/02 16:30:11 3419665#169 [debug] 127.0.0.1:5335: sending request AAAA www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#168 [debug] Serving response from general cache
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.99) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.103) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.106) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.147) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.104) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] DNSFwd: Checking record A (142.250.27.105) for www.google.com.
- 2020/11/02 16:30:11 3419665#168 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48452
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.google.com. IN A
- ;; ANSWER SECTION:
- www.google.com. 2 IN A 142.250.27.99
- www.google.com. 2 IN A 142.250.27.103
- www.google.com. 2 IN A 142.250.27.106
- www.google.com. 2 IN A 142.250.27.147
- www.google.com. 2 IN A 142.250.27.104
- www.google.com. 2 IN A 142.250.27.105
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#169 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.google.com. IN AAAA. Elapsed 16 ms.
- 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 16 ms
- 2020/11/02 16:30:11 3419665#169 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80b::2004) for www.google.com.
- 2020/11/02 16:30:11 3419665#169 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 25414
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.google.com. IN AAAA
- ;; ANSWER SECTION:
- www.google.com. 300 IN AAAA 2a00:1450:400e:80b::2004
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52883
- 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52883
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 19617
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telegraaf.nl. IN AAAA
- 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13738
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;telegraaf.nl. IN A
- 2020/11/02 16:30:11 3419665#158 [debug] AutoHosts: answer: telegraaf.nl -> []
- 2020/11/02 16:30:11 3419665#159 [debug] AutoHosts: answer: telegraaf.nl -> []
- 2020/11/02 16:30:11 3419665#158 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#158 [debug] 127.0.0.1:5335: sending request A telegraaf.nl.
- 2020/11/02 16:30:11 3419665#159 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#159 [debug] 127.0.0.1:5335: sending request AAAA telegraaf.nl.
- 2020/11/02 16:30:11 3419665#159 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#158 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telegraaf.nl. IN AAAA. Elapsed 43 ms.
- 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;telegraaf.nl. IN A. Elapsed 43 ms.
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 43 ms
- 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 43 ms
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): telegraaf.nl.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:11 3419665#158 [debug] DNSFwd: Checking record A (83.96.244.140) for telegraaf.nl.
- 2020/11/02 16:30:11 3419665#159 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 19617
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telegraaf.nl. IN AAAA
- ;; AUTHORITY SECTION:
- telegraaf.nl. 3600 IN SOA donna.ns.cloudflare.com. dns.cloudflare.com. 2035566889 10000 2400 604800 3600
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#158 [debug] DNSFwd: Checking record A (83.96.244.141) for telegraaf.nl.
- 2020/11/02 16:30:11 3419665#158 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13738
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;telegraaf.nl. IN A
- ;; ANSWER SECTION:
- telegraaf.nl. 300 IN A 83.96.244.140
- telegraaf.nl. 300 IN A 83.96.244.141
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
- 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:56554
- 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2743
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN A
- 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 1449
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN AAAA
- 2020/11/02 16:30:11 3419665#123 [debug] AutoHosts: answer: csm.cxpublic.com -> []
- 2020/11/02 16:30:11 3419665#124 [debug] AutoHosts: answer: csm.cxpublic.com -> []
- 2020/11/02 16:30:11 3419665#123 [debug] Filtering: found rule for host 'csm.cxpublic.com': '||cxpublic.com^' list_id: 1604323042
- 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host csm.cxpublic.com is filtered, reason - 'FilteredBlackList', matched rule: '||cxpublic.com^'
- 2020/11/02 16:30:11 3419665#124 [debug] Filtering: found rule for host 'csm.cxpublic.com': '||cxpublic.com^' list_id: 1604323042
- 2020/11/02 16:30:11 3419665#123 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 2743
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN A
- ;; ANSWER SECTION:
- csm.cxpublic.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host csm.cxpublic.com is filtered, reason - 'FilteredBlackList', matched rule: '||cxpublic.com^'
- 2020/11/02 16:30:11 3419665#124 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 1449
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;csm.cxpublic.com. IN AAAA
- ;; ANSWER SECTION:
- csm.cxpublic.com. 10 IN AAAA ::
- 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
- 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:60540
- 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 38425
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN A
- 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 26909
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN AAAA
- 2020/11/02 16:30:11 3419665#125 [debug] AutoHosts: answer: cdn.krxd.net -> []
- 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN A
- 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN AAAA
- 2020/11/02 16:30:11 3419665#127 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
- 2020/11/02 16:30:11 3419665#126 [debug] AutoHosts: answer: cdn.krxd.net -> []
- 2020/11/02 16:30:11 3419665#128 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:40007 based on IP only
- 2020/11/02 16:30:11 3419665#127 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:11 3419665#127 [debug] 127.0.0.1:5335: sending request A sat.public.bd.313.nl.
- 2020/11/02 16:30:11 3419665#125 [debug] Filtering: found rule for host 'cdn.krxd.net': '||cdn.krxd.net^' list_id: 1604323042
- 2020/11/02 16:30:11 3419665#126 [debug] Filtering: found rule for host 'cdn.krxd.net': '||cdn.krxd.net^' list_id: 1604323042
- 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host cdn.krxd.net is filtered, reason - 'FilteredBlackList', matched rule: '||cdn.krxd.net^'
- 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host cdn.krxd.net is filtered, reason - 'FilteredBlackList', matched rule: '||cdn.krxd.net^'
- 2020/11/02 16:30:11 3419665#125 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 38425
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN A
- ;; ANSWER SECTION:
- cdn.krxd.net. 10 IN A 0.0.0.0
- 2020/11/02 16:30:11 3419665#126 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 26909
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdn.krxd.net. IN AAAA
- ;; ANSWER SECTION:
- cdn.krxd.net. 10 IN AAAA ::
- 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
- 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
- 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57071
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
- 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62595
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN A
- 2020/11/02 16:30:11 3419665#180 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
- 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48192
- 2020/11/02 16:30:11 3419665#177 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
- 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:35329
- 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 133
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN AAAA
- 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 6893
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN A
- 2020/11/02 16:30:11 3419665#179 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:35329 based on IP only
- 2020/11/02 16:30:11 3419665#178 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48192 based on IP only
- 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
- 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
- 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35016
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3778
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- 2020/11/02 16:30:11 3419665#182 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:53629 based on IP only
- 2020/11/02 16:30:11 3419665#181 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:53629 based on IP only
- 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
- 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31472
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN AAAA
- 2020/11/02 16:30:11 3419665#37 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
- 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:59966
- 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35059
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN A
- 2020/11/02 16:30:11 3419665#36 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:59966 based on IP only
- 2020/11/02 16:30:11 3419665#127 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sat.public.bd.313.nl. IN A. Elapsed 31 ms.
- 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 31 ms
- 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (52.51.30.134) for sat.public.bd.313.nl.
- 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (54.72.70.5) for sat.public.bd.313.nl.
- 2020/11/02 16:30:11 3419665#127 [debug] DNSFwd: Checking record A (18.203.10.86) for sat.public.bd.313.nl.
- 2020/11/02 16:30:11 3419665#127 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 31981
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN A
- ;; ANSWER SECTION:
- sat.public.bd.313.nl. 300 IN A 52.51.30.134
- sat.public.bd.313.nl. 300 IN A 54.72.70.5
- sat.public.bd.313.nl. 300 IN A 18.203.10.86
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
- 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:48624
- 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 15909
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- 2020/11/02 16:30:11 3419665#184 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
- 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29990
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- 2020/11/02 16:30:11 3419665#183 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:48624 based on IP only
- 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 31981
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN A
- 2020/11/02 16:30:16 3419665#38 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
- 2020/11/02 16:30:16 3419665#38 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#38 [debug] Serving response from general cache
- 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (52.51.30.134) for sat.public.bd.313.nl.
- 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (54.72.70.5) for sat.public.bd.313.nl.
- 2020/11/02 16:30:16 3419665#38 [debug] DNSFwd: Checking record A (18.203.10.86) for sat.public.bd.313.nl.
- 2020/11/02 16:30:16 3419665#38 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 31981
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN A
- ;; ANSWER SECTION:
- sat.public.bd.313.nl. 295 IN A 52.51.30.134
- sat.public.bd.313.nl. 295 IN A 54.72.70.5
- sat.public.bd.313.nl. 295 IN A 18.203.10.86
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:40007
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46994
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN AAAA
- 2020/11/02 16:30:16 3419665#39 [debug] AutoHosts: answer: sat.public.bd.313.nl -> []
- 2020/11/02 16:30:16 3419665#39 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#39 [debug] 127.0.0.1:5335: sending request AAAA sat.public.bd.313.nl.
- 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46892
- 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 42750
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A
- 2020/11/02 16:30:16 3419665#40 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net.obelix -> []
- 2020/11/02 16:30:16 3419665#40 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#40 [debug] 127.0.0.1:5335: sending request A d20kyoxkb5vbjm.cloudfront.net.Obelix.
- 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55260
- 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:55260
- 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 19574
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com.Obelix. IN A
- 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 65390
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com.Obelix. IN AAAA
- 2020/11/02 16:30:16 3419665#41 [debug] AutoHosts: answer: scdn.cxense.com.obelix -> []
- 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:46892
- 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61939
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA
- 2020/11/02 16:30:16 3419665#40 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#42 [debug] AutoHosts: answer: scdn.cxense.com.obelix -> []
- 2020/11/02 16:30:16 3419665#41 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:16 3419665#43 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net.obelix -> []
- 2020/11/02 16:30:16 3419665#42 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:16 3419665#41 [debug] 127.0.0.1:5335: sending request A scdn.cxense.com.Obelix.
- 2020/11/02 16:30:16 3419665#42 [debug] 127.0.0.1:5335: sending request AAAA scdn.cxense.com.Obelix.
- 2020/11/02 16:30:16 3419665#43 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#43 [debug] 127.0.0.1:5335: sending request AAAA d20kyoxkb5vbjm.cloudfront.net.Obelix.
- 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#41 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;scdn.cxense.com.Obelix. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:16 3419665#40 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#40 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 42750
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#41 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#41 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 19574
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;scdn.cxense.com.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#43 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:16 3419665#42 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;scdn.cxense.com.Obelix. IN AAAA. Elapsed 1 ms.
- 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#43 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#43 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 61939
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#42 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#42 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 65390
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;scdn.cxense.com.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50366
- 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36569
- 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35291
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
- 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 54589
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN AAAA
- 2020/11/02 16:30:16 3419665#45 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net -> []
- 2020/11/02 16:30:16 3419665#186 [debug] AutoHosts: answer: scdn.cxense.com -> []
- 2020/11/02 16:30:16 3419665#45 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#45 [debug] 127.0.0.1:5335: sending request AAAA d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#186 [debug] Filtering: found rule for host 'scdn.cxense.com': '||scdn.cxense.com^' list_id: 1604323042
- 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host scdn.cxense.com is filtered, reason - 'FilteredBlackList', matched rule: '||scdn.cxense.com^'
- 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36569
- 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62522
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN A
- 2020/11/02 16:30:16 3419665#186 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 54589
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN AAAA
- ;; ANSWER SECTION:
- scdn.cxense.com. 10 IN AAAA ::
- 2020/11/02 16:30:16 3419665#185 [debug] AutoHosts: answer: scdn.cxense.com -> []
- 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43785
- 2020/11/02 16:30:16 3419665#185 [debug] Filtering: found rule for host 'scdn.cxense.com': '||scdn.cxense.com^' list_id: 1604323042
- 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 5888
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl.Obelix. IN AAAA
- 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host scdn.cxense.com is filtered, reason - 'FilteredBlackList', matched rule: '||scdn.cxense.com^'
- 2020/11/02 16:30:16 3419665#185 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62522
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;scdn.cxense.com. IN A
- ;; ANSWER SECTION:
- scdn.cxense.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:43785
- 2020/11/02 16:30:16 3419665#188 [debug] AutoHosts: answer: beak.bd.313.nl.obelix -> []
- 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 37404
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl.Obelix. IN A
- 2020/11/02 16:30:16 3419665#187 [debug] AutoHosts: answer: beak.bd.313.nl.obelix -> []
- 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50366
- 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
- 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 32231
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN A
- 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 3778
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- 2020/11/02 16:30:16 3419665#44 [debug] AutoHosts: answer: d20kyoxkb5vbjm.cloudfront.net -> []
- 2020/11/02 16:30:16 3419665#160 [debug] AutoHosts: answer: www.telegraaf.nl -> []
- 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:53629
- 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 35016
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- 2020/11/02 16:30:16 3419665#193 [debug] AutoHosts: answer: www.telegraaf.nl -> []
- 2020/11/02 16:30:16 3419665#44 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#193 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#44 [debug] 127.0.0.1:5335: sending request A d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#193 [debug] 127.0.0.1:5335: sending request AAAA www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#187 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#188 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#187 [debug] 127.0.0.1:5335: sending request A beak.bd.313.nl.Obelix.
- 2020/11/02 16:30:16 3419665#160 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#188 [debug] 127.0.0.1:5335: sending request AAAA beak.bd.313.nl.Obelix.
- 2020/11/02 16:30:16 3419665#160 [debug] 127.0.0.1:5335: sending request A www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#187 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;beak.bd.313.nl.Obelix. IN A. Elapsed 1 ms.
- 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#187 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#187 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 37404
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;beak.bd.313.nl.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#188 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;beak.bd.313.nl.Obelix. IN AAAA. Elapsed 1 ms.
- 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#188 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#188 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 5888
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;beak.bd.313.nl.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36136
- 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36136
- 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61745
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN AAAA
- 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48956
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN A
- 2020/11/02 16:30:16 3419665#171 [debug] AutoHosts: answer: beak.bd.313.nl -> []
- 2020/11/02 16:30:16 3419665#170 [debug] AutoHosts: answer: beak.bd.313.nl -> []
- 2020/11/02 16:30:16 3419665#171 [debug] Filtering: found rule for host 'beak.bd.313.nl': '||beak.bd.313.nl^' list_id: 1
- 2020/11/02 16:30:16 3419665#170 [debug] Filtering: found rule for host 'beak.bd.313.nl': '||beak.bd.313.nl^' list_id: 1
- 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host beak.bd.313.nl is filtered, reason - 'FilteredBlackList', matched rule: '||beak.bd.313.nl^'
- 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host beak.bd.313.nl is filtered, reason - 'FilteredBlackList', matched rule: '||beak.bd.313.nl^'
- 2020/11/02 16:30:16 3419665#171 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61745
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN AAAA
- ;; ANSWER SECTION:
- beak.bd.313.nl. 10 IN AAAA ::
- 2020/11/02 16:30:16 3419665#170 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48956
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;beak.bd.313.nl. IN A
- ;; ANSWER SECTION:
- beak.bd.313.nl. 10 IN A 0.0.0.0
- 2020/11/02 16:30:16 3419665#39 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sat.public.bd.313.nl. IN AAAA. Elapsed 16 ms.
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 16 ms
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): sat.public.bd.313.nl.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:16 3419665#39 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 46994
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sat.public.bd.313.nl. IN AAAA
- ;; AUTHORITY SECTION:
- public.bd.313.nl. 900 IN SOA ns-1877.awsdns-42.co.uk. awsdns-hostmaster.amazon.com. 1 7200 900 1209600 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51370
- 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:51370
- 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11124
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com.Obelix. IN A
- 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7538
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com.Obelix. IN AAAA
- 2020/11/02 16:30:16 3419665#189 [debug] AutoHosts: answer: w.usabilla.com.obelix -> []
- 2020/11/02 16:30:16 3419665#189 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#189 [debug] 127.0.0.1:5335: sending request A w.usabilla.com.Obelix.
- 2020/11/02 16:30:16 3419665#190 [debug] AutoHosts: answer: w.usabilla.com.obelix -> []
- 2020/11/02 16:30:16 3419665#160 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#190 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.telegraaf.nl. IN A. Elapsed 25 ms.
- 2020/11/02 16:30:16 3419665#190 [debug] 127.0.0.1:5335: sending request AAAA w.usabilla.com.Obelix.
- 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 25 ms
- 2020/11/02 16:30:16 3419665#160 [debug] DNSFwd: Checking record A (104.18.20.245) for www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#160 [debug] DNSFwd: Checking record A (104.18.21.245) for www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#160 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 3778
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- ;; ANSWER SECTION:
- www.telegraaf.nl. 300 IN A 104.18.20.245
- www.telegraaf.nl. 300 IN A 104.18.21.245
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#189 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;w.usabilla.com.Obelix. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#189 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#189 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 11124
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;w.usabilla.com.Obelix. IN A
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#193 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;www.telegraaf.nl. IN AAAA. Elapsed 26 ms.
- 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 26 ms
- 2020/11/02 16:30:16 3419665#193 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:14f5) for www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#193 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:15f5) for www.telegraaf.nl.
- 2020/11/02 16:30:16 3419665#193 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 35016
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- ;; ANSWER SECTION:
- www.telegraaf.nl. 300 IN AAAA 2606:4700::6812:14f5
- www.telegraaf.nl. 300 IN AAAA 2606:4700::6812:15f5
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#190 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;w.usabilla.com.Obelix. IN AAAA. Elapsed 1 ms.
- 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: . 3163 IN RRSIG NSEC 8 0 86400 20201115050000 20201102040000 26116 . Vajs1noA5nJBpjd1+YElK0H/0F8O18Yqt1T6k+e/rawTjHfTzUS1ts0m3TU2OIS69ZF6pHELpF8lWIvSSsEzwnFluqVe/eRv1i+zO0H7JcA+9k/CVGJHEfxybCwIRSkiNPS+iRqwwCQmykN4T4k7W7MR+N8vqQQORYJycKwF9saAkJDiTmx+/WtughhcYRnRsyZgLSeFa/+u83cFGz6ryUqjGzsEZ9T/S8m9E7oHqKpgALEIl9S6dgA9dUaLr7GSFvG66/j/jjOs+FF3Uy7s8dKNH8qhArnCqLwrF9LW95wHhatMs+HJMsrMTH/DMfgvgk3ODVoznhnrxTmmKv9Kog==
- 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: nz. 3163 IN RRSIG NSEC 8 1 86400 20201115050000 20201102040000 26116 . T5ZZLmTQe/5YzA8/6iktqIwkWUsvyE46uDbEQ5EDyLIyLk0cYsoWjW9nFHhEOgIQciNvSzfXp8zZR2rmqoXRKSrV/jyN4Gjt6aVz95IWakLOyjSiP0sNhEOvz9WWWkMVUotezXfiUcYL02pEUlGn632bZKnbmSqTVLjKd5cchxtGsPLNGX5HZ8gnOhBa8c4T2kEEAbHVGHhHb9UxxbODfrIeaGmbq10LZH8h42vSYgga1ThGxesqFgvp8gSxAEM225DOR2gd4+qSGtLK1Oo3EgWf7kbRnVOXq3vr7rFGf7pl8VGi+hjejawLYFTLMD7AJuVgtzu8f0NKSXiMxyNeOQ==
- 2020/11/02 16:30:16 3419665#190 [debug] Removing RRSIG record from response: . 3163 IN RRSIG SOA 8 0 86400 20201115050000 20201102040000 26116 . OocmjQelmPWqyjO0h4se9giUfwXQEwJCosM571zHcQbXn7f1J8rJb52Tq+WzPcsj5RMQmPjsRfccrnRZodAAR0lX1cag16PA0/5SRWYqtlHiyAbNgNh44qHKNr5hi8CrHvP/8AYnSbhG4UhzS0PN5VyY5zqPPPuV/Y3ZE2aQjdc39+tqOfuaurvrB5zcbPchg6/ar0Gm6kwnjzLSBBc+WbgEmjIi+qYd9fckgROkkGsOATMpEJPcgkCopxLI9CYMTNOH+9MOrzflevm1qoYsKYX1YXttk8AUBKMl3nwuGBnzwxvDl1a/GUnEH92AKKAn9230agUOJzI8NkRRYtYlog==
- 2020/11/02 16:30:16 3419665#190 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NXDOMAIN, id: 7538
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;w.usabilla.com.Obelix. IN AAAA
- ;; AUTHORITY SECTION:
- . 3163 IN NSEC aaa. NS SOA RRSIG NSEC DNSKEY
- nz. 3163 IN NSEC obi. NS DS RRSIG NSEC
- . 3163 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020110200 1800 900 604800 86400
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45709
- 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 46522
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- 2020/11/02 16:30:16 3419665#192 [debug] AutoHosts: answer: w.usabilla.com -> []
- 2020/11/02 16:30:16 3419665#192 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
- 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
- 2020/11/02 16:30:16 3419665#192 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 46522
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN AAAA
- ;; ANSWER SECTION:
- w.usabilla.com. 10 IN AAAA ::
- 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45709
- 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 9406
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- 2020/11/02 16:30:16 3419665#191 [debug] AutoHosts: answer: w.usabilla.com -> []
- 2020/11/02 16:30:16 3419665#191 [debug] Filtering: found rule for host 'w.usabilla.com': '||usabilla.com^' list_id: 1604323042
- 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host w.usabilla.com is filtered, reason - 'FilteredBlackList', matched rule: '||usabilla.com^'
- 2020/11/02 16:30:16 3419665#191 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 9406
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;w.usabilla.com. IN A
- ;; ANSWER SECTION:
- w.usabilla.com. 10 IN A 0.0.0.0
- 2020/11/02 16:30:16 3419665#45 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA. Elapsed 31 ms.
- 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 31 ms
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:8200:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:2a00:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:e400:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:4600:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:8000:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:f000:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:d200:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] DNSFwd: Checking record AAAA (2600:9000:2156:2600:1e:7bbf:4c80:21) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#45 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 35291
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN AAAA
- ;; ANSWER SECTION:
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:8200:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:2a00:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:e400:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:4600:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:8000:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:f000:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:d200:1e:7bbf:4c80:21
- d20kyoxkb5vbjm.cloudfront.net. 300 IN AAAA 2600:9000:2156:2600:1e:7bbf:4c80:21
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:16 3419665#44 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;d20kyoxkb5vbjm.cloudfront.net. IN A. Elapsed 29 ms.
- 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 29 ms
- 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.13) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.189) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.52) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#44 [debug] DNSFwd: Checking record A (143.204.101.143) for d20kyoxkb5vbjm.cloudfront.net.
- 2020/11/02 16:30:16 3419665#44 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 32231
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;d20kyoxkb5vbjm.cloudfront.net. IN A
- ;; ANSWER SECTION:
- d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.13
- d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.189
- d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.52
- d20kyoxkb5vbjm.cloudfront.net. 300 IN A 143.204.101.143
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
- 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 20956
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- 2020/11/02 16:30:17 3419665#194 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:36769 based on IP only
- 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
- 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29657
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- 2020/11/02 16:30:17 3419665#195 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).handleDNSRequest(): Ratelimiting 192.168.88.10:36769 based on IP only
- 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
- 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:36769
- 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 29657
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 20956
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- 2020/11/02 16:30:22 3419665#197 [debug] AutoHosts: answer: www.telegraaf.nl -> []
- 2020/11/02 16:30:22 3419665#196 [debug] AutoHosts: answer: www.telegraaf.nl -> []
- 2020/11/02 16:30:22 3419665#197 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#196 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#197 [debug] Serving response from general cache
- 2020/11/02 16:30:22 3419665#196 [debug] Serving response from general cache
- 2020/11/02 16:30:22 3419665#197 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:14f5) for www.telegraaf.nl.
- 2020/11/02 16:30:22 3419665#196 [debug] DNSFwd: Checking record A (104.18.20.245) for www.telegraaf.nl.
- 2020/11/02 16:30:22 3419665#197 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:15f5) for www.telegraaf.nl.
- 2020/11/02 16:30:22 3419665#196 [debug] DNSFwd: Checking record A (104.18.21.245) for www.telegraaf.nl.
- 2020/11/02 16:30:22 3419665#196 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 20956
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN A
- ;; ANSWER SECTION:
- www.telegraaf.nl. 294 IN A 104.18.20.245
- www.telegraaf.nl. 294 IN A 104.18.21.245
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#197 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 29657
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;www.telegraaf.nl. IN AAAA
- ;; ANSWER SECTION:
- www.telegraaf.nl. 294 IN AAAA 2606:4700::6812:14f5
- www.telegraaf.nl. 294 IN AAAA 2606:4700::6812:15f5
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41193
- 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 51647
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN AAAA
- 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41193
- 2020/11/02 16:30:22 3419665#173 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
- 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 61092
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN A
- 2020/11/02 16:30:22 3419665#172 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
- 2020/11/02 16:30:22 3419665#173 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#173 [debug] 127.0.0.1:5335: sending request AAAA sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#172 [debug] 127.0.0.1:5335: sending request A sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sdk.privacy-center.org. IN A. Elapsed 60 ms.
- 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 60 ms
- 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.69) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.124) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.18) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] DNSFwd: Checking record A (13.249.11.34) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#172 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 61092
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN A
- ;; ANSWER SECTION:
- sdk.privacy-center.org. 300 IN A 13.249.11.69
- sdk.privacy-center.org. 300 IN A 13.249.11.124
- sdk.privacy-center.org. 300 IN A 13.249.11.18
- sdk.privacy-center.org. 300 IN A 13.249.11.34
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#173 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;sdk.privacy-center.org. IN AAAA. Elapsed 60 ms.
- 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 60 ms
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:f400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:4e00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:7800:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:600:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:8000:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#173 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 51647
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN AAAA
- ;; ANSWER SECTION:
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:f400:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:4e00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:7800:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3c00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:600:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:8000:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:c00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3400:5:b7cc:d3c0:93a1
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38518
- 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 11641
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN A
- 2020/11/02 16:30:22 3419665#174 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
- 2020/11/02 16:30:22 3419665#174 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#174 [debug] Serving response from general cache
- 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.69) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.124) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.18) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#174 [debug] DNSFwd: Checking record A (13.249.11.34) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#174 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 11641
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN A
- ;; ANSWER SECTION:
- sdk.privacy-center.org. 300 IN A 13.249.11.69
- sdk.privacy-center.org. 300 IN A 13.249.11.124
- sdk.privacy-center.org. 300 IN A 13.249.11.18
- sdk.privacy-center.org. 300 IN A 13.249.11.34
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38518
- 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39550
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN AAAA
- 2020/11/02 16:30:22 3419665#209 [debug] AutoHosts: answer: sdk.privacy-center.org -> []
- 2020/11/02 16:30:22 3419665#209 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#209 [debug] Serving response from general cache
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:f400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:4e00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:7800:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:600:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:8000:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:c00:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] DNSFwd: Checking record AAAA (2600:9000:2171:3400:5:b7cc:d3c0:93a1) for sdk.privacy-center.org.
- 2020/11/02 16:30:22 3419665#209 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 39550
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 8, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;sdk.privacy-center.org. IN AAAA
- ;; ANSWER SECTION:
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:f400:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:4e00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:7800:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3c00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:600:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:8000:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:c00:5:b7cc:d3c0:93a1
- sdk.privacy-center.org. 300 IN AAAA 2600:9000:2171:3400:5:b7cc:d3c0:93a1
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:49481
- 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58331
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cdnjs.cloudflare.com. IN A
- 2020/11/02 16:30:22 3419665#175 [debug] AutoHosts: answer: cdnjs.cloudflare.com -> []
- 2020/11/02 16:30:22 3419665#175 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#175 [debug] 127.0.0.1:5335: sending request A cdnjs.cloudflare.com.
- 2020/11/02 16:30:22 3419665#175 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cdnjs.cloudflare.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:22 3419665#175 [debug] Removing RRSIG record from response: cdnjs.cloudflare.com. 30 IN RRSIG A 13 3 300 20201103161516 20201101141516 34505 cdnjs.cloudflare.com. mY4MMVCppYgU5Kui5t/eXmHZ04J9YImL22mgKXq2jIi28HOUN8b3qOLpZcOjFyhHjmHg+xfxj7Ra3n1qhXWR4g==
- 2020/11/02 16:30:22 3419665#175 [debug] DNSFwd: Checking record A (104.16.19.94) for cdnjs.cloudflare.com.
- 2020/11/02 16:30:22 3419665#175 [debug] DNSFwd: Checking record A (104.16.18.94) for cdnjs.cloudflare.com.
- 2020/11/02 16:30:22 3419665#175 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58331
- ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cdnjs.cloudflare.com. IN A
- ;; ANSWER SECTION:
- cdnjs.cloudflare.com. 30 IN A 104.16.19.94
- cdnjs.cloudflare.com. 30 IN A 104.16.18.94
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42840
- 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 34576
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;fonts.googleapis.com. IN A
- 2020/11/02 16:30:22 3419665#176 [debug] AutoHosts: answer: fonts.googleapis.com -> []
- 2020/11/02 16:30:22 3419665#176 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:22 3419665#176 [debug] 127.0.0.1:5335: sending request A fonts.googleapis.com.
- 2020/11/02 16:30:22 3419665#176 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;fonts.googleapis.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:22 3419665#176 [debug] DNSFwd: Checking record A (216.58.207.42) for fonts.googleapis.com.
- 2020/11/02 16:30:22 3419665#176 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 34576
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;fonts.googleapis.com. IN A
- ;; ANSWER SECTION:
- fonts.googleapis.com. 30 IN A 216.58.207.42
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 10.6.0.3:10038
- 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58463
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;googleads.g.doubleclick.net. IN A
- 2020/11/02 16:30:22 3419665#210 [debug] AutoHosts: answer: googleads.g.doubleclick.net -> []
- 2020/11/02 16:30:22 3419665#210 [debug] Filtering: found rule for host 'googleads.g.doubleclick.net': '||googleads.g.doubleclick.net^' list_id: 1604323042
- 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host googleads.g.doubleclick.net is filtered, reason - 'FilteredBlackList', matched rule: '||googleads.g.doubleclick.net^'
- 2020/11/02 16:30:22 3419665#210 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58463
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;googleads.g.doubleclick.net. IN A
- ;; ANSWER SECTION:
- googleads.g.doubleclick.net. 10 IN A 0.0.0.0
- 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45864
- 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 36885
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN AAAA
- 2020/11/02 16:30:25 3419665#226 [debug] AutoHosts: answer: api.privacy-center.org -> []
- 2020/11/02 16:30:25 3419665#226 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
- 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
- 2020/11/02 16:30:25 3419665#226 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 36885
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN AAAA
- ;; ANSWER SECTION:
- api.privacy-center.org. 10 IN AAAA ::
- 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:45864
- 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 22536
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN A
- 2020/11/02 16:30:25 3419665#225 [debug] AutoHosts: answer: api.privacy-center.org -> []
- 2020/11/02 16:30:25 3419665#225 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
- 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
- 2020/11/02 16:30:25 3419665#225 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 22536
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN A
- ;; ANSWER SECTION:
- api.privacy-center.org. 10 IN A 0.0.0.0
- 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52897
- 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 51563
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN A
- 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:52897
- 2020/11/02 16:30:25 3419665#46 [debug] AutoHosts: answer: api.privacy-center.org -> []
- 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62054
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN AAAA
- 2020/11/02 16:30:25 3419665#46 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
- 2020/11/02 16:30:25 3419665#47 [debug] AutoHosts: answer: api.privacy-center.org -> []
- 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
- 2020/11/02 16:30:25 3419665#46 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 51563
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN A
- ;; ANSWER SECTION:
- api.privacy-center.org. 10 IN A 0.0.0.0
- 2020/11/02 16:30:25 3419665#47 [debug] Filtering: found rule for host 'api.privacy-center.org': '||api.privacy-center.org^' list_id: 1604323042
- 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/AdGuardHome/dnsforward.(*Server).filterDNSRequest(): Host api.privacy-center.org is filtered, reason - 'FilteredBlackList', matched rule: '||api.privacy-center.org^'
- 2020/11/02 16:30:25 3419665#47 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62054
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;api.privacy-center.org. IN AAAA
- ;; ANSWER SECTION:
- api.privacy-center.org. 10 IN AAAA ::
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41543
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48488
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- 2020/11/02 16:30:25 3419665#241 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:25 3419665#241 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#241 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
- 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41543
- 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7021
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- 2020/11/02 16:30:25 3419665#48 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:25 3419665#48 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#48 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#48 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
- 2020/11/02 16:30:25 3419665#48 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7021
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- ;; ANSWER SECTION:
- mozilla.org. 11 IN A 63.245.208.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41190
- 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 24540
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN AAAA
- 2020/11/02 16:30:25 3419665#243 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:25 3419665#243 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#243 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:25 3419665#243 [debug] DNSFwd: Checking record AAAA (2600:1901:0:38d7::) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:25 3419665#243 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 24540
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN AAAA
- ;; ANSWER SECTION:
- detectportal.firefox.com. 11 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 11 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 11 IN AAAA 2600:1901:0:38d7::
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:41190
- 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 62497
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- 2020/11/02 16:30:25 3419665#242 [debug] AutoHosts: answer: detectportal.firefox.com -> []
- 2020/11/02 16:30:25 3419665#242 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#242 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking CNAME detectportal.prod.mozaws.net. for detectportal.firefox.com.
- 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking CNAME prod.detectportal.prod.cloudops.mozgcp.net. for detectportal.prod.mozaws.net.
- 2020/11/02 16:30:25 3419665#242 [debug] DNSFwd: Checking record A (34.107.221.82) for prod.detectportal.prod.cloudops.mozgcp.net.
- 2020/11/02 16:30:25 3419665#242 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 62497
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;detectportal.firefox.com. IN A
- ;; ANSWER SECTION:
- detectportal.firefox.com. 11 IN CNAME detectportal.prod.mozaws.net.
- detectportal.prod.mozaws.net. 11 IN CNAME prod.detectportal.prod.cloudops.mozgcp.net.
- prod.detectportal.prod.cloudops.mozgcp.net. 11 IN A 34.107.221.82
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#241 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:25 3419665#241 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48488
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- ;; AUTHORITY SECTION:
- mozilla.org. 281 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37330
- 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37330
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 56179
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 10609
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- 2020/11/02 16:30:25 3419665#228 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:25 3419665#227 [debug] AutoHosts: answer: mozilla.org -> []
- 2020/11/02 16:30:25 3419665#228 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#227 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#228 [debug] 127.0.0.1:5335: sending request AAAA mozilla.org.
- 2020/11/02 16:30:25 3419665#227 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#227 [debug] DNSFwd: Checking record A (63.245.208.195) for mozilla.org.
- 2020/11/02 16:30:25 3419665#227 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 10609
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN A
- ;; ANSWER SECTION:
- mozilla.org. 11 IN A 63.245.208.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#228 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;mozilla.org. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): mozilla.org.: refusing to cache a NOERROR response with no answers
- 2020/11/02 16:30:25 3419665#228 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 56179
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;mozilla.org. IN AAAA
- ;; AUTHORITY SECTION:
- mozilla.org. 281 IN SOA infoblox1.private.mdc2.mozilla.com. sysadmins.mozilla.org. 2019040747 180 180 1209600 60
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39668
- 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:39668
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 2421
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 57718
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- 2020/11/02 16:30:25 3419665#230 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:25 3419665#229 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:25 3419665#229 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#229 [debug] 127.0.0.1:5335: sending request A cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#230 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#230 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37278
- 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 47447
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN A
- 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:37278
- 2020/11/02 16:30:25 3419665#198 [debug] AutoHosts: answer: shared.mediahuis.be -> []
- 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 48986
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN AAAA
- 2020/11/02 16:30:25 3419665#199 [debug] AutoHosts: answer: shared.mediahuis.be -> []
- 2020/11/02 16:30:25 3419665#198 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#198 [debug] 127.0.0.1:5335: sending request A shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#199 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#199 [debug] 127.0.0.1:5335: sending request AAAA shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#198 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;shared.mediahuis.be. IN A. Elapsed 143 ms.
- 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 143 ms
- 2020/11/02 16:30:25 3419665#198 [debug] DNSFwd: Checking record A (104.18.73.21) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#198 [debug] DNSFwd: Checking record A (104.16.208.34) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#198 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 47447
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN A
- ;; ANSWER SECTION:
- shared.mediahuis.be. 300 IN A 104.18.73.21
- shared.mediahuis.be. 300 IN A 104.16.208.34
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#230 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 197 ms.
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 197 ms
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:25 3419665#230 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#230 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 2421
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- ;; ANSWER SECTION:
- cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- ;; AUTHORITY SECTION:
- tmgcloud.nl. 600 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#229 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN A. Elapsed 198 ms.
- 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 198 ms
- 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#229 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#229 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 57718
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- ;; ANSWER SECTION:
- cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.87.109
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.87.164
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 426 IN A 81.4.84.219
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47295
- 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:47295
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7495
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 9082
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- 2020/11/02 16:30:25 3419665#200 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:25 3419665#201 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:25 3419665#200 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#201 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#201 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#200 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#200 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:25 3419665#200 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 9082
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- ;; ANSWER SECTION:
- cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.87.109
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.87.164
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 300 IN A 81.4.84.219
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#201 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:25 3419665#201 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:25 3419665#201 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7495
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- ;; ANSWER SECTION:
- cd.tnet.nl. 300 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- ;; AUTHORITY SECTION:
- tmgcloud.nl. 600 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50425
- 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 58119
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;ocsp.usertrust.com. IN A
- 2020/11/02 16:30:25 3419665#202 [debug] AutoHosts: answer: ocsp.usertrust.com -> []
- 2020/11/02 16:30:25 3419665#202 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#202 [debug] 127.0.0.1:5335: sending request A ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#199 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;shared.mediahuis.be. IN AAAA. Elapsed 206 ms.
- 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 207 ms
- 2020/11/02 16:30:25 3419665#199 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:4915) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#199 [debug] DNSFwd: Checking record AAAA (2606:4700::6810:d022) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#199 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 48986
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN AAAA
- ;; ANSWER SECTION:
- shared.mediahuis.be. 300 IN AAAA 2606:4700::6812:4915
- shared.mediahuis.be. 300 IN AAAA 2606:4700::6810:d022
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42461
- 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 39017
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN AAAA
- 2020/11/02 16:30:25 3419665#204 [debug] AutoHosts: answer: shared.mediahuis.be -> []
- 2020/11/02 16:30:25 3419665#204 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#204 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#204 [debug] DNSFwd: Checking record AAAA (2606:4700::6812:4915) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#204 [debug] DNSFwd: Checking record AAAA (2606:4700::6810:d022) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#204 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 39017
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN AAAA
- ;; ANSWER SECTION:
- shared.mediahuis.be. 300 IN AAAA 2606:4700::6812:4915
- shared.mediahuis.be. 300 IN AAAA 2606:4700::6810:d022
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:42461
- 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 7027
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN A
- 2020/11/02 16:30:25 3419665#203 [debug] AutoHosts: answer: shared.mediahuis.be -> []
- 2020/11/02 16:30:25 3419665#203 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#203 [debug] Serving response from general cache
- 2020/11/02 16:30:25 3419665#203 [debug] DNSFwd: Checking record A (104.18.73.21) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#203 [debug] DNSFwd: Checking record A (104.16.208.34) for shared.mediahuis.be.
- 2020/11/02 16:30:25 3419665#203 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 7027
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;shared.mediahuis.be. IN A
- ;; ANSWER SECTION:
- shared.mediahuis.be. 300 IN A 104.18.73.21
- shared.mediahuis.be. 300 IN A 104.16.208.34
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#202 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;ocsp.usertrust.com. IN A. Elapsed 105 ms.
- 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 105 ms
- 2020/11/02 16:30:25 3419665#202 [debug] DNSFwd: Checking record A (151.139.128.14) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#202 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 58119
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;ocsp.usertrust.com. IN A
- ;; ANSWER SECTION:
- ocsp.usertrust.com. 1139 IN A 151.139.128.14
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:50425
- 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 37378
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;ocsp.usertrust.com. IN AAAA
- 2020/11/02 16:30:25 3419665#231 [debug] AutoHosts: answer: ocsp.usertrust.com -> []
- 2020/11/02 16:30:25 3419665#231 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:25 3419665#231 [debug] 127.0.0.1:5335: sending request AAAA ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;ocsp.usertrust.com. IN AAAA. Elapsed 21 ms.
- 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 21 ms
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2a) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3a) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:2b) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1b) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:3b) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] DNSFwd: Checking record AAAA (2001:4de0:ac19::1:b:1a) for ocsp.usertrust.com.
- 2020/11/02 16:30:25 3419665#231 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 37378
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;ocsp.usertrust.com. IN AAAA
- ;; ANSWER SECTION:
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:2a
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:3a
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:2b
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:1b
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:3b
- ocsp.usertrust.com. 565 IN AAAA 2001:4de0:ac19::1:b:1a
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38572
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 21988
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.10:38572
- 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 45048
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- 2020/11/02 16:30:27 3419665#233 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:27 3419665#233 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:27 3419665#232 [debug] AutoHosts: answer: cd.tnet.nl -> []
- 2020/11/02 16:30:27 3419665#233 [debug] 127.0.0.1:5335: sending request AAAA cd.tnet.nl.
- 2020/11/02 16:30:27 3419665#232 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:27 3419665#232 [debug] Serving response from general cache
- 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.87.109) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.87.164) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:27 3419665#232 [debug] DNSFwd: Checking record A (81.4.84.219) for production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- 2020/11/02 16:30:27 3419665#232 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 45048
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN A
- ;; ANSWER SECTION:
- cd.tnet.nl. 298 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.87.109
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.87.164
- production-proxy-haystack-api-tnet-nl.tmgcloud.nl. 298 IN A 81.4.84.219
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:27 3419665#233 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;cd.tnet.nl. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.isCacheable(): cd.tnet.nl.: refusing to cache a response with no A and AAAA answers
- 2020/11/02 16:30:27 3419665#233 [debug] DNSFwd: Checking CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl. for cd.tnet.nl.
- 2020/11/02 16:30:27 3419665#233 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 21988
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 1, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;cd.tnet.nl. IN AAAA
- ;; ANSWER SECTION:
- cd.tnet.nl. 298 IN CNAME production-proxy-haystack-api-tnet-nl.tmgcloud.nl.
- ;; AUTHORITY SECTION:
- tmgcloud.nl. 598 IN SOA ns0.tmgcloud.nl. hostmaster.telegraafnet.nl. 1604322480 604800 86400 2419200 604800
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:55234
- 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 16036
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- 2020/11/02 16:30:33 3419665#244 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:30:33 3419665#244 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:33 3419665#244 [debug] 127.0.0.1:5335: sending request A connectivitycheck.gstatic.com.
- 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.35:55234
- 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13115
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- 2020/11/02 16:30:33 3419665#234 [debug] AutoHosts: answer: connectivitycheck.gstatic.com -> []
- 2020/11/02 16:30:33 3419665#234 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:33 3419665#234 [debug] 127.0.0.1:5335: sending request AAAA connectivitycheck.gstatic.com.
- 2020/11/02 16:30:33 3419665#244 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:33 3419665#244 [debug] DNSFwd: Checking record A (142.250.74.195) for connectivitycheck.gstatic.com.
- 2020/11/02 16:30:33 3419665#244 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 16036
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN A
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 30 IN A 142.250.74.195
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:33 3419665#234 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;connectivitycheck.gstatic.com. IN AAAA. Elapsed 0 ms.
- 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 0 ms
- 2020/11/02 16:30:33 3419665#234 [debug] DNSFwd: Checking record AAAA (2a00:1450:400e:80e::2003) for connectivitycheck.gstatic.com.
- 2020/11/02 16:30:33 3419665#234 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13115
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;connectivitycheck.gstatic.com. IN AAAA
- ;; ANSWER SECTION:
- connectivitycheck.gstatic.com. 30 IN AAAA 2a00:1450:400e:80e::2003
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
- 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).udpHandlePacket(): Start handling new UDP packet from 192.168.88.30:42711
- 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): IN: ;; opcode: QUERY, status: NOERROR, id: 13302
- ;; flags: rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 0
- ;; QUESTION SECTION:
- ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A
- 2020/11/02 16:30:47 3419665#205 [debug] AutoHosts: answer: epdg.epc.mnc016.mcc204.pub.3gppnetwork.org -> []
- 2020/11/02 16:30:47 3419665#205 [debug] DNS: Adding OPT record with DNSSEC flag
- 2020/11/02 16:30:47 3419665#205 [debug] 127.0.0.1:5335: sending request A epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] 127.0.0.1:5335: response: ok
- 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.exchangeWithUpstream(): upstream 127.0.0.1:5335 successfully finished exchange of ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A. Elapsed 0 ms.
- 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).Resolve(): RTT: 1 ms
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.205) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.221) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.222) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.202) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.203) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.204) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.217) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.220) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.218) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.206) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.201) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] DNSFwd: Checking record A (84.241.236.219) for epdg.epc.mnc016.mcc204.pub.3gppnetwork.org.
- 2020/11/02 16:30:47 3419665#205 [debug] github.com/AdguardTeam/dnsproxy/proxy.(*Proxy).logDNSMessage(): OUT: ;; opcode: QUERY, status: NOERROR, id: 13302
- ;; flags: qr rd ra; QUERY: 1, ANSWER: 12, AUTHORITY: 0, ADDITIONAL: 1
- ;; QUESTION SECTION:
- ;epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. IN A
- ;; ANSWER SECTION:
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.205
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.221
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.222
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.202
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.203
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.204
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.217
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.220
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.218
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.206
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.201
- epdg.epc.mnc016.mcc204.pub.3gppnetwork.org. 30 IN A 84.241.236.219
- ;; ADDITIONAL SECTION:
- ;; OPT PSEUDOSECTION:
- ; EDNS: version 0; flags: do; udp: 1232
Add Comment
Please, Sign In to add comment