Advertisement
Guest User

Untitled

a guest
Sep 16th, 2018
265
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.70 KB | None | 0 0
  1. Sep 16 00:54:24 dropbear[27208]: Child connection from 192.168.50.241:53327
  2. Sep 16 00:54:27 dropbear[27208]: Pubkey auth succeeded for 'asus2012' with key sha1!! 10:f9:24:14:7a:3b:e7:12:db:61:10:f7:5a:fb:97:fc:5a:fd:d2:02 from 192.168.50.241:53327
  3. Sep 16 00:54:34 Diversion: created br0:pixelserv-tls 192.168.50.2, from /opt/etc/init.d/S80pixelserv-tls
  4. Sep 16 00:54:34 pixelserv-tls[22794]: 10742 uts, 1 log, 13 kcc, 16 kmx, 4.84 kvg, 47 krq, 1480 req, 433 avg, 1405 rmx, 1 tav, 129 tmx, 253 slh, 8 slm, 0 sle, 15 slc, 29 slu, 0 uca, 0 uce, 41 sct, 77 sch, 4 scm, 0 scp, 0 sst, 37 ssh, 24 ssm, 0 ssp, 1169 nfe, 0 gif, 0 ico, 2 txt, 0 jpg, 0 png, 0 swf, 0 sta, 0 stt, 248 ufe, 0 opt, 0 pst, 0 hed, 0 rdr, 1 nou, 0 pth, 0 204, 0 bad, 8 tmo, 15 cls, 0 cly, 0 clt, 0 err
  5. Sep 16 00:54:35 Entware (armv7sf-k2.6): Started pixelserv-tls (Diversion) from /opt/bin/diversion
  6. Sep 16 00:54:35 pixelserv-tls[27471]: pixelserv-tls 2.1.2 (compiled: Sep 8 2018 20:33:38) options: 192.168.50.2
  7. Sep 16 00:54:35 pixelserv-tls[27471]: Listening on :192.168.50.2:443
  8. Sep 16 00:54:35 pixelserv-tls[27471]: Listening on :192.168.50.2:80
  9. Sep 16 00:58:36 kernel: [tdts_shell_ioctl_stat:256] Recv ioctl req with op 2
  10. Sep 16 01:00:09 Skynet: [#] 134023 IPs -- 6278 Ranges Banned || 0 New IPs -- 0 New Ranges Banned || 3910 Inbound -- 113 Outbound Connections Blocked! [save] [9s]
  11. Sep 16 01:02:04 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  12. Sep 16 01:02:04 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 158ms
  13. Sep 16 01:02:04 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 158ms)
  14. Sep 16 01:10:04 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  15. Sep 16 01:10:04 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 155ms
  16. Sep 16 01:10:04 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 155ms)
  17. Sep 16 01:18:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  18. Sep 16 01:18:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  19. Sep 16 01:18:05 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 156ms)
  20. Sep 16 01:26:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  21. Sep 16 01:26:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  22. Sep 16 01:26:05 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 157ms)
  23. Sep 16 01:28:36 kernel: [tdts_shell_ioctl_stat:256] Recv ioctl req with op 2
  24. Sep 16 01:34:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 154ms
  25. Sep 16 01:34:05 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 153ms
  26. Sep 16 01:34:05 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 153ms)
  27. Sep 16 01:42:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  28. Sep 16 01:42:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  29. Sep 16 01:42:06 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 156ms)
  30. Sep 16 01:46:21 dropbear[27208]: Exit (asus2012): Exited normally
  31. Sep 16 01:50:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 166ms
  32. Sep 16 01:50:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  33. Sep 16 01:50:06 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 157ms)
  34. Sep 16 01:58:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  35. Sep 16 01:58:06 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  36. Sep 16 01:58:06 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 156ms)
  37. Sep 16 01:58:36 kernel: [tdts_shell_ioctl_stat:256] Recv ioctl req with op 2
  38. Sep 16 02:00:08 Skynet: [#] 134023 IPs -- 6278 Ranges Banned || 0 New IPs -- 0 New Ranges Banned || 4068 Inbound -- 116 Outbound Connections Blocked! [save] [8s]
  39. Sep 16 02:06:07 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 155ms
  40. Sep 16 02:06:07 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 156ms
  41. Sep 16 02:06:07 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 156ms)
  42. Sep 16 02:14:07 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 157ms
  43. Sep 16 02:14:07 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 182ms
  44. Sep 16 02:14:07 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 182ms)
  45. Sep 16 02:22:07 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 155ms
  46. Sep 16 02:22:08 dnscrypt-proxy[149]: [dnscrypt.nl-ns0] OK (crypto v2) - rtt: 155ms
  47. Sep 16 02:22:08 dnscrypt-proxy[149]: Server with the lowest initial latency: dnscrypt.nl-ns0 (rtt: 155ms)
  48. Sep 16 02:25:34 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=5.189.226.186 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=39512 PROTO=TCP SPT=60000 DPT=33892 SEQ=3069622831 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  49. Sep 16 02:25:45 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=77.72.83.133 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=33602 PROTO=TCP SPT=46373 DPT=3261 SEQ=3570019308 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  50. Sep 16 02:25:51 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=222.187.239.84 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 PROTO=TCP SPT=31433 DPT=60001 SEQ=2043215872 ACK=0 WINDOW=16384 RES=0x00 SYN URGP=0
  51. Sep 16 02:25:54 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=176.119.7.18 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=63296 PROTO=TCP SPT=49757 DPT=3938 SEQ=2018008113 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  52. Sep 16 02:26:02 Skynet: [#] 128035 IPs -- 6335 Ranges Banned || -5988 New IPs -- 57 New Ranges Banned || 4133 Inbound -- 116 Outbound Connections Blocked! [banmalware] [62s]
  53. Sep 16 02:26:11 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=184.105.247.214 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=54321 PROTO=TCP SPT=47407 DPT=50075 SEQ=3623209834 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
  54. Sep 16 02:27:19 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=77.72.85.25 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29574 PROTO=TCP SPT=56863 DPT=2424 SEQ=219995885 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  55. Sep 16 02:27:24 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=77.72.85.107 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=29568 PROTO=TCP SPT=51421 DPT=33030 SEQ=665343637 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  56. Sep 16 02:27:33 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=31.192.108.75 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=19435 PROTO=TCP SPT=58288 DPT=30010 SEQ=4270299842 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  57. Sep 16 02:27:48 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=109.248.9.19 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=40907 PROTO=TCP SPT=49487 DPT=9900 SEQ=2499681652 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  58. Sep 16 02:28:02 dropbear[31982]: Child connection from 192.168.50.241:55024
  59. Sep 16 02:28:08 dropbear[31982]: Pubkey auth succeeded for 'asus2012' with key sha1!! 10:f9:24:14:7a:3b:e7:12:db:61:10:f7:5a:fb:97:fc:5a:fd:d2:02 from 192.168.50.241:55024
  60. Sep 16 02:28:31 dropbear[32042]: Child connection from 192.168.50.241:55026
  61. Sep 16 02:28:32 dropbear[32042]: Pubkey auth succeeded for 'asus2012' with key sha1!! 10:f9:24:14:7a:3b:e7:12:db:61:10:f7:5a:fb:97:fc:5a:fd:d2:02 from 192.168.50.241:55026
  62. Sep 16 02:28:34 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=77.72.85.25 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=53776 PROTO=TCP SPT=56863 DPT=33577 SEQ=1248785706 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  63. Sep 16 02:28:37 kernel: [tdts_shell_ioctl_stat:256] Recv ioctl req with op 2
  64. Sep 16 02:28:37 dropbear[32108]: Child connection from 192.168.50.241:55027
  65. Sep 16 02:28:39 dropbear[32108]: Login attempt for nonexistent user from 192.168.50.241:55027
  66. Sep 16 02:28:39 dropbear[32108]: Exit before auth: Disconnect received
  67. Sep 16 02:28:40 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=146.185.222.12 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=50467 PROTO=TCP SPT=48171 DPT=16082 SEQ=1760059362 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  68. Sep 16 02:28:43 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=77.72.85.107 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=22228 PROTO=TCP SPT=51421 DPT=1039 SEQ=1111750344 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  69. Sep 16 02:28:44 dropbear[32109]: Child connection from 192.168.50.241:55028
  70. Sep 16 02:28:47 dropbear[32109]: Pubkey auth succeeded for 'asus2012' with key sha1!! 10:f9:24:14:7a:3b:e7:12:db:61:10:f7:5a:fb:97:fc:5a:fd:d2:02 from 192.168.50.241:55028
  71. Sep 16 02:28:56 kernel: [BLOCKED - INBOUND] IN=eth0 OUT= MAC=fc:d8:48:81:10:4c:00:01:5c:a2:56:46:08:00 SRC=31.192.108.110 DST=24.66.164.19 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=36676 PROTO=TCP SPT=49684 DPT=50004 SEQ=297003011 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
  72. Sep 16 02:29:01 Diversion: created br0:pixelserv-tls 192.168.50.2, from /opt/etc/init.d/S80pixelserv-tls
  73. Sep 16 02:29:01 pixelserv-tls[32356]: pixelserv-tls 2.1.2 (compiled: Sep 8 2018 20:33:38) options: 192.168.50.2
  74. Sep 16 02:29:01 Entware (armv7sf-k2.6): Started pixelserv-tls (Diversion) from /opt/bin/diversion
  75. Sep 16 02:29:02 pixelserv-tls[32356]: Listening on :192.168.50.2:443
  76. Sep 16 02:29:02 pixelserv-tls[32356]: Listening on :192.168.50.2:80
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement