Advertisement
Guest User

Untitled

a guest
Mar 27th, 2019
739
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.82 KB | None | 0 0
  1. 27-03-2019 13:12:01 Application version 1.5.9 started
  2. 26-03-2019 21:58:56 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.5.9 работает на samsung SM-T385 (msm8937), Android 8.1.0 (M1AJQ) API 27, ABI armeabi-v7a, (samsung/gta2sltedx/gta2slte:8.1.0/M1AJQ/T385DXU2BRK4:user/release-keys)
  3. 26-03-2019 21:58:57 Background loading servers
  4. 26-03-2019 21:59:00 Servers list received
  5. 26-03-2019 21:59:00 Создание конфигурации…
  6. 26-03-2019 21:59:00 started Socket Thread
  7. 26-03-2019 21:59:00 Статус сети: CONNECTED to WIFI "Home"
  8. 26-03-2019 21:59:00 Current Parameter Settings:
  9. 26-03-2019 21:59:00 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  10. 26-03-2019 21:59:00 mode = 0
  11. 26-03-2019 21:59:00 show_ciphers = DISABLED
  12. 26-03-2019 21:59:00 show_digests = DISABLED
  13. 26-03-2019 21:59:00 show_engines = DISABLED
  14. 26-03-2019 21:59:00 genkey = DISABLED
  15. 26-03-2019 21:59:00 key_pass_file = '[UNDEF]'
  16. 26-03-2019 21:59:00 show_tls_ciphers = DISABLED
  17. 26-03-2019 21:59:00 connect_retry_max = 5
  18. 26-03-2019 21:59:00 Connection profiles [0]:
  19. 26-03-2019 21:59:00 proto = tcp-client
  20. 26-03-2019 21:59:00 local = '[UNDEF]'
  21. 26-03-2019 21:59:00 local_port = '[UNDEF]'
  22. 26-03-2019 21:59:00 remote = '91.219.238.56'
  23. 26-03-2019 21:59:00 remote_port = '995'
  24. 26-03-2019 21:59:00 remote_float = DISABLED
  25. 26-03-2019 21:59:00 bind_defined = DISABLED
  26. 26-03-2019 21:59:00 bind_local = DISABLED
  27. 26-03-2019 21:59:00 bind_ipv6_only = DISABLED
  28. 26-03-2019 21:59:00 NOTE: --mute triggered...
  29. 26-03-2019 21:59:00 164 variation(s) on previous 20 message(s) suppressed by --mute
  30. 26-03-2019 21:59:00 OpenVPN 2.5-icsopenvpn [git:54ad578] armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  31. 26-03-2019 21:59:00 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  32. 26-03-2019 21:59:00 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  33. 26-03-2019 21:59:00 MANAGEMENT: CMD 'hold release'
  34. 26-03-2019 21:59:00 MANAGEMENT: CMD 'bytecount 2'
  35. 26-03-2019 21:59:00 MANAGEMENT: CMD 'state on'
  36. 26-03-2019 21:59:00 MANAGEMENT: CMD 'proxy NONE'
  37. 26-03-2019 21:59:01 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  38. 26-03-2019 21:59:02 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  39. 26-03-2019 21:59:02 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  40. 26-03-2019 21:59:02 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  41. 26-03-2019 21:59:02 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  42. 26-03-2019 21:59:02 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
  43. 26-03-2019 21:59:02 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  44. 26-03-2019 21:59:02 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
  45. 26-03-2019 21:59:02 MANAGEMENT: >STATE:1553626742,TCP_CONNECT,,,,,,
  46. 26-03-2019 21:59:02 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  47. 26-03-2019 21:59:03 TCP connection established with [AF_INET]91.219.238.56:995
  48. 26-03-2019 21:59:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  49. 26-03-2019 21:59:03 TCP_CLIENT link local: (not bound)
  50. 26-03-2019 21:59:03 TCP_CLIENT link remote: [AF_INET]91.219.238.56:995
  51. 26-03-2019 21:59:03 MANAGEMENT: >STATE:1553626743,WAIT,,,,,,
  52. 26-03-2019 21:59:03 Scrambler: disabled by config
  53. 26-03-2019 21:59:03 MANAGEMENT: >STATE:1553626743,AUTH,,,,,,
  54. 26-03-2019 21:59:03 TLS: Initial packet from [AF_INET]91.219.238.56:995, sid=1427e15e 9b59cb29
  55. 26-03-2019 21:59:03 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  56. 26-03-2019 21:59:03 VERIFY OK: nsCertType=SERVER
  57. 26-03-2019 21:59:03 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  58. 26-03-2019 21:59:04 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  59. 26-03-2019 21:59:04 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  60. 26-03-2019 21:59:04 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  61. 26-03-2019 21:59:04 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  62. 26-03-2019 21:59:04 [server] Peer Connection Initiated with [AF_INET]91.219.238.56:995
  63. 26-03-2019 21:59:05 MANAGEMENT: >STATE:1553626745,GET_CONFIG,,,,,,
  64. 26-03-2019 21:59:05 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  65. 26-03-2019 21:59:06 PUSH: Received control message: 'PUSH_REPLY,route 10.119.144.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.119.146.86 10.119.146.85,peer-id 0,cipher AES-256-GCM'
  66. 26-03-2019 21:59:06 OPTIONS IMPORT: timers and/or timeouts modified
  67. 26-03-2019 21:59:06 OPTIONS IMPORT: --ifconfig/up options modified
  68. 26-03-2019 21:59:06 OPTIONS IMPORT: route options modified
  69. 26-03-2019 21:59:06 OPTIONS IMPORT: peer-id set
  70. 26-03-2019 21:59:06 OPTIONS IMPORT: adjusting link_mtu to 1626
  71. 26-03-2019 21:59:06 OPTIONS IMPORT: data channel crypto options modified
  72. 26-03-2019 21:59:06 Data Channel: using negotiated cipher 'AES-256-GCM'
  73. 26-03-2019 21:59:06 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  74. 26-03-2019 21:59:06 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  75. 26-03-2019 21:59:06 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  76. 26-03-2019 21:59:06 GDG: SIOCGIFHWADDR(lo) failed
  77. 26-03-2019 21:59:06 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  78. 26-03-2019 21:59:06 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  79. 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,ASSIGN_IP,,10.119.146.86,,,,
  80. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  81. 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,ADD_ROUTES,,,,,,
  82. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  83. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  84. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  85. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  86. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  87. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  88. 26-03-2019 21:59:06 Открытие TUN-интерфейса:
  89. 26-03-2019 21:59:06 Игнорируется мультиадресный маршрут: 224.0.0.0/3
  90. 26-03-2019 21:59:06 Адрес IPv4: 10.119.146.86/30 IPv6: null MTU: 1500
  91. 26-03-2019 21:59:06 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  92. 26-03-2019 21:59:06 Маршруты: 0.0.0.0/0, 10.119.144.0/20, 10.119.146.84/30
  93. 26-03-2019 21:59:06 Исключенные маршруты: 192.168.0.100/24
  94. 26-03-2019 21:59:06 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
  95. 26-03-2019 21:59:06 Запрещенные VPN приложения:
  96. 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  97. 26-03-2019 21:59:06 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  98. 26-03-2019 21:59:06 Initialization Sequence Completed
  99. 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,CONNECTED,SUCCESS,10.119.146.86,91.219.238.56,995,192.168.0.100,42952
  100. 26-03-2019 21:59:08 Obtaining IP address
  101. 26-03-2019 21:59:08 Obtaining IP address
  102. 26-03-2019 21:59:15 Internal authentication error
  103. 26-03-2019 21:59:17 Obtaining location
  104. 26-03-2019 21:59:17 Current IP received : 91.219.237.59;91.219.237.59
  105. 26-03-2019 21:59:18 Location received
  106. 26-03-2019 21:59:18 Current location : Hungary
  107. 26-03-2019 21:59:27 Internal authentication error
  108. 26-03-2019 21:59:39 Internal authentication error
  109. 26-03-2019 21:59:51 Internal authentication error
  110. 26-03-2019 22:00:16 Internal authentication is successful
  111. 26-03-2019 22:04:31 Obtaining IP address
  112. 26-03-2019 22:04:31 Obtaining IP address
  113. 26-03-2019 22:04:32 Obtaining IP address
  114. 26-03-2019 22:04:32 Obtaining IP address
  115. 26-03-2019 22:04:34 Obtaining location
  116. 26-03-2019 22:04:34 Current IP received : 91.219.237.59;91.219.237.59
  117. 26-03-2019 22:04:34 Obtaining location
  118. 26-03-2019 22:04:34 Current IP received : 91.219.237.59;91.219.237.59
  119. 26-03-2019 22:04:35 Location received
  120. 26-03-2019 22:04:35 Location received
  121. 26-03-2019 22:04:35 Current location : Hungary
  122. 26-03-2019 22:04:35 Current location : Hungary
  123. 26-03-2019 22:04:42 Obtaining IP address
  124. 26-03-2019 22:04:42 Obtaining IP address
  125. 26-03-2019 22:04:43 Obtaining IP address
  126. 26-03-2019 22:04:43 Obtaining IP address
  127. 26-03-2019 22:04:43 Obtaining location
  128. 26-03-2019 22:04:43 Current IP received : 91.219.237.59;91.219.237.59
  129. 26-03-2019 22:04:44 Location received
  130. 26-03-2019 22:04:44 Current location : Hungary
  131. 26-03-2019 22:04:45 Obtaining location
  132. 26-03-2019 22:04:45 Current IP received : 91.219.237.59;91.219.237.59
  133. 26-03-2019 22:04:46 Location received
  134. 26-03-2019 22:04:46 Current location : Hungary
  135. 26-03-2019 22:09:41 Background loading servers
  136. 26-03-2019 22:09:44 Servers list received
  137. 26-03-2019 22:20:41 Background loading servers
  138. 26-03-2019 22:20:44 Servers list received
  139. 26-03-2019 22:32:41 Background loading servers
  140. 26-03-2019 22:32:45 Servers list received
  141. 26-03-2019 22:46:41 Background loading servers
  142. 26-03-2019 22:46:47 Servers list received
  143. 26-03-2019 22:59:05 TLS: soft reset sec=3601/3600 bytes=13170680/-1 pkts=23754/0
  144. 26-03-2019 22:59:06 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  145. 26-03-2019 22:59:06 VERIFY OK: nsCertType=SERVER
  146. 26-03-2019 22:59:06 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  147. 26-03-2019 22:59:06 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  148. 26-03-2019 22:59:06 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  149. 26-03-2019 22:59:06 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  150. 26-03-2019 22:59:06 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  151. 26-03-2019 22:59:06 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  152. 26-03-2019 22:59:06 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  153. 26-03-2019 23:04:53 Background loading servers
  154. 26-03-2019 23:05:01 Servers list received
  155. 26-03-2019 23:31:00 Background loading servers
  156. 26-03-2019 23:31:03 Servers list received
  157. 26-03-2019 23:59:07 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  158. 26-03-2019 23:59:07 VERIFY OK: nsCertType=SERVER
  159. 26-03-2019 23:59:07 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  160. 26-03-2019 23:59:07 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  161. 26-03-2019 23:59:07 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  162. 26-03-2019 23:59:07 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  163. 26-03-2019 23:59:07 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  164. 26-03-2019 23:59:07 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  165. 26-03-2019 23:59:07 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  166. 27-03-2019 00:12:59 Background loading servers
  167. 27-03-2019 00:13:03 Servers list received
  168. 27-03-2019 00:59:06 TLS: tls_process: killed expiring key
  169. 27-03-2019 00:59:08 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  170. 27-03-2019 00:59:08 VERIFY OK: nsCertType=SERVER
  171. 27-03-2019 00:59:08 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  172. 27-03-2019 00:59:08 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  173. 27-03-2019 00:59:08 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  174. 27-03-2019 00:59:08 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  175. 27-03-2019 00:59:08 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  176. 27-03-2019 00:59:08 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  177. 27-03-2019 00:59:08 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  178. 27-03-2019 01:27:06 Background loading servers
  179. 27-03-2019 01:27:09 Servers list received
  180. 27-03-2019 01:59:07 TLS: tls_process: killed expiring key
  181. 27-03-2019 01:59:09 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  182. 27-03-2019 01:59:09 VERIFY OK: nsCertType=SERVER
  183. 27-03-2019 01:59:09 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  184. 27-03-2019 01:59:09 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  185. 27-03-2019 01:59:09 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  186. 27-03-2019 01:59:09 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  187. 27-03-2019 01:59:09 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  188. 27-03-2019 01:59:09 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  189. 27-03-2019 01:59:09 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  190. 27-03-2019 02:59:08 TLS: tls_process: killed expiring key
  191. 27-03-2019 02:59:09 TLS: soft reset sec=3600/3600 bytes=72941571/-1 pkts=76267/0
  192. 27-03-2019 02:59:09 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  193. 27-03-2019 02:59:09 VERIFY OK: nsCertType=SERVER
  194. 27-03-2019 02:59:09 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  195. 27-03-2019 02:59:09 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  196. 27-03-2019 02:59:09 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  197. 27-03-2019 02:59:09 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  198. 27-03-2019 02:59:09 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  199. 27-03-2019 02:59:09 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  200. 27-03-2019 02:59:09 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  201. 27-03-2019 03:45:21 Background loading servers
  202. 27-03-2019 03:45:24 Servers list received
  203. 27-03-2019 03:59:10 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  204. 27-03-2019 03:59:10 VERIFY OK: nsCertType=SERVER
  205. 27-03-2019 03:59:10 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  206. 27-03-2019 03:59:10 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  207. 27-03-2019 03:59:10 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  208. 27-03-2019 03:59:10 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  209. 27-03-2019 03:59:10 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  210. 27-03-2019 03:59:10 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  211. 27-03-2019 03:59:10 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  212. 27-03-2019 04:59:09 TLS: tls_process: killed expiring key
  213. 27-03-2019 04:59:11 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  214. 27-03-2019 04:59:11 VERIFY OK: nsCertType=SERVER
  215. 27-03-2019 04:59:11 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  216. 27-03-2019 04:59:11 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  217. 27-03-2019 04:59:11 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  218. 27-03-2019 04:59:11 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  219. 27-03-2019 04:59:11 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  220. 27-03-2019 04:59:11 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  221. 27-03-2019 04:59:11 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  222. 27-03-2019 05:59:11 TLS: soft reset sec=3600/3600 bytes=525496/-1 pkts=1975/0
  223. 27-03-2019 05:59:12 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  224. 27-03-2019 05:59:12 VERIFY OK: nsCertType=SERVER
  225. 27-03-2019 05:59:12 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  226. 27-03-2019 05:59:12 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  227. 27-03-2019 05:59:12 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  228. 27-03-2019 05:59:12 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  229. 27-03-2019 05:59:12 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  230. 27-03-2019 05:59:12 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  231. 27-03-2019 05:59:12 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  232. 27-03-2019 06:59:13 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  233. 27-03-2019 06:59:13 VERIFY OK: nsCertType=SERVER
  234. 27-03-2019 06:59:13 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  235. 27-03-2019 06:59:13 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  236. 27-03-2019 06:59:13 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  237. 27-03-2019 06:59:13 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  238. 27-03-2019 06:59:13 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  239. 27-03-2019 06:59:13 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  240. 27-03-2019 06:59:13 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  241. 27-03-2019 07:59:12 TLS: tls_process: killed expiring key
  242. 27-03-2019 07:59:14 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  243. 27-03-2019 07:59:14 VERIFY OK: nsCertType=SERVER
  244. 27-03-2019 07:59:14 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  245. 27-03-2019 07:59:14 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  246. 27-03-2019 07:59:14 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  247. 27-03-2019 07:59:14 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  248. 27-03-2019 07:59:14 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  249. 27-03-2019 07:59:14 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  250. 27-03-2019 07:59:14 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  251. 27-03-2019 08:12:02 Background loading servers
  252. 27-03-2019 08:12:06 Servers list received
  253. 27-03-2019 08:59:15 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  254. 27-03-2019 08:59:15 VERIFY OK: nsCertType=SERVER
  255. 27-03-2019 08:59:15 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  256. 27-03-2019 08:59:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  257. 27-03-2019 08:59:16 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  258. 27-03-2019 08:59:16 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  259. 27-03-2019 08:59:16 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  260. 27-03-2019 08:59:16 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  261. 27-03-2019 08:59:16 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  262. 27-03-2019 09:59:15 TLS: tls_process: killed expiring key
  263. 27-03-2019 09:59:16 TLS: soft reset sec=3600/3600 bytes=31673803/-1 pkts=42110/0
  264. 27-03-2019 09:59:16 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  265. 27-03-2019 09:59:16 VERIFY OK: nsCertType=SERVER
  266. 27-03-2019 09:59:16 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  267. 27-03-2019 09:59:17 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  268. 27-03-2019 09:59:17 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  269. 27-03-2019 09:59:17 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  270. 27-03-2019 09:59:17 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  271. 27-03-2019 09:59:17 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  272. 27-03-2019 09:59:17 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  273. 27-03-2019 10:59:16 TLS: tls_process: killed expiring key
  274. 27-03-2019 10:59:18 TLS: soft reset sec=3601/3600 bytes=5014312/-1 pkts=10040/0
  275. 27-03-2019 10:59:19 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  276. 27-03-2019 10:59:19 VERIFY OK: nsCertType=SERVER
  277. 27-03-2019 10:59:19 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  278. 27-03-2019 10:59:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  279. 27-03-2019 10:59:20 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  280. 27-03-2019 10:59:20 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  281. 27-03-2019 10:59:20 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  282. 27-03-2019 10:59:20 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  283. 27-03-2019 10:59:20 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  284. 27-03-2019 11:59:18 TLS: tls_process: killed expiring key
  285. 27-03-2019 11:59:20 TLS: soft reset sec=3600/3600 bytes=9004394/-1 pkts=14813/0
  286. 27-03-2019 11:59:20 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  287. 27-03-2019 11:59:20 VERIFY OK: nsCertType=SERVER
  288. 27-03-2019 11:59:20 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  289. 27-03-2019 11:59:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  290. 27-03-2019 11:59:21 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  291. 27-03-2019 11:59:21 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  292. 27-03-2019 11:59:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  293. 27-03-2019 11:59:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  294. 27-03-2019 11:59:21 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  295. 27-03-2019 12:59:20 TLS: tls_process: killed expiring key
  296. 27-03-2019 12:59:21 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  297. 27-03-2019 12:59:21 VERIFY OK: nsCertType=SERVER
  298. 27-03-2019 12:59:21 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  299. 27-03-2019 12:59:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  300. 27-03-2019 12:59:21 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  301. 27-03-2019 12:59:21 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  302. 27-03-2019 12:59:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  303. 27-03-2019 12:59:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  304. 27-03-2019 12:59:21 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  305. 27-03-2019 13:05:29 Obtaining IP address
  306. 27-03-2019 13:05:29 Obtaining IP address
  307. 27-03-2019 13:05:29 Obtaining IP address
  308. 27-03-2019 13:05:29 Obtaining IP address
  309. 27-03-2019 13:05:31 Obtaining location
  310. 27-03-2019 13:05:31 Current IP received : 91.219.237.59;91.219.237.59
  311. 27-03-2019 13:05:31 Obtaining location
  312. 27-03-2019 13:05:31 Current IP received : 91.219.237.59;91.219.237.59
  313. 27-03-2019 13:05:32 Location received
  314. 27-03-2019 13:05:32 Current location : Hungary
  315. 27-03-2019 13:05:32 Location received
  316. 27-03-2019 13:05:32 Current location : Hungary
  317. 27-03-2019 13:06:28 read TCP_CLIENT []: Software caused connection abort (code=103)
  318. 27-03-2019 13:06:28 Connection reset, restarting [0]
  319. 27-03-2019 13:06:29 TCP/UDP: Closing socket
  320. 27-03-2019 13:06:29 SIGUSR1[soft,connection-reset] received, process restarting
  321. 27-03-2019 13:06:29 MANAGEMENT: >STATE:1553681189,RECONNECTING,connection-reset,,,,,
  322. 27-03-2019 13:06:29 MANAGEMENT: CMD 'hold release'
  323. 27-03-2019 13:06:29 MANAGEMENT: CMD 'bytecount 2'
  324. 27-03-2019 13:06:29 MANAGEMENT: CMD 'state on'
  325. 27-03-2019 13:06:29 MANAGEMENT: CMD 'proxy NONE'
  326. 27-03-2019 13:06:29 Статус сети: not prepareSuccess
  327. 27-03-2019 13:06:30 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  328. 27-03-2019 13:06:30 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  329. 27-03-2019 13:06:30 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  330. 27-03-2019 13:06:30 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  331. 27-03-2019 13:06:30 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  332. 27-03-2019 13:06:30 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
  333. 27-03-2019 13:06:30 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  334. 27-03-2019 13:06:30 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
  335. 27-03-2019 13:06:30 MANAGEMENT: >STATE:1553681190,TCP_CONNECT,,,,,,
  336. 27-03-2019 13:06:30 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  337. 27-03-2019 13:06:30 TCP: connect to [AF_INET]91.219.238.56:995 failed: Network is unreachable
  338. 27-03-2019 13:06:30 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  339. 27-03-2019 13:06:30 MANAGEMENT: >STATE:1553681190,RECONNECTING,init_instance,,,,,
  340. 27-03-2019 13:06:34 MANAGEMENT: CMD 'hold release'
  341. 27-03-2019 13:06:34 MANAGEMENT: CMD 'proxy NONE'
  342. 27-03-2019 13:06:34 MANAGEMENT: CMD 'bytecount 2'
  343. 27-03-2019 13:06:34 MANAGEMENT: CMD 'state on'
  344. 27-03-2019 13:06:34 Статус сети: CONNECTED HSPA to MOBILE internet.mts.ru
  345. 27-03-2019 13:06:35 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  346. 27-03-2019 13:06:35 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  347. 27-03-2019 13:06:35 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  348. 27-03-2019 13:06:35 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  349. 27-03-2019 13:06:35 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  350. 27-03-2019 13:06:35 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
  351. 27-03-2019 13:06:35 Socket Buffers: R=[87380->524288] S=[16384->524288]
  352. 27-03-2019 13:06:35 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
  353. 27-03-2019 13:06:35 MANAGEMENT: >STATE:1553681195,TCP_CONNECT,,,,,,
  354. 27-03-2019 13:06:35 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  355. 27-03-2019 13:06:38 TCP connection established with [AF_INET]91.219.238.56:995
  356. 27-03-2019 13:06:38 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  357. 27-03-2019 13:06:38 TCP_CLIENT link local: (not bound)
  358. 27-03-2019 13:06:38 TCP_CLIENT link remote: [AF_INET]91.219.238.56:995
  359. 27-03-2019 13:06:38 MANAGEMENT: >STATE:1553681198,WAIT,,,,,,
  360. 27-03-2019 13:06:38 Scrambler: disabled by config
  361. 27-03-2019 13:06:38 MANAGEMENT: >STATE:1553681198,AUTH,,,,,,
  362. 27-03-2019 13:06:38 TLS: Initial packet from [AF_INET]91.219.238.56:995, sid=c3af5f4a 5b678412
  363. 27-03-2019 13:06:38 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  364. 27-03-2019 13:06:38 VERIFY OK: nsCertType=SERVER
  365. 27-03-2019 13:06:38 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  366. 27-03-2019 13:06:39 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1551', remote='link-mtu 1543'
  367. 27-03-2019 13:06:39 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher BF-CBC'
  368. 27-03-2019 13:06:39 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  369. 27-03-2019 13:06:39 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  370. 27-03-2019 13:06:39 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  371. 27-03-2019 13:06:39 [server] Peer Connection Initiated with [AF_INET]91.219.238.56:995
  372. 27-03-2019 13:06:40 MANAGEMENT: >STATE:1553681200,GET_CONFIG,,,,,,
  373. 27-03-2019 13:06:40 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  374. 27-03-2019 13:06:41 PUSH: Received control message: 'PUSH_REPLY,route 10.119.144.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.119.146.86 10.119.146.85,peer-id 0,cipher AES-256-GCM'
  375. 27-03-2019 13:06:41 OPTIONS IMPORT: timers and/or timeouts modified
  376. 27-03-2019 13:06:41 OPTIONS IMPORT: --ifconfig/up options modified
  377. 27-03-2019 13:06:41 OPTIONS IMPORT: route options modified
  378. 27-03-2019 13:06:41 OPTIONS IMPORT: peer-id set
  379. 27-03-2019 13:06:41 OPTIONS IMPORT: adjusting link_mtu to 1626
  380. 27-03-2019 13:06:41 OPTIONS IMPORT: data channel crypto options modified
  381. 27-03-2019 13:06:41 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  382. 27-03-2019 13:06:41 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  383. 27-03-2019 13:06:41 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  384. 27-03-2019 13:06:41 GDG: SIOCGIFHWADDR(lo) failed
  385. 27-03-2019 13:06:41 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  386. 27-03-2019 13:06:41 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  387. 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,ASSIGN_IP,,10.119.146.86,,,,
  388. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  389. 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,ADD_ROUTES,,,,,,
  390. 27-03-2019 13:06:41 Открытие TUN-интерфейса:
  391. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  392. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  393. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  394. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  395. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  396. 27-03-2019 13:06:41 Адрес IPv4: 10.119.146.86/30 IPv6: null MTU: 1500
  397. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  398. 27-03-2019 13:06:41 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  399. 27-03-2019 13:06:41 Маршруты: 0.0.0.0/0, 10.119.144.0/20, 10.119.146.84/30
  400. 27-03-2019 13:06:41 Исключенные маршруты:
  401. 27-03-2019 13:06:41 Подключенные маршруты сервиса VPN: 0.0.0.0/0
  402. 27-03-2019 13:06:41 Запрещенные VPN приложения:
  403. 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  404. 27-03-2019 13:06:41 Initialization Sequence Completed
  405. 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,CONNECTED,SUCCESS,10.119.146.86,91.219.238.56,995,10.196.255.17,40359
  406. 27-03-2019 13:06:42 Статус сети: CONNECTED HSPA+ to MOBILE internet.mts.ru
  407. 27-03-2019 13:09:15 Obtaining IP address
  408. 27-03-2019 13:09:16 Obtaining IP address
  409. 27-03-2019 13:09:16 Obtaining IP address
  410. 27-03-2019 13:09:16 Obtaining IP address
  411. 27-03-2019 13:09:18 Obtaining location
  412. 27-03-2019 13:09:18 Current IP received : 91.219.237.59;91.219.237.59
  413. 27-03-2019 13:09:18 Obtaining location
  414. 27-03-2019 13:09:18 Current IP received : 91.219.237.59;91.219.237.59
  415. 27-03-2019 13:09:20 Location received
  416. 27-03-2019 13:09:20 Location received
  417. 27-03-2019 13:09:20 Current location : Hungary
  418. 27-03-2019 13:09:20 Current location : Hungary
  419. 27-03-2019 13:09:49 Obtaining IP address
  420. 27-03-2019 13:09:49 Obtaining IP address
  421. 27-03-2019 13:09:49 Obtaining IP address
  422. 27-03-2019 13:09:49 Obtaining IP address
  423. 27-03-2019 13:09:50 Obtaining location
  424. 27-03-2019 13:09:50 Current IP received : 91.219.237.59;91.219.237.59
  425. 27-03-2019 13:09:51 Location received
  426. 27-03-2019 13:09:51 Current location : Hungary
  427. 27-03-2019 13:09:52 Obtaining location
  428. 27-03-2019 13:09:52 Current IP received : 91.219.237.59;91.219.237.59
  429. 27-03-2019 13:09:53 Location received
  430. 27-03-2019 13:09:54 Current location : Hungary
  431. 27-03-2019 13:11:39 Obtaining IP address
  432. 27-03-2019 13:11:39 Obtaining IP address
  433. 27-03-2019 13:11:39 Obtaining IP address
  434. 27-03-2019 13:11:39 Obtaining IP address
  435. 27-03-2019 13:11:40 Obtaining location
  436. 27-03-2019 13:11:40 Current IP received : 91.219.237.59;91.219.237.59
  437. 27-03-2019 13:11:42 Location received
  438. 27-03-2019 13:11:42 Current location : Hungary
  439. 27-03-2019 13:11:44 Obtaining location
  440. 27-03-2019 13:11:44 Current IP received : 91.219.237.59;91.219.237.59
  441. 27-03-2019 13:11:45 Location received
  442. 27-03-2019 13:11:45 Current location : Hungary
  443. 27-03-2019 13:12:00 Obtaining IP address
  444. 27-03-2019 13:12:00 Obtaining IP address
  445. 27-03-2019 13:12:00 Obtaining IP address
  446. 27-03-2019 13:12:00 Obtaining IP address
  447. 27-03-2019 13:12:02 Obtaining location
  448. 27-03-2019 13:12:02 Current IP received : 91.219.237.59;91.219.237.59
  449. 27-03-2019 13:12:03 Location received
  450. 27-03-2019 13:12:03 Current location : Hungary
  451. 27-03-2019 13:12:03 Obtaining location
  452. 27-03-2019 13:12:03 Current IP received : 91.219.237.59;91.219.237.59
  453. 27-03-2019 13:12:04 Location received
  454. 27-03-2019 13:12:04 Current location : Hungary
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement