Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 27-03-2019 13:12:01 Application version 1.5.9 started
- 26-03-2019 21:58:56 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.5.9 работает на samsung SM-T385 (msm8937), Android 8.1.0 (M1AJQ) API 27, ABI armeabi-v7a, (samsung/gta2sltedx/gta2slte:8.1.0/M1AJQ/T385DXU2BRK4:user/release-keys)
- 26-03-2019 21:58:57 Background loading servers
- 26-03-2019 21:59:00 Servers list received
- 26-03-2019 21:59:00 Создание конфигурации…
- 26-03-2019 21:59:00 started Socket Thread
- 26-03-2019 21:59:00 Статус сети: CONNECTED to WIFI "Home"
- 26-03-2019 21:59:00 Current Parameter Settings:
- 26-03-2019 21:59:00 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
- 26-03-2019 21:59:00 mode = 0
- 26-03-2019 21:59:00 show_ciphers = DISABLED
- 26-03-2019 21:59:00 show_digests = DISABLED
- 26-03-2019 21:59:00 show_engines = DISABLED
- 26-03-2019 21:59:00 genkey = DISABLED
- 26-03-2019 21:59:00 key_pass_file = '[UNDEF]'
- 26-03-2019 21:59:00 show_tls_ciphers = DISABLED
- 26-03-2019 21:59:00 connect_retry_max = 5
- 26-03-2019 21:59:00 Connection profiles [0]:
- 26-03-2019 21:59:00 proto = tcp-client
- 26-03-2019 21:59:00 local = '[UNDEF]'
- 26-03-2019 21:59:00 local_port = '[UNDEF]'
- 26-03-2019 21:59:00 remote = '91.219.238.56'
- 26-03-2019 21:59:00 remote_port = '995'
- 26-03-2019 21:59:00 remote_float = DISABLED
- 26-03-2019 21:59:00 bind_defined = DISABLED
- 26-03-2019 21:59:00 bind_local = DISABLED
- 26-03-2019 21:59:00 bind_ipv6_only = DISABLED
- 26-03-2019 21:59:00 NOTE: --mute triggered...
- 26-03-2019 21:59:00 164 variation(s) on previous 20 message(s) suppressed by --mute
- 26-03-2019 21:59:00 OpenVPN 2.5-icsopenvpn [git:54ad578] armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
- 26-03-2019 21:59:00 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
- 26-03-2019 21:59:00 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
- 26-03-2019 21:59:00 MANAGEMENT: CMD 'hold release'
- 26-03-2019 21:59:00 MANAGEMENT: CMD 'bytecount 2'
- 26-03-2019 21:59:00 MANAGEMENT: CMD 'state on'
- 26-03-2019 21:59:00 MANAGEMENT: CMD 'proxy NONE'
- 26-03-2019 21:59:01 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 26-03-2019 21:59:02 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
- 26-03-2019 21:59:02 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
- 26-03-2019 21:59:02 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
- 26-03-2019 21:59:02 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
- 26-03-2019 21:59:02 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
- 26-03-2019 21:59:02 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
- 26-03-2019 21:59:02 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
- 26-03-2019 21:59:02 MANAGEMENT: >STATE:1553626742,TCP_CONNECT,,,,,,
- 26-03-2019 21:59:02 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 26-03-2019 21:59:03 TCP connection established with [AF_INET]91.219.238.56:995
- 26-03-2019 21:59:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 26-03-2019 21:59:03 TCP_CLIENT link local: (not bound)
- 26-03-2019 21:59:03 TCP_CLIENT link remote: [AF_INET]91.219.238.56:995
- 26-03-2019 21:59:03 MANAGEMENT: >STATE:1553626743,WAIT,,,,,,
- 26-03-2019 21:59:03 Scrambler: disabled by config
- 26-03-2019 21:59:03 MANAGEMENT: >STATE:1553626743,AUTH,,,,,,
- 26-03-2019 21:59:03 TLS: Initial packet from [AF_INET]91.219.238.56:995, sid=1427e15e 9b59cb29
- 26-03-2019 21:59:03 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 26-03-2019 21:59:03 VERIFY OK: nsCertType=SERVER
- 26-03-2019 21:59:03 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 26-03-2019 21:59:04 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 26-03-2019 21:59:04 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 26-03-2019 21:59:04 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 26-03-2019 21:59:04 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 26-03-2019 21:59:04 [server] Peer Connection Initiated with [AF_INET]91.219.238.56:995
- 26-03-2019 21:59:05 MANAGEMENT: >STATE:1553626745,GET_CONFIG,,,,,,
- 26-03-2019 21:59:05 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 26-03-2019 21:59:06 PUSH: Received control message: 'PUSH_REPLY,route 10.119.144.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.119.146.86 10.119.146.85,peer-id 0,cipher AES-256-GCM'
- 26-03-2019 21:59:06 OPTIONS IMPORT: timers and/or timeouts modified
- 26-03-2019 21:59:06 OPTIONS IMPORT: --ifconfig/up options modified
- 26-03-2019 21:59:06 OPTIONS IMPORT: route options modified
- 26-03-2019 21:59:06 OPTIONS IMPORT: peer-id set
- 26-03-2019 21:59:06 OPTIONS IMPORT: adjusting link_mtu to 1626
- 26-03-2019 21:59:06 OPTIONS IMPORT: data channel crypto options modified
- 26-03-2019 21:59:06 Data Channel: using negotiated cipher 'AES-256-GCM'
- 26-03-2019 21:59:06 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
- 26-03-2019 21:59:06 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 21:59:06 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 21:59:06 GDG: SIOCGIFHWADDR(lo) failed
- 26-03-2019 21:59:06 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 26-03-2019 21:59:06 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,ASSIGN_IP,,10.119.146.86,,,,
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,ADD_ROUTES,,,,,,
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 26-03-2019 21:59:06 Открытие TUN-интерфейса:
- 26-03-2019 21:59:06 Игнорируется мультиадресный маршрут: 224.0.0.0/3
- 26-03-2019 21:59:06 Адрес IPv4: 10.119.146.86/30 IPv6: null MTU: 1500
- 26-03-2019 21:59:06 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
- 26-03-2019 21:59:06 Маршруты: 0.0.0.0/0, 10.119.144.0/20, 10.119.146.84/30
- 26-03-2019 21:59:06 Исключенные маршруты: 192.168.0.100/24
- 26-03-2019 21:59:06 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
- 26-03-2019 21:59:06 Запрещенные VPN приложения:
- 26-03-2019 21:59:06 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 26-03-2019 21:59:06 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 26-03-2019 21:59:06 Initialization Sequence Completed
- 26-03-2019 21:59:06 MANAGEMENT: >STATE:1553626746,CONNECTED,SUCCESS,10.119.146.86,91.219.238.56,995,192.168.0.100,42952
- 26-03-2019 21:59:08 Obtaining IP address
- 26-03-2019 21:59:08 Obtaining IP address
- 26-03-2019 21:59:15 Internal authentication error
- 26-03-2019 21:59:17 Obtaining location
- 26-03-2019 21:59:17 Current IP received : 91.219.237.59;91.219.237.59
- 26-03-2019 21:59:18 Location received
- 26-03-2019 21:59:18 Current location : Hungary
- 26-03-2019 21:59:27 Internal authentication error
- 26-03-2019 21:59:39 Internal authentication error
- 26-03-2019 21:59:51 Internal authentication error
- 26-03-2019 22:00:16 Internal authentication is successful
- 26-03-2019 22:04:31 Obtaining IP address
- 26-03-2019 22:04:31 Obtaining IP address
- 26-03-2019 22:04:32 Obtaining IP address
- 26-03-2019 22:04:32 Obtaining IP address
- 26-03-2019 22:04:34 Obtaining location
- 26-03-2019 22:04:34 Current IP received : 91.219.237.59;91.219.237.59
- 26-03-2019 22:04:34 Obtaining location
- 26-03-2019 22:04:34 Current IP received : 91.219.237.59;91.219.237.59
- 26-03-2019 22:04:35 Location received
- 26-03-2019 22:04:35 Location received
- 26-03-2019 22:04:35 Current location : Hungary
- 26-03-2019 22:04:35 Current location : Hungary
- 26-03-2019 22:04:42 Obtaining IP address
- 26-03-2019 22:04:42 Obtaining IP address
- 26-03-2019 22:04:43 Obtaining IP address
- 26-03-2019 22:04:43 Obtaining IP address
- 26-03-2019 22:04:43 Obtaining location
- 26-03-2019 22:04:43 Current IP received : 91.219.237.59;91.219.237.59
- 26-03-2019 22:04:44 Location received
- 26-03-2019 22:04:44 Current location : Hungary
- 26-03-2019 22:04:45 Obtaining location
- 26-03-2019 22:04:45 Current IP received : 91.219.237.59;91.219.237.59
- 26-03-2019 22:04:46 Location received
- 26-03-2019 22:04:46 Current location : Hungary
- 26-03-2019 22:09:41 Background loading servers
- 26-03-2019 22:09:44 Servers list received
- 26-03-2019 22:20:41 Background loading servers
- 26-03-2019 22:20:44 Servers list received
- 26-03-2019 22:32:41 Background loading servers
- 26-03-2019 22:32:45 Servers list received
- 26-03-2019 22:46:41 Background loading servers
- 26-03-2019 22:46:47 Servers list received
- 26-03-2019 22:59:05 TLS: soft reset sec=3601/3600 bytes=13170680/-1 pkts=23754/0
- 26-03-2019 22:59:06 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 26-03-2019 22:59:06 VERIFY OK: nsCertType=SERVER
- 26-03-2019 22:59:06 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 26-03-2019 22:59:06 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 26-03-2019 22:59:06 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 26-03-2019 22:59:06 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 26-03-2019 22:59:06 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 22:59:06 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 22:59:06 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 26-03-2019 23:04:53 Background loading servers
- 26-03-2019 23:05:01 Servers list received
- 26-03-2019 23:31:00 Background loading servers
- 26-03-2019 23:31:03 Servers list received
- 26-03-2019 23:59:07 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 26-03-2019 23:59:07 VERIFY OK: nsCertType=SERVER
- 26-03-2019 23:59:07 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 26-03-2019 23:59:07 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 26-03-2019 23:59:07 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 26-03-2019 23:59:07 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 26-03-2019 23:59:07 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 23:59:07 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 26-03-2019 23:59:07 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 00:12:59 Background loading servers
- 27-03-2019 00:13:03 Servers list received
- 27-03-2019 00:59:06 TLS: tls_process: killed expiring key
- 27-03-2019 00:59:08 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 00:59:08 VERIFY OK: nsCertType=SERVER
- 27-03-2019 00:59:08 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 00:59:08 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 00:59:08 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 00:59:08 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 00:59:08 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 00:59:08 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 00:59:08 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 01:27:06 Background loading servers
- 27-03-2019 01:27:09 Servers list received
- 27-03-2019 01:59:07 TLS: tls_process: killed expiring key
- 27-03-2019 01:59:09 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 01:59:09 VERIFY OK: nsCertType=SERVER
- 27-03-2019 01:59:09 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 01:59:09 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 01:59:09 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 01:59:09 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 01:59:09 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 01:59:09 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 01:59:09 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 02:59:08 TLS: tls_process: killed expiring key
- 27-03-2019 02:59:09 TLS: soft reset sec=3600/3600 bytes=72941571/-1 pkts=76267/0
- 27-03-2019 02:59:09 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 02:59:09 VERIFY OK: nsCertType=SERVER
- 27-03-2019 02:59:09 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 02:59:09 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 02:59:09 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 02:59:09 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 02:59:09 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 02:59:09 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 02:59:09 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 03:45:21 Background loading servers
- 27-03-2019 03:45:24 Servers list received
- 27-03-2019 03:59:10 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 03:59:10 VERIFY OK: nsCertType=SERVER
- 27-03-2019 03:59:10 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 03:59:10 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 03:59:10 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 03:59:10 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 03:59:10 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 03:59:10 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 03:59:10 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 04:59:09 TLS: tls_process: killed expiring key
- 27-03-2019 04:59:11 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 04:59:11 VERIFY OK: nsCertType=SERVER
- 27-03-2019 04:59:11 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 04:59:11 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 04:59:11 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 04:59:11 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 04:59:11 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 04:59:11 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 04:59:11 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 05:59:11 TLS: soft reset sec=3600/3600 bytes=525496/-1 pkts=1975/0
- 27-03-2019 05:59:12 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 05:59:12 VERIFY OK: nsCertType=SERVER
- 27-03-2019 05:59:12 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 05:59:12 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 05:59:12 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 05:59:12 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 05:59:12 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 05:59:12 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 05:59:12 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 06:59:13 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 06:59:13 VERIFY OK: nsCertType=SERVER
- 27-03-2019 06:59:13 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 06:59:13 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 06:59:13 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 06:59:13 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 06:59:13 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 06:59:13 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 06:59:13 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 07:59:12 TLS: tls_process: killed expiring key
- 27-03-2019 07:59:14 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 07:59:14 VERIFY OK: nsCertType=SERVER
- 27-03-2019 07:59:14 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 07:59:14 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 07:59:14 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 07:59:14 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 07:59:14 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 07:59:14 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 07:59:14 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 08:12:02 Background loading servers
- 27-03-2019 08:12:06 Servers list received
- 27-03-2019 08:59:15 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 08:59:15 VERIFY OK: nsCertType=SERVER
- 27-03-2019 08:59:15 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 08:59:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 08:59:16 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 08:59:16 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 08:59:16 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 08:59:16 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 08:59:16 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 09:59:15 TLS: tls_process: killed expiring key
- 27-03-2019 09:59:16 TLS: soft reset sec=3600/3600 bytes=31673803/-1 pkts=42110/0
- 27-03-2019 09:59:16 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 09:59:16 VERIFY OK: nsCertType=SERVER
- 27-03-2019 09:59:16 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 09:59:17 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 09:59:17 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 09:59:17 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 09:59:17 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 09:59:17 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 09:59:17 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 10:59:16 TLS: tls_process: killed expiring key
- 27-03-2019 10:59:18 TLS: soft reset sec=3601/3600 bytes=5014312/-1 pkts=10040/0
- 27-03-2019 10:59:19 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 10:59:19 VERIFY OK: nsCertType=SERVER
- 27-03-2019 10:59:19 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 10:59:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 10:59:20 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 10:59:20 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 10:59:20 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 10:59:20 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 10:59:20 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 11:59:18 TLS: tls_process: killed expiring key
- 27-03-2019 11:59:20 TLS: soft reset sec=3600/3600 bytes=9004394/-1 pkts=14813/0
- 27-03-2019 11:59:20 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 11:59:20 VERIFY OK: nsCertType=SERVER
- 27-03-2019 11:59:20 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 11:59:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 11:59:21 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 11:59:21 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 11:59:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 11:59:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 11:59:21 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 12:59:20 TLS: tls_process: killed expiring key
- 27-03-2019 12:59:21 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 12:59:21 VERIFY OK: nsCertType=SERVER
- 27-03-2019 12:59:21 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 12:59:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
- 27-03-2019 12:59:21 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- 27-03-2019 12:59:21 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 12:59:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 12:59:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 12:59:21 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 13:05:29 Obtaining IP address
- 27-03-2019 13:05:29 Obtaining IP address
- 27-03-2019 13:05:29 Obtaining IP address
- 27-03-2019 13:05:29 Obtaining IP address
- 27-03-2019 13:05:31 Obtaining location
- 27-03-2019 13:05:31 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:05:31 Obtaining location
- 27-03-2019 13:05:31 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:05:32 Location received
- 27-03-2019 13:05:32 Current location : Hungary
- 27-03-2019 13:05:32 Location received
- 27-03-2019 13:05:32 Current location : Hungary
- 27-03-2019 13:06:28 read TCP_CLIENT []: Software caused connection abort (code=103)
- 27-03-2019 13:06:28 Connection reset, restarting [0]
- 27-03-2019 13:06:29 TCP/UDP: Closing socket
- 27-03-2019 13:06:29 SIGUSR1[soft,connection-reset] received, process restarting
- 27-03-2019 13:06:29 MANAGEMENT: >STATE:1553681189,RECONNECTING,connection-reset,,,,,
- 27-03-2019 13:06:29 MANAGEMENT: CMD 'hold release'
- 27-03-2019 13:06:29 MANAGEMENT: CMD 'bytecount 2'
- 27-03-2019 13:06:29 MANAGEMENT: CMD 'state on'
- 27-03-2019 13:06:29 MANAGEMENT: CMD 'proxy NONE'
- 27-03-2019 13:06:29 Статус сети: not prepareSuccess
- 27-03-2019 13:06:30 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 27-03-2019 13:06:30 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
- 27-03-2019 13:06:30 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
- 27-03-2019 13:06:30 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
- 27-03-2019 13:06:30 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
- 27-03-2019 13:06:30 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
- 27-03-2019 13:06:30 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
- 27-03-2019 13:06:30 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
- 27-03-2019 13:06:30 MANAGEMENT: >STATE:1553681190,TCP_CONNECT,,,,,,
- 27-03-2019 13:06:30 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 27-03-2019 13:06:30 TCP: connect to [AF_INET]91.219.238.56:995 failed: Network is unreachable
- 27-03-2019 13:06:30 SIGUSR1[connection failed(soft),init_instance] received, process restarting
- 27-03-2019 13:06:30 MANAGEMENT: >STATE:1553681190,RECONNECTING,init_instance,,,,,
- 27-03-2019 13:06:34 MANAGEMENT: CMD 'hold release'
- 27-03-2019 13:06:34 MANAGEMENT: CMD 'proxy NONE'
- 27-03-2019 13:06:34 MANAGEMENT: CMD 'bytecount 2'
- 27-03-2019 13:06:34 MANAGEMENT: CMD 'state on'
- 27-03-2019 13:06:34 Статус сети: CONNECTED HSPA to MOBILE internet.mts.ru
- 27-03-2019 13:06:35 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- 27-03-2019 13:06:35 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
- 27-03-2019 13:06:35 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
- 27-03-2019 13:06:35 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
- 27-03-2019 13:06:35 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
- 27-03-2019 13:06:35 TCP/UDP: Preserving recently used remote address: [AF_INET]91.219.238.56:995
- 27-03-2019 13:06:35 Socket Buffers: R=[87380->524288] S=[16384->524288]
- 27-03-2019 13:06:35 Attempting to establish TCP connection with [AF_INET]91.219.238.56:995 [nonblock]
- 27-03-2019 13:06:35 MANAGEMENT: >STATE:1553681195,TCP_CONNECT,,,,,,
- 27-03-2019 13:06:35 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 27-03-2019 13:06:38 TCP connection established with [AF_INET]91.219.238.56:995
- 27-03-2019 13:06:38 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 27-03-2019 13:06:38 TCP_CLIENT link local: (not bound)
- 27-03-2019 13:06:38 TCP_CLIENT link remote: [AF_INET]91.219.238.56:995
- 27-03-2019 13:06:38 MANAGEMENT: >STATE:1553681198,WAIT,,,,,,
- 27-03-2019 13:06:38 Scrambler: disabled by config
- 27-03-2019 13:06:38 MANAGEMENT: >STATE:1553681198,AUTH,,,,,,
- 27-03-2019 13:06:38 TLS: Initial packet from [AF_INET]91.219.238.56:995, sid=c3af5f4a 5b678412
- 27-03-2019 13:06:38 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- 27-03-2019 13:06:38 VERIFY OK: nsCertType=SERVER
- 27-03-2019 13:06:38 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- 27-03-2019 13:06:39 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1551', remote='link-mtu 1543'
- 27-03-2019 13:06:39 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher BF-CBC'
- 27-03-2019 13:06:39 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 27-03-2019 13:06:39 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- 27-03-2019 13:06:39 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 27-03-2019 13:06:39 [server] Peer Connection Initiated with [AF_INET]91.219.238.56:995
- 27-03-2019 13:06:40 MANAGEMENT: >STATE:1553681200,GET_CONFIG,,,,,,
- 27-03-2019 13:06:40 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 27-03-2019 13:06:41 PUSH: Received control message: 'PUSH_REPLY,route 10.119.144.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.119.146.86 10.119.146.85,peer-id 0,cipher AES-256-GCM'
- 27-03-2019 13:06:41 OPTIONS IMPORT: timers and/or timeouts modified
- 27-03-2019 13:06:41 OPTIONS IMPORT: --ifconfig/up options modified
- 27-03-2019 13:06:41 OPTIONS IMPORT: route options modified
- 27-03-2019 13:06:41 OPTIONS IMPORT: peer-id set
- 27-03-2019 13:06:41 OPTIONS IMPORT: adjusting link_mtu to 1626
- 27-03-2019 13:06:41 OPTIONS IMPORT: data channel crypto options modified
- 27-03-2019 13:06:41 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
- 27-03-2019 13:06:41 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 13:06:41 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 27-03-2019 13:06:41 GDG: SIOCGIFHWADDR(lo) failed
- 27-03-2019 13:06:41 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 27-03-2019 13:06:41 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,ASSIGN_IP,,10.119.146.86,,,,
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,ADD_ROUTES,,,,,,
- 27-03-2019 13:06:41 Открытие TUN-интерфейса:
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
- 27-03-2019 13:06:41 Адрес IPv4: 10.119.146.86/30 IPv6: null MTU: 1500
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 27-03-2019 13:06:41 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
- 27-03-2019 13:06:41 Маршруты: 0.0.0.0/0, 10.119.144.0/20, 10.119.146.84/30
- 27-03-2019 13:06:41 Исключенные маршруты:
- 27-03-2019 13:06:41 Подключенные маршруты сервиса VPN: 0.0.0.0/0
- 27-03-2019 13:06:41 Запрещенные VPN приложения:
- 27-03-2019 13:06:41 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 27-03-2019 13:06:41 Initialization Sequence Completed
- 27-03-2019 13:06:41 MANAGEMENT: >STATE:1553681201,CONNECTED,SUCCESS,10.119.146.86,91.219.238.56,995,10.196.255.17,40359
- 27-03-2019 13:06:42 Статус сети: CONNECTED HSPA+ to MOBILE internet.mts.ru
- 27-03-2019 13:09:15 Obtaining IP address
- 27-03-2019 13:09:16 Obtaining IP address
- 27-03-2019 13:09:16 Obtaining IP address
- 27-03-2019 13:09:16 Obtaining IP address
- 27-03-2019 13:09:18 Obtaining location
- 27-03-2019 13:09:18 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:09:18 Obtaining location
- 27-03-2019 13:09:18 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:09:20 Location received
- 27-03-2019 13:09:20 Location received
- 27-03-2019 13:09:20 Current location : Hungary
- 27-03-2019 13:09:20 Current location : Hungary
- 27-03-2019 13:09:49 Obtaining IP address
- 27-03-2019 13:09:49 Obtaining IP address
- 27-03-2019 13:09:49 Obtaining IP address
- 27-03-2019 13:09:49 Obtaining IP address
- 27-03-2019 13:09:50 Obtaining location
- 27-03-2019 13:09:50 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:09:51 Location received
- 27-03-2019 13:09:51 Current location : Hungary
- 27-03-2019 13:09:52 Obtaining location
- 27-03-2019 13:09:52 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:09:53 Location received
- 27-03-2019 13:09:54 Current location : Hungary
- 27-03-2019 13:11:39 Obtaining IP address
- 27-03-2019 13:11:39 Obtaining IP address
- 27-03-2019 13:11:39 Obtaining IP address
- 27-03-2019 13:11:39 Obtaining IP address
- 27-03-2019 13:11:40 Obtaining location
- 27-03-2019 13:11:40 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:11:42 Location received
- 27-03-2019 13:11:42 Current location : Hungary
- 27-03-2019 13:11:44 Obtaining location
- 27-03-2019 13:11:44 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:11:45 Location received
- 27-03-2019 13:11:45 Current location : Hungary
- 27-03-2019 13:12:00 Obtaining IP address
- 27-03-2019 13:12:00 Obtaining IP address
- 27-03-2019 13:12:00 Obtaining IP address
- 27-03-2019 13:12:00 Obtaining IP address
- 27-03-2019 13:12:02 Obtaining location
- 27-03-2019 13:12:02 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:12:03 Location received
- 27-03-2019 13:12:03 Current location : Hungary
- 27-03-2019 13:12:03 Obtaining location
- 27-03-2019 13:12:03 Current IP received : 91.219.237.59;91.219.237.59
- 27-03-2019 13:12:04 Location received
- 27-03-2019 13:12:04 Current location : Hungary
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement