0% found this document useful (0 votes)
280 views

Event Log

This document contains log entries from a firewall over a period of several weeks. It logs details of multiple denial-of-service attacks involving TCP and UDP port scans from various sources, and records that each time the firewall dropped the packet to protect the system. It also contains some system log entries showing the device booting up successfully and syncing with the NTP server.

Uploaded by

Omar Torres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
280 views

Event Log

This document contains log entries from a firewall over a period of several weeks. It logs details of multiple denial-of-service attacks involving TCP and UDP port scans from various sources, and records that each time the firewall dropped the packet to protect the system. It also contains some system log entries showing the device booting up successfully and syncing with the NTP server.

Uploaded by

Omar Torres
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 22

Device Information

Module Name: FG6123BTM


Build Tag: SERCOMM.TELMEX
Firmware Version: FG6123BV3019
Build Time: Mon Jul 27 04:18:09 CST 2020
PON Serial Number: SCOM2010787B

{Firewall} 09-14-2020 05:19:25 DoS attack: TCP Port Scan from source:
89.248.171.134:58758
{Firewall} 09-14-2020 05:19:25 drop this packet for psd
{System} 09-14-2020 08:57:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-14-2020 08:57:43 TR069 connects to ACS server success.
{System} 09-14-2020 08:57:47 Sync up with NTP Server successfully, 2020-09-
14T08:57:46Z.
{Firewall} 09-14-2020 15:16:24 DoS attack: TCP Port Scan from source:
89.248.171.134:54578
{Firewall} 09-14-2020 15:16:24 drop this packet for psd
{System} 09-14-2020 20:34:54 Sync up with NTP Server successfully, 2020-09-
14T20:34:54Z.
{Firewall} 09-15-2020 01:07:35 DoS attack: TCP Port Scan from source:
185.39.10.14:50042
{Firewall} 09-15-2020 01:07:35 drop this packet for psd
{Firewall} 09-15-2020 12:45:05 DoS attack: TCP Port Scan from source:
60.172.47.2:7987
{Firewall} 09-15-2020 12:45:05 drop this packet for psd
{Firewall} 09-15-2020 14:09:33 DoS attack: TCP Port Scan from source:
89.248.174.199:56965
{Firewall} 09-15-2020 14:09:33 drop this packet for psd
{Firewall} 09-15-2020 23:34:09 DoS attack: TCP Port Scan from source:
94.102.49.135:50842
{Firewall} 09-15-2020 23:34:09 drop this packet for psd
{Firewall} 09-16-2020 18:13:24 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 09-16-2020 18:13:24 drop this packet for psd
{System} 09-16-2020 20:12:32 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-16-2020 20:12:57 Sync up with NTP Server successfully, 2020-09-
16T20:12:57Z.
{System} 09-16-2020 20:12:59 TR069 connects to ACS server success.
{Firewall} 09-16-2020 21:44:26 DoS attack: TCP Port Scan from source:
180.214.238.174:48424
{Firewall} 09-16-2020 21:44:26 drop this packet for psd
{Firewall} 09-17-2020 00:57:15 DoS attack: UDP Port Scan from source:
216.245.209.226:5311
{Firewall} 09-17-2020 00:57:15 drop this packet for psd
{Firewall} 09-17-2020 04:07:57 DoS attack: TCP Port Scan from source:
80.82.65.60:53668
{Firewall} 09-17-2020 04:07:57 drop this packet for psd
{Firewall} 09-17-2020 12:13:06 DoS attack: TCP Port Scan from source:
203.98.96.180:27549
{Firewall} 09-17-2020 12:13:06 drop this packet for psd
{Firewall} 09-17-2020 13:29:02 DoS attack: TCP Port Scan from source:
80.82.70.189:47337
{Firewall} 09-17-2020 13:29:02 drop this packet for psd
{Firewall} 09-17-2020 18:42:12 DoS attack: TCP Port Scan from source:
193.27.228.156:40080
{Firewall} 09-17-2020 18:42:12 drop this packet for psd
{Firewall} 09-17-2020 22:47:45 DoS attack: TCP Port Scan from source:
94.102.49.137:40857
{Firewall} 09-17-2020 22:47:45 drop this packet for psd
{Firewall} 09-18-2020 08:09:25 DoS attack: TCP Port Scan from source:
94.102.49.135:54556
{Firewall} 09-18-2020 08:09:25 drop this packet for psd
{Firewall} 09-18-2020 09:56:07 DoS attack: TCP Port Scan from source:
202.29.14.12:6000
{Firewall} 09-18-2020 09:56:07 drop this packet for psd
{Firewall} 09-18-2020 13:35:02 DoS attack: TCP Port Scan from source:
45.227.254.30:52023
{Firewall} 09-18-2020 13:35:02 drop this packet for psd
{Firewall} 09-18-2020 17:36:26 DoS attack: TCP Port Scan from source:
94.102.49.137:48577
{Firewall} 09-18-2020 17:36:26 drop this packet for psd
{Firewall} 09-19-2020 08:02:13 DoS attack: TCP Port Scan from source:
89.248.162.179:40528
{Firewall} 09-19-2020 08:02:13 drop this packet for psd
{Firewall} 09-19-2020 19:29:52 DoS attack: TCP Port Scan from source:
185.39.11.109:41780
{Firewall} 09-19-2020 19:29:52 drop this packet for psd
{Firewall} 09-20-2020 01:41:37 DoS attack: TCP Port Scan from source:
80.82.65.60:44081
{Firewall} 09-20-2020 01:41:37 drop this packet for psd
{Firewall} 09-20-2020 04:52:16 DoS attack: TCP Port Scan from source:
141.136.37.245:6000
{Firewall} 09-20-2020 04:52:16 drop this packet for psd
{Firewall} 09-20-2020 07:58:13 DoS attack: TCP Port Scan from source:
80.82.64.167:46626
{Firewall} 09-20-2020 07:58:13 drop this packet for psd
{Firewall} 09-20-2020 10:12:18 DoS attack: TCP Port Scan from source:
185.39.10.14:54730
{Firewall} 09-20-2020 10:12:18 drop this packet for psd
{Firewall} 09-20-2020 22:27:48 DoS attack: UDP Port Scan from source:
45.143.221.6:5392
{Firewall} 09-20-2020 22:27:48 drop this packet for psd
{Firewall} 09-21-2020 20:50:30 DoS attack: UDP Port Scan from source:
103.145.13.85:5132
{Firewall} 09-21-2020 20:50:30 drop this packet for psd
{Firewall} 09-22-2020 07:06:03 DoS attack: TCP Port Scan from source:
123.233.116.131:6000
{Firewall} 09-22-2020 07:06:03 drop this packet for psd
{System} 09-22-2020 13:19:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-22-2020 13:20:09 Sync up with NTP Server successfully, 2020-09-
22T13:20:09Z.
{System} 09-22-2020 13:20:10 TR069 connects to ACS server success.
{Firewall} 09-22-2020 13:35:45 DoS attack: TCP Port Scan from source:
79.124.62.86:51075
{Firewall} 09-22-2020 13:35:45 drop this packet for psd
{Firewall} 09-23-2020 03:14:02 DoS attack: TCP Port Scan from source:
193.27.229.230:51755
{Firewall} 09-23-2020 03:14:02 drop this packet for psd
{Firewall} 09-23-2020 09:42:17 DoS attack: TCP Port Scan from source:
89.248.172.208:52137
{Firewall} 09-23-2020 09:42:17 drop this packet for psd
{Firewall} 09-23-2020 12:43:26 DoS attack: TCP Port Scan from source:
92.63.197.97:57728
{Firewall} 09-23-2020 12:43:26 drop this packet for psd
{Firewall} 09-24-2020 04:51:13 DoS attack: TCP Port Scan from source:
94.102.49.137:41061
{Firewall} 09-24-2020 04:51:13 drop this packet for psd
{Firewall} 09-24-2020 13:21:02 DoS attack: TCP Port Scan from source:
89.248.171.134:51656
{Firewall} 09-24-2020 13:21:02 drop this packet for psd
{Firewall} 09-24-2020 18:44:25 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-24-2020 18:44:25 drop this packet for psd
{Firewall} 09-25-2020 02:18:40 DoS attack: UDP Port Scan from source:
103.145.13.237:5219
{Firewall} 09-25-2020 02:18:40 drop this packet for psd
{Firewall} 09-25-2020 03:41:06 DoS attack: TCP Port Scan from source:
94.102.49.117:43262
{Firewall} 09-25-2020 03:41:06 drop this packet for psd
{Firewall} 09-25-2020 04:26:25 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-25-2020 04:26:25 drop this packet for psd
{Firewall} 09-25-2020 07:23:48 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-25-2020 07:23:48 drop this packet for psd
{Firewall} 09-25-2020 17:25:56 DoS attack: TCP Port Scan from source:
94.102.49.59:52750
{Firewall} 09-25-2020 17:25:56 drop this packet for psd
{Firewall} 09-26-2020 02:48:56 DoS attack: TCP Port Scan from source:
89.248.174.199:46530
{Firewall} 09-26-2020 02:48:56 drop this packet for psd
{Firewall} 09-26-2020 12:12:14 DoS attack: TCP Port Scan from source:
94.102.49.117:40322
{Firewall} 09-26-2020 12:12:14 drop this packet for psd
{Firewall} 09-26-2020 21:36:12 DoS attack: TCP Port Scan from source:
185.39.11.109:54161
{Firewall} 09-26-2020 21:36:12 drop this packet for psd
{Firewall} 09-27-2020 07:01:30 DoS attack: TCP Port Scan from source:
89.248.162.179:48082
{Firewall} 09-27-2020 07:01:30 drop this packet for psd
{Firewall} 09-27-2020 16:24:39 DoS attack: TCP Port Scan from source:
94.102.49.98:41872
{Firewall} 09-27-2020 16:24:39 drop this packet for psd
{Firewall} 09-27-2020 18:37:59 DoS attack: TCP Port Scan from source:
87.251.70.79:65534
{Firewall} 09-27-2020 18:37:59 drop this packet for psd
{Firewall} 09-27-2020 21:28:59 DoS attack: UDP Port Scan from source:
103.145.13.40:5434
{Firewall} 09-27-2020 21:28:59 drop this packet for psd
{Firewall} 09-28-2020 01:43:55 DoS attack: TCP Port Scan from source:
80.82.77.132:55429
{Firewall} 09-28-2020 01:43:55 drop this packet for psd
{Firewall} 09-28-2020 11:08:53 DoS attack: TCP Port Scan from source:
93.174.93.27:49326
{Firewall} 09-28-2020 11:08:53 drop this packet for psd
{Firewall} 09-28-2020 20:37:24 DoS attack: TCP Port Scan from source:
94.102.49.98:43434
{Firewall} 09-28-2020 20:37:24 drop this packet for psd
{Firewall} 09-29-2020 06:01:57 DoS attack: TCP Port Scan from source:
94.102.49.135:57307
{Firewall} 09-29-2020 06:01:57 drop this packet for psd
{Firewall} 09-29-2020 07:03:07 DoS attack: UDP Port Scan from source:
45.125.65.52:5612
{Firewall} 09-29-2020 07:03:07 drop this packet for psd
{Firewall} 09-29-2020 07:13:16 DoS attack: UDP Port Scan from source:
141.98.10.55:5616
{Firewall} 09-29-2020 07:13:16 drop this packet for psd
{Firewall} 09-29-2020 14:50:49 DoS attack: UDP Port Scan from source:
103.145.13.158:5064
{Firewall} 09-29-2020 14:50:49 drop this packet for psd
{Firewall} 09-29-2020 15:24:23 DoS attack: TCP Port Scan from source:
89.248.174.199:51055
{Firewall} 09-29-2020 15:24:23 drop this packet for psd
{Firewall} 09-29-2020 15:54:47 DoS attack: UDP Port Scan from source:
103.145.13.133:5179
{Firewall} 09-29-2020 15:54:47 drop this packet for psd
{Firewall} 09-29-2020 17:40:00 DoS attack: UDP Port Scan from source:
103.145.13.237:5136
{Firewall} 09-29-2020 17:40:00 drop this packet for psd
{Firewall} 09-30-2020 01:20:30 DoS attack: TCP Port Scan from source:
94.102.49.137:46821
{Firewall} 09-30-2020 01:20:30 drop this packet for psd
{Firewall} 09-30-2020 11:23:25 DoS attack: TCP Port Scan from source:
89.248.171.134:42996
{Firewall} 09-30-2020 11:23:25 drop this packet for psd
{Firewall} 09-30-2020 12:31:19 DoS attack: UDP Port Scan from source:
45.143.221.6:5105
{Firewall} 09-30-2020 12:31:19 drop this packet for psd
{Firewall} 09-30-2020 20:50:41 DoS attack: TCP Port Scan from source:
94.102.49.98:57032
{Firewall} 09-30-2020 20:50:41 drop this packet for psd
{Firewall} 10-01-2020 00:37:28 DoS attack: TCP Port Scan from source:
185.216.140.68:50612
{Firewall} 10-01-2020 00:37:28 drop this packet for psd
{Firewall} 10-01-2020 13:11:07 DoS attack: TCP Port Scan from source:
89.248.171.134:55860
{Firewall} 10-01-2020 13:11:07 drop this packet for psd
{Firewall} 10-01-2020 22:34:36 DoS attack: TCP Port Scan from source:
94.102.49.59:49665
{Firewall} 10-01-2020 22:34:36 drop this packet for psd
{Firewall} 10-02-2020 06:09:06 DoS attack: TCP Port Scan from source:
93.174.89.2:56883
{Firewall} 10-02-2020 06:09:06 drop this packet for psd
{Firewall} 10-02-2020 07:58:33 DoS attack: TCP Port Scan from source:
89.248.162.179:43505
{Firewall} 10-02-2020 07:58:33 drop this packet for psd
{Firewall} 10-02-2020 10:58:52 DoS attack: TCP Port Scan from source:
223.112.70.109:53204
{Firewall} 10-02-2020 10:58:52 drop this packet for psd
{Firewall} 10-02-2020 17:22:53 DoS attack: TCP Port Scan from source:
185.39.10.124:57362
{Firewall} 10-02-2020 17:22:53 drop this packet for psd
{Firewall} 10-02-2020 17:50:19 DoS attack: TCP Port Scan from source:
80.82.64.167:58975
{Firewall} 10-02-2020 17:50:19 drop this packet for psd
{Firewall} 10-03-2020 02:47:11 DoS attack: TCP Port Scan from source:
185.39.10.124:51220
{Firewall} 10-03-2020 02:47:11 drop this packet for psd
{Firewall} 10-04-2020 17:14:53 DoS attack: UDP Port Scan from source:
103.145.13.40:5431
{Firewall} 10-04-2020 17:14:53 drop this packet for psd
{Firewall} 10-05-2020 12:43:19 DoS attack: TCP Port Scan from source:
94.102.49.117:59789
{Firewall} 10-05-2020 12:43:19 drop this packet for psd
{Firewall} 10-05-2020 13:58:58 DoS attack: UDP Port Scan from source:
45.143.221.99:5306
{Firewall} 10-05-2020 13:58:58 drop this packet for psd
{Firewall} 10-05-2020 16:43:26 DoS attack: TCP Port Scan from source:
78.129.146.110:56494
{Firewall} 10-05-2020 16:43:26 drop this packet for psd
{Firewall} 10-05-2020 22:03:55 DoS attack: TCP Port Scan from source:
185.39.11.109:53427
{Firewall} 10-05-2020 22:03:55 drop this packet for psd
{Firewall} 10-06-2020 13:10:55 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=76
{Firewall} 10-06-2020 13:10:55 UDP flood attack from LAN has been detected,
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=76
{Firewall} 10-06-2020 17:12:12 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-07-2020 00:00:18 DoS attack: UDP Port Scan from source:
103.145.13.85:5132
{Firewall} 10-07-2020 00:00:18 drop this packet for psd
{System} 10-07-2020 02:31:31 TR069 download file
http://gateway.telmex.com/SERCOMM_FG6123BTM_FG6123BV3019/FG6123BV3019.img
successfully.
{System} 10-07-2020 02:31:41 Upgrade image version: FG6123BV3019.
{System} 10-07-2020 02:31:45 Request to reboot by TR069.
{System} 10-07-2020 02:32:25 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1257120 seconds
{System} 10-07-2020 02:32:57 Sync up with NTP Server successfully, 2020-10-
07T02:32:53Z.
{System} 10-07-2020 02:32:59 TR069 connects to ACS server success.
{Firewall} 10-07-2020 09:46:25 DoS attack: TCP Port Scan from source:
94.102.49.117:41971
{Firewall} 10-07-2020 09:46:25 drop this packet for psd
{Firewall} 10-07-2020 19:08:05 DoS attack: TCP Port Scan from source:
185.39.11.109:55675
{Firewall} 10-07-2020 19:08:05 drop this packet for psd
{Firewall} 10-07-2020 21:47:22 DoS attack: TCP Port Scan from source:
45.129.33.122:41899
{Firewall} 10-07-2020 21:47:22 drop this packet for psd
{Firewall} 10-07-2020 23:54:14 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-08-2020 01:19:16 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-08-2020 02:31:54 DoS attack: TCP Port Scan from source:
185.156.73.57:47631
{Firewall} 10-08-2020 02:31:54 drop this packet for psd
{Firewall} 10-08-2020 04:31:33 DoS attack: TCP Port Scan from source:
94.102.49.137:49476
{Firewall} 10-08-2020 04:31:33 drop this packet for psd
{Firewall} 10-08-2020 13:59:36 DoS attack: TCP Port Scan from source:
89.248.171.134:43566
{Firewall} 10-08-2020 13:59:36 drop this packet for psd
{Firewall} 10-08-2020 23:22:16 DoS attack: TCP Port Scan from source:
185.39.11.109:57324
{Firewall} 10-08-2020 23:22:16 drop this packet for psd
{Firewall} 10-09-2020 08:46:22 DoS attack: TCP Port Scan from source:
94.102.49.135:51170
{Firewall} 10-09-2020 08:46:22 drop this packet for psd
{Firewall} 10-09-2020 13:12:35 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-09-2020 18:09:10 DoS attack: TCP Port Scan from source:
185.39.10.14:44941
{Firewall} 10-09-2020 18:09:10 drop this packet for psd
{Firewall} 10-09-2020 18:51:12 DoS attack: UDP Port Scan from source:
103.145.13.55:5312
{Firewall} 10-09-2020 18:51:12 drop this packet for psd
{Firewall} 10-09-2020 22:02:43 DoS attack: TCP Port Scan from source:
167.114.27.115:6000
{Firewall} 10-09-2020 22:02:43 drop this packet for psd
{Firewall} 10-09-2020 22:38:40 DoS attack: TCP Port Scan from source:
141.98.10.173:65530
{Firewall} 10-09-2020 22:38:40 drop this packet for psd
{Firewall} 10-10-2020 03:59:48 DoS attack: TCP Port Scan from source:
94.102.49.98:40378
{Firewall} 10-10-2020 03:59:48 drop this packet for psd
{Firewall} 10-10-2020 13:55:24 DoS attack: TCP Port Scan from source:
94.102.49.117:56115
{Firewall} 10-10-2020 13:55:24 drop this packet for psd
{Firewall} 10-10-2020 23:29:56 DoS attack: TCP Port Scan from source:
89.248.171.134:50586
{Firewall} 10-10-2020 23:29:56 drop this packet for psd
{Firewall} 10-11-2020 07:02:44 DoS attack: UDP Port Scan from source:
103.145.13.133:5164
{Firewall} 10-11-2020 07:02:44 drop this packet for psd
{Firewall} 10-11-2020 07:05:53 DoS attack: UDP Port Scan from source:
103.145.13.237:5164
{Firewall} 10-11-2020 07:05:53 drop this packet for psd
{Firewall} 10-11-2020 08:56:16 DoS attack: TCP Port Scan from source:
89.248.174.199:44569
{Firewall} 10-11-2020 08:56:16 drop this packet for psd
{Firewall} 10-11-2020 18:16:25 DoS attack: UDP Port Scan from source:
45.143.221.18:5438
{Firewall} 10-11-2020 18:16:25 drop this packet for psd
{Firewall} 10-11-2020 18:33:45 DoS attack: TCP Port Scan from source:
185.39.10.124:59217
{Firewall} 10-11-2020 18:33:45 drop this packet for psd
{Firewall} 10-12-2020 03:59:10 DoS attack: TCP Port Scan from source:
94.102.49.59:53143
{Firewall} 10-12-2020 03:59:10 drop this packet for psd
{Firewall} 10-12-2020 16:29:42 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 17:21:28 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 18:56:46 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 19:50:31 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-13-2020 10:37:14 DoS attack: TCP Port Scan from source:
94.102.49.59:43423
{Firewall} 10-13-2020 10:37:14 drop this packet for psd
{System} 10-13-2020 19:24:23 Sync up with NTP Server successfully, 2020-10-
13T19:24:22Z.
{Firewall} 10-13-2020 19:58:12 DoS attack: TCP Port Scan from source:
80.82.70.189:57084
{Firewall} 10-13-2020 19:58:12 drop this packet for psd
{Firewall} 10-14-2020 05:25:02 DoS attack: TCP Port Scan from source:
94.102.49.98:51087
{Firewall} 10-14-2020 05:25:02 drop this packet for psd
{Firewall} 10-14-2020 09:46:45 DoS attack: UDP Port Scan from source:
103.145.13.133:5121
{Firewall} 10-14-2020 09:46:45 drop this packet for psd
{Firewall} 10-14-2020 10:14:27 DoS attack: UDP Port Scan from source:
103.145.13.237:5121
{Firewall} 10-14-2020 10:14:27 drop this packet for psd
{Firewall} 10-14-2020 14:44:39 DoS attack: TCP Port Scan from source:
89.248.174.199:44670
{Firewall} 10-14-2020 14:44:39 drop this packet for psd
{Firewall} 10-14-2020 17:23:38 DoS attack: TCP Port Scan from source:
42.62.114.231:37083
{Firewall} 10-14-2020 17:23:38 drop this packet for psd
{Firewall} 10-15-2020 09:26:13 DoS attack: TCP Port Scan from source:
89.248.174.199:51964
{Firewall} 10-15-2020 09:26:13 drop this packet for psd
{System} 10-15-2020 09:58:07 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-15-2020 09:58:32 Sync up with NTP Server successfully, 2020-10-
15T09:58:32Z.
{System} 10-15-2020 09:58:34 TR069 connects to ACS server success.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 10-15-2020 10:04:56 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-15-2020 10:05:21 Sync up with NTP Server successfully, 2020-10-
15T10:05:21Z.
{System} 10-15-2020 10:05:23 TR069 connects to ACS server success.
{Firewall} 10-15-2020 11:46:51 DoS attack: TCP Port Scan from source:
94.102.49.106:56907
{Firewall} 10-15-2020 11:46:51 drop this packet for psd
{Firewall} 10-15-2020 18:49:27 DoS attack: TCP Port Scan from source:
94.102.49.137:45746
{Firewall} 10-15-2020 18:49:27 drop this packet for psd
{Firewall} 10-16-2020 06:58:40 DoS attack: TCP Port Scan from source:
195.54.160.228:51536
{Firewall} 10-16-2020 06:58:40 drop this packet for psd
{Firewall} 10-16-2020 10:04:22 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-16-2020 10:09:49 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-16-2020 13:38:14 DoS attack: TCP Port Scan from source:
94.102.49.98:53485
{Firewall} 10-16-2020 13:38:14 drop this packet for psd
{Firewall} 10-16-2020 23:02:49 DoS attack: TCP Port Scan from source:
94.102.49.117:47359
{Firewall} 10-16-2020 23:02:49 drop this packet for psd
{Firewall} 10-16-2020 23:33:05 DoS attack: TCP Port Scan from source:
89.248.172.140:42187
{Firewall} 10-16-2020 23:33:05 drop this packet for psd
{Firewall} 10-17-2020 04:33:34 DoS attack: TCP Port Scan from source:
42.62.114.231:49454
{Firewall} 10-17-2020 04:33:34 drop this packet for psd
{Firewall} 10-17-2020 08:28:56 DoS attack: TCP Port Scan from source:
185.39.10.124:41329
{Firewall} 10-17-2020 08:28:56 drop this packet for psd
{Firewall} 10-17-2020 17:22:25 DoS attack: UDP Port Scan from source:
103.145.13.18:5278
{Firewall} 10-17-2020 17:22:25 drop this packet for psd
{Firewall} 10-17-2020 17:57:08 DoS attack: TCP Port Scan from source:
94.102.49.137:55416
{Firewall} 10-17-2020 17:57:08 drop this packet for psd
{Firewall} 10-17-2020 18:49:22 DoS attack: UDP Port Scan from source:
103.145.13.133:5115
{Firewall} 10-17-2020 18:49:22 drop this packet for psd
{Firewall} 10-18-2020 02:51:29 DoS attack: TCP Port Scan from source:
185.153.197.185:65533
{Firewall} 10-18-2020 02:51:29 drop this packet for psd
{Firewall} 10-18-2020 03:26:02 DoS attack: TCP Port Scan from source:
94.102.49.135:49552
{Firewall} 10-18-2020 03:26:02 drop this packet for psd
{Firewall} 10-18-2020 12:51:37 DoS attack: TCP Port Scan from source:
94.102.49.93:43471
{Firewall} 10-18-2020 12:51:37 drop this packet for psd
{Firewall} 10-18-2020 22:12:15 DoS attack: TCP Port Scan from source:
93.174.93.27:57126
{Firewall} 10-18-2020 22:12:15 drop this packet for psd
{Firewall} 10-19-2020 07:38:23 DoS attack: TCP Port Scan from source:
94.102.49.98:51097
{Firewall} 10-19-2020 07:38:23 drop this packet for psd
{Firewall} 10-20-2020 17:35:28 DoS attack: TCP Port Scan from source:
223.112.70.109:25030
{Firewall} 10-20-2020 17:35:28 drop this packet for psd
{Firewall} 10-20-2020 19:23:01 DoS attack: TCP Port Scan from source:
124.92.127.102:6000
{Firewall} 10-20-2020 19:23:01 drop this packet for psd
{Firewall} 10-21-2020 14:32:27 DoS attack: TCP Port Scan from source:
94.102.49.59:48734
{Firewall} 10-21-2020 14:32:27 drop this packet for psd
{Firewall} 10-21-2020 23:57:14 DoS attack: TCP Port Scan from source:
94.102.49.93:42625
{Firewall} 10-21-2020 23:57:14 drop this packet for psd
{Firewall} 10-22-2020 05:04:13 DoS attack: UDP Port Scan from source:
103.145.13.18:5110
{Firewall} 10-22-2020 05:04:13 drop this packet for psd
{Firewall} 10-22-2020 09:27:14 DoS attack: TCP Port Scan from source:
94.102.49.117:56824
{Firewall} 10-22-2020 09:27:14 drop this packet for psd
{Firewall} 10-22-2020 13:22:05 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-22-2020 18:52:50 DoS attack: TCP Port Scan from source:
185.39.10.14:50755
{Firewall} 10-22-2020 18:52:50 drop this packet for psd
{Firewall} 10-22-2020 21:31:55 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-23-2020 08:50:15 DoS attack: TCP Port Scan from source:
80.82.64.242:41008
{Firewall} 10-23-2020 08:50:15 drop this packet for psd
{Firewall} 10-23-2020 18:10:46 DoS attack: TCP Port Scan from source:
89.248.162.179:54638
{Firewall} 10-23-2020 18:10:46 drop this packet for psd
{Firewall} 10-24-2020 03:36:49 DoS attack: TCP Port Scan from source:
80.82.70.189:48605
{Firewall} 10-24-2020 03:36:49 drop this packet for psd
{Firewall} 10-24-2020 10:43:35 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 10-24-2020 13:35:41 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-24-2020 13:36:10 Sync up with NTP Server successfully, 2020-10-
24T13:36:10Z.
{System} 10-24-2020 13:36:11 TR069 connects to ACS server success.
{Firewall} 10-24-2020 14:25:15 DoS attack: TCP Port Scan from source:
94.102.57.240:49022
{Firewall} 10-24-2020 14:25:15 drop this packet for psd
{Firewall} 10-24-2020 14:34:01 DoS attack: TCP Port Scan from source:
89.248.162.161:49065
{Firewall} 10-24-2020 14:34:01 drop this packet for psd
{Firewall} 10-24-2020 14:50:46 DoS attack: TCP Port Scan from source:
94.102.49.106:49032
{Firewall} 10-24-2020 14:50:46 drop this packet for psd
{Firewall} 10-24-2020 15:10:49 DoS attack: TCP Port Scan from source:
80.82.70.25:49055
{Firewall} 10-24-2020 15:10:49 drop this packet for psd
{Firewall} 10-24-2020 17:41:44 DoS attack: TCP Port Scan from source:
94.102.49.98:59291
{Firewall} 10-24-2020 17:41:44 drop this packet for psd
{Firewall} 10-25-2020 03:04:45 DoS attack: TCP Port Scan from source:
94.102.49.98:53078
{Firewall} 10-25-2020 03:04:45 drop this packet for psd
{Firewall} 10-25-2020 12:39:29 DoS attack: TCP Port Scan from source:
94.102.49.93:47557
{Firewall} 10-25-2020 12:39:29 drop this packet for psd
{Firewall} 10-25-2020 15:10:24 DoS attack: TCP Port Scan from source:
193.27.228.156:44061
{Firewall} 10-25-2020 15:10:24 drop this packet for psd
{Firewall} 10-25-2020 21:05:17 DoS attack: TCP Port Scan from source:
185.39.10.14:41509
{Firewall} 10-25-2020 21:05:17 drop this packet for psd
{Firewall} 10-26-2020 08:36:09 DoS attack: TCP Port Scan from source:
80.82.78.20:42962
{Firewall} 10-26-2020 08:36:09 drop this packet for psd
{Firewall} 10-26-2020 17:38:13 DoS attack: TCP Port Scan from source:
80.82.65.60:55487
{Firewall} 10-26-2020 17:38:13 drop this packet for psd
{Firewall} 10-26-2020 19:14:37 DoS attack: TCP Port Scan from source:
125.64.94.136:43618
{Firewall} 10-26-2020 19:14:37 drop this packet for psd
{Firewall} 10-27-2020 03:05:21 DoS attack: TCP Port Scan from source:
94.102.49.117:49497
{Firewall} 10-27-2020 03:05:21 drop this packet for psd
{Firewall} 10-27-2020 12:31:47 DoS attack: TCP Port Scan from source:
94.102.49.104:43487
{Firewall} 10-27-2020 12:31:47 drop this packet for psd
{Firewall} 10-27-2020 15:18:30 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 10-27-2020 15:18:30 drop this packet for psd
{Firewall} 10-27-2020 17:29:43 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 10-27-2020 17:29:43 drop this packet for psd
{Firewall} 10-27-2020 18:55:49 DoS attack: UDP Port Scan from source:
103.145.13.237:5113
{Firewall} 10-27-2020 18:55:49 drop this packet for psd
{Firewall} 10-27-2020 19:35:04 DoS attack: UDP Port Scan from source:
103.145.12.71:5076
{Firewall} 10-27-2020 19:35:04 drop this packet for psd
{System} 10-27-2020 21:18:07 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-27-2020 21:18:32 Sync up with NTP Server successfully, 2020-10-
27T21:18:32Z.
{System} 10-27-2020 21:18:33 TR069 connects to ACS server success.
{Firewall} 10-27-2020 21:32:03 DoS attack: TCP Port Scan from source:
79.124.62.82:40253
{Firewall} 10-27-2020 21:32:03 drop this packet for psd
{Firewall} 10-27-2020 21:55:53 DoS attack: TCP Port Scan from source:
80.82.77.235:57347
{Firewall} 10-27-2020 21:55:53 drop this packet for psd
{Firewall} 10-27-2020 22:08:30 DoS attack: TCP Port Scan from source:
94.102.49.106:52678
{Firewall} 10-27-2020 22:08:30 drop this packet for psd
{Firewall} 10-28-2020 00:45:14 DoS attack: TCP Port Scan from source:
94.102.51.95:40353
{Firewall} 10-28-2020 00:45:14 drop this packet for psd
{Firewall} 10-28-2020 01:43:23 DoS attack: TCP Port Scan from source:
89.248.162.161:50271
{Firewall} 10-28-2020 01:43:23 drop this packet for psd
{Firewall} 10-28-2020 04:33:55 DoS attack: UDP Port Scan from source:
103.145.13.18:5161
{Firewall} 10-28-2020 04:33:55 drop this packet for psd
{Firewall} 10-28-2020 08:26:10 DoS attack: UDP Port Scan from source:
146.88.240.4:54995
{Firewall} 10-28-2020 08:26:10 drop this packet for psd
{Firewall} 10-28-2020 14:21:36 DoS attack: TCP Port Scan from source:
185.156.73.57:54613
{Firewall} 10-28-2020 14:21:36 drop this packet for psd
{Firewall} 10-28-2020 14:31:38 DoS attack: TCP Port Scan from source:
92.63.197.61:54715
{Firewall} 10-28-2020 14:31:38 drop this packet for psd
{Firewall} 10-28-2020 16:20:40 DoS attack: TCP Port Scan from source:
94.102.49.117:43629
{Firewall} 10-28-2020 16:20:40 drop this packet for psd
{Firewall} 10-29-2020 06:30:24 DoS attack: TCP Port Scan from source:
94.102.49.104:54605
{Firewall} 10-29-2020 06:30:24 drop this packet for psd
{Firewall} 10-29-2020 15:57:23 DoS attack: TCP Port Scan from source:
94.102.49.117:48634
{Firewall} 10-29-2020 15:57:23 drop this packet for psd
{Firewall} 10-30-2020 01:23:48 DoS attack: TCP Port Scan from source:
94.102.49.135:42619
{Firewall} 10-30-2020 01:23:48 drop this packet for psd
{Firewall} 10-30-2020 10:50:51 DoS attack: TCP Port Scan from source:
89.248.171.134:56643
{Firewall} 10-30-2020 10:50:51 drop this packet for psd
{Firewall} 10-30-2020 12:06:56 DoS attack: TCP Port Scan from source:
89.248.162.146:41208
{Firewall} 10-30-2020 12:06:56 drop this packet for psd
{Firewall} 10-30-2020 20:17:37 DoS attack: TCP Port Scan from source:
185.39.11.109:50649
{Firewall} 10-30-2020 20:17:37 drop this packet for psd
{Firewall} 10-31-2020 05:47:01 DoS attack: TCP Port Scan from source:
94.102.49.93:44814
{Firewall} 10-31-2020 05:47:01 drop this packet for psd
{Firewall} 10-31-2020 08:18:57 DoS attack: TCP Port Scan from source:
94.102.49.97:53931
{Firewall} 10-31-2020 08:18:57 drop this packet for psd
{System} 10-31-2020 10:03:52 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 10-31-2020 10:04:18 Sync up with NTP Server successfully, 2020-10-
31T10:04:18Z.
{System} 10-31-2020 10:04:20 TR069 connects to ACS server success.
{Firewall} 10-31-2020 15:10:32 DoS attack: TCP Port Scan from source:
89.248.171.134:58624
{Firewall} 10-31-2020 15:10:32 drop this packet for psd
{Firewall} 10-31-2020 15:33:44 DoS attack: TCP Port Scan from source:
45.131.231.90:8
{Firewall} 10-31-2020 15:33:44 drop this packet for psd
{Firewall} 10-31-2020 17:54:11 DoS attack: UDP Port Scan from source:
103.145.13.237:5176
{Firewall} 10-31-2020 17:54:11 drop this packet for psd
{Firewall} 11-01-2020 00:34:17 DoS attack: TCP Port Scan from source:
185.39.10.124:52448
{Firewall} 11-01-2020 00:34:17 drop this packet for psd
{Firewall} 11-01-2020 00:54:44 DoS attack: UDP Port Scan from source:
103.145.13.18:5228
{Firewall} 11-01-2020 00:54:44 drop this packet for psd
{Firewall} 11-01-2020 03:56:35 DoS attack: TCP Port Scan from source:
94.102.49.97:44567
{Firewall} 11-01-2020 03:56:35 drop this packet for psd
{Firewall} 11-01-2020 06:45:37 DoS attack: TCP Port Scan from source:
92.63.197.53:41994
{Firewall} 11-01-2020 06:45:37 drop this packet for psd
{System} 11-01-2020 06:55:47 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-01-2020 06:56:16 Sync up with NTP Server successfully, 2020-11-
01T06:56:16Z.
{System} 11-01-2020 06:56:18 TR069 connects to ACS server success.
{Firewall} 11-01-2020 10:48:39 DoS attack: TCP Port Scan from source:
89.248.174.199:49310
{Firewall} 11-01-2020 10:48:39 drop this packet for psd
{System} 11-01-2020 17:45:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-01-2020 17:46:09 Sync up with NTP Server successfully, 2020-11-
01T17:46:09Z.
{System} 11-01-2020 17:46:11 TR069 connects to ACS server success.
{System} 11-01-2020 18:02:24 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:02:52 Sync up with NTP Server successfully, 2020-11-
01T18:02:52Z.
{System} 11-01-2020 18:02:54 TR069 connects to ACS server success.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:17:08 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:18:36 Sync up with NTP Server successfully, 2020-11-
01T18:18:36Z.
{System} 11-01-2020 18:18:38 TR069 connects to ACS server success.
{Firewall} 11-01-2020 18:25:31 DoS attack: UDP Port Scan from source:
45.143.221.18:5927
{Firewall} 11-01-2020 18:25:31 drop this packet for psd
{Firewall} 11-01-2020 18:25:31 DoS attack: TCP Port Scan from source:
185.156.73.64:61000
{Firewall} 11-01-2020 18:25:31 drop this packet for psd
{Firewall} 11-01-2020 18:38:32 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 11-01-2020 18:38:32 drop this packet for psd
{Firewall} 11-01-2020 19:34:00 DoS attack: TCP Port Scan from source:
45.129.33.45:54664
{Firewall} 11-01-2020 19:34:00 drop this packet for psd
{Firewall} 11-01-2020 19:46:48 DoS attack: UDP Port Scan from source:
128.90.187.190:5060
{Firewall} 11-01-2020 19:46:48 drop this packet for psd
{Firewall} 11-01-2020 20:18:29 DoS attack: TCP Port Scan from source:
80.82.78.20:43497
{Firewall} 11-01-2020 20:18:29 drop this packet for psd
{Firewall} 11-02-2020 05:44:43 DoS attack: TCP Port Scan from source:
80.82.65.60:57476
{Firewall} 11-02-2020 05:44:43 drop this packet for psd
{Firewall} 11-02-2020 06:41:44 DoS attack: TCP Port Scan from source:
80.82.77.215:40894
{Firewall} 11-02-2020 06:41:44 drop this packet for psd
{Firewall} 11-02-2020 15:16:26 DoS attack: TCP Port Scan from source:
80.82.64.242:51780
{Firewall} 11-02-2020 15:16:26 drop this packet for psd
{Firewall} 11-02-2020 16:01:07 DoS attack: TCP Port Scan from source:
185.175.93.14:50484
{Firewall} 11-02-2020 16:01:07 drop this packet for psd
{Firewall} 11-02-2020 19:25:28 DoS attack: TCP Port Scan from source:
89.248.172.232:46717
{Firewall} 11-02-2020 19:25:28 drop this packet for psd
{Firewall} 11-02-2020 19:50:14 DoS attack: TCP Port Scan from source:
202.29.14.121:6000
{Firewall} 11-02-2020 19:50:14 drop this packet for psd
{Firewall} 11-02-2020 21:14:31 DoS attack: TCP Port Scan from source:
94.102.49.104:53261
{Firewall} 11-02-2020 21:14:31 drop this packet for psd
{Firewall} 11-03-2020 00:33:51 DoS attack: TCP Port Scan from source:
80.82.77.132:45223
{Firewall} 11-03-2020 00:33:51 drop this packet for psd
{Firewall} 11-03-2020 03:31:21 DoS attack: ICMP Flood from source:
2001:0250:0200:0007:0250:56ff:fe8b:7f41
{Firewall} 11-03-2020 03:31:21 drop this packet for icmp flood
{Firewall} 11-03-2020 07:57:12 DoS attack: TCP Port Scan from source:
185.216.140.249:51825
{Firewall} 11-03-2020 07:57:12 drop this packet for psd
{Firewall} 11-03-2020 08:51:21 DoS attack: TCP Port Scan from source:
73.103.18.182:63464
{Firewall} 11-03-2020 08:51:21 drop this packet for psd
{Firewall} 11-03-2020 16:37:56 DoS attack: TCP Port Scan from source:
185.39.10.14:43069
{Firewall} 11-03-2020 16:37:56 drop this packet for psd
{Firewall} 11-03-2020 16:48:02 DoS attack: TCP Port Scan from source:
94.102.49.93:43672
{Firewall} 11-03-2020 16:48:02 drop this packet for psd
{Firewall} 11-03-2020 20:34:46 DoS attack: TCP Port Scan from source:
80.82.70.168:57275
{Firewall} 11-03-2020 20:34:46 drop this packet for psd
{Firewall} 11-03-2020 22:35:10 DoS attack: TCP Port Scan from source:
185.39.10.124:44501
{Firewall} 11-03-2020 22:35:10 drop this packet for psd
{Firewall} 11-04-2020 03:55:29 DoS attack: TCP Port Scan from source:
183.131.157.114:6000
{Firewall} 11-04-2020 03:55:29 drop this packet for psd
{Firewall} 11-04-2020 05:12:54 DoS attack: TCP Port Scan from source:
94.102.49.137:48365
{Firewall} 11-04-2020 05:12:54 drop this packet for psd
{Firewall} 11-04-2020 06:38:41 DoS attack: TCP Port Scan from source:
89.248.171.134:53514
{Firewall} 11-04-2020 06:38:41 drop this packet for psd
{Firewall} 11-04-2020 09:17:57 DoS attack: TCP Port Scan from source:
94.102.49.97:43070
{Firewall} 11-04-2020 09:17:57 drop this packet for psd
{Firewall} 11-04-2020 17:00:43 DoS attack: UDP Port Scan from source:
103.145.13.18:5113
{Firewall} 11-04-2020 17:00:43 drop this packet for psd
{Firewall} 11-04-2020 18:31:14 DoS attack: TCP Port Scan from source:
94.102.49.98:56265
{Firewall} 11-04-2020 18:31:14 drop this packet for psd
{Firewall} 11-04-2020 21:51:13 DoS attack: TCP Port Scan from source:
89.248.172.20:48264
{Firewall} 11-04-2020 21:51:13 drop this packet for psd
{Firewall} 11-04-2020 23:06:39 DoS attack: UDP Port Scan from source:
103.145.13.237:5066
{Firewall} 11-04-2020 23:06:39 drop this packet for psd
{Firewall} 11-05-2020 00:27:03 DoS attack: TCP Port Scan from source:
94.102.49.98:57616
{Firewall} 11-05-2020 00:27:03 drop this packet for psd
{Firewall} 11-05-2020 10:25:27 DoS attack: TCP Port Scan from source:
80.82.77.146:53518
{Firewall} 11-05-2020 10:25:27 drop this packet for psd
{Firewall} 11-05-2020 11:46:20 DoS attack: TCP Port Scan from source:
80.82.78.20:58373
{Firewall} 11-05-2020 11:46:20 drop this packet for psd
{Firewall} 11-05-2020 20:31:52 DoS attack: TCP Port Scan from source:
185.39.11.109:49904
{Firewall} 11-05-2020 20:31:52 drop this packet for psd
{Firewall} 11-06-2020 02:09:24 DoS attack: TCP Port Scan from source:
185.39.8.30:50156
{Firewall} 11-06-2020 02:09:24 drop this packet for psd
{Firewall} 11-06-2020 02:12:36 DoS attack: UDP Port Scan from source:
37.49.229.52:5286
{Firewall} 11-06-2020 02:12:36 drop this packet for psd
{Firewall} 11-06-2020 02:45:09 DoS attack: TCP Port Scan from source:
80.82.65.60:52300
{Firewall} 11-06-2020 02:45:09 drop this packet for psd
{Firewall} 11-06-2020 03:17:36 DoS attack: TCP Port Scan from source:
83.69.215.130:6000
{Firewall} 11-06-2020 03:17:36 drop this packet for psd
{Firewall} 11-06-2020 09:11:01 DoS attack: TCP Port Scan from source:
185.39.10.14:55454
{Firewall} 11-06-2020 09:11:01 drop this packet for psd
{Firewall} 11-06-2020 14:53:00 DoS attack: TCP Port Scan from source:
80.82.65.62:55968
{Firewall} 11-06-2020 14:53:00 drop this packet for psd
{Firewall} 11-06-2020 16:48:22 DoS attack: TCP Port Scan from source:
94.102.49.117:42891
{Firewall} 11-06-2020 16:48:22 drop this packet for psd
{Firewall} 11-06-2020 16:50:32 DoS attack: TCP Port Scan from source:
80.82.77.235:43023
{Firewall} 11-06-2020 16:50:32 drop this packet for psd
{Firewall} 11-07-2020 16:14:43 DoS attack: TCP Port Scan from source:
80.82.65.62:47274
{Firewall} 11-07-2020 16:14:43 drop this packet for psd
{Firewall} 11-08-2020 01:25:05 DoS attack: UDP Port Scan from source:
45.143.221.18:6531
{Firewall} 11-08-2020 01:25:05 drop this packet for psd
{Firewall} 11-08-2020 02:52:32 DoS attack: TCP Port Scan from source:
89.248.171.134:45547
{Firewall} 11-08-2020 02:52:32 drop this packet for psd
{Firewall} 11-08-2020 04:56:24 DoS attack: TCP Port Scan from source:
80.82.70.168:52976
{Firewall} 11-08-2020 04:56:24 drop this packet for psd
{Firewall} 11-08-2020 15:12:16 DoS attack: UDP Port Scan from source:
103.145.13.18:5250
{Firewall} 11-08-2020 15:12:16 drop this packet for psd
{Firewall} 11-08-2020 18:28:44 DoS attack: TCP Port Scan from source:
89.248.171.134:41714
{Firewall} 11-08-2020 18:28:44 drop this packet for psd
{Firewall} 11-08-2020 19:11:15 DoS attack: UDP Port Scan from source:
103.145.13.237:5113
{Firewall} 11-08-2020 19:11:15 drop this packet for psd
{Firewall} 11-08-2020 20:59:01 DoS attack: TCP Port Scan from source:
80.82.70.168:50732
{Firewall} 11-08-2020 20:59:01 drop this packet for psd
{Firewall} 11-08-2020 22:58:49 DoS attack: UDP Port Scan from source:
45.143.221.18:6533
{Firewall} 11-08-2020 22:58:49 drop this packet for psd
{Firewall} 11-09-2020 00:09:52 DoS attack: TCP Port Scan from source:
93.174.93.27:42183
{Firewall} 11-09-2020 00:09:52 drop this packet for psd
{Firewall} 11-09-2020 02:49:40 DoS attack: UDP Port Scan from source:
37.49.229.52:5431
{Firewall} 11-09-2020 02:49:40 drop this packet for psd
{Firewall} 11-09-2020 12:34:26 DoS attack: TCP Port Scan from source:
89.248.172.48:46855
{Firewall} 11-09-2020 12:34:26 drop this packet for psd
{Firewall} 11-09-2020 19:25:23 DoS attack: TCP Port Scan from source:
185.39.10.124:51512
{Firewall} 11-09-2020 19:25:23 drop this packet for psd
{Firewall} 11-10-2020 01:15:01 DoS attack: TCP Port Scan from source:
80.82.77.146:52493
{Firewall} 11-10-2020 01:15:01 drop this packet for psd
{Firewall} 11-10-2020 07:06:47 DoS attack: TCP Port Scan from source:
89.248.171.134:53599
{Firewall} 11-10-2020 07:06:47 drop this packet for psd
{Firewall} 11-10-2020 07:09:37 DoS attack: TCP Port Scan from source:
80.82.70.189:53771
{Firewall} 11-10-2020 07:09:37 drop this packet for psd
{Firewall} 11-10-2020 13:56:09 DoS attack: TCP Port Scan from source:
185.216.140.32:58160
{Firewall} 11-10-2020 13:56:09 drop this packet for psd
{Firewall} 11-10-2020 18:28:35 DoS attack: TCP Port Scan from source:
89.248.162.179:54508
{Firewall} 11-10-2020 18:28:35 drop this packet for psd
{Firewall} 11-10-2020 23:39:07 DoS attack: TCP Port Scan from source:
94.102.49.117:53138
{Firewall} 11-10-2020 23:39:07 drop this packet for psd
{Firewall} 11-11-2020 02:39:11 DoS attack: TCP Port Scan from source:
80.82.70.168:43941
{Firewall} 11-11-2020 02:39:11 drop this packet for psd
{Firewall} 11-11-2020 05:24:35 DoS attack: TCP Port Scan from source:
94.102.49.137:53866
{Firewall} 11-11-2020 05:24:35 drop this packet for psd
{Firewall} 11-11-2020 09:31:16 DoS attack: UDP Port Scan from source:
195.154.221.174:5115
{Firewall} 11-11-2020 09:31:16 drop this packet for psd
{Firewall} 11-11-2020 15:16:24 DoS attack: TCP Port Scan from source:
80.82.77.146:49373
{Firewall} 11-11-2020 15:16:24 drop this packet for psd
{Firewall} 11-11-2020 22:11:32 DoS attack: TCP Port Scan from source:
89.248.162.179:54283
{Firewall} 11-11-2020 22:11:32 drop this packet for psd
{Firewall} 11-12-2020 03:27:31 DoS attack: TCP Port Scan from source:
94.102.49.98:53241
{Firewall} 11-12-2020 03:27:31 drop this packet for psd
{Firewall} 11-12-2020 03:36:13 DoS attack: TCP Port Scan from source:
80.82.70.189:53765
{Firewall} 11-12-2020 03:36:13 drop this packet for psd
{Firewall} 11-12-2020 03:56:55 DoS attack: TCP Port Scan from source:
185.216.140.249:55007
{Firewall} 11-12-2020 03:56:55 drop this packet for psd
{Firewall} 11-12-2020 09:08:01 DoS attack: TCP Port Scan from source:
80.82.65.60:53671
{Firewall} 11-12-2020 09:08:01 drop this packet for psd
{Firewall} 11-12-2020 16:43:37 DoS attack: TCP Port Scan from source:
185.39.11.122:41008
{Firewall} 11-12-2020 16:43:37 drop this packet for psd
{Firewall} 11-12-2020 21:20:07 DoS attack: UDP Port Scan from source:
72.251.235.116:45878
{Firewall} 11-12-2020 21:20:07 drop this packet for psd
{Firewall} 11-13-2020 05:30:37 DoS attack: TCP Port Scan from source:
89.248.162.146:47030
{Firewall} 11-13-2020 05:30:37 drop this packet for psd
{Firewall} 11-13-2020 08:34:19 DoS attack: TCP Port Scan from source:
89.248.162.179:58051
{Firewall} 11-13-2020 08:34:19 drop this packet for psd
{Firewall} 11-13-2020 18:18:08 DoS attack: TCP Port Scan from source:
89.248.172.232:53081
{Firewall} 11-13-2020 18:18:08 drop this packet for psd
{Firewall} 11-13-2020 18:55:12 DoS attack: TCP Port Scan from source:
80.82.78.20:55295
{Firewall} 11-13-2020 18:55:12 drop this packet for psd
{System} 11-13-2020 20:01:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:02:15 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:02:38 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:03:13 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:04:20 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:06:55 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:10:50 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:16:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:29:21 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:50:54 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-13-2020 22:58:11 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:58:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:58:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:59:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:00:30 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:02:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:05:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:15:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:26:35 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:52:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-14-2020 00:53:01 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:53:12 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:53:34 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:54:13 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:55:20 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:57:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:00:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:10:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:21:25 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:29:00 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 2160 seconds
{System} 11-14-2020 01:30:08 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:30:19 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:30:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:31:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:32:14 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:34:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:37:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:46:39 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:59:38 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 02:25:25 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 03:42:24 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 04:42:19 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 05:50:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 06:50:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 07:50:36 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-14-2020 11:15:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:15:55 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:16:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:16:54 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:18:09 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-14-2020 19:19:29 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:19:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:20:07 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:20:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:22:01 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:24:04 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:27:59 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:34:34 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:49:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 20:11:14 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:01:54 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:37:55 UDP flood attack from LAN has been detected,
SRC=192.168.1.65 DST=192.168.1.254 PROTO=UDP SPT=64628 DPT=53 LEN=39
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:12:29 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=38520 DPT=53 LEN=51
{System} 01-01-1970 00:13:08 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:04:27 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=22198 DPT=53 LEN=43
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:03:40 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:16:54 Requested to reboot by web client 192.168.1.69.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 960 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup 960 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:09:39 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:05:43 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:20:45 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 01:22:31 Requested to reboot by web client 192.168.1.65.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 4920 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:06:15 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:16:43 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=38916 DPT=53 LEN=45
{Firewall} 01-01-1970 00:22:20 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=54438 DPT=53 LEN=43
{Firewall} 01-01-1970 00:38:19 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=60288 DPT=53 LEN=42
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:16:37 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:39:54 UDP flood attack from LAN has been detected,
SRC=192.168.1.66 DST=192.168.1.254 PROTO=UDP SPT=10294 DPT=53 LEN=45
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 01-01-1970 02:52:37 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:04:54 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:11:32 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 660 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:06:20 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 360 seconds
{System} 01-01-1970 00:18:53 Restore factory defaults by web client 192.168.1.64.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1080 seconds
[GPON] 01-01-1970 00:00:12 Starting GPON interface OK.
[System] 01-01-1970 00:00:12 Register watchdog (umcid)
[System] 01-01-1970 00:00:12 Register watchdog (network_manager)
[GPON] 01-01-1970 00:00:12 OLT reset the OMCI mib.
[Firewall] 01-01-1970 00:00:15 Firewall Block Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Spoof Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 UDP Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 ICMP Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP SYN Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP FIN Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 Port Scan Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Land Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Broadcast Source Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP Syn With Data Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP Syn With Data Detect has been disabled.
[IPTV] 01-01-1970 00:00:15 Start IPTV OK
[System] 01-01-1970 00:00:16 Line is disabled or not config account
[WIFI] 01-01-1970 00:00:16 WiFi Init..
[IPTV] 01-01-1970 00:00:16 LAN send out a general query.
[System] 01-01-1970 00:00:17 LAN Port [2] connected, Link Speed: [100M F].
[System] 01-01-1970 00:00:17 LAN Port [3] connected, Link Speed: [1G F].
[System] 01-01-1970 00:00:23 Register watchdog (temp_monitor)
[System] 01-01-1970 00:00:23 Register watchdog (optical_monitor)
[System] 01-01-1970 00:00:23 RX Power (-2147483.75)dbm is lower than the threshold
(-28.00)dbm
[System] 01-01-1970 00:00:23 TX Power (-2147483.75)dbm is lower than the threshold
(0.50)dbm
[Firewall] 01-01-1970 00:00:23 Fireall Level has been set to Medium.
[Firewall] 01-01-1970 00:00:23 Local UDP Flood Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local ICMP Flood Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local Winnuke Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local LAN Source Detect has been enabled.
[Firewall] 01-01-1970 00:00:23 Local Smurf Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local Frament Flood Detect has been enabled on LAN.
[LAN] 01-01-1970 00:00:23 DHCP Server Started
[System] 01-01-1970 00:00:24 LAN Port [2] disconnected.
[System] 01-01-1970 00:00:24 LAN Port [3] disconnected.
[IPTV] 01-01-1970 00:00:24 LAN send out a general query.
[System] 01-01-1970 00:00:25 LAN Port [2] connected, Link Speed: [100M F].
[WIFI] 01-01-1970 00:00:26 channel score,che03a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che06a:bss0 intfadj1 cns-90 tol1
[WIFI] 01-01-1970 00:00:26 channel score,che08a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che09b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che13a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che16a:bss0 intfadj1 cns-90 tol1
[WIFI] 01-01-1970 00:00:26 channel score,che18a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che19b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che23a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che26a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che28a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che29b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che33a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che36a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che39b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 5G select auto channel :100
[UPnP] 01-01-1970 00:00:27 HTTP listening on port 49152
[UPnP] 01-01-1970 00:00:27 Starting UPnP IGD OK.
[LAN] 01-01-1970 00:00:27 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:00:27 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[WIFI] 01-01-1970 00:00:27 channel score,ch1001:bss1 intfadj1 cns-78 tol0
[WIFI] 01-01-1970 00:00:27 channel score,ch1006:bss4 intfadj2 cns-78 tol-2
[WIFI] 01-01-1970 00:00:27 channel score,ch100b:bss1 intfadj5 cns-62 tol4
[WIFI] 01-01-1970 00:00:27 2.4G select auto channel :11
[WIFI] 01-01-1970 00:00:27 acsd run
[System] 01-01-1970 00:00:28 LAN Port [3] connected, Link Speed: [1G F].
[System] 01-01-1970 00:00:31 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:00:31 User logout via HTTP from 192.168.1.64
[LAN] 01-01-1970 00:00:32 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:32 Send NAK to client ip [0.0.0.0] mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:33 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Successfully assign IP [192.168.1.65] to client mac
[00:18:8b:04:67:30], lease time [86400]
[System] 01-01-1970 00:00:35 User 'TELMEX' login failed via HTTP from 192.168.1.64
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[System] 01-01-1970 00:00:54 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[LAN] 01-01-1970 00:01:29 Received INFORM from client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:01:29 Send Information to client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[IPTV] 01-01-1970 00:02:29 LAN send out a general query.
[IPTV] 01-01-1970 00:04:34 LAN send out a general query.
[IPTV] 01-01-1970 00:06:39 LAN send out a general query.
[IPTV] 01-01-1970 00:08:44 LAN send out a general query.
[IPTV] 01-01-1970 00:10:49 LAN send out a general query.
[IPTV] 01-01-1970 00:12:54 LAN send out a general query.
[WIFI] 01-01-1970 00:14:18 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 ASSOC(8) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 Authorized sta:cc:9f:7a:6a:1d:fe intf wl1
[LAN] 01-01-1970 00:14:18 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:19 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:19 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[LAN] 01-01-1970 00:14:20 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[IPTV] 01-01-1970 00:14:59 LAN send out a general query.
[WIFI] 01-01-1970 00:15:06 DEAUTH(6) reason3 send to sta:cc:9f:7a:6a:1d:fe intf wl1
[WIFI] 01-01-1970 00:15:06 DISASSOC(12) reason8 send to sta:cc:9f:7a:6a:1d:fe intf
wl1
[IPTV] 01-01-1970 00:17:04 LAN send out a general query.
[IPTV] 01-01-1970 00:19:09 LAN send out a general query.
[System] 01-01-1970 00:20:08 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:20:08 User logout via HTTP from 192.168.1.64
[IPTV] 01-01-1970 00:21:14 LAN send out a general query.
[IPTV] 01-01-1970 00:23:19 LAN send out a general query.
[IPTV] 01-01-1970 00:25:24 LAN send out a general query.
[IPTV] 01-01-1970 00:27:29 LAN send out a general query.
[WIFI] 01-01-1970 00:27:55 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 ASSOC(8) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 Authorized sta:cc:9f:7a:6a:1d:fe intf wl1
[LAN] 01-01-1970 00:27:56 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[WIFI] 01-01-1970 00:28:26 DEAUTH(6) reason3 send to sta:cc:9f:7a:6a:1d:fe intf wl1
[WIFI] 01-01-1970 00:28:26 DISASSOC(12) reason8 send to sta:cc:9f:7a:6a:1d:fe intf
wl1
[IPTV] 01-01-1970 00:29:34 LAN send out a general query.
[System] 01-01-1970 00:30:54 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:31:39 LAN send out a general query.
[System] 01-01-1970 00:32:27 LAN Port [3] disconnected.
[IPTV] 01-01-1970 00:33:44 LAN send out a general query.
[System] 01-01-1970 00:34:29 LAN Port [2] disconnected.
[LAN] 01-01-1970 00:34:33 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:34:33 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[System] 01-01-1970 00:34:33 LAN Port [1] connected, Link Speed: [100M F].
[IPTV] 01-01-1970 00:35:49 LAN send out a general query.
[IPTV] 01-01-1970 00:37:54 LAN send out a general query.
[IPTV] 01-01-1970 00:39:59 LAN send out a general query.
[IPTV] 01-01-1970 00:42:04 LAN send out a general query.
[System] 01-01-1970 00:43:59 User logout via HTTP from 192.168.1.64
[IPTV] 01-01-1970 00:44:09 LAN send out a general query.
[System] 01-01-1970 00:44:25 User 'TELMEX' login failed via HTTP from 192.168.1.64
[System] 01-01-1970 00:44:44 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[System] 01-01-1970 00:45:31 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:45:53 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:46:14 LAN send out a general query.
[IPTV] 01-01-1970 00:48:19 LAN send out a general query.
[System] 01-01-1970 00:49:15 LAN Port [1] disconnected.
[System] 01-01-1970 00:49:29 LAN Port [1] connected, Link Speed: [10M H].
[System] 01-01-1970 00:49:33 LAN Port [1] disconnected.
[System] 01-01-1970 00:49:35 LAN Port [1] connected, Link Speed: [100M F].
[LAN] 01-01-1970 00:49:36 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:49:36 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[IPTV] 01-01-1970 00:50:24 LAN send out a general query.
[System] 01-01-1970 00:50:35 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:52:03 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:52:27 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:52:29 LAN send out a general query.
[IPTV] 01-01-1970 00:54:34 LAN send out a general query.
[UPnP] 01-01-1970 00:55:51 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954567 Success.
[UPnP] 01-01-1970 00:55:51 upnp_event_send: sending event notify message to
192.168.1.64::2869
[UPnP] 01-01-1970 00:55:51 upnp_event_send: msg: NOTIFY /upnp/eventing/vwybnzoqeg
HTTP/1.1Host: 192.168.1.64:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954567SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 01-01-1970 00:55:51 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309523c6 Success.
[UPnP] 01-01-1970 00:55:51 upnp_event_send: sending event notify message to
192.168.1.64::2869
[UPnP] 01-01-1970 00:55:51 upnp_event_send: msg: NOTIFY /upnp/eventing/fdsrcogixi
HTTP/1.1Host: 192.168.1.64:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309523c6SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 01-01-1970 00:56:39 LAN send out a general query.
[System] 01-01-1970 00:56:54 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:57:29 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:58:44 LAN send out a general query.
[System] 01-01-1970 00:58:56 LAN Port [1] disconnected.
[System] 01-01-1970 00:58:58 LAN Port [1] connected, Link Speed: [100M F].
[LAN] 01-01-1970 00:59:10 Received DISCOVER from client mac [44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Send OFFER of ip [192.168.1.67] to client mac
[44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Received REQUEST from client ip [0.0.0.0] mac
[44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Successfully assign IP [192.168.1.67] to client mac
[44:6d:57:ec:3a:96], lease time [86400]
[System] 01-01-1970 00:59:40 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 00:59:40 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 01:00:06 User 'TELMEX' login successfully via HTTP from
192.168.1.67
[WIFI] 01-01-1970 01:00:30 channel score,ch1001:bss1 intfadj0 cns-77 tol-1
[WIFI] 01-01-1970 01:00:30 channel score,ch1006:bss5 intfadj1 cns-75 tol-4
[WIFI] 01-01-1970 01:00:30 channel score,ch100b:bss5 intfadj4 cns-85 tol-1
[WIFI] 01-01-1970 01:00:30 2.4G select auto channel :1
[IPTV] 01-01-1970 01:00:49 LAN send out a general query.
[System] 01-01-1970 01:01:35 LAN Port [4] connected, Link Speed: [1G F].
[LAN] 01-01-1970 01:01:36 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:36 Successfully assign IP [192.168.1.65] to client mac
[00:18:8b:04:67:30], lease time [86400]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:45 Received INFORM from client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:45 Send Information to client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[IPTV] 01-01-1970 01:02:54 LAN send out a general query.
[System] 01-01-1970 01:04:15 User logout via HTTP from 192.168.1.65
[System] 01-01-1970 01:04:41 User 'TELMEX' login failed via HTTP from 192.168.1.65
[System] 01-01-1970 01:04:59 User 'TELMEX' login failed via HTTP from 192.168.1.65
[IPTV] 01-01-1970 01:04:59 LAN send out a general query.
[System] 01-01-1970 01:05:04 User 'TELMEX' login failed via HTTP from 192.168.1.65
[System] 01-01-1970 01:05:28 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 01:06:09 User 'TELMEX' login successfully via HTTP from
192.168.1.65
[IPTV] 01-01-1970 01:07:04 LAN send out a general query.
[UPnP] 01-01-1970 01:08:12 Success to broadcast good-bye notifications
[IPTV] 01-01-1970 01:09:09 LAN send out a general query.
[IPTV] 01-01-1970 01:11:14 LAN send out a general query.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy