Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 22

Device Information

Module Name: FG6123BTM


Build Tag: SERCOMM.TELMEX
Firmware Version: FG6123BV3019
Build Time: Mon Jul 27 04:18:09 CST 2020
PON Serial Number: SCOM2010787B

{Firewall} 09-14-2020 05:19:25 DoS attack: TCP Port Scan from source:
89.248.171.134:58758
{Firewall} 09-14-2020 05:19:25 drop this packet for psd
{System} 09-14-2020 08:57:16 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-14-2020 08:57:43 TR069 connects to ACS server success.
{System} 09-14-2020 08:57:47 Sync up with NTP Server successfully, 2020-09-
14T08:57:46Z.
{Firewall} 09-14-2020 15:16:24 DoS attack: TCP Port Scan from source:
89.248.171.134:54578
{Firewall} 09-14-2020 15:16:24 drop this packet for psd
{System} 09-14-2020 20:34:54 Sync up with NTP Server successfully, 2020-09-
14T20:34:54Z.
{Firewall} 09-15-2020 01:07:35 DoS attack: TCP Port Scan from source:
185.39.10.14:50042
{Firewall} 09-15-2020 01:07:35 drop this packet for psd
{Firewall} 09-15-2020 12:45:05 DoS attack: TCP Port Scan from source:
60.172.47.2:7987
{Firewall} 09-15-2020 12:45:05 drop this packet for psd
{Firewall} 09-15-2020 14:09:33 DoS attack: TCP Port Scan from source:
89.248.174.199:56965
{Firewall} 09-15-2020 14:09:33 drop this packet for psd
{Firewall} 09-15-2020 23:34:09 DoS attack: TCP Port Scan from source:
94.102.49.135:50842
{Firewall} 09-15-2020 23:34:09 drop this packet for psd
{Firewall} 09-16-2020 18:13:24 DoS attack: TCP Port Scan from source:
193.29.13.29:65534
{Firewall} 09-16-2020 18:13:24 drop this packet for psd
{System} 09-16-2020 20:12:32 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-16-2020 20:12:57 Sync up with NTP Server successfully, 2020-09-
16T20:12:57Z.
{System} 09-16-2020 20:12:59 TR069 connects to ACS server success.
{Firewall} 09-16-2020 21:44:26 DoS attack: TCP Port Scan from source:
180.214.238.174:48424
{Firewall} 09-16-2020 21:44:26 drop this packet for psd
{Firewall} 09-17-2020 00:57:15 DoS attack: UDP Port Scan from source:
216.245.209.226:5311
{Firewall} 09-17-2020 00:57:15 drop this packet for psd
{Firewall} 09-17-2020 04:07:57 DoS attack: TCP Port Scan from source:
80.82.65.60:53668
{Firewall} 09-17-2020 04:07:57 drop this packet for psd
{Firewall} 09-17-2020 12:13:06 DoS attack: TCP Port Scan from source:
203.98.96.180:27549
{Firewall} 09-17-2020 12:13:06 drop this packet for psd
{Firewall} 09-17-2020 13:29:02 DoS attack: TCP Port Scan from source:
80.82.70.189:47337
{Firewall} 09-17-2020 13:29:02 drop this packet for psd
{Firewall} 09-17-2020 18:42:12 DoS attack: TCP Port Scan from source:
193.27.228.156:40080
{Firewall} 09-17-2020 18:42:12 drop this packet for psd
{Firewall} 09-17-2020 22:47:45 DoS attack: TCP Port Scan from source:
94.102.49.137:40857
{Firewall} 09-17-2020 22:47:45 drop this packet for psd
{Firewall} 09-18-2020 08:09:25 DoS attack: TCP Port Scan from source:
94.102.49.135:54556
{Firewall} 09-18-2020 08:09:25 drop this packet for psd
{Firewall} 09-18-2020 09:56:07 DoS attack: TCP Port Scan from source:
202.29.14.12:6000
{Firewall} 09-18-2020 09:56:07 drop this packet for psd
{Firewall} 09-18-2020 13:35:02 DoS attack: TCP Port Scan from source:
45.227.254.30:52023
{Firewall} 09-18-2020 13:35:02 drop this packet for psd
{Firewall} 09-18-2020 17:36:26 DoS attack: TCP Port Scan from source:
94.102.49.137:48577
{Firewall} 09-18-2020 17:36:26 drop this packet for psd
{Firewall} 09-19-2020 08:02:13 DoS attack: TCP Port Scan from source:
89.248.162.179:40528
{Firewall} 09-19-2020 08:02:13 drop this packet for psd
{Firewall} 09-19-2020 19:29:52 DoS attack: TCP Port Scan from source:
185.39.11.109:41780
{Firewall} 09-19-2020 19:29:52 drop this packet for psd
{Firewall} 09-20-2020 01:41:37 DoS attack: TCP Port Scan from source:
80.82.65.60:44081
{Firewall} 09-20-2020 01:41:37 drop this packet for psd
{Firewall} 09-20-2020 04:52:16 DoS attack: TCP Port Scan from source:
141.136.37.245:6000
{Firewall} 09-20-2020 04:52:16 drop this packet for psd
{Firewall} 09-20-2020 07:58:13 DoS attack: TCP Port Scan from source:
80.82.64.167:46626
{Firewall} 09-20-2020 07:58:13 drop this packet for psd
{Firewall} 09-20-2020 10:12:18 DoS attack: TCP Port Scan from source:
185.39.10.14:54730
{Firewall} 09-20-2020 10:12:18 drop this packet for psd
{Firewall} 09-20-2020 22:27:48 DoS attack: UDP Port Scan from source:
45.143.221.6:5392
{Firewall} 09-20-2020 22:27:48 drop this packet for psd
{Firewall} 09-21-2020 20:50:30 DoS attack: UDP Port Scan from source:
103.145.13.85:5132
{Firewall} 09-21-2020 20:50:30 drop this packet for psd
{Firewall} 09-22-2020 07:06:03 DoS attack: TCP Port Scan from source:
123.233.116.131:6000
{Firewall} 09-22-2020 07:06:03 drop this packet for psd
{System} 09-22-2020 13:19:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 09-22-2020 13:20:09 Sync up with NTP Server successfully, 2020-09-
22T13:20:09Z.
{System} 09-22-2020 13:20:10 TR069 connects to ACS server success.
{Firewall} 09-22-2020 13:35:45 DoS attack: TCP Port Scan from source:
79.124.62.86:51075
{Firewall} 09-22-2020 13:35:45 drop this packet for psd
{Firewall} 09-23-2020 03:14:02 DoS attack: TCP Port Scan from source:
193.27.229.230:51755
{Firewall} 09-23-2020 03:14:02 drop this packet for psd
{Firewall} 09-23-2020 09:42:17 DoS attack: TCP Port Scan from source:
89.248.172.208:52137
{Firewall} 09-23-2020 09:42:17 drop this packet for psd
{Firewall} 09-23-2020 12:43:26 DoS attack: TCP Port Scan from source:
92.63.197.97:57728
{Firewall} 09-23-2020 12:43:26 drop this packet for psd
{Firewall} 09-24-2020 04:51:13 DoS attack: TCP Port Scan from source:
94.102.49.137:41061
{Firewall} 09-24-2020 04:51:13 drop this packet for psd
{Firewall} 09-24-2020 13:21:02 DoS attack: TCP Port Scan from source:
89.248.171.134:51656
{Firewall} 09-24-2020 13:21:02 drop this packet for psd
{Firewall} 09-24-2020 18:44:25 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-24-2020 18:44:25 drop this packet for psd
{Firewall} 09-25-2020 02:18:40 DoS attack: UDP Port Scan from source:
103.145.13.237:5219
{Firewall} 09-25-2020 02:18:40 drop this packet for psd
{Firewall} 09-25-2020 03:41:06 DoS attack: TCP Port Scan from source:
94.102.49.117:43262
{Firewall} 09-25-2020 03:41:06 drop this packet for psd
{Firewall} 09-25-2020 04:26:25 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-25-2020 04:26:25 drop this packet for psd
{Firewall} 09-25-2020 07:23:48 DoS attack: TCP Port Scan from source:
185.202.0.112:65531
{Firewall} 09-25-2020 07:23:48 drop this packet for psd
{Firewall} 09-25-2020 17:25:56 DoS attack: TCP Port Scan from source:
94.102.49.59:52750
{Firewall} 09-25-2020 17:25:56 drop this packet for psd
{Firewall} 09-26-2020 02:48:56 DoS attack: TCP Port Scan from source:
89.248.174.199:46530
{Firewall} 09-26-2020 02:48:56 drop this packet for psd
{Firewall} 09-26-2020 12:12:14 DoS attack: TCP Port Scan from source:
94.102.49.117:40322
{Firewall} 09-26-2020 12:12:14 drop this packet for psd
{Firewall} 09-26-2020 21:36:12 DoS attack: TCP Port Scan from source:
185.39.11.109:54161
{Firewall} 09-26-2020 21:36:12 drop this packet for psd
{Firewall} 09-27-2020 07:01:30 DoS attack: TCP Port Scan from source:
89.248.162.179:48082
{Firewall} 09-27-2020 07:01:30 drop this packet for psd
{Firewall} 09-27-2020 16:24:39 DoS attack: TCP Port Scan from source:
94.102.49.98:41872
{Firewall} 09-27-2020 16:24:39 drop this packet for psd
{Firewall} 09-27-2020 18:37:59 DoS attack: TCP Port Scan from source:
87.251.70.79:65534
{Firewall} 09-27-2020 18:37:59 drop this packet for psd
{Firewall} 09-27-2020 21:28:59 DoS attack: UDP Port Scan from source:
103.145.13.40:5434
{Firewall} 09-27-2020 21:28:59 drop this packet for psd
{Firewall} 09-28-2020 01:43:55 DoS attack: TCP Port Scan from source:
80.82.77.132:55429
{Firewall} 09-28-2020 01:43:55 drop this packet for psd
{Firewall} 09-28-2020 11:08:53 DoS attack: TCP Port Scan from source:
93.174.93.27:49326
{Firewall} 09-28-2020 11:08:53 drop this packet for psd
{Firewall} 09-28-2020 20:37:24 DoS attack: TCP Port Scan from source:
94.102.49.98:43434
{Firewall} 09-28-2020 20:37:24 drop this packet for psd
{Firewall} 09-29-2020 06:01:57 DoS attack: TCP Port Scan from source:
94.102.49.135:57307
{Firewall} 09-29-2020 06:01:57 drop this packet for psd
{Firewall} 09-29-2020 07:03:07 DoS attack: UDP Port Scan from source:
45.125.65.52:5612
{Firewall} 09-29-2020 07:03:07 drop this packet for psd
{Firewall} 09-29-2020 07:13:16 DoS attack: UDP Port Scan from source:
141.98.10.55:5616
{Firewall} 09-29-2020 07:13:16 drop this packet for psd
{Firewall} 09-29-2020 14:50:49 DoS attack: UDP Port Scan from source:
103.145.13.158:5064
{Firewall} 09-29-2020 14:50:49 drop this packet for psd
{Firewall} 09-29-2020 15:24:23 DoS attack: TCP Port Scan from source:
89.248.174.199:51055
{Firewall} 09-29-2020 15:24:23 drop this packet for psd
{Firewall} 09-29-2020 15:54:47 DoS attack: UDP Port Scan from source:
103.145.13.133:5179
{Firewall} 09-29-2020 15:54:47 drop this packet for psd
{Firewall} 09-29-2020 17:40:00 DoS attack: UDP Port Scan from source:
103.145.13.237:5136
{Firewall} 09-29-2020 17:40:00 drop this packet for psd
{Firewall} 09-30-2020 01:20:30 DoS attack: TCP Port Scan from source:
94.102.49.137:46821
{Firewall} 09-30-2020 01:20:30 drop this packet for psd
{Firewall} 09-30-2020 11:23:25 DoS attack: TCP Port Scan from source:
89.248.171.134:42996
{Firewall} 09-30-2020 11:23:25 drop this packet for psd
{Firewall} 09-30-2020 12:31:19 DoS attack: UDP Port Scan from source:
45.143.221.6:5105
{Firewall} 09-30-2020 12:31:19 drop this packet for psd
{Firewall} 09-30-2020 20:50:41 DoS attack: TCP Port Scan from source:
94.102.49.98:57032
{Firewall} 09-30-2020 20:50:41 drop this packet for psd
{Firewall} 10-01-2020 00:37:28 DoS attack: TCP Port Scan from source:
185.216.140.68:50612
{Firewall} 10-01-2020 00:37:28 drop this packet for psd
{Firewall} 10-01-2020 13:11:07 DoS attack: TCP Port Scan from source:
89.248.171.134:55860
{Firewall} 10-01-2020 13:11:07 drop this packet for psd
{Firewall} 10-01-2020 22:34:36 DoS attack: TCP Port Scan from source:
94.102.49.59:49665
{Firewall} 10-01-2020 22:34:36 drop this packet for psd
{Firewall} 10-02-2020 06:09:06 DoS attack: TCP Port Scan from source:
93.174.89.2:56883
{Firewall} 10-02-2020 06:09:06 drop this packet for psd
{Firewall} 10-02-2020 07:58:33 DoS attack: TCP Port Scan from source:
89.248.162.179:43505
{Firewall} 10-02-2020 07:58:33 drop this packet for psd
{Firewall} 10-02-2020 10:58:52 DoS attack: TCP Port Scan from source:
223.112.70.109:53204
{Firewall} 10-02-2020 10:58:52 drop this packet for psd
{Firewall} 10-02-2020 17:22:53 DoS attack: TCP Port Scan from source:
185.39.10.124:57362
{Firewall} 10-02-2020 17:22:53 drop this packet for psd
{Firewall} 10-02-2020 17:50:19 DoS attack: TCP Port Scan from source:
80.82.64.167:58975
{Firewall} 10-02-2020 17:50:19 drop this packet for psd
{Firewall} 10-03-2020 02:47:11 DoS attack: TCP Port Scan from source:
185.39.10.124:51220
{Firewall} 10-03-2020 02:47:11 drop this packet for psd
{Firewall} 10-04-2020 17:14:53 DoS attack: UDP Port Scan from source:
103.145.13.40:5431
{Firewall} 10-04-2020 17:14:53 drop this packet for psd
{Firewall} 10-05-2020 12:43:19 DoS attack: TCP Port Scan from source:
94.102.49.117:59789
{Firewall} 10-05-2020 12:43:19 drop this packet for psd
{Firewall} 10-05-2020 13:58:58 DoS attack: UDP Port Scan from source:
45.143.221.99:5306
{Firewall} 10-05-2020 13:58:58 drop this packet for psd
{Firewall} 10-05-2020 16:43:26 DoS attack: TCP Port Scan from source:
78.129.146.110:56494
{Firewall} 10-05-2020 16:43:26 drop this packet for psd
{Firewall} 10-05-2020 22:03:55 DoS attack: TCP Port Scan from source:
185.39.11.109:53427
{Firewall} 10-05-2020 22:03:55 drop this packet for psd
{Firewall} 10-06-2020 13:10:55 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=76
{Firewall} 10-06-2020 13:10:55 UDP flood attack from LAN has been detected,
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=76
{Firewall} 10-06-2020 17:12:12 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.67 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-07-2020 00:00:18 DoS attack: UDP Port Scan from source:
103.145.13.85:5132
{Firewall} 10-07-2020 00:00:18 drop this packet for psd
{System} 10-07-2020 02:31:31 TR069 download file
http://gateway.telmex.com/SERCOMM_FG6123BTM_FG6123BV3019/FG6123BV3019.img
successfully.
{System} 10-07-2020 02:31:41 Upgrade image version: FG6123BV3019.
{System} 10-07-2020 02:31:45 Request to reboot by TR069.
{System} 10-07-2020 02:32:25 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1257120 seconds
{System} 10-07-2020 02:32:57 Sync up with NTP Server successfully, 2020-10-
07T02:32:53Z.
{System} 10-07-2020 02:32:59 TR069 connects to ACS server success.
{Firewall} 10-07-2020 09:46:25 DoS attack: TCP Port Scan from source:
94.102.49.117:41971
{Firewall} 10-07-2020 09:46:25 drop this packet for psd
{Firewall} 10-07-2020 19:08:05 DoS attack: TCP Port Scan from source:
185.39.11.109:55675
{Firewall} 10-07-2020 19:08:05 drop this packet for psd
{Firewall} 10-07-2020 21:47:22 DoS attack: TCP Port Scan from source:
45.129.33.122:41899
{Firewall} 10-07-2020 21:47:22 drop this packet for psd
{Firewall} 10-07-2020 23:54:14 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-08-2020 01:19:16 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-08-2020 02:31:54 DoS attack: TCP Port Scan from source:
185.156.73.57:47631
{Firewall} 10-08-2020 02:31:54 drop this packet for psd
{Firewall} 10-08-2020 04:31:33 DoS attack: TCP Port Scan from source:
94.102.49.137:49476
{Firewall} 10-08-2020 04:31:33 drop this packet for psd
{Firewall} 10-08-2020 13:59:36 DoS attack: TCP Port Scan from source:
89.248.171.134:43566
{Firewall} 10-08-2020 13:59:36 drop this packet for psd
{Firewall} 10-08-2020 23:22:16 DoS attack: TCP Port Scan from source:
185.39.11.109:57324
{Firewall} 10-08-2020 23:22:16 drop this packet for psd
{Firewall} 10-09-2020 08:46:22 DoS attack: TCP Port Scan from source:
94.102.49.135:51170
{Firewall} 10-09-2020 08:46:22 drop this packet for psd
{Firewall} 10-09-2020 13:12:35 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-09-2020 18:09:10 DoS attack: TCP Port Scan from source:
185.39.10.14:44941
{Firewall} 10-09-2020 18:09:10 drop this packet for psd
{Firewall} 10-09-2020 18:51:12 DoS attack: UDP Port Scan from source:
103.145.13.55:5312
{Firewall} 10-09-2020 18:51:12 drop this packet for psd
{Firewall} 10-09-2020 22:02:43 DoS attack: TCP Port Scan from source:
167.114.27.115:6000
{Firewall} 10-09-2020 22:02:43 drop this packet for psd
{Firewall} 10-09-2020 22:38:40 DoS attack: TCP Port Scan from source:
141.98.10.173:65530
{Firewall} 10-09-2020 22:38:40 drop this packet for psd
{Firewall} 10-10-2020 03:59:48 DoS attack: TCP Port Scan from source:
94.102.49.98:40378
{Firewall} 10-10-2020 03:59:48 drop this packet for psd
{Firewall} 10-10-2020 13:55:24 DoS attack: TCP Port Scan from source:
94.102.49.117:56115
{Firewall} 10-10-2020 13:55:24 drop this packet for psd
{Firewall} 10-10-2020 23:29:56 DoS attack: TCP Port Scan from source:
89.248.171.134:50586
{Firewall} 10-10-2020 23:29:56 drop this packet for psd
{Firewall} 10-11-2020 07:02:44 DoS attack: UDP Port Scan from source:
103.145.13.133:5164
{Firewall} 10-11-2020 07:02:44 drop this packet for psd
{Firewall} 10-11-2020 07:05:53 DoS attack: UDP Port Scan from source:
103.145.13.237:5164
{Firewall} 10-11-2020 07:05:53 drop this packet for psd
{Firewall} 10-11-2020 08:56:16 DoS attack: TCP Port Scan from source:
89.248.174.199:44569
{Firewall} 10-11-2020 08:56:16 drop this packet for psd
{Firewall} 10-11-2020 18:16:25 DoS attack: UDP Port Scan from source:
45.143.221.18:5438
{Firewall} 10-11-2020 18:16:25 drop this packet for psd
{Firewall} 10-11-2020 18:33:45 DoS attack: TCP Port Scan from source:
185.39.10.124:59217
{Firewall} 10-11-2020 18:33:45 drop this packet for psd
{Firewall} 10-12-2020 03:59:10 DoS attack: TCP Port Scan from source:
94.102.49.59:53143
{Firewall} 10-12-2020 03:59:10 drop this packet for psd
{Firewall} 10-12-2020 16:29:42 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 17:21:28 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 18:56:46 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.66 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-12-2020 19:50:31 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.72 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-13-2020 10:37:14 DoS attack: TCP Port Scan from source:
94.102.49.59:43423
{Firewall} 10-13-2020 10:37:14 drop this packet for psd
{System} 10-13-2020 19:24:23 Sync up with NTP Server successfully, 2020-10-
13T19:24:22Z.
{Firewall} 10-13-2020 19:58:12 DoS attack: TCP Port Scan from source:
80.82.70.189:57084
{Firewall} 10-13-2020 19:58:12 drop this packet for psd
{Firewall} 10-14-2020 05:25:02 DoS attack: TCP Port Scan from source:
94.102.49.98:51087
{Firewall} 10-14-2020 05:25:02 drop this packet for psd
{Firewall} 10-14-2020 09:46:45 DoS attack: UDP Port Scan from source:
103.145.13.133:5121
{Firewall} 10-14-2020 09:46:45 drop this packet for psd
{Firewall} 10-14-2020 10:14:27 DoS attack: UDP Port Scan from source:
103.145.13.237:5121
{Firewall} 10-14-2020 10:14:27 drop this packet for psd
{Firewall} 10-14-2020 14:44:39 DoS attack: TCP Port Scan from source:
89.248.174.199:44670
{Firewall} 10-14-2020 14:44:39 drop this packet for psd
{Firewall} 10-14-2020 17:23:38 DoS attack: TCP Port Scan from source:
42.62.114.231:37083
{Firewall} 10-14-2020 17:23:38 drop this packet for psd
{Firewall} 10-15-2020 09:26:13 DoS attack: TCP Port Scan from source:
89.248.174.199:51964
{Firewall} 10-15-2020 09:26:13 drop this packet for psd
{System} 10-15-2020 09:58:07 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-15-2020 09:58:32 Sync up with NTP Server successfully, 2020-10-
15T09:58:32Z.
{System} 10-15-2020 09:58:34 TR069 connects to ACS server success.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 10-15-2020 10:04:56 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-15-2020 10:05:21 Sync up with NTP Server successfully, 2020-10-
15T10:05:21Z.
{System} 10-15-2020 10:05:23 TR069 connects to ACS server success.
{Firewall} 10-15-2020 11:46:51 DoS attack: TCP Port Scan from source:
94.102.49.106:56907
{Firewall} 10-15-2020 11:46:51 drop this packet for psd
{Firewall} 10-15-2020 18:49:27 DoS attack: TCP Port Scan from source:
94.102.49.137:45746
{Firewall} 10-15-2020 18:49:27 drop this packet for psd
{Firewall} 10-16-2020 06:58:40 DoS attack: TCP Port Scan from source:
195.54.160.228:51536
{Firewall} 10-16-2020 06:58:40 drop this packet for psd
{Firewall} 10-16-2020 10:04:22 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-16-2020 10:09:49 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-16-2020 13:38:14 DoS attack: TCP Port Scan from source:
94.102.49.98:53485
{Firewall} 10-16-2020 13:38:14 drop this packet for psd
{Firewall} 10-16-2020 23:02:49 DoS attack: TCP Port Scan from source:
94.102.49.117:47359
{Firewall} 10-16-2020 23:02:49 drop this packet for psd
{Firewall} 10-16-2020 23:33:05 DoS attack: TCP Port Scan from source:
89.248.172.140:42187
{Firewall} 10-16-2020 23:33:05 drop this packet for psd
{Firewall} 10-17-2020 04:33:34 DoS attack: TCP Port Scan from source:
42.62.114.231:49454
{Firewall} 10-17-2020 04:33:34 drop this packet for psd
{Firewall} 10-17-2020 08:28:56 DoS attack: TCP Port Scan from source:
185.39.10.124:41329
{Firewall} 10-17-2020 08:28:56 drop this packet for psd
{Firewall} 10-17-2020 17:22:25 DoS attack: UDP Port Scan from source:
103.145.13.18:5278
{Firewall} 10-17-2020 17:22:25 drop this packet for psd
{Firewall} 10-17-2020 17:57:08 DoS attack: TCP Port Scan from source:
94.102.49.137:55416
{Firewall} 10-17-2020 17:57:08 drop this packet for psd
{Firewall} 10-17-2020 18:49:22 DoS attack: UDP Port Scan from source:
103.145.13.133:5115
{Firewall} 10-17-2020 18:49:22 drop this packet for psd
{Firewall} 10-18-2020 02:51:29 DoS attack: TCP Port Scan from source:
185.153.197.185:65533
{Firewall} 10-18-2020 02:51:29 drop this packet for psd
{Firewall} 10-18-2020 03:26:02 DoS attack: TCP Port Scan from source:
94.102.49.135:49552
{Firewall} 10-18-2020 03:26:02 drop this packet for psd
{Firewall} 10-18-2020 12:51:37 DoS attack: TCP Port Scan from source:
94.102.49.93:43471
{Firewall} 10-18-2020 12:51:37 drop this packet for psd
{Firewall} 10-18-2020 22:12:15 DoS attack: TCP Port Scan from source:
93.174.93.27:57126
{Firewall} 10-18-2020 22:12:15 drop this packet for psd
{Firewall} 10-19-2020 07:38:23 DoS attack: TCP Port Scan from source:
94.102.49.98:51097
{Firewall} 10-19-2020 07:38:23 drop this packet for psd
{Firewall} 10-20-2020 17:35:28 DoS attack: TCP Port Scan from source:
223.112.70.109:25030
{Firewall} 10-20-2020 17:35:28 drop this packet for psd
{Firewall} 10-20-2020 19:23:01 DoS attack: TCP Port Scan from source:
124.92.127.102:6000
{Firewall} 10-20-2020 19:23:01 drop this packet for psd
{Firewall} 10-21-2020 14:32:27 DoS attack: TCP Port Scan from source:
94.102.49.59:48734
{Firewall} 10-21-2020 14:32:27 drop this packet for psd
{Firewall} 10-21-2020 23:57:14 DoS attack: TCP Port Scan from source:
94.102.49.93:42625
{Firewall} 10-21-2020 23:57:14 drop this packet for psd
{Firewall} 10-22-2020 05:04:13 DoS attack: UDP Port Scan from source:
103.145.13.18:5110
{Firewall} 10-22-2020 05:04:13 drop this packet for psd
{Firewall} 10-22-2020 09:27:14 DoS attack: TCP Port Scan from source:
94.102.49.117:56824
{Firewall} 10-22-2020 09:27:14 drop this packet for psd
{Firewall} 10-22-2020 13:22:05 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.69 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-22-2020 18:52:50 DoS attack: TCP Port Scan from source:
185.39.10.14:50755
{Firewall} 10-22-2020 18:52:50 drop this packet for psd
{Firewall} 10-22-2020 21:31:55 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{Firewall} 10-23-2020 08:50:15 DoS attack: TCP Port Scan from source:
80.82.64.242:41008
{Firewall} 10-23-2020 08:50:15 drop this packet for psd
{Firewall} 10-23-2020 18:10:46 DoS attack: TCP Port Scan from source:
89.248.162.179:54638
{Firewall} 10-23-2020 18:10:46 drop this packet for psd
{Firewall} 10-24-2020 03:36:49 DoS attack: TCP Port Scan from source:
80.82.70.189:48605
{Firewall} 10-24-2020 03:36:49 drop this packet for psd
{Firewall} 10-24-2020 10:43:35 Fraggle attack from LAN has been detected, DROP
SRC=192.168.1.70 DST=192.168.1.255 PROTO=UDP SPT=137 DPT=137 LEN=58
{System} 10-24-2020 13:35:41 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-24-2020 13:36:10 Sync up with NTP Server successfully, 2020-10-
24T13:36:10Z.
{System} 10-24-2020 13:36:11 TR069 connects to ACS server success.
{Firewall} 10-24-2020 14:25:15 DoS attack: TCP Port Scan from source:
94.102.57.240:49022
{Firewall} 10-24-2020 14:25:15 drop this packet for psd
{Firewall} 10-24-2020 14:34:01 DoS attack: TCP Port Scan from source:
89.248.162.161:49065
{Firewall} 10-24-2020 14:34:01 drop this packet for psd
{Firewall} 10-24-2020 14:50:46 DoS attack: TCP Port Scan from source:
94.102.49.106:49032
{Firewall} 10-24-2020 14:50:46 drop this packet for psd
{Firewall} 10-24-2020 15:10:49 DoS attack: TCP Port Scan from source:
80.82.70.25:49055
{Firewall} 10-24-2020 15:10:49 drop this packet for psd
{Firewall} 10-24-2020 17:41:44 DoS attack: TCP Port Scan from source:
94.102.49.98:59291
{Firewall} 10-24-2020 17:41:44 drop this packet for psd
{Firewall} 10-25-2020 03:04:45 DoS attack: TCP Port Scan from source:
94.102.49.98:53078
{Firewall} 10-25-2020 03:04:45 drop this packet for psd
{Firewall} 10-25-2020 12:39:29 DoS attack: TCP Port Scan from source:
94.102.49.93:47557
{Firewall} 10-25-2020 12:39:29 drop this packet for psd
{Firewall} 10-25-2020 15:10:24 DoS attack: TCP Port Scan from source:
193.27.228.156:44061
{Firewall} 10-25-2020 15:10:24 drop this packet for psd
{Firewall} 10-25-2020 21:05:17 DoS attack: TCP Port Scan from source:
185.39.10.14:41509
{Firewall} 10-25-2020 21:05:17 drop this packet for psd
{Firewall} 10-26-2020 08:36:09 DoS attack: TCP Port Scan from source:
80.82.78.20:42962
{Firewall} 10-26-2020 08:36:09 drop this packet for psd
{Firewall} 10-26-2020 17:38:13 DoS attack: TCP Port Scan from source:
80.82.65.60:55487
{Firewall} 10-26-2020 17:38:13 drop this packet for psd
{Firewall} 10-26-2020 19:14:37 DoS attack: TCP Port Scan from source:
125.64.94.136:43618
{Firewall} 10-26-2020 19:14:37 drop this packet for psd
{Firewall} 10-27-2020 03:05:21 DoS attack: TCP Port Scan from source:
94.102.49.117:49497
{Firewall} 10-27-2020 03:05:21 drop this packet for psd
{Firewall} 10-27-2020 12:31:47 DoS attack: TCP Port Scan from source:
94.102.49.104:43487
{Firewall} 10-27-2020 12:31:47 drop this packet for psd
{Firewall} 10-27-2020 15:18:30 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 10-27-2020 15:18:30 drop this packet for psd
{Firewall} 10-27-2020 17:29:43 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 10-27-2020 17:29:43 drop this packet for psd
{Firewall} 10-27-2020 18:55:49 DoS attack: UDP Port Scan from source:
103.145.13.237:5113
{Firewall} 10-27-2020 18:55:49 drop this packet for psd
{Firewall} 10-27-2020 19:35:04 DoS attack: UDP Port Scan from source:
103.145.12.71:5076
{Firewall} 10-27-2020 19:35:04 drop this packet for psd
{System} 10-27-2020 21:18:07 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 10-27-2020 21:18:32 Sync up with NTP Server successfully, 2020-10-
27T21:18:32Z.
{System} 10-27-2020 21:18:33 TR069 connects to ACS server success.
{Firewall} 10-27-2020 21:32:03 DoS attack: TCP Port Scan from source:
79.124.62.82:40253
{Firewall} 10-27-2020 21:32:03 drop this packet for psd
{Firewall} 10-27-2020 21:55:53 DoS attack: TCP Port Scan from source:
80.82.77.235:57347
{Firewall} 10-27-2020 21:55:53 drop this packet for psd
{Firewall} 10-27-2020 22:08:30 DoS attack: TCP Port Scan from source:
94.102.49.106:52678
{Firewall} 10-27-2020 22:08:30 drop this packet for psd
{Firewall} 10-28-2020 00:45:14 DoS attack: TCP Port Scan from source:
94.102.51.95:40353
{Firewall} 10-28-2020 00:45:14 drop this packet for psd
{Firewall} 10-28-2020 01:43:23 DoS attack: TCP Port Scan from source:
89.248.162.161:50271
{Firewall} 10-28-2020 01:43:23 drop this packet for psd
{Firewall} 10-28-2020 04:33:55 DoS attack: UDP Port Scan from source:
103.145.13.18:5161
{Firewall} 10-28-2020 04:33:55 drop this packet for psd
{Firewall} 10-28-2020 08:26:10 DoS attack: UDP Port Scan from source:
146.88.240.4:54995
{Firewall} 10-28-2020 08:26:10 drop this packet for psd
{Firewall} 10-28-2020 14:21:36 DoS attack: TCP Port Scan from source:
185.156.73.57:54613
{Firewall} 10-28-2020 14:21:36 drop this packet for psd
{Firewall} 10-28-2020 14:31:38 DoS attack: TCP Port Scan from source:
92.63.197.61:54715
{Firewall} 10-28-2020 14:31:38 drop this packet for psd
{Firewall} 10-28-2020 16:20:40 DoS attack: TCP Port Scan from source:
94.102.49.117:43629
{Firewall} 10-28-2020 16:20:40 drop this packet for psd
{Firewall} 10-29-2020 06:30:24 DoS attack: TCP Port Scan from source:
94.102.49.104:54605
{Firewall} 10-29-2020 06:30:24 drop this packet for psd
{Firewall} 10-29-2020 15:57:23 DoS attack: TCP Port Scan from source:
94.102.49.117:48634
{Firewall} 10-29-2020 15:57:23 drop this packet for psd
{Firewall} 10-30-2020 01:23:48 DoS attack: TCP Port Scan from source:
94.102.49.135:42619
{Firewall} 10-30-2020 01:23:48 drop this packet for psd
{Firewall} 10-30-2020 10:50:51 DoS attack: TCP Port Scan from source:
89.248.171.134:56643
{Firewall} 10-30-2020 10:50:51 drop this packet for psd
{Firewall} 10-30-2020 12:06:56 DoS attack: TCP Port Scan from source:
89.248.162.146:41208
{Firewall} 10-30-2020 12:06:56 drop this packet for psd
{Firewall} 10-30-2020 20:17:37 DoS attack: TCP Port Scan from source:
185.39.11.109:50649
{Firewall} 10-30-2020 20:17:37 drop this packet for psd
{Firewall} 10-31-2020 05:47:01 DoS attack: TCP Port Scan from source:
94.102.49.93:44814
{Firewall} 10-31-2020 05:47:01 drop this packet for psd
{Firewall} 10-31-2020 08:18:57 DoS attack: TCP Port Scan from source:
94.102.49.97:53931
{Firewall} 10-31-2020 08:18:57 drop this packet for psd
{System} 10-31-2020 10:03:52 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 10-31-2020 10:04:18 Sync up with NTP Server successfully, 2020-10-
31T10:04:18Z.
{System} 10-31-2020 10:04:20 TR069 connects to ACS server success.
{Firewall} 10-31-2020 15:10:32 DoS attack: TCP Port Scan from source:
89.248.171.134:58624
{Firewall} 10-31-2020 15:10:32 drop this packet for psd
{Firewall} 10-31-2020 15:33:44 DoS attack: TCP Port Scan from source:
45.131.231.90:8
{Firewall} 10-31-2020 15:33:44 drop this packet for psd
{Firewall} 10-31-2020 17:54:11 DoS attack: UDP Port Scan from source:
103.145.13.237:5176
{Firewall} 10-31-2020 17:54:11 drop this packet for psd
{Firewall} 11-01-2020 00:34:17 DoS attack: TCP Port Scan from source:
185.39.10.124:52448
{Firewall} 11-01-2020 00:34:17 drop this packet for psd
{Firewall} 11-01-2020 00:54:44 DoS attack: UDP Port Scan from source:
103.145.13.18:5228
{Firewall} 11-01-2020 00:54:44 drop this packet for psd
{Firewall} 11-01-2020 03:56:35 DoS attack: TCP Port Scan from source:
94.102.49.97:44567
{Firewall} 11-01-2020 03:56:35 drop this packet for psd
{Firewall} 11-01-2020 06:45:37 DoS attack: TCP Port Scan from source:
92.63.197.53:41994
{Firewall} 11-01-2020 06:45:37 drop this packet for psd
{System} 11-01-2020 06:55:47 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-01-2020 06:56:16 Sync up with NTP Server successfully, 2020-11-
01T06:56:16Z.
{System} 11-01-2020 06:56:18 TR069 connects to ACS server success.
{Firewall} 11-01-2020 10:48:39 DoS attack: TCP Port Scan from source:
89.248.174.199:49310
{Firewall} 11-01-2020 10:48:39 drop this packet for psd
{System} 11-01-2020 17:45:40 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-01-2020 17:46:09 Sync up with NTP Server successfully, 2020-11-
01T17:46:09Z.
{System} 11-01-2020 17:46:11 TR069 connects to ACS server success.
{System} 11-01-2020 18:02:24 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:02:52 Sync up with NTP Server successfully, 2020-11-
01T18:02:52Z.
{System} 11-01-2020 18:02:54 TR069 connects to ACS server success.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:17:08 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-01-2020 18:18:36 Sync up with NTP Server successfully, 2020-11-
01T18:18:36Z.
{System} 11-01-2020 18:18:38 TR069 connects to ACS server success.
{Firewall} 11-01-2020 18:25:31 DoS attack: UDP Port Scan from source:
45.143.221.18:5927
{Firewall} 11-01-2020 18:25:31 drop this packet for psd
{Firewall} 11-01-2020 18:25:31 DoS attack: TCP Port Scan from source:
185.156.73.64:61000
{Firewall} 11-01-2020 18:25:31 drop this packet for psd
{Firewall} 11-01-2020 18:38:32 DoS attack: TCP Port Scan from source:
121.13.252.53:2409
{Firewall} 11-01-2020 18:38:32 drop this packet for psd
{Firewall} 11-01-2020 19:34:00 DoS attack: TCP Port Scan from source:
45.129.33.45:54664
{Firewall} 11-01-2020 19:34:00 drop this packet for psd
{Firewall} 11-01-2020 19:46:48 DoS attack: UDP Port Scan from source:
128.90.187.190:5060
{Firewall} 11-01-2020 19:46:48 drop this packet for psd
{Firewall} 11-01-2020 20:18:29 DoS attack: TCP Port Scan from source:
80.82.78.20:43497
{Firewall} 11-01-2020 20:18:29 drop this packet for psd
{Firewall} 11-02-2020 05:44:43 DoS attack: TCP Port Scan from source:
80.82.65.60:57476
{Firewall} 11-02-2020 05:44:43 drop this packet for psd
{Firewall} 11-02-2020 06:41:44 DoS attack: TCP Port Scan from source:
80.82.77.215:40894
{Firewall} 11-02-2020 06:41:44 drop this packet for psd
{Firewall} 11-02-2020 15:16:26 DoS attack: TCP Port Scan from source:
80.82.64.242:51780
{Firewall} 11-02-2020 15:16:26 drop this packet for psd
{Firewall} 11-02-2020 16:01:07 DoS attack: TCP Port Scan from source:
185.175.93.14:50484
{Firewall} 11-02-2020 16:01:07 drop this packet for psd
{Firewall} 11-02-2020 19:25:28 DoS attack: TCP Port Scan from source:
89.248.172.232:46717
{Firewall} 11-02-2020 19:25:28 drop this packet for psd
{Firewall} 11-02-2020 19:50:14 DoS attack: TCP Port Scan from source:
202.29.14.121:6000
{Firewall} 11-02-2020 19:50:14 drop this packet for psd
{Firewall} 11-02-2020 21:14:31 DoS attack: TCP Port Scan from source:
94.102.49.104:53261
{Firewall} 11-02-2020 21:14:31 drop this packet for psd
{Firewall} 11-03-2020 00:33:51 DoS attack: TCP Port Scan from source:
80.82.77.132:45223
{Firewall} 11-03-2020 00:33:51 drop this packet for psd
{Firewall} 11-03-2020 03:31:21 DoS attack: ICMP Flood from source:
2001:0250:0200:0007:0250:56ff:fe8b:7f41
{Firewall} 11-03-2020 03:31:21 drop this packet for icmp flood
{Firewall} 11-03-2020 07:57:12 DoS attack: TCP Port Scan from source:
185.216.140.249:51825
{Firewall} 11-03-2020 07:57:12 drop this packet for psd
{Firewall} 11-03-2020 08:51:21 DoS attack: TCP Port Scan from source:
73.103.18.182:63464
{Firewall} 11-03-2020 08:51:21 drop this packet for psd
{Firewall} 11-03-2020 16:37:56 DoS attack: TCP Port Scan from source:
185.39.10.14:43069
{Firewall} 11-03-2020 16:37:56 drop this packet for psd
{Firewall} 11-03-2020 16:48:02 DoS attack: TCP Port Scan from source:
94.102.49.93:43672
{Firewall} 11-03-2020 16:48:02 drop this packet for psd
{Firewall} 11-03-2020 20:34:46 DoS attack: TCP Port Scan from source:
80.82.70.168:57275
{Firewall} 11-03-2020 20:34:46 drop this packet for psd
{Firewall} 11-03-2020 22:35:10 DoS attack: TCP Port Scan from source:
185.39.10.124:44501
{Firewall} 11-03-2020 22:35:10 drop this packet for psd
{Firewall} 11-04-2020 03:55:29 DoS attack: TCP Port Scan from source:
183.131.157.114:6000
{Firewall} 11-04-2020 03:55:29 drop this packet for psd
{Firewall} 11-04-2020 05:12:54 DoS attack: TCP Port Scan from source:
94.102.49.137:48365
{Firewall} 11-04-2020 05:12:54 drop this packet for psd
{Firewall} 11-04-2020 06:38:41 DoS attack: TCP Port Scan from source:
89.248.171.134:53514
{Firewall} 11-04-2020 06:38:41 drop this packet for psd
{Firewall} 11-04-2020 09:17:57 DoS attack: TCP Port Scan from source:
94.102.49.97:43070
{Firewall} 11-04-2020 09:17:57 drop this packet for psd
{Firewall} 11-04-2020 17:00:43 DoS attack: UDP Port Scan from source:
103.145.13.18:5113
{Firewall} 11-04-2020 17:00:43 drop this packet for psd
{Firewall} 11-04-2020 18:31:14 DoS attack: TCP Port Scan from source:
94.102.49.98:56265
{Firewall} 11-04-2020 18:31:14 drop this packet for psd
{Firewall} 11-04-2020 21:51:13 DoS attack: TCP Port Scan from source:
89.248.172.20:48264
{Firewall} 11-04-2020 21:51:13 drop this packet for psd
{Firewall} 11-04-2020 23:06:39 DoS attack: UDP Port Scan from source:
103.145.13.237:5066
{Firewall} 11-04-2020 23:06:39 drop this packet for psd
{Firewall} 11-05-2020 00:27:03 DoS attack: TCP Port Scan from source:
94.102.49.98:57616
{Firewall} 11-05-2020 00:27:03 drop this packet for psd
{Firewall} 11-05-2020 10:25:27 DoS attack: TCP Port Scan from source:
80.82.77.146:53518
{Firewall} 11-05-2020 10:25:27 drop this packet for psd
{Firewall} 11-05-2020 11:46:20 DoS attack: TCP Port Scan from source:
80.82.78.20:58373
{Firewall} 11-05-2020 11:46:20 drop this packet for psd
{Firewall} 11-05-2020 20:31:52 DoS attack: TCP Port Scan from source:
185.39.11.109:49904
{Firewall} 11-05-2020 20:31:52 drop this packet for psd
{Firewall} 11-06-2020 02:09:24 DoS attack: TCP Port Scan from source:
185.39.8.30:50156
{Firewall} 11-06-2020 02:09:24 drop this packet for psd
{Firewall} 11-06-2020 02:12:36 DoS attack: UDP Port Scan from source:
37.49.229.52:5286
{Firewall} 11-06-2020 02:12:36 drop this packet for psd
{Firewall} 11-06-2020 02:45:09 DoS attack: TCP Port Scan from source:
80.82.65.60:52300
{Firewall} 11-06-2020 02:45:09 drop this packet for psd
{Firewall} 11-06-2020 03:17:36 DoS attack: TCP Port Scan from source:
83.69.215.130:6000
{Firewall} 11-06-2020 03:17:36 drop this packet for psd
{Firewall} 11-06-2020 09:11:01 DoS attack: TCP Port Scan from source:
185.39.10.14:55454
{Firewall} 11-06-2020 09:11:01 drop this packet for psd
{Firewall} 11-06-2020 14:53:00 DoS attack: TCP Port Scan from source:
80.82.65.62:55968
{Firewall} 11-06-2020 14:53:00 drop this packet for psd
{Firewall} 11-06-2020 16:48:22 DoS attack: TCP Port Scan from source:
94.102.49.117:42891
{Firewall} 11-06-2020 16:48:22 drop this packet for psd
{Firewall} 11-06-2020 16:50:32 DoS attack: TCP Port Scan from source:
80.82.77.235:43023
{Firewall} 11-06-2020 16:50:32 drop this packet for psd
{Firewall} 11-07-2020 16:14:43 DoS attack: TCP Port Scan from source:
80.82.65.62:47274
{Firewall} 11-07-2020 16:14:43 drop this packet for psd
{Firewall} 11-08-2020 01:25:05 DoS attack: UDP Port Scan from source:
45.143.221.18:6531
{Firewall} 11-08-2020 01:25:05 drop this packet for psd
{Firewall} 11-08-2020 02:52:32 DoS attack: TCP Port Scan from source:
89.248.171.134:45547
{Firewall} 11-08-2020 02:52:32 drop this packet for psd
{Firewall} 11-08-2020 04:56:24 DoS attack: TCP Port Scan from source:
80.82.70.168:52976
{Firewall} 11-08-2020 04:56:24 drop this packet for psd
{Firewall} 11-08-2020 15:12:16 DoS attack: UDP Port Scan from source:
103.145.13.18:5250
{Firewall} 11-08-2020 15:12:16 drop this packet for psd
{Firewall} 11-08-2020 18:28:44 DoS attack: TCP Port Scan from source:
89.248.171.134:41714
{Firewall} 11-08-2020 18:28:44 drop this packet for psd
{Firewall} 11-08-2020 19:11:15 DoS attack: UDP Port Scan from source:
103.145.13.237:5113
{Firewall} 11-08-2020 19:11:15 drop this packet for psd
{Firewall} 11-08-2020 20:59:01 DoS attack: TCP Port Scan from source:
80.82.70.168:50732
{Firewall} 11-08-2020 20:59:01 drop this packet for psd
{Firewall} 11-08-2020 22:58:49 DoS attack: UDP Port Scan from source:
45.143.221.18:6533
{Firewall} 11-08-2020 22:58:49 drop this packet for psd
{Firewall} 11-09-2020 00:09:52 DoS attack: TCP Port Scan from source:
93.174.93.27:42183
{Firewall} 11-09-2020 00:09:52 drop this packet for psd
{Firewall} 11-09-2020 02:49:40 DoS attack: UDP Port Scan from source:
37.49.229.52:5431
{Firewall} 11-09-2020 02:49:40 drop this packet for psd
{Firewall} 11-09-2020 12:34:26 DoS attack: TCP Port Scan from source:
89.248.172.48:46855
{Firewall} 11-09-2020 12:34:26 drop this packet for psd
{Firewall} 11-09-2020 19:25:23 DoS attack: TCP Port Scan from source:
185.39.10.124:51512
{Firewall} 11-09-2020 19:25:23 drop this packet for psd
{Firewall} 11-10-2020 01:15:01 DoS attack: TCP Port Scan from source:
80.82.77.146:52493
{Firewall} 11-10-2020 01:15:01 drop this packet for psd
{Firewall} 11-10-2020 07:06:47 DoS attack: TCP Port Scan from source:
89.248.171.134:53599
{Firewall} 11-10-2020 07:06:47 drop this packet for psd
{Firewall} 11-10-2020 07:09:37 DoS attack: TCP Port Scan from source:
80.82.70.189:53771
{Firewall} 11-10-2020 07:09:37 drop this packet for psd
{Firewall} 11-10-2020 13:56:09 DoS attack: TCP Port Scan from source:
185.216.140.32:58160
{Firewall} 11-10-2020 13:56:09 drop this packet for psd
{Firewall} 11-10-2020 18:28:35 DoS attack: TCP Port Scan from source:
89.248.162.179:54508
{Firewall} 11-10-2020 18:28:35 drop this packet for psd
{Firewall} 11-10-2020 23:39:07 DoS attack: TCP Port Scan from source:
94.102.49.117:53138
{Firewall} 11-10-2020 23:39:07 drop this packet for psd
{Firewall} 11-11-2020 02:39:11 DoS attack: TCP Port Scan from source:
80.82.70.168:43941
{Firewall} 11-11-2020 02:39:11 drop this packet for psd
{Firewall} 11-11-2020 05:24:35 DoS attack: TCP Port Scan from source:
94.102.49.137:53866
{Firewall} 11-11-2020 05:24:35 drop this packet for psd
{Firewall} 11-11-2020 09:31:16 DoS attack: UDP Port Scan from source:
195.154.221.174:5115
{Firewall} 11-11-2020 09:31:16 drop this packet for psd
{Firewall} 11-11-2020 15:16:24 DoS attack: TCP Port Scan from source:
80.82.77.146:49373
{Firewall} 11-11-2020 15:16:24 drop this packet for psd
{Firewall} 11-11-2020 22:11:32 DoS attack: TCP Port Scan from source:
89.248.162.179:54283
{Firewall} 11-11-2020 22:11:32 drop this packet for psd
{Firewall} 11-12-2020 03:27:31 DoS attack: TCP Port Scan from source:
94.102.49.98:53241
{Firewall} 11-12-2020 03:27:31 drop this packet for psd
{Firewall} 11-12-2020 03:36:13 DoS attack: TCP Port Scan from source:
80.82.70.189:53765
{Firewall} 11-12-2020 03:36:13 drop this packet for psd
{Firewall} 11-12-2020 03:56:55 DoS attack: TCP Port Scan from source:
185.216.140.249:55007
{Firewall} 11-12-2020 03:56:55 drop this packet for psd
{Firewall} 11-12-2020 09:08:01 DoS attack: TCP Port Scan from source:
80.82.65.60:53671
{Firewall} 11-12-2020 09:08:01 drop this packet for psd
{Firewall} 11-12-2020 16:43:37 DoS attack: TCP Port Scan from source:
185.39.11.122:41008
{Firewall} 11-12-2020 16:43:37 drop this packet for psd
{Firewall} 11-12-2020 21:20:07 DoS attack: UDP Port Scan from source:
72.251.235.116:45878
{Firewall} 11-12-2020 21:20:07 drop this packet for psd
{Firewall} 11-13-2020 05:30:37 DoS attack: TCP Port Scan from source:
89.248.162.146:47030
{Firewall} 11-13-2020 05:30:37 drop this packet for psd
{Firewall} 11-13-2020 08:34:19 DoS attack: TCP Port Scan from source:
89.248.162.179:58051
{Firewall} 11-13-2020 08:34:19 drop this packet for psd
{Firewall} 11-13-2020 18:18:08 DoS attack: TCP Port Scan from source:
89.248.172.232:53081
{Firewall} 11-13-2020 18:18:08 drop this packet for psd
{Firewall} 11-13-2020 18:55:12 DoS attack: TCP Port Scan from source:
80.82.78.20:55295
{Firewall} 11-13-2020 18:55:12 drop this packet for psd
{System} 11-13-2020 20:01:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:02:15 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:02:38 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:03:13 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:04:20 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:06:55 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:10:50 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:16:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:29:21 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 20:50:54 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-13-2020 22:58:11 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:58:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:58:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 22:59:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:00:30 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:02:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:05:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:15:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:26:35 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-13-2020 23:52:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 11-14-2020 00:53:01 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:53:12 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:53:34 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:54:13 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:55:20 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 00:57:23 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:00:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:10:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:21:25 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:29:00 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 2160 seconds
{System} 11-14-2020 01:30:08 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:30:19 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:30:43 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:31:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:32:14 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:34:33 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:37:56 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:46:39 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 01:59:38 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 02:25:25 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 03:42:24 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 04:42:19 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 05:50:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 06:50:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 07:50:36 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-14-2020 11:15:44 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:15:55 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:16:22 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:16:54 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 11:18:09 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 11-14-2020 19:19:29 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:19:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:20:07 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:20:46 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:22:01 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:24:04 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:27:59 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:34:34 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 19:49:41 TR069 connects to ACS server failed, couldn't resolve.
{System} 11-14-2020 20:11:14 TR069 connects to ACS server failed, couldn't resolve.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:01:54 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:37:55 UDP flood attack from LAN has been detected,
SRC=192.168.1.65 DST=192.168.1.254 PROTO=UDP SPT=64628 DPT=53 LEN=39
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:12:29 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=38520 DPT=53 LEN=51
{System} 01-01-1970 00:13:08 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:04:27 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=22198 DPT=53 LEN=43
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:03:40 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:16:54 Requested to reboot by web client 192.168.1.69.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 960 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup 960 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:09:39 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:05:43 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:20:45 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 01:22:31 Requested to reboot by web client 192.168.1.65.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 4920 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:06:15 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:16:43 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=38916 DPT=53 LEN=45
{Firewall} 01-01-1970 00:22:20 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=54438 DPT=53 LEN=43
{Firewall} 01-01-1970 00:38:19 UDP flood attack from LAN has been detected,
SRC=192.168.1.64 DST=192.168.1.254 PROTO=UDP SPT=60288 DPT=53 LEN=42
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:16:37 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{Firewall} 01-01-1970 00:39:54 UDP flood attack from LAN has been detected,
SRC=192.168.1.66 DST=192.168.1.254 PROTO=UDP SPT=10294 DPT=53 LEN=45
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 01-01-1970 02:52:37 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:04:54 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_UNKNOW ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:11:32 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 660 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_POWER_OFF ,last bootup -1 seconds
{System} 01-01-1970 00:06:20 Restore facroty defaults by Restore Button.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 360 seconds
{System} 01-01-1970 00:18:53 Restore factory defaults by web client 192.168.1.64.
{System} 01-01-1970 00:00:12 Boot up successfully, duration is 12 seconds.Boot up
reason: REBOOT_TRIGGER_BY_USER ,last bootup 1080 seconds
[GPON] 01-01-1970 00:00:12 Starting GPON interface OK.
[System] 01-01-1970 00:00:12 Register watchdog (umcid)
[System] 01-01-1970 00:00:12 Register watchdog (network_manager)
[GPON] 01-01-1970 00:00:12 OLT reset the OMCI mib.
[Firewall] 01-01-1970 00:00:15 Firewall Block Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Spoof Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 UDP Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 ICMP Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP SYN Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP FIN Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 Port Scan Per IP Flood Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Land Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 IP Broadcast Source Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP Syn With Data Detect has been enabled.
[Firewall] 01-01-1970 00:00:15 TCP Syn With Data Detect has been disabled.
[IPTV] 01-01-1970 00:00:15 Start IPTV OK
[System] 01-01-1970 00:00:16 Line is disabled or not config account
[WIFI] 01-01-1970 00:00:16 WiFi Init..
[IPTV] 01-01-1970 00:00:16 LAN send out a general query.
[System] 01-01-1970 00:00:17 LAN Port [2] connected, Link Speed: [100M F].
[System] 01-01-1970 00:00:17 LAN Port [3] connected, Link Speed: [1G F].
[System] 01-01-1970 00:00:23 Register watchdog (temp_monitor)
[System] 01-01-1970 00:00:23 Register watchdog (optical_monitor)
[System] 01-01-1970 00:00:23 RX Power (-2147483.75)dbm is lower than the threshold
(-28.00)dbm
[System] 01-01-1970 00:00:23 TX Power (-2147483.75)dbm is lower than the threshold
(0.50)dbm
[Firewall] 01-01-1970 00:00:23 Fireall Level has been set to Medium.
[Firewall] 01-01-1970 00:00:23 Local UDP Flood Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local ICMP Flood Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local Winnuke Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local LAN Source Detect has been enabled.
[Firewall] 01-01-1970 00:00:23 Local Smurf Detect has been enabled on LAN.
[Firewall] 01-01-1970 00:00:23 Local Frament Flood Detect has been enabled on LAN.
[LAN] 01-01-1970 00:00:23 DHCP Server Started
[System] 01-01-1970 00:00:24 LAN Port [2] disconnected.
[System] 01-01-1970 00:00:24 LAN Port [3] disconnected.
[IPTV] 01-01-1970 00:00:24 LAN send out a general query.
[System] 01-01-1970 00:00:25 LAN Port [2] connected, Link Speed: [100M F].
[WIFI] 01-01-1970 00:00:26 channel score,che03a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che06a:bss0 intfadj1 cns-90 tol1
[WIFI] 01-01-1970 00:00:26 channel score,che08a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che09b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che13a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che16a:bss0 intfadj1 cns-90 tol1
[WIFI] 01-01-1970 00:00:26 channel score,che18a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che19b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che23a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che26a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che28a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che29b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che33a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che36a:bss0 intfadj0 cns-90 tol0
[WIFI] 01-01-1970 00:00:26 channel score,che39b:bss0 intfadj0 cns-89 tol0
[WIFI] 01-01-1970 00:00:26 5G select auto channel :100
[UPnP] 01-01-1970 00:00:27 HTTP listening on port 49152
[UPnP] 01-01-1970 00:00:27 Starting UPnP IGD OK.
[LAN] 01-01-1970 00:00:27 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:00:27 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[WIFI] 01-01-1970 00:00:27 channel score,ch1001:bss1 intfadj1 cns-78 tol0
[WIFI] 01-01-1970 00:00:27 channel score,ch1006:bss4 intfadj2 cns-78 tol-2
[WIFI] 01-01-1970 00:00:27 channel score,ch100b:bss1 intfadj5 cns-62 tol4
[WIFI] 01-01-1970 00:00:27 2.4G select auto channel :11
[WIFI] 01-01-1970 00:00:27 acsd run
[System] 01-01-1970 00:00:28 LAN Port [3] connected, Link Speed: [1G F].
[System] 01-01-1970 00:00:31 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:00:31 User logout via HTTP from 192.168.1.64
[LAN] 01-01-1970 00:00:32 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:32 Send NAK to client ip [0.0.0.0] mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:33 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:34 Successfully assign IP [192.168.1.65] to client mac
[00:18:8b:04:67:30], lease time [86400]
[System] 01-01-1970 00:00:35 User 'TELMEX' login failed via HTTP from 192.168.1.64
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 00:00:37 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[System] 01-01-1970 00:00:54 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[LAN] 01-01-1970 00:01:29 Received INFORM from client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 00:01:29 Send Information to client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[IPTV] 01-01-1970 00:02:29 LAN send out a general query.
[IPTV] 01-01-1970 00:04:34 LAN send out a general query.
[IPTV] 01-01-1970 00:06:39 LAN send out a general query.
[IPTV] 01-01-1970 00:08:44 LAN send out a general query.
[IPTV] 01-01-1970 00:10:49 LAN send out a general query.
[IPTV] 01-01-1970 00:12:54 LAN send out a general query.
[WIFI] 01-01-1970 00:14:18 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 ASSOC(8) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:14:18 Authorized sta:cc:9f:7a:6a:1d:fe intf wl1
[LAN] 01-01-1970 00:14:18 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:19 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:19 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[LAN] 01-01-1970 00:14:20 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:14:20 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[IPTV] 01-01-1970 00:14:59 LAN send out a general query.
[WIFI] 01-01-1970 00:15:06 DEAUTH(6) reason3 send to sta:cc:9f:7a:6a:1d:fe intf wl1
[WIFI] 01-01-1970 00:15:06 DISASSOC(12) reason8 send to sta:cc:9f:7a:6a:1d:fe intf
wl1
[IPTV] 01-01-1970 00:17:04 LAN send out a general query.
[IPTV] 01-01-1970 00:19:09 LAN send out a general query.
[System] 01-01-1970 00:20:08 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:20:08 User logout via HTTP from 192.168.1.64
[IPTV] 01-01-1970 00:21:14 LAN send out a general query.
[IPTV] 01-01-1970 00:23:19 LAN send out a general query.
[IPTV] 01-01-1970 00:25:24 LAN send out a general query.
[IPTV] 01-01-1970 00:27:29 LAN send out a general query.
[WIFI] 01-01-1970 00:27:55 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 AUTH(4) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 ASSOC(8) send to sta:cc:9f:7a:6a:1d:fe
[WIFI] 01-01-1970 00:27:55 Authorized sta:cc:9f:7a:6a:1d:fe intf wl1
[LAN] 01-01-1970 00:27:56 Received DISCOVER from client mac [cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Send OFFER of ip [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Received REQUEST from client ip [0.0.0.0] mac
[cc:9f:7a:6a:1d:fe]
[LAN] 01-01-1970 00:27:56 Successfully assign IP [192.168.1.66] to client mac
[cc:9f:7a:6a:1d:fe], lease time [86400]
[WIFI] 01-01-1970 00:28:26 DEAUTH(6) reason3 send to sta:cc:9f:7a:6a:1d:fe intf wl1
[WIFI] 01-01-1970 00:28:26 DISASSOC(12) reason8 send to sta:cc:9f:7a:6a:1d:fe intf
wl1
[IPTV] 01-01-1970 00:29:34 LAN send out a general query.
[System] 01-01-1970 00:30:54 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:31:39 LAN send out a general query.
[System] 01-01-1970 00:32:27 LAN Port [3] disconnected.
[IPTV] 01-01-1970 00:33:44 LAN send out a general query.
[System] 01-01-1970 00:34:29 LAN Port [2] disconnected.
[LAN] 01-01-1970 00:34:33 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:34:33 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[System] 01-01-1970 00:34:33 LAN Port [1] connected, Link Speed: [100M F].
[IPTV] 01-01-1970 00:35:49 LAN send out a general query.
[IPTV] 01-01-1970 00:37:54 LAN send out a general query.
[IPTV] 01-01-1970 00:39:59 LAN send out a general query.
[IPTV] 01-01-1970 00:42:04 LAN send out a general query.
[System] 01-01-1970 00:43:59 User logout via HTTP from 192.168.1.64
[IPTV] 01-01-1970 00:44:09 LAN send out a general query.
[System] 01-01-1970 00:44:25 User 'TELMEX' login failed via HTTP from 192.168.1.64
[System] 01-01-1970 00:44:44 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[System] 01-01-1970 00:45:31 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:45:53 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:46:14 LAN send out a general query.
[IPTV] 01-01-1970 00:48:19 LAN send out a general query.
[System] 01-01-1970 00:49:15 LAN Port [1] disconnected.
[System] 01-01-1970 00:49:29 LAN Port [1] connected, Link Speed: [10M H].
[System] 01-01-1970 00:49:33 LAN Port [1] disconnected.
[System] 01-01-1970 00:49:35 LAN Port [1] connected, Link Speed: [100M F].
[LAN] 01-01-1970 00:49:36 Received REQUEST from client ip [0.0.0.0] mac
[00:26:6c:1b:c2:18]
[LAN] 01-01-1970 00:49:36 Successfully assign IP [192.168.1.64] to client mac
[00:26:6c:1b:c2:18], lease time [86400]
[IPTV] 01-01-1970 00:50:24 LAN send out a general query.
[System] 01-01-1970 00:50:35 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:52:03 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:52:27 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:52:29 LAN send out a general query.
[IPTV] 01-01-1970 00:54:34 LAN send out a general query.
[UPnP] 01-01-1970 00:55:51 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a16830954567 Success.
[UPnP] 01-01-1970 00:55:51 upnp_event_send: sending event notify message to
192.168.1.64::2869
[UPnP] 01-01-1970 00:55:51 upnp_event_send: msg: NOTIFY /upnp/eventing/vwybnzoqeg
HTTP/1.1Host: 192.168.1.64:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a16830954567SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[UPnP] 01-01-1970 00:55:51 Notify Client: UUID=uuid:fc4ec57e-28b1-11db-88f8-
a168309523c6 Success.
[UPnP] 01-01-1970 00:55:51 upnp_event_send: sending event notify message to
192.168.1.64::2869
[UPnP] 01-01-1970 00:55:51 upnp_event_send: msg: NOTIFY /upnp/eventing/fdsrcogixi
HTTP/1.1Host: 192.168.1.64:2869Content-Type: text/xmlContent-Length: 142NT:
upnp:eventNTS: upnp:propchangeSID: uuid:fc4ec57e-28b1-11db-88f8-a168309523c6SEQ:
0Connection: closeCache-Control: no-cache<e:propertyset xmlns:e="urn:schemas-upnp-
org:event-1-
0"><e:property><PhysicalLinkStatus>Up</PhysicalLinkStatus></e:property></e:property
set>
[IPTV] 01-01-1970 00:56:39 LAN send out a general query.
[System] 01-01-1970 00:56:54 User logout via HTTP from 192.168.1.64
[System] 01-01-1970 00:57:29 User 'TELMEX' login successfully via HTTP from
192.168.1.64
[IPTV] 01-01-1970 00:58:44 LAN send out a general query.
[System] 01-01-1970 00:58:56 LAN Port [1] disconnected.
[System] 01-01-1970 00:58:58 LAN Port [1] connected, Link Speed: [100M F].
[LAN] 01-01-1970 00:59:10 Received DISCOVER from client mac [44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Send OFFER of ip [192.168.1.67] to client mac
[44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Received REQUEST from client ip [0.0.0.0] mac
[44:6d:57:ec:3a:96]
[LAN] 01-01-1970 00:59:11 Successfully assign IP [192.168.1.67] to client mac
[44:6d:57:ec:3a:96], lease time [86400]
[System] 01-01-1970 00:59:40 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 00:59:40 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 01:00:06 User 'TELMEX' login successfully via HTTP from
192.168.1.67
[WIFI] 01-01-1970 01:00:30 channel score,ch1001:bss1 intfadj0 cns-77 tol-1
[WIFI] 01-01-1970 01:00:30 channel score,ch1006:bss5 intfadj1 cns-75 tol-4
[WIFI] 01-01-1970 01:00:30 channel score,ch100b:bss5 intfadj4 cns-85 tol-1
[WIFI] 01-01-1970 01:00:30 2.4G select auto channel :1
[IPTV] 01-01-1970 01:00:49 LAN send out a general query.
[System] 01-01-1970 01:01:35 LAN Port [4] connected, Link Speed: [1G F].
[LAN] 01-01-1970 01:01:36 Received REQUEST from client ip [0.0.0.0] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:36 Successfully assign IP [192.168.1.65] to client mac
[00:18:8b:04:67:30], lease time [86400]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Received DISCOVER from client mac [00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:39 Send OFFER of ip [192.168.1.65] to client mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:45 Received INFORM from client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[LAN] 01-01-1970 01:01:45 Send Information to client ip [192.168.1.65] mac
[00:18:8b:04:67:30]
[IPTV] 01-01-1970 01:02:54 LAN send out a general query.
[System] 01-01-1970 01:04:15 User logout via HTTP from 192.168.1.65
[System] 01-01-1970 01:04:41 User 'TELMEX' login failed via HTTP from 192.168.1.65
[System] 01-01-1970 01:04:59 User 'TELMEX' login failed via HTTP from 192.168.1.65
[IPTV] 01-01-1970 01:04:59 LAN send out a general query.
[System] 01-01-1970 01:05:04 User 'TELMEX' login failed via HTTP from 192.168.1.65
[System] 01-01-1970 01:05:28 User logout via HTTP from 192.168.1.67
[System] 01-01-1970 01:06:09 User 'TELMEX' login successfully via HTTP from
192.168.1.65
[IPTV] 01-01-1970 01:07:04 LAN send out a general query.
[UPnP] 01-01-1970 01:08:12 Success to broadcast good-bye notifications
[IPTV] 01-01-1970 01:09:09 LAN send out a general query.
[IPTV] 01-01-1970 01:11:14 LAN send out a general query.

You might also like