Problem loading web pages

Ok! It looks like it took about roughly three months for this problem to rear it’s ugly head again. It stopped working this afternoon after having worked first thing in the morning when I powered on the IPfire router. About four hours later of the router being on the whole time, I go to check a web page and nothing loads. I’m currently connected to the Internet with the WAN ethernet cable directly into my desktop PC, so I know the connection does work. IPfire is updated to the most current version 2.25 CU 157.

I’ve looked at /var/log/messages and have not found anything obvious the way it was last time, but I’m admittedly not an expert with this. Interestingly enough, the problem displays itself differently than last time when I first started this thread here. When I log into the IPfire web admin page, it shows red is connected, but I cannot access anything on the internet through the router. Where as it used to show red not being able to connect.

I’m not very familiar with this forum in how it works and how many lines of code are expected to be posted. I’m getting a error message of too many characters in my post when I add the pieces of messages log. I’ll post those logs in separate posts.

/var/log/messages

From this morning of IPfire booting when it was working and could access the internet through it.

Jul 5 23:25:10 ipfire exiting on signal 15
Jul 6 08:40:13 ipfire syslogd 1.5.1: restart (remote reception).
Jul 6 08:40:13 ipfire unbound: [13294:0] notice: init module 0: validator
Jul 6 08:40:13 ipfire unbound: [13294:0] notice: init module 1: iterator
Jul 6 08:40:13 ipfire unbound: [13294:0] info: start of service (unbound 1.13.1).
Jul 6 08:40:13 ipfire unbound: [13294:0] error: SERVFAIL <. DNSKEY IN>: exceeded the maximum nameserver nxdomains
Jul 6 08:40:13 ipfire acpid: starting up with netlink and the input layer
Jul 6 08:40:13 ipfire acpid: 1 rule loaded
Jul 6 08:40:13 ipfire acpid: waiting for events: event logging is off
Jul 6 08:40:16 ipfire dhcpcd[13472]: dhcpcd-9.1.4 starting
Jul 6 08:40:16 ipfire dhcpcd[13474]: DUID 00:01:00:01:27:e7:70:30:00:0d:b9:53:e2:a0
Jul 6 08:40:16 ipfire kernel: 8021q: 802.1Q VLAN Support v1.8
Jul 6 08:40:16 ipfire kernel: 8021q: adding VLAN 0 to HW filter on device green0
Jul 6 08:40:16 ipfire kernel: 8021q: adding VLAN 0 to HW filter on device red0
Jul 6 08:40:16 ipfire dhcpcd[13474]: red0: waiting for carrier
Jul 6 08:40:18 ipfire kernel: igb 0000:01:00.0 green0: igb: green0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX
Jul 6 08:40:19 ipfire dhcpcd[13474]: red0: carrier acquired
Jul 6 08:40:19 ipfire kernel: igb 0000:02:00.0 red0: igb: red0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
Jul 6 08:40:19 ipfire dhcpcd[13474]: red0: IAID b9:53:e2:a1
Jul 6 08:40:19 ipfire dhcpcd[13474]: red0: adding address fe80::20d:b9ff:fe53:e2a1
Jul 6 08:40:19 ipfire dhcpcd[13474]: ipv6_addaddr1: Permission denied
Jul 6 08:40:19 ipfire dhcpcd[13474]: red0: soliciting a DHCP lease
Jul 6 08:40:19 ipfire dhcpcd[13474]: red0: soliciting an IPv6 router
Jul 6 08:40:24 ipfire dhcpcd[13474]: red0: offered 69.5.116.32 from 204.13.41.66
Jul 6 08:40:24 ipfire dhcpcd[13474]: red0: probing address 69.5.116.32/24
Jul 6 08:40:28 ipfire dhcpcd[13474]: red0: leased 69.5.116.32 for 7200 seconds
Jul 6 08:40:28 ipfire dhcpcd[13474]: red0: adding route to 69.5.116.0/24
Jul 6 08:40:28 ipfire dhcpcd[13474]: red0: adding default route via 69.5.116.1
Jul 6 08:40:29 ipfire dhcpcd.exe[13527]: red0 has been (re)configured with IP=69.5.116.32
Jul 6 08:40:30 ipfire unbound: [13294:0] info: service stopped (unbound 1.13.1).
Jul 6 08:40:30 ipfire unbound: [13294:0] info: server stats for thread 0: 0 queries, 0 answers from cache, 0 recursions, 0 prefetch, 0 rejected by ip ratelimiting
Jul 6 08:40:30 ipfire unbound: [13294:0] info: server stats for thread 0: requestlist max 0 avg 0 exceeded 0 jostled 0
Jul 6 08:40:30 ipfire unbound: [13294:0] notice: Restart of unbound 1.13.1.
Jul 6 08:40:30 ipfire unbound: [13294:0] notice: init module 0: validator
Jul 6 08:40:30 ipfire unbound: [13294:0] notice: init module 1: iterator
Jul 6 08:40:30 ipfire unbound: [13294:0] info: start of service (unbound 1.13.1).
Jul 6 08:40:30 ipfire unbound: [13294:0] info: generate keytag query _ta-4a5c-4f66. NULL IN
Jul 6 08:40:41 ipfire saslauthd[14084]: detach_tty : master pid is: 14084
Jul 6 08:40:41 ipfire saslauthd[14084]: ipc_init : listening on socket: /var/run/saslauthd/mux
Jul 6 08:40:43 ipfire pakfire: PAKFIRE INFO: IPFire Pakfire 2.25-x86_64 started!
Jul 6 08:40:43 ipfire pakfire: MIRROR INFO: server-list.db is 43545 seconds old. - DEBUG: force
Jul 6 08:40:43 ipfire pakfire: DOWNLOAD STARTED: 2.25-x86_64/lists/server-list.db
Jul 6 08:40:43 ipfire pakfire: DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTPS) - File: 2.25-x86_64/lists/server-list.db
Jul 6 08:40:43 ipfire pakfire: DOWNLOAD INFO: 2.25-x86_64/lists/server-list.db has size of 2229 bytes
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD INFO: Signature of server-list.db is fine.
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD FINISHED: 2.25-x86_64/lists/server-list.db
Jul 6 08:40:44 ipfire pakfire: DB INFO: packages_list.db is 43544 seconds old. - DEBUG: force
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD STARTED: lists/packages_list.db
Jul 6 08:40:44 ipfire pakfire: MIRROR INFO: 24 servers found in list
Jul 6 08:40:44 ipfire pakfire: DOWNLOAD INFO: Host: quantum-mirror.hu (HTTPS) - File: mirrors/pub/ipfire/pakfire2/2.25-x86_64/lists/packages_list.db
Jul 6 08:40:45 ipfire pakfire: DOWNLOAD INFO: mirrors/pub/ipfire/pakfire2/2.25-x86_64/lists/packages_list.db has size of 4972 bytes
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD INFO: Signature of packages_list.db is fine.
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD FINISHED: mirrors/pub/ipfire/pakfire2/2.25-x86_64/lists/packages_list.db
Jul 6 08:40:46 ipfire pakfire: CORE INFO: core-list.db is 43544 seconds old. - DEBUG: force
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD STARTED: lists/core-list.db
Jul 6 08:40:46 ipfire pakfire: MIRROR INFO: 24 servers found in list
Jul 6 08:40:46 ipfire pakfire: DOWNLOAD INFO: Host: mirror.datacenter.by (HTTPS) - File: pub/ipfire/pakfire2/2.25-x86_64/lists/core-list.db
Jul 6 08:40:47 ipfire pakfire: DOWNLOAD INFO: pub/ipfire/pakfire2/2.25-x86_64/lists/core-list.db has size of 903 bytes
Jul 6 08:40:47 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 08:40:47 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 08:40:47 ipfire pakfire: DOWNLOAD INFO: Signature of core-list.db is fine.
Jul 6 08:40:47 ipfire pakfire: DOWNLOAD FINISHED: pub/ipfire/pakfire2/2.25-x86_64/lists/core-list.db
Jul 6 08:40:47 ipfire pakfire: PAKFIRE INFO: Pakfire has finished. Closing.
Jul 6 08:40:50 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.249 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=8010 PROTO=TCP SPT=59804 DPT=346 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:40:50 ipfire ntpdate[14117]: adjust time server 66.220.9.122 offset -0.036801 sec
Jul 6 08:40:50 ipfire ipfire: NTP synchronisation
Jul 6 08:40:51 ipfire ntpd[14165]: ntpd 4.2.8p15@1.3728-o Mon Feb 22 21:33:50 UTC 2021 (1): Starting
Jul 6 08:40:51 ipfire ntpd[14165]: Command line: /usr/bin/ntpd -Ap /var/run/ntpd.pid
Jul 6 08:40:51 ipfire ntpd[14165]: ----------------------------------------------------
Jul 6 08:40:51 ipfire ntpd[14165]: ntp-4 is maintained by Network Time Foundation,
Jul 6 08:40:51 ipfire ntpd[14165]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
Jul 6 08:40:51 ipfire ntpd[14165]: corporation. Support and training for ntp-4 are
Jul 6 08:40:51 ipfire ntpd[14165]: available at https://www.nwtime.org/support
Jul 6 08:40:51 ipfire ntpd[14165]: ----------------------------------------------------
Jul 6 08:40:51 ipfire ntpd[14167]: proto: precision = 0.307 usec (-22)
Jul 6 08:40:51 ipfire ntpd[14167]: basedate set to 2021-02-10
Jul 6 08:40:51 ipfire ntpd[14167]: gps base set to 2021-02-14 (week 2145)
Jul 6 08:40:51 ipfire ntpd[14167]: Listen and drop on 0 v6wildcard [::]:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listen and drop on 1 v4wildcard 0.0.0.0:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listen normally on 2 lo 127.0.0.1:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listen normally on 3 green0 192.168.0.1:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listen normally on 4 red0 69.5.116.32:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listen normally on 5 blue0 192.168.2.1:123
Jul 6 08:40:51 ipfire ntpd[14167]: Listening on routing socket on fd #22 for interface updates
Jul 6 08:40:51 ipfire ntpd[14167]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jul 6 08:40:51 ipfire ntpd[14167]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jul 6 08:40:51 ipfire collectd[14214]: cpufreq plugin: Found 4 CPUs
Jul 6 08:40:51 ipfire collectd[14214]: Initialization complete, entering read-loop.
Jul 6 08:40:52 ipfire dhcpd: Wrote 3 leases to leases file.
Jul 6 08:40:52 ipfire dhcpd: Server starting service.
Jul 6 08:41:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.17 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=18612 PROTO=TCP SPT=56469 DPT=24225 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:08 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=161.97.70.107 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=18573 PROTO=TCP SPT=40622 DPT=7797 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:13 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.93.201.164 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=19814 PROTO=TCP SPT=58670 DPT=5740 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:17 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.242 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=71 PROTO=TCP SPT=40138 DPT=1128 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:20 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.109 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=36694 PROTO=TCP SPT=40133 DPT=1274 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:37 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=167.172.140.51 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=53570 PROTO=TCP SPT=55059 DPT=2001 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:41:48 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=35565 PROTO=TCP SPT=55008 DPT=28371 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 08:42:05 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.156.73.111 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=3414 PROTO=TCP SPT=47954 DPT=3388 WINDOW=1024 RES=0x00 SYN URGP=0

/var/log/messages

From this afternoon of IPfire booting when I could not access the internet through it.

Jul 6 14:01:57 ipfire exiting on signal 15
Jul 6 16:50:20 ipfire syslogd 1.5.1: restart (remote reception).
Jul 6 16:50:20 ipfire kernel: ath10k_pci 0000:04:00.0 blue0: renamed from wlan0
Jul 6 16:50:20 ipfire kernel: random: crng init done
Jul 6 16:50:20 ipfire kernel: random: 1 urandom warning(s) missed due to ratelimiting
Jul 6 16:50:20 ipfire unbound: [13349:0] notice: init module 0: validator
Jul 6 16:50:20 ipfire unbound: [13349:0] notice: init module 1: iterator
Jul 6 16:50:20 ipfire unbound: [13349:0] info: start of service (unbound 1.13.1).
Jul 6 16:50:20 ipfire acpid: starting up with netlink and the input layer
Jul 6 16:50:20 ipfire acpid: 1 rule loaded
Jul 6 16:50:20 ipfire acpid: waiting for events: event logging is off
Jul 6 16:50:23 ipfire dhcpcd[13526]: dhcpcd-9.1.4 starting
Jul 6 16:50:23 ipfire dhcpcd[13528]: DUID 00:01:00:01:27:e7:70:30:00:0d:b9:53:e2:a0
Jul 6 16:50:23 ipfire kernel: 8021q: 802.1Q VLAN Support v1.8
Jul 6 16:50:23 ipfire kernel: 8021q: adding VLAN 0 to HW filter on device green0
Jul 6 16:50:23 ipfire kernel: 8021q: adding VLAN 0 to HW filter on device red0
Jul 6 16:50:23 ipfire dhcpcd[13528]: red0: waiting for carrier
Jul 6 16:50:25 ipfire kernel: igb 0000:01:00.0 green0: igb: green0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX/TX
Jul 6 16:50:26 ipfire kernel: igb 0000:02:00.0 red0: igb: red0 NIC Link is Up 1000 Mbps Full Duplex, Flow Control: RX
Jul 6 16:50:26 ipfire dhcpcd[13528]: red0: carrier acquired
Jul 6 16:50:26 ipfire dhcpcd[13528]: red0: IAID b9:53:e2:a1
Jul 6 16:50:26 ipfire dhcpcd[13528]: red0: adding address fe80::20d:b9ff:fe53:e2a1
Jul 6 16:50:26 ipfire dhcpcd[13528]: ipv6_addaddr1: Permission denied
Jul 6 16:50:26 ipfire dhcpcd[13528]: red0: soliciting an IPv6 router
Jul 6 16:50:28 ipfire dhcpcd[13528]: red0: soliciting a DHCP lease
Jul 6 16:50:29 ipfire dhcpcd[13528]: red0: offered 69.5.116.32 from 204.13.41.66
Jul 6 16:50:29 ipfire dhcpcd[13528]: red0: probing address 69.5.116.32/24
Jul 6 16:50:34 ipfire dhcpcd[13528]: red0: leased 69.5.116.32 for 7200 seconds
Jul 6 16:50:34 ipfire dhcpcd[13528]: red0: adding route to 69.5.116.0/24
Jul 6 16:50:34 ipfire dhcpcd[13528]: red0: adding default route via 69.5.116.1
Jul 6 16:50:35 ipfire dhcpcd.exe[13581]: red0 has been (re)configured with IP=69.5.116.32
Jul 6 16:50:36 ipfire unbound: [13349:0] info: service stopped (unbound 1.13.1).
Jul 6 16:50:36 ipfire unbound: [13349:0] info: server stats for thread 0: 0 queries, 0 answers from cache, 0 recursions, 0 prefetch, 0 rejected by ip ratelimiting
Jul 6 16:50:36 ipfire unbound: [13349:0] info: server stats for thread 0: requestlist max 0 avg 0 exceeded 0 jostled 0
Jul 6 16:50:36 ipfire unbound: [13349:0] notice: Restart of unbound 1.13.1.
Jul 6 16:50:36 ipfire unbound: [13349:0] notice: init module 0: validator
Jul 6 16:50:36 ipfire unbound: [13349:0] notice: init module 1: iterator
Jul 6 16:50:36 ipfire unbound: [13349:0] info: start of service (unbound 1.13.1).
Jul 6 16:50:37 ipfire unbound: [13349:0] info: generate keytag query _ta-4a5c-4f66. NULL IN
Jul 6 16:50:41 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.56 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=3082 PROTO=TCP SPT=58361 DPT=43968 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:50:44 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.12 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=39208 PROTO=TCP SPT=58796 DPT=52173 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:50:47 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=192.241.221.5 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=239 ID=54321 PROTO=TCP SPT=37502 DPT=5984 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:50:47 ipfire saslauthd[14138]: detach_tty : master pid is: 14138
Jul 6 16:50:47 ipfire saslauthd[14138]: ipc_init : listening on socket: /var/run/saslauthd/mux
Jul 6 16:50:48 ipfire pakfire: PAKFIRE INFO: IPFire Pakfire 2.25-x86_64 started!
Jul 6 16:50:48 ipfire pakfire: MIRROR INFO: server-list.db is 11123 seconds old. - DEBUG: force
Jul 6 16:50:48 ipfire pakfire: DOWNLOAD STARTED: 2.25-x86_64/lists/server-list.db
Jul 6 16:50:48 ipfire pakfire: DOWNLOAD INFO: Host: pakfire.ipfire.org (HTTPS) - File: 2.25-x86_64/lists/server-list.db
Jul 6 16:50:49 ipfire pakfire: DOWNLOAD INFO: 2.25-x86_64/lists/server-list.db has size of 2347 bytes
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD INFO: Signature of server-list.db is fine.
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD FINISHED: 2.25-x86_64/lists/server-list.db
Jul 6 16:50:50 ipfire pakfire: DB INFO: packages_list.db is 11123 seconds old. - DEBUG: force
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD STARTED: lists/packages_list.db
Jul 6 16:50:50 ipfire pakfire: MIRROR INFO: 26 servers found in list
Jul 6 16:50:50 ipfire pakfire: DOWNLOAD INFO: Host: ipfire.mirror.ac.za (HTTPS) - File: pakfire2/2.25-x86_64/lists/packages_list.db
Jul 6 16:50:52 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.177.182.217 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=247 ID=54321 PROTO=TCP SPT=43665 DPT=80 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:50:53 ipfire pakfire: DOWNLOAD INFO: pakfire2/2.25-x86_64/lists/packages_list.db has size of 4972 bytes
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD INFO: Signature of packages_list.db is fine.
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD FINISHED: pakfire2/2.25-x86_64/lists/packages_list.db
Jul 6 16:50:54 ipfire pakfire: CORE INFO: core-list.db is 11126 seconds old. - DEBUG: force
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD STARTED: lists/core-list.db
Jul 6 16:50:54 ipfire pakfire: MIRROR INFO: 26 servers found in list
Jul 6 16:50:54 ipfire pakfire: DOWNLOAD INFO: Host: ftp.yz.yamagata-u.ac.jp (HTTPS) - File: pub/network/security/ipfire/pakfire2/2.25-x86_64/lists/core-list.db
Jul 6 16:50:55 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=54389 PROTO=TCP SPT=44585 DPT=26319 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:50:55 ipfire pakfire: DOWNLOAD INFO: pub/network/security/ipfire/pakfire2/2.25-x86_64/lists/core-list.db has size of 903 bytes
Jul 6 16:50:55 ipfire ntpdate[14171]: step time server 168.96.251.197 offset -0.713957 sec
Jul 6 16:50:55 ipfire ipfire: NTP synchronisation
Jul 6 16:50:55 ipfire pakfire: DOWNLOAD INFO: HTTP-Status-Code: 200 - 200 OK
Jul 6 16:50:55 ipfire pakfire: DOWNLOAD INFO: File received. Start checking signature…
Jul 6 16:50:55 ipfire pakfire: DOWNLOAD INFO: Signature of core-list.db is fine.
Jul 6 16:50:55 ipfire pakfire: DOWNLOAD FINISHED: pub/network/security/ipfire/pakfire2/2.25-x86_64/lists/core-list.db
Jul 6 16:50:55 ipfire pakfire: PAKFIRE INFO: Pakfire has finished. Closing.
Jul 6 16:50:57 ipfire ntpd[14219]: ntpd 4.2.8p15@1.3728-o Mon Feb 22 21:33:50 UTC 2021 (1): Starting
Jul 6 16:50:57 ipfire ntpd[14219]: Command line: /usr/bin/ntpd -Ap /var/run/ntpd.pid
Jul 6 16:50:57 ipfire ntpd[14219]: ----------------------------------------------------
Jul 6 16:50:57 ipfire ntpd[14219]: ntp-4 is maintained by Network Time Foundation,
Jul 6 16:50:57 ipfire ntpd[14219]: Inc. (NTF), a non-profit 501(c)(3) public-benefit
Jul 6 16:50:57 ipfire ntpd[14219]: corporation. Support and training for ntp-4 are
Jul 6 16:50:57 ipfire ntpd[14219]: available at https://www.nwtime.org/support
Jul 6 16:50:57 ipfire ntpd[14219]: ----------------------------------------------------
Jul 6 16:50:57 ipfire ntpd[14221]: proto: precision = 0.306 usec (-22)
Jul 6 16:50:57 ipfire ntpd[14221]: basedate set to 2021-02-10
Jul 6 16:50:57 ipfire ntpd[14221]: gps base set to 2021-02-14 (week 2145)
Jul 6 16:50:57 ipfire ntpd[14221]: Listen and drop on 0 v6wildcard [::]:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listen and drop on 1 v4wildcard 0.0.0.0:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listen normally on 2 lo 127.0.0.1:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listen normally on 3 green0 192.168.0.1:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listen normally on 4 red0 69.5.116.32:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listen normally on 5 blue0 192.168.2.1:123
Jul 6 16:50:57 ipfire ntpd[14221]: Listening on routing socket on fd #22 for interface updates
Jul 6 16:50:57 ipfire ntpd[14221]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jul 6 16:50:57 ipfire ntpd[14221]: kernel reports TIME_ERROR: 0x41: Clock Unsynchronized
Jul 6 16:50:57 ipfire collectd[14268]: cpufreq plugin: Found 4 CPUs
Jul 6 16:50:57 ipfire collectd[14268]: Initialization complete, entering read-loop.
Jul 6 16:50:58 ipfire dhcpd: Wrote 4 leases to leases file.
Jul 6 16:50:58 ipfire dhcpd: Server starting service.
Jul 6 16:51:00 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=192.241.218.115 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=239 ID=54321 PROTO=TCP SPT=36482 DPT=1521 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:51:15 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.48 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=35280 PROTO=TCP SPT=58254 DPT=43557 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:51:23 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=2351 PROTO=TCP SPT=44585 DPT=58633 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:51:25 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=92.63.197.103 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=7746 PROTO=TCP SPT=44275 DPT=6962 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:51:50 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.228.61 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=19146 PROTO=TCP SPT=52700 DPT=8017 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:03 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=205.185.120.237 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x20 TTL=242 ID=54321 PROTO=TCP SPT=33387 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:52:26 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.200.46 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=14895 PROTO=TCP SPT=41330 DPT=14794 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:31 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=19939 PROTO=TCP SPT=44585 DPT=21838 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:34 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.153.197.32 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=8255 PROTO=TCP SPT=57906 DPT=42253 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:35 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.135.232.119 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=20125 PROTO=TCP SPT=52725 DPT=8170 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:40 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=92.63.197.74 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=29533 PROTO=TCP SPT=41327 DPT=12619 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:52:50 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=172.95.161.71 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=48 ID=47869 PROTO=TCP SPT=37846 DPT=23 WINDOW=33732 RES=0x00 SYN URGP=0
Jul 6 16:52:50 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=91.184.203.229 DST=69.5.116.32 LEN=131 TOS=0x08 PREC=0x20 TTL=114 ID=10448 PROTO=UDP SPT=12672 DPT=51413 LEN=111
Jul 6 16:53:00 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.200.6 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=22277 PROTO=TCP SPT=41307 DPT=12399 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:53:19 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.163.125.197 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x40 TTL=247 ID=25785 PROTO=TCP SPT=41020 DPT=8084 WINDOW=14600 RES=0x00 SYN URGP=0
Jul 6 16:53:25 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.200.58 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=48121 PROTO=TCP SPT=44223 DPT=10186 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:53:32 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.16 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=243 ID=3602 PROTO=TCP SPT=56358 DPT=24029 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:53:38 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=103.145.13.79 DST=69.5.116.32 LEN=81 TOS=0x08 PREC=0x20 TTL=243 ID=54321 PROTO=UDP SPT=49308 DPT=389 LEN=61
Jul 6 16:53:53 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=139.224.235.97 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=233 ID=40292 PROTO=TCP SPT=44425 DPT=2376 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:53:54 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.146.164.106 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=52769 PROTO=TCP SPT=53918 DPT=23508 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:53:55 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.146.164.106 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=24806 PROTO=TCP SPT=53918 DPT=23523 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:54:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=183.166.53.169 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=56083 PROTO=TCP SPT=24043 DPT=23 WINDOW=7096 RES=0x00 SYN URGP=0
Jul 6 16:54:06 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=111.7.96.132 DST=69.5.116.32 LEN=52 TOS=0x08 PREC=0x20 TTL=36 ID=18940 PROTO=TCP SPT=19964 DPT=2710 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:54:14 ipfire unbound: [13349:0] error: SERVFAIL <32.116.5.69.in-addr.arpa. PTR IN>: all the configured stub or forward servers failed, at zone .
Jul 6 16:54:27 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=192.241.217.129 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=239 ID=54321 PROTO=TCP SPT=51486 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:54:27 ipfire ipfire: SSH is enabled. Restarting.
Jul 6 16:54:27 ipfire ipfire: SSH Port 22
Jul 6 16:54:27 ipfire sshd[14543]: Server listening on 0.0.0.0 port 22.
Jul 6 16:54:31 ipfire ipfire: SSH is enabled. Restarting.
Jul 6 16:54:31 ipfire ipfire: SSH Port 22
Jul 6 16:54:31 ipfire sshd[14543]: Received signal 15; terminating.
Jul 6 16:54:32 ipfire sshd[14577]: Server listening on 0.0.0.0 port 22.
Jul 6 16:54:41 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.146.164.149 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=34605 PROTO=TCP SPT=54440 DPT=23675 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:55:12 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=122.254.102.121 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=47 ID=24853 PROTO=TCP SPT=23865 DPT=23 WINDOW=25089 RES=0x00 SYN URGP=0
Jul 6 16:55:14 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=5.188.206.18 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=42664 PROTO=TCP SPT=46856 DPT=1729 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:55:19 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=92.63.196.13 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=245 ID=48855 PROTO=TCP SPT=40429 DPT=3387 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:55:26 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.41 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=29733 PROTO=TCP SPT=58129 DPT=43053 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:56:11 ipfire sshd[14843]: fatal: Timeout before authentication for 192.168.0.2 port 38547
Jul 6 16:56:16 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.153.199.145 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=13299 PROTO=TCP SPT=57992 DPT=42478 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:56:16 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=81.69.202.201 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=235 ID=48981 PROTO=TCP SPT=44924 DPT=2376 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:56:23 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=39.99.158.5 DST=69.5.116.32 LEN=60 TOS=0x08 PREC=0x20 TTL=41 ID=64114 DF PROTO=TCP SPT=52698 DPT=6379 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 6 16:56:33 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.220.205.106 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=54321 PROTO=TCP SPT=44074 DPT=902 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:56:36 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=162.142.125.85 DST=69.5.116.32 LEN=44 TOS=0x00 PREC=0x00 TTL=45 ID=43093 PROTO=TCP SPT=7018 DPT=12902 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:56:56 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.146.165.149 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=19368 PROTO=TCP SPT=51807 DPT=22116 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:57:02 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=192.241.217.195 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=239 ID=54321 PROTO=TCP SPT=46085 DPT=3050 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:57:05 ipfire sshd[15015]: Accepted password for root from 192.168.0.2 port 51883 ssh2
Jul 6 16:57:12 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=156.96.156.172 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=246 ID=4000 PROTO=TCP SPT=44566 DPT=443 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:57:17 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=12965 PROTO=TCP SPT=44585 DPT=42965 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:57:40 ipfire The database has been updated recently
Jul 6 16:57:43 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=49015 PROTO=TCP SPT=44585 DPT=47694 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:57:49 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=50241 PROTO=TCP SPT=44585 DPT=62439 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:57:57 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.220.205.196 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=54321 PROTO=TCP SPT=40892 DPT=8181 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:58:02 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=218.150.29.226 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=47 ID=35353 PROTO=TCP SPT=54264 DPT=26 WINDOW=2872 RES=0x00 SYN URGP=0
Jul 6 16:58:08 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.228.60 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=19224 PROTO=TCP SPT=52681 DPT=7895 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:10 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.228.58 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=25164 PROTO=TCP SPT=52639 DPT=7510 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:12 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.167.97.191 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=54321 PROTO=TCP SPT=38891 DPT=21 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 16:58:22 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.155.205.247 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=53752 PROTO=TCP SPT=51790 DPT=22318 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:25 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.155.205.46 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=31980 PROTO=TCP SPT=50239 DPT=4498 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:48 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=36.76.102.221 DST=69.5.116.32 LEN=44 TOS=0x00 PREC=0x00 TTL=246 ID=123 DF PROTO=TCP SPT=1863 DPT=8080 WINDOW=14600 RES=0x00 SYN URGP=0
Jul 6 16:58:50 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=23.148.145.28 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=246 ID=29387 PROTO=TCP SPT=42253 DPT=80 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:55 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.12 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=21832 PROTO=TCP SPT=58796 DPT=65054 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:58:59 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=139.162.190.203 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=246 ID=28405 PROTO=TCP SPT=21437 DPT=1047 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:59:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=92.63.197.94 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=30811 PROTO=TCP SPT=42401 DPT=50000 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:59:14 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.155.205.46 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=34124 PROTO=TCP SPT=50239 DPT=4573 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:59:25 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.162.161 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=10505 PROTO=TCP SPT=53994 DPT=3388 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 16:59:47 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=121.153.76.228 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=45 ID=10657 PROTO=TCP SPT=12615 DPT=23 WINDOW=51470 RES=0x00 SYN URGP=0
Jul 6 16:59:52 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=75.83.66.105 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=236 ID=32277 DF PROTO=TCP SPT=56994 DPT=23 WINDOW=14600 RES=0x00 SYN URGP=0
Jul 6 17:00:31 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=74.207.242.56 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=54321 PROTO=TCP SPT=52484 DPT=1002 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:00:34 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.242.145.14 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=31490 PROTO=TCP SPT=47630 DPT=1399 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:00:38 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=173.181.27.165 DST=69.5.116.32 LEN=175 TOS=0x08 PREC=0x20 TTL=115 ID=32533 PROTO=UDP SPT=62958 DPT=55785 LEN=155
Jul 6 17:00:44 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.177.182.217 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=247 ID=54321 PROTO=TCP SPT=49420 DPT=8000 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:00:48 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.56 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=4554 PROTO=TCP SPT=58361 DPT=43955 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:01:03 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.173.35.53 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x40 TTL=229 ID=54321 PROTO=TCP SPT=62326 DPT=10010 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:01:13 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.242.145.14 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=4161 PROTO=TCP SPT=47630 DPT=51389 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:01:28 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.108 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=244 ID=31341 PROTO=TCP SPT=40121 DPT=101 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:02:00 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=23867 PROTO=TCP SPT=44585 DPT=15810 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:02:13 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=103.145.13.79 DST=69.5.116.32 LEN=81 TOS=0x08 PREC=0x20 TTL=242 ID=54321 PROTO=UDP SPT=58168 DPT=389 LEN=61
Jul 6 17:02:17 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.168.112 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=54321 PROTO=TCP SPT=51134 DPT=5432 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:02:28 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.146.165.149 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=38878 PROTO=TCP SPT=51807 DPT=22119 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:02:33 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.228.59 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=12714 PROTO=TCP SPT=52660 DPT=7797 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:02:37 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.16 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=3597 PROTO=TCP SPT=56358 DPT=24065 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:02:39 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=106.14.43.184 DST=69.5.116.32 LEN=60 TOS=0x08 PREC=0x20 TTL=42 ID=45196 DF PROTO=TCP SPT=41888 DPT=6379 WINDOW=29200 RES=0x00 SYN URGP=0
Jul 6 17:03:00 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=77.247.108.42 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=243 ID=55960 PROTO=TCP SPT=61001 DPT=8443 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:03 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.48 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=2428 PROTO=TCP SPT=58254 DPT=43536 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=5.1.38.128 DST=69.5.116.32 LEN=52 TOS=0x08 PREC=0x20 TTL=113 ID=32174 DF PROTO=TCP SPT=53823 DPT=8001 WINDOW=8192 RES=0x00 SYN URGP=0
Jul 6 17:03:13 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=194.165.16.57 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=65081 PROTO=TCP SPT=52591 DPT=3382 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:16 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=92.63.197.58 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=42214 PROTO=TCP SPT=56808 DPT=24938 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:21 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=61869 PROTO=TCP SPT=44585 DPT=46315 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:30 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.48 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=24592 PROTO=TCP SPT=58254 DPT=43560 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:36 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=75 PROTO=TCP SPT=44585 DPT=10948 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:03:58 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=5.188.206.157 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=3881 PROTO=TCP SPT=41604 DPT=11443 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:04:01 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.143.203.12 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=244 ID=5246 PROTO=TCP SPT=58796 DPT=277 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:04:19 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.44 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=39349 PROTO=TCP SPT=58169 DPT=43191 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:04:30 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=5.188.210.158 DST=69.5.116.32 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=43522 PROTO=TCP SPT=54891 DPT=1080 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:04:44 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=31821 PROTO=TCP SPT=45453 DPT=48379 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:05:22 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.75 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=244 ID=1525 PROTO=TCP SPT=59811 DPT=171 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:05:26 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.156.73.104 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=245 ID=49981 PROTO=TCP SPT=52413 DPT=20877 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:05:38 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=165.232.182.170 DST=69.5.116.32 LEN=72 TOS=0x08 PREC=0x20 TTL=45 ID=21908 DF PROTO=UDP SPT=1027 DPT=5060 LEN=52
Jul 6 17:05:54 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=46.161.27.44 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=247 ID=123 PROTO=TCP SPT=65534 DPT=3389 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:05:56 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=104.140.188.26 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x20 TTL=245 ID=23887 PROTO=TCP SPT=64602 DPT=44818 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:06:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.202 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=244 ID=54321 PROTO=TCP SPT=60668 DPT=56029 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:06:10 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=162.142.125.95 DST=69.5.116.32 LEN=44 TOS=0x00 PREC=0x00 TTL=45 ID=22543 PROTO=TCP SPT=1843 DPT=23082 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:07:24 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=162.142.125.160 DST=69.5.116.32 LEN=44 TOS=0x00 PREC=0x00 TTL=45 ID=64528 PROTO=TCP SPT=17569 DPT=60483 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:07:28 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=123.160.221.17 DST=69.5.116.32 LEN=52 TOS=0x08 PREC=0x20 TTL=42 ID=52449 PROTO=TCP SPT=53473 DPT=2492 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:07:47 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=34.86.35.12 DST=69.5.116.32 LEN=44 TOS=0x00 PREC=0x00 TTL=252 ID=54321 PROTO=TCP SPT=56215 DPT=17516 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:07:51 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.153.199.145 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=34481 PROTO=TCP SPT=57992 DPT=42479 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:07:52 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.229.86 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=45024 PROTO=TCP SPT=57948 DPT=42366 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:07:53 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=167.248.133.73 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x40 TTL=39 ID=20457 PROTO=TCP SPT=50944 DPT=3071 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:07:55 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.229.106 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=240 ID=1116 PROTO=TCP SPT=57922 DPT=42277 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:08:15 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=74.120.14.95 DST=69.5.116.32 LEN=44 TOS=0x08 PREC=0x40 TTL=40 ID=20351 PROTO=TCP SPT=48595 DPT=12458 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:08:31 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=162.62.209.251 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=242 ID=54321 PROTO=TCP SPT=41578 DPT=3306 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:08:36 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=193.27.228.64 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=58059 PROTO=TCP SPT=52763 DPT=8547 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:08:48 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=192.241.215.174 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=239 ID=54321 PROTO=TCP SPT=59060 DPT=443 WINDOW=65535 RES=0x00 SYN URGP=0
Jul 6 17:09:00 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=45.134.26.53 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=241 ID=47491 PROTO=TCP SPT=58321 DPT=43773 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:09:02 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=185.191.34.246 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x20 TTL=239 ID=43365 PROTO=TCP SPT=45453 DPT=64737 WINDOW=1024 RES=0x00 SYN URGP=0
Jul 6 17:09:04 ipfire kernel: DROP_INPUT IN=red0 OUT= MAC=00:0d:b9:53:e2:a1:00:07:ec:68:00:00:08:00 SRC=89.248.165.204 DST=69.5.116.32 LEN=40 TOS=0x08 PREC=0x40 TTL=244 ID=49384 PROTO=TCP SPT=56855 DPT=9582 WINDOW=1024 RES=0x00 SYN URGP=0

Hi @donteatyellowsnow

Looking at the logs when you are having trouble I don’t see any problems. The connection is made and you get an ip address and then pakfire updates its lists which means it successfully connected to the Internet.
Then you have a range of DROP_INPUT messages for things that have been blocked by IPFire from coming in on red, ie tge internet. So things look okay from those logs.

What is the status of your DNS servers page. Is it showing errors?

1 Like

Hello Adolf,

If you are asking about the Network—>Domain Name System page from the web admin interface…

The status shows as working, and two DNS servers from my ISP are connected.

Ok, never mind about this issue. It’s a problem on my desktop end, and completely different I think than the original problem I was having.

I’m using opennic.org DNS servers, and sometimes they go down, or are replaced. What’s odd though about this, is I had the same two DNS servers listed and it would not work with IPfire, but it did work with the WAN cable directly into my desktop PC. I updated the two open DNS servers in my network manager profile for connecting through IPfire, as both were offline, and now I’m connecting normally to the internet through IPfire.

It makes me wonder if when the WAN cable is directly connected to my desktop PC, that network manager in Linuxmint knows to try the ISP supplied DNS servers if the alternate ones don’t connect?

Hi John,

Yes, that was the one I meant. Sorry should have been clearer.

As the status is working and your ISP DNS servers are working and based on content of your logs then there is no problem with your Red connection.

There must be some other problem when you are trying to load a web page.

Are you using the web proxy (Network → Web Proxy). If yes, then maybe try pressing the Save and Restart button at the bottom of the Web Proxy page when you have the problem with loading a web page.

If pressing the Save and Restart button solves your issue then let us know. I will also then look at moving your posts to a new or other existing thread.

1 Like

Hi Adolf,

You may have missed one of my prior messages. This ended up having nothing to do with IPfire and the prior problem I was having. I’d be totally ok if you want to delete posts on this thread from the last two days. Sorry for the mistake. Though I did learn that it is possible to assign alternate DNS servers from the web admin page in IPfire. That is very useful! Thank you for the heads up about that.

2 Likes

Hi John,

Yes I must have been typing my message when you posted yours and I missed seeing it.

Glad you figured it out and got working again.

I will have a look through and see what to do with the posts.

Edit:- Have decided to keep the info but created a new thread for it.