Clients randomly go down

Hi,

I have two machines both using Ubuntu 22.04 and connected via ethernet to my Banana Pi R64 which, I am using as a bridge to my main router. I have tested the internet access from the pi to the internet and it works fine. However, on both computers even though the main router passes through ip, dns, etc the connection drops with the network manager going offline and refusing to restart.

Has anyone else experienced this or know of a fix?

Thanks,

Aaron

Try connecting debug uart to see whats happened,look in logs/dmesg…without any information it is impossible to say why you have this issue

I have already looked in /var/logs but the logs in that location are empty, I will ask a friend later today if he has a debugger and can help me retrieve the information.

The logs are also shown with dmesg. Also journalctl -r may help…

I have reinstalled OpenWRT because I noticed some mis-configured things. Although, now that I did a reinstall I do not think I changed anything. Regardless will keep the thread open incase it happens again.

Here is the openwrt information about the wireless device

config wifi-device 'radio0'
        option type 'mac80211'
        option path 'platform/18000000.wmac'
        option channel '1'
        option band '2g'
        option htmode 'HT20'
        option country 'AU'
        option cell_density '0'

config wifi-iface 'wifinet0'
        option device 'radio0'
        option mode 'sta'
        option ssid 'private'
        option bssid '10:13:31:60:42:9B'
        option encryption 'psk2'
        option key 'private'
        option macaddr 'private'
        option network 'wwan'

I had the pi go down the other day and while checking the interfaces I noticed the wwan (wireless) was reporting the wireless device was “not present”. What could cause this?

The information from Dmesg

dmesg
[    0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd034]
[    0.000000] Linux version 5.15.167 (builder@buildhost) (aarch64-openwrt-linux-musl-gcc (OpenWrt GCC 12.3.0 r24106-10cc5fcd00) 12.3.0, GNU ld (GNU Binutils) 2.40.0) #0 SMP Mon Sep 23 12:34:46 2024
[    0.000000] Machine model: Bananapi BPI-R64
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x0000000040000000-0x000000007fffffff]
[    0.000000]   DMA32    empty
[    0.000000]   Normal   empty
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000040000000-0x0000000042ffffff]
[    0.000000]   node   0: [mem 0x0000000043000000-0x000000004302ffff]
[    0.000000]   node   0: [mem 0x0000000043030000-0x000000007fffffff]
[    0.000000] Initmem setup node 0 [mem 0x0000000040000000-0x000000007fffffff]
[    0.000000] psci: probing for conduit method from DT.
[    0.000000] psci: PSCIv1.1 detected in firmware.
[    0.000000] psci: Using standard PSCI v0.2 function IDs
[    0.000000] psci: MIGRATE_INFO_TYPE not supported.
[    0.000000] psci: SMC Calling Convention v1.4
[    0.000000] percpu: Embedded 18 pages/cpu s33112 r8192 d32424 u73728
[    0.000000] pcpu-alloc: s33112 r8192 d32424 u73728 alloc=18*4096
[    0.000000] pcpu-alloc: [0] 0 [0] 1
[    0.000000] Detected VIPT I-cache on CPU0
[    0.000000] CPU features: kernel page table isolation disabled by kernel configuration
[    0.000000] CPU features: detected: ARM erratum 843419
[    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 258048
[    0.000000] Kernel command line: root=/dev/mmcblk1p65
[    0.000000] Dentry cache hash table entries: 131072 (order: 8, 1048576 bytes, linear)
[    0.000000] Inode-cache hash table entries: 65536 (order: 7, 524288 bytes, linear)
[    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
[    0.000000] Memory: 1016340K/1048576K available (8384K kernel code, 904K rwdata, 1436K rodata, 448K init, 307K bss, 32236K reserved, 0K cma-reserved)
[    0.000000] SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1
[    0.000000] rcu: Hierarchical RCU implementation.
[    0.000000]  Tracing variant of Tasks RCU enabled.
[    0.000000] rcu: RCU calculated value of scheduler-enlistment delay is 10 jiffies.
[    0.000000] NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0
[    0.000000] Root IRQ handler: 0xffffffc008010000
[    0.000000] GIC: Using split EOI/Deactivate mode
[    0.000000] arch_timer: cp15 timer(s) running at 12.50MHz (phys).
[    0.000000] clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x2e2049cda, max_idle_ns: 440795202628 ns
[    0.000000] sched_clock: 56 bits at 12MHz, resolution 80ns, wraps every 4398046511080ns
[    0.000201] Calibrating delay loop (skipped), value calculated using timer frequency.. 25.00 BogoMIPS (lpj=125000)
[    0.000211] pid_max: default: 32768 minimum: 301
[    0.000500] Mount-cache hash table entries: 2048 (order: 2, 16384 bytes, linear)
[    0.000514] Mountpoint-cache hash table entries: 2048 (order: 2, 16384 bytes, linear)
[    0.001885] rcu: Hierarchical SRCU implementation.
[    0.002366] smp: Bringing up secondary CPUs ...
[    0.002720] Detected VIPT I-cache on CPU1
[    0.002730] CPU features: SANITY CHECK: Unexpected variation in SYS_CNTFRQ_EL0. Boot CPU: 0x00000000bebc20, CPU1: 0x00000000000000
[    0.002749] CPU features: Unsupported CPU feature variation detected.
[    0.002778] CPU1: Booted secondary processor 0x0000000001 [0x410fd034]
[    0.002849] smp: Brought up 1 node, 2 CPUs
[    0.002866] SMP: Total of 2 processors activated.
[    0.002871] CPU features: detected: 32-bit EL0 Support
[    0.002875] CPU features: detected: CRC32 instructions
[    0.002913] CPU features: emulated: Privileged Access Never (PAN) using TTBR0_EL1 switching
[    0.002977] CPU: All CPU(s) started at EL2
[    0.002988] alternatives: patching kernel code
[    0.007775] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
[    0.007801] futex hash table entries: 512 (order: 3, 32768 bytes, linear)
[    0.007972] pinctrl core: initialized pinctrl subsystem
[    0.008834] NET: Registered PF_NETLINK/PF_ROUTE protocol family
[    0.009151] DMA: preallocated 128 KiB GFP_KERNEL pool for atomic allocations
[    0.009190] DMA: preallocated 128 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations
[    0.009214] DMA: preallocated 128 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations
[    0.009501] thermal_sys: Registered thermal governor 'fair_share'
[    0.009505] thermal_sys: Registered thermal governor 'bang_bang'
[    0.009510] thermal_sys: Registered thermal governor 'step_wise'
[    0.009514] thermal_sys: Registered thermal governor 'user_space'
[    0.009707] ASID allocator initialised with 65536 entries
[    0.010140] pstore: Registered ramoops as persistent store backend
[    0.010146] ramoops: using 0x10000@0x42ff0000, ecc: 0
[    0.023246] gpio-499 (asm_sel): hogged as output/high
[    0.033915] cryptd: max_cpu_qlen set to 1000
[    0.036533] SCSI subsystem initialized
[    0.036743] libata version 3.00 loaded.
[    0.037963] clocksource: Switched to clocksource arch_sys_counter
[    0.038585] NET: Registered PF_INET protocol family
[    0.038709] IP idents hash table entries: 16384 (order: 5, 131072 bytes, linear)
[    0.039361] tcp_listen_portaddr_hash hash table entries: 512 (order: 1, 8192 bytes, linear)
[    0.039383] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
[    0.039392] TCP established hash table entries: 8192 (order: 4, 65536 bytes, linear)
[    0.039445] TCP bind hash table entries: 8192 (order: 5, 131072 bytes, linear)
[    0.039558] TCP: Hash tables configured (established 8192 bind 8192)
[    0.039664] UDP hash table entries: 512 (order: 2, 16384 bytes, linear)
[    0.039688] UDP-Lite hash table entries: 512 (order: 2, 16384 bytes, linear)
[    0.039850] NET: Registered PF_UNIX/PF_LOCAL protocol family
[    0.039876] PCI: CLS 0 bytes, default 64
[    0.042667] workingset: timestamp_bits=46 max_order=18 bucket_order=0
[    0.046260] squashfs: version 4.0 (2009/01/31) Phillip Lougher
[    0.046278] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
[    0.079695] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 251)
[    0.085989] mt-pmic-pwrap 10001000.pwrap: unexpected interrupt int=0x1
[    0.101136] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
[    0.103437] printk: console [ttyS0] disabled
[    0.123673] 11002000.serial: ttyS0 at MMIO 0x11002000 (irq = 125, base_baud = 1562500) is a ST16650V2
[    0.713262] printk: console [ttyS0] enabled
[    0.718388] 1100c000.serial: ttyS1 at MMIO 0x1100c000 (irq = 131, base_baud = 17499995) is a MediaTek BTIF
[    0.728219] serial serial0: tty port ttyS1 registered
[    0.733955] mtk_rng 1020f000.rng: registered RNG driver
[    0.738137] random: crng init done
[    0.745959] loop: module loaded
[    0.749134] Loading iSCSI transport class v2.0-870.
[    0.755253] mtk-ecc 1100e000.ecc: probed
[    0.761132] spi-nand spi1.0: Winbond SPI NAND was found.
[    0.766450] spi-nand spi1.0: 128 MiB, block size: 128 KiB, page size: 2048, OOB size: 64
[    0.774671] mtk-snand 1100d000.spi: ECC strength: 4 bits per 512 bytes
[    0.781713] 3 fixed-partitions partitions found on MTD device spi1.0
[    0.788092] Creating 3 MTD partitions on "spi1.0":
[    0.792878] 0x000000000000-0x000000080000 : "bl2"
[    0.798624] 0x000000080000-0x000000280000 : "fip"
[    0.805798] 0x000000280000-0x000008000000 : "ubi"
[    1.069262] mtk_soc_eth 1b100000.ethernet: generated random MAC address ee:73:30:97:30:a5
[    1.079965] mtk_soc_eth 1b100000.ethernet eth0: mediatek frame engine at 0xffffffc009400000, irq 143
[    1.089946] mtk_soc_eth 1b100000.ethernet eth1: mediatek frame engine at 0xffffffc009400000, irq 143
[    1.099808] i2c_dev: i2c /dev entries driver
[    1.106639] mtk-wdt 10212000.watchdog: IRQ index 0 not found
[    1.112480] mtk-wdt 10212000.watchdog: Watchdog enabled (timeout=31 sec, nowayout=0)
[    1.122802] mtk-msdc 11240000.mmc: Got CD GPIO
[    1.123872] NET: Registered PF_INET6 protocol family
[    1.133290] Segment Routing with IPv6
[    1.136984] In-situ OAM (IOAM) with IPv6
[    1.140994] NET: Registered PF_PACKET protocol family
[    1.146090] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
[    1.159492] 8021q: 802.1Q VLAN Support v1.8
[    1.165128] pstore: Using crash dump compression: deflate
[    1.182381] mtk-pcie 1a143000.pcie: host bridge /pcie@1a143000 ranges:
[    1.189013] mtk-pcie 1a143000.pcie: Parsing ranges property...
[    1.194869] mtk-pcie 1a143000.pcie:      MEM 0x0020000000..0x0027ffffff -> 0x0020000000
[    1.213535] mmc1: host does not support reading read-only switch, assuming write-enable
[    1.226172] mmc1: new high speed SDHC card at address aaaa
[    1.233281] mmcblk1: mmc1:aaaa SC32G 29.7 GiB
[    1.244107] Alternate GPT is invalid, using primary GPT.
[    1.249995] FIT: Selected configuration: "config-1" (OpenWrt bananapi_bpi-r64)
[    1.257233] FIT:           kernel sub-image 0x00001000..0x004eb4b0 "kernel-1" (ARM64 OpenWrt Linux-5.15.167)
[    1.267171] FIT:          flat_dt sub-image 0x004ec000..0x004f5130 "fdt-1" (ARM64 OpenWrt bananapi_bpi-r64 device tree blob)
[    1.278504] FIT:          flat_dt sub-image 0x004f6000..0x004f611a "fdt-mt7622-bananapi-bpi-r64-pcie1" (ARM64 OpenWrt bananapi_bpi-r64 device tree overlay mt7622-bananapi-bpi-r64-pcie1)
[    1.295124] FIT:          flat_dt sub-image 0x004f7000..0x004f720f "fdt-mt7622-bananapi-bpi-r64-sata" (ARM64 OpenWrt bananapi_bpi-r64 device tree overlay mt7622-bananapi-bpi-r64-sata)
[    1.311566] FIT:       filesystem sub-image 0x004f8000..0x00a15fff "rootfs-1" (ARM64 OpenWrt bananapi_bpi-r64 rootfs)
[    1.322274] FIT: selecting configured loadable "rootfs-1" to be root filesystem
[    1.329594]  mmcblk1: p1 p2 p3 p4 p5 p6 p65(rootfs-1) p66(rootfs_data) p128
[    1.354692] mtk-msdc 11230000.mmc: phase: [map:3fffffff] [maxlen:30] [final:10]
[    1.363240] mmc0: new HS200 MMC card at address 0001
[    1.369802] mmcblk0: mmc0:0001 008G30 7.28 GiB
[    1.378669]  mmcblk0:
[    1.382156] mmcblk0boot0: mmc0:0001 008G30 4.00 MiB
[    1.388509] mmcblk0boot1: mmc0:0001 008G30 4.00 MiB
[    1.393829] mmcblk0rpmb: mmc0:0001 008G30 4.00 MiB, chardev (250:0)
[    1.422296] mtk-pcie 1a143000.pcie: Port0 link down
[    1.427455] mtk-pcie 1a143000.pcie: PCI host bridge to bus 0000:00
[    1.433670] pci_bus 0000:00: root bus resource [bus 00-ff]
[    1.439190] pci_bus 0000:00: root bus resource [mem 0x20000000-0x27ffffff]
[    1.446069] pci_bus 0000:00: scanning bus
[    1.452618] pci_bus 0000:00: fixups for bus
[    1.456802] pci_bus 0000:00: bus scan returning with max=00
[    1.463055] mtk-pcie 1a145000.pcie: host bridge /pcie@1a145000 ranges:
[    1.469650] mtk-pcie 1a145000.pcie: Parsing ranges property...
[    1.475495] mtk-pcie 1a145000.pcie:      MEM 0x0028000000..0x002fffffff -> 0x0028000000
[    1.698017] mtk-pcie 1a145000.pcie: Port1 link down
[    1.703106] mtk-pcie 1a145000.pcie: PCI host bridge to bus 0001:00
[    1.709308] pci_bus 0001:00: root bus resource [bus 00-ff]
[    1.714795] pci_bus 0001:00: root bus resource [mem 0x28000000-0x2fffffff]
[    1.721677] pci_bus 0001:00: scanning bus
[    1.727576] pci_bus 0001:00: fixups for bus
[    1.731767] pci_bus 0001:00: bus scan returning with max=00
[    1.737941] mtk_hsdma 1b007000.dma-controller: MediaTek HSDMA driver registered
[    1.796185] mt7530-mdio mdio-bus:00: configuring for fixed/2500base-x link mode
[    1.805548] mt7530-mdio mdio-bus:00: Link is Up - 2.5Gbps/Full - flow control rx/tx
[    1.814509] mt7530-mdio mdio-bus:00 wan (uninitialized): PHY [mt7530-0:00] driver [MediaTek MT7531 PHY] (irq=148)
[    1.834989] mt7530-mdio mdio-bus:00 lan1 (uninitialized): PHY [mt7530-0:01] driver [MediaTek MT7531 PHY] (irq=149)
[    1.855388] mt7530-mdio mdio-bus:00 lan2 (uninitialized): PHY [mt7530-0:02] driver [MediaTek MT7531 PHY] (irq=150)
[    1.875753] mt7530-mdio mdio-bus:00 lan3 (uninitialized): PHY [mt7530-0:03] driver [MediaTek MT7531 PHY] (irq=151)
[    1.896101] mt7530-mdio mdio-bus:00 lan4 (uninitialized): PHY [mt7530-0:04] driver [MediaTek MT7531 PHY] (irq=152)
[    1.907475] DSA: tree 0 setup
[    1.911143] UBI error: no valid UBI magic found inside mtd2
[    1.917067] clk: Disabling unused clocks
[    1.927921] VFS: Mounted root (squashfs filesystem) readonly on device 259:0.
[    1.935285] Freeing unused kernel memory: 448K
[    1.939783] Run /sbin/init as init process
[    1.943871]   with arguments:
[    1.946828]     /sbin/init
[    1.949529]   with environment:
[    1.952660]     HOME=/
[    1.955010]     TERM=linux
[    2.123277] init: Console is alive
[    2.126821] init: - watchdog -
[    2.631983] kmodloader: loading kernel modules from /etc/modules-boot.d/*
[    2.661141] usbcore: registered new interface driver usbfs
[    2.666674] usbcore: registered new interface driver hub
[    2.672057] usbcore: registered new device driver usb
[    2.684671] xhci-mtk 1a0c0000.usb: xHCI Host Controller
[    2.689950] xhci-mtk 1a0c0000.usb: new USB bus registered, assigned bus number 1
[    2.698992] xhci-mtk 1a0c0000.usb: hcc params 0x01403198 hci version 0x96 quirks 0x0000000000210010
[    2.708103] xhci-mtk 1a0c0000.usb: irq 137, io mem 0x1a0c0000
[    2.713958] xhci-mtk 1a0c0000.usb: xHCI Host Controller
[    2.719195] xhci-mtk 1a0c0000.usb: new USB bus registered, assigned bus number 2
[    2.726593] xhci-mtk 1a0c0000.usb: Host supports USB 3.0 SuperSpeed
[    2.733358] hub 1-0:1.0: USB hub found
[    2.737158] hub 1-0:1.0: 2 ports detected
[    2.741668] usb usb2: We don't know the algorithms for LPM for this host, disabling LPM.
[    2.750264] hub 2-0:1.0: USB hub found
[    2.754066] hub 2-0:1.0: 1 port detected
[    2.762495] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
[    2.780096] init: - preinit -
[    3.125871] mtk_soc_eth 1b100000.ethernet eth0: configuring for fixed/2500base-x link mode
[    3.134979] mtk_soc_eth 1b100000.ethernet eth0: Link is Up - 2.5Gbps/Full - flow control rx/tx
[    3.141531] mt7530-mdio mdio-bus:00 lan1: configuring for phy/gmii link mode
[    3.151280] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[    5.729748] F2FS-fs (mmcblk1p66): Mounted with checkpoint version = 30a3e876
[    5.739605] mount_root: switching to f2fs overlay
[    5.747082] overlayfs: null uuid detected in lower fs '/', falling back to xino=off,index=off,nfs_export=off.
[    5.762455] urandom-seed: Seeding with /etc/urandom.seed
[    5.824206] procd: - early -
[    5.827185] procd: - watchdog -
[    6.377709] procd: - watchdog -
[    6.384092] procd: - ubus -
[    6.449123] procd: - init -
[    6.749106] kmodloader: loading kernel modules from /etc/modules.d/*
[    6.760934] tun: Universal TUN/TAP device driver, 1.6
[    6.773720] hid: raw HID events driver (C) Jiri Kosina
[    6.785341] Bluetooth: Core ver 2.22
[    6.789052] NET: Registered PF_BLUETOOTH protocol family
[    6.794356] Bluetooth: HCI device and connection manager initialized
[    6.800717] Bluetooth: HCI socket layer initialized
[    6.805589] Bluetooth: L2CAP socket layer initialized
[    6.810683] Bluetooth: SCO socket layer initialized
[    6.817268] Bluetooth: BNEP (Ethernet Emulation) ver 1.3
[    6.822637] Bluetooth: BNEP filters: protocol multicast
[    6.827864] Bluetooth: BNEP socket layer initialized
[    6.850553] usbcore: registered new interface driver btusb
[    6.856596] Loading modules backported from Linux version v6.1.110-0-g5f55cad62cc9d
[    6.864304] Backport generated by backports.git v6.1.110-1-0-g965f73fc
[    6.872086] Bluetooth: HCI UART driver ver 2.3
[    6.876544] Bluetooth: HCI UART protocol H4 registered
[    6.881719] Bluetooth: HCI UART protocol BCSP registered
[    6.887027] Bluetooth: HCI UART protocol ATH3K registered
[    6.894191] Bluetooth: HIDP (Human Interface Emulation) ver 1.2
[    6.900191] Bluetooth: HIDP socket layer initialized
[    6.935393] Bluetooth: RFCOMM TTY layer initialized
[    6.940349] Bluetooth: RFCOMM socket layer initialized
[    6.945499] Bluetooth: RFCOMM ver 1.11
[    6.987443] urngd: v1.0.2 started.
[    6.992581] mt7622-wmac 18000000.wmac: Invalid MAC address, using random address ee:64:46:fd:aa:fa
[    7.008446] mt7622-wmac 18000000.wmac: registering led 'mt76-phy0'
[    7.048403] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
[    7.078476] mt7622-wmac 18000000.wmac: Failed to get patch semaphore
[    7.143050] PPP generic driver version 2.4.2
[    7.158752] NET: Registered PF_PPPOX protocol family
[    7.184435] kmodloader: done loading kernel modules from /etc/modules.d/*
[    7.228247] Bluetooth: hci0: Device setup in 327283 usecs
[    7.362477] mt7622-wmac 18000000.wmac: N9 Firmware Version: _reserved_, Build Time: 20220630094834
[    9.871108] mtk_soc_eth 1b100000.ethernet eth0: Link is Down
[    9.885941] mtk_soc_eth 1b100000.ethernet eth0: configuring for fixed/2500base-x link mode
[    9.895296] mtk_soc_eth 1b100000.ethernet eth0: Link is Up - 2.5Gbps/Full - flow control rx/tx
[    9.895370] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
[    9.917086] mt7530-mdio mdio-bus:00 lan1: configuring for phy/gmii link mode
[    9.930266] br-lan: port 1(lan1) entered blocking state
[    9.935509] br-lan: port 1(lan1) entered disabled state
[    9.945196] device lan1 entered promiscuous mode
[    9.949910] device eth0 entered promiscuous mode
[    9.975632] mt7530-mdio mdio-bus:00 lan2: configuring for phy/gmii link mode
[    9.983677] br-lan: port 2(lan2) entered blocking state
[    9.988973] br-lan: port 2(lan2) entered disabled state
[    9.996432] device lan2 entered promiscuous mode
[   10.010222] mt7530-mdio mdio-bus:00 lan3: configuring for phy/gmii link mode
[   10.020895] br-lan: port 3(lan3) entered blocking state
[   10.026136] br-lan: port 3(lan3) entered disabled state
[   10.033658] device lan3 entered promiscuous mode
[   10.046907] mt7530-mdio mdio-bus:00 lan4: configuring for phy/gmii link mode
[   10.057491] br-lan: port 4(lan4) entered blocking state
[   10.062786] br-lan: port 4(lan4) entered disabled state
[   10.070500] device lan4 entered promiscuous mode
[   10.082650] mt7530-mdio mdio-bus:00 wan: configuring for phy/gmii link mode
[   12.815565] wl0-sta0: authenticate with 10:13:31:60:42:9b
[   12.821120] wl0-sta0: 80 MHz not supported, disabling VHT
[   12.830941] wl0-sta0: send auth to 10:13:31:60:42:9b (try 1/3)
[   12.838305] wl0-sta0: authenticated
[   12.847995] wl0-sta0: associate with 10:13:31:60:42:9b (try 1/3)
[   12.857783] wl0-sta0: RX AssocResp from 10:13:31:60:42:9b (capab=0x1411 status=0 aid=6)
[   12.866742] wl0-sta0: associated
[   12.909486] mt7530-mdio mdio-bus:00 wan: Link is Up - 1Gbps/Full - flow control off
[   12.909510] IPv6: ADDRCONF(NETDEV_CHANGE): wan: link becomes ready
[   12.978566] IPv6: ADDRCONF(NETDEV_CHANGE): wl0-sta0: link becomes ready
[   13.157505] mt7530-mdio mdio-bus:00 lan3: Link is Up - 1Gbps/Full - flow control rx/tx
[   13.157549] br-lan: port 3(lan3) entered blocking state
[   13.170732] br-lan: port 3(lan3) entered forwarding state
[   13.177106] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
[   26.708104] mt7530-mdio mdio-bus:00 wan: Link is Down
[   37.340520] mt7530-mdio mdio-bus:00 lan1: Link is Up - 1Gbps/Full - flow control off
[   37.340570] br-lan: port 1(lan1) entered blocking state
[   37.353546] br-lan: port 1(lan1) entered forwarding state

I just had the pi go down just now but a reboot fixed it! Hopefully someone can figure out what is causing this and a fix for it.

Was it down before getting the log without reboot? Currently i only see bootup (37s uptime)

Yes, the reboot was the only way I could get the information.

But log after reboot does not show the issue…how often is the issue? Could you let serial console open till the issue came up again to show dmesg adter it happens before reboot (a crash requires terminal active while it happens)

I do not have a uart device to test it with! Is there another way?

Not really as your clients fo down so it is likely networkstack which crashes and so i guess you do not see the crash when logged in via ssh. Crash can also happen somewhere else and affects network which results in same blindness over network connection.

Are you able to link me to a uart adapter? I have no idea what it looks like.

R64 also supports also cp2102,but to be compatible with other boards like r3/r4 i send ftdi here

Thanks! I was thanking uart were the connectors that went over the pins on the board.

Debug uart are the 3pins separately (rx,tx,gnd) not the 40pin gpio header (which also has an uart,but not print messages there).

I managed to save the logs in another directory! Although, the wifi sorted itself out after awhile.

Sun Dec 15 04:17:38 2024 authpriv.info dropbear[8786]: Exit before auth from <218.92.0.112:17294>: Disconnect received
Sun Dec 15 04:18:31 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 04:26:41 2024 authpriv.info dropbear[8797]: Child connection from 218.92.0.226:14784
Sun Dec 15 04:26:43 2024 authpriv.info dropbear[8797]: Exit before auth from <218.92.0.226:14784>: Disconnect received
Sun Dec 15 04:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:35:52 2024 authpriv.info dropbear[8807]: Child connection from 218.92.0.228:51244
Sun Dec 15 04:35:54 2024 authpriv.info dropbear[8807]: Exit before auth from <218.92.0.228:51244>: Disconnect received
Sun Dec 15 04:36:23 2024 authpriv.info dropbear[8808]: Child connection from 218.92.0.218:53624
Sun Dec 15 04:36:25 2024 authpriv.info dropbear[8808]: Exit before auth from <218.92.0.218:53624>: Disconnect received
Sun Dec 15 04:37:17 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 04:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:38:10 2024 authpriv.info dropbear[8809]: Child connection from 139.59.63.157:6101
Sun Dec 15 04:38:12 2024 authpriv.info dropbear[8809]: Exit before auth from <139.59.63.157:6101>: Unexpected packet type 20, expected 21
Sun Dec 15 04:39:08 2024 authpriv.info dropbear[8810]: Child connection from 218.92.0.216:36354
Sun Dec 15 04:39:10 2024 authpriv.info dropbear[8810]: Exit before auth from <218.92.0.216:36354>: Disconnect received
Sun Dec 15 04:41:34 2024 authpriv.info dropbear[8812]: Child connection from 94.156.227.163:44172
Sun Dec 15 04:41:34 2024 authpriv.info dropbear[8813]: Child connection from 94.156.227.163:44184
Sun Dec 15 04:41:34 2024 authpriv.info dropbear[8812]: Exit before auth from <94.156.227.163:44172>: Exited normally
Sun Dec 15 04:41:34 2024 authpriv.info dropbear[8813]: Exit before auth from <94.156.227.163:44184>: Exited normally
Sun Dec 15 04:41:58 2024 authpriv.info dropbear[8814]: Child connection from 218.92.0.217:29930
Sun Dec 15 04:42:00 2024 authpriv.info dropbear[8814]: Exit before auth from <218.92.0.217:29930>: Disconnect received
Sun Dec 15 04:46:51 2024 authpriv.info dropbear[8823]: Child connection from 83.222.191.74:55369
Sun Dec 15 04:46:52 2024 authpriv.info dropbear[8823]: Exit before auth from <83.222.191.74:55369>: Exited normally
Sun Dec 15 04:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:50:08 2024 authpriv.info dropbear[8825]: Child connection from 218.92.0.230:25252
Sun Dec 15 04:50:11 2024 authpriv.info dropbear[8825]: Exit before auth from <218.92.0.230:25252>: Disconnect received
Sun Dec 15 04:50:48 2024 authpriv.info dropbear[8826]: Child connection from 218.92.0.218:15174
Sun Dec 15 04:50:51 2024 authpriv.info dropbear[8826]: Exit before auth from <218.92.0.218:15174>: Disconnect received
Sun Dec 15 04:54:18 2024 authpriv.info dropbear[8835]: Child connection from 218.92.0.198:16354
Sun Dec 15 04:54:20 2024 authpriv.info dropbear[8835]: Exit before auth from <218.92.0.198:16354>: Disconnect received
Sun Dec 15 04:57:24 2024 authpriv.info dropbear[8837]: Child connection from 218.92.0.232:60190
Sun Dec 15 04:57:26 2024 authpriv.info dropbear[8837]: Exit before auth from <218.92.0.232:60190>: Disconnect received
Sun Dec 15 04:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:58:54 2024 authpriv.info dropbear[8838]: Child connection from 192.155.90.220:35932
Sun Dec 15 04:58:55 2024 authpriv.info dropbear[8838]: Exit before auth from <192.155.90.220:35932>: Exited normally
Sun Dec 15 04:58:55 2024 authpriv.info dropbear[8839]: Child connection from 192.155.90.220:7822
Sun Dec 15 04:58:55 2024 authpriv.info dropbear[8840]: Child connection from 192.155.90.220:7824
Sun Dec 15 04:58:55 2024 authpriv.info dropbear[8839]: Exit before auth from <192.155.90.220:7822>: No matching algo hostkey
Sun Dec 15 04:58:56 2024 authpriv.info dropbear[8840]: Exit before auth from <192.155.90.220:7824>: Exited normally
Sun Dec 15 04:59:41 2024 authpriv.info dropbear[8841]: Child connection from 45.79.172.21:13728
Sun Dec 15 04:59:42 2024 authpriv.info dropbear[8841]: Exit before auth from <45.79.172.21:13728>: Exited normally
Sun Dec 15 04:59:42 2024 authpriv.info dropbear[8842]: Child connection from 45.79.172.21:13742
Sun Dec 15 04:59:42 2024 authpriv.info dropbear[8842]: Exit before auth from <45.79.172.21:13742>: No matching algo hostkey
Sun Dec 15 04:59:42 2024 authpriv.info dropbear[8843]: Child connection from 45.79.172.21:13746
Sun Dec 15 04:59:43 2024 authpriv.info dropbear[8843]: Exit before auth from <45.79.172.21:13746>: Exited normally
Sun Dec 15 05:04:55 2024 authpriv.info dropbear[8845]: Child connection from 218.92.0.230:29084
Sun Dec 15 05:04:57 2024 authpriv.info dropbear[8845]: Exit before auth from <218.92.0.230:29084>: Disconnect received
Sun Dec 15 05:05:35 2024 authpriv.info dropbear[8854]: Child connection from 218.92.0.229:62358
Sun Dec 15 05:05:38 2024 authpriv.info dropbear[8854]: Exit before auth from <218.92.0.229:62358>: Disconnect received
Sun Dec 15 05:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:10:31 2024 authpriv.info dropbear[8856]: Child connection from 80.64.30.65:43120
Sun Dec 15 05:10:32 2024 authpriv.warn dropbear[8856]: Login attempt for nonexistent user
Sun Dec 15 05:10:34 2024 authpriv.info dropbear[8856]: Exit before auth from <80.64.30.65:43120>: Error reading: Connection reset by peer
Sun Dec 15 05:10:35 2024 authpriv.info dropbear[8857]: Child connection from 80.64.30.65:56152
Sun Dec 15 05:10:36 2024 authpriv.warn dropbear[8857]: Login attempt for nonexistent user
Sun Dec 15 05:10:37 2024 authpriv.info dropbear[8857]: Exit before auth from <80.64.30.65:56152>: Error reading: Connection reset by peer
Sun Dec 15 05:10:38 2024 authpriv.info dropbear[8858]: Child connection from 80.64.30.65:56172
Sun Dec 15 05:10:40 2024 authpriv.warn dropbear[8858]: Login attempt for nonexistent user
Sun Dec 15 05:10:41 2024 authpriv.info dropbear[8858]: Exit before auth from <80.64.30.65:56172>: Error reading: Connection reset by peer
Sun Dec 15 05:10:41 2024 authpriv.info dropbear[8859]: Child connection from 80.64.30.65:34242
Sun Dec 15 05:10:43 2024 authpriv.warn dropbear[8859]: Login attempt for nonexistent user
Sun Dec 15 05:10:45 2024 authpriv.info dropbear[8859]: Exit before auth from <80.64.30.65:34242>: Error reading: Connection reset by peer
Sun Dec 15 05:10:45 2024 authpriv.info dropbear[8860]: Child connection from 80.64.30.65:34246
Sun Dec 15 05:10:47 2024 authpriv.warn dropbear[8860]: Login attempt for nonexistent user
Sun Dec 15 05:10:49 2024 authpriv.info dropbear[8860]: Exit before auth from <80.64.30.65:34246>: Error reading: Connection reset by peer
Sun Dec 15 05:13:19 2024 authpriv.info dropbear[8861]: Child connection from 218.92.0.226:49046
Sun Dec 15 05:13:21 2024 authpriv.info dropbear[8861]: Exit before auth from <218.92.0.226:49046>: Disconnect received
Sun Dec 15 05:15:58 2024 authpriv.info dropbear[8871]: Child connection from 57.152.56.42:55036
Sun Dec 15 05:16:09 2024 authpriv.info dropbear[8871]: Exit before auth from <57.152.56.42:55036>: Exited normally
Sun Dec 15 05:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:17:51 2024 authpriv.info dropbear[8872]: Child connection from 85.192.56.68:42720
Sun Dec 15 05:17:52 2024 authpriv.warn dropbear[8872]: Bad password attempt for 'root' from 85.192.56.68:42720
Sun Dec 15 05:17:53 2024 authpriv.info dropbear[8872]: Exit before auth from <85.192.56.68:42720>: (user 'root', 1 fails): Error reading: Connection reset by peer
Sun Dec 15 05:19:38 2024 authpriv.info dropbear[8873]: Child connection from 218.92.0.228:31294
Sun Dec 15 05:19:40 2024 authpriv.info dropbear[8873]: Exit before auth from <218.92.0.228:31294>: Disconnect received
Sun Dec 15 05:20:30 2024 authpriv.info dropbear[8874]: Child connection from 218.92.0.229:16300
Sun Dec 15 05:20:33 2024 authpriv.info dropbear[8874]: Exit before auth from <218.92.0.229:16300>: Disconnect received
Sun Dec 15 05:22:29 2024 authpriv.info dropbear[8875]: Child connection from 218.92.0.237:12008
Sun Dec 15 05:26:22 2024 authpriv.info dropbear[8876]: Child connection from 111.119.207.55:39198
Sun Dec 15 05:26:22 2024 authpriv.info dropbear[8876]: Exit before auth from <111.119.207.55:39198>: Exited normally
Sun Dec 15 05:27:29 2024 authpriv.info dropbear[8885]: Child connection from 218.92.0.198:17084
Sun Dec 15 05:27:29 2024 authpriv.info dropbear[8875]: Exit before auth from <218.92.0.237:12008>: Timeout before auth
Sun Dec 15 05:27:31 2024 authpriv.info dropbear[8885]: Exit before auth from <218.92.0.198:17084>: Disconnect received
Sun Dec 15 05:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:28:47 2024 authpriv.info dropbear[8886]: Child connection from 218.92.0.232:60056
Sun Dec 15 05:28:49 2024 authpriv.info dropbear[8886]: Exit before auth from <218.92.0.232:60056>: Disconnect received
Sun Dec 15 05:29:49 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 05:34:30 2024 authpriv.info dropbear[8888]: Child connection from 218.92.0.230:27058
Sun Dec 15 05:34:33 2024 authpriv.info dropbear[8888]: Exit before auth from <218.92.0.230:27058>: Disconnect received
Sun Dec 15 05:35:24 2024 authpriv.info dropbear[8889]: Child connection from 218.92.0.225:56460
Sun Dec 15 05:35:26 2024 authpriv.info dropbear[8889]: Exit before auth from <218.92.0.225:56460>: Disconnect received
Sun Dec 15 05:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:38:30 2024 authpriv.info dropbear[8899]: Child connection from 218.92.0.133:22947
Sun Dec 15 05:38:34 2024 authpriv.info dropbear[8899]: Exit before auth from <218.92.0.133:22947>: Disconnect received
Sun Dec 15 05:40:05 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 05:45:05 2024 authpriv.info dropbear[8900]: Child connection from 135.148.25.120:58651
Sun Dec 15 05:45:16 2024 authpriv.info dropbear[8900]: Exit before auth from <135.148.25.120:58651>: Exited normally
Sun Dec 15 05:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:48:18 2024 authpriv.info dropbear[8902]: Child connection from 218.92.0.231:50552
Sun Dec 15 05:48:21 2024 authpriv.info dropbear[8903]: Child connection from 218.92.0.236:13354
Sun Dec 15 05:48:24 2024 authpriv.info dropbear[8903]: Exit before auth from <218.92.0.236:13354>: Disconnect received
Sun Dec 15 05:48:25 2024 authpriv.info dropbear[8904]: Child connection from 218.92.0.228:18892
Sun Dec 15 05:48:29 2024 authpriv.info dropbear[8904]: Exit before auth from <218.92.0.228:18892>: Disconnect received
Sun Dec 15 05:53:18 2024 authpriv.info dropbear[8902]: Exit before auth from <218.92.0.231:50552>: Timeout before auth
Sun Dec 15 05:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 05:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 05:58:19 2024 authpriv.info dropbear[8914]: Child connection from 80.64.30.65:51038
Sun Dec 15 05:58:21 2024 authpriv.warn dropbear[8914]: Login attempt for nonexistent user
Sun Dec 15 05:58:22 2024 authpriv.info dropbear[8914]: Exit before auth from <80.64.30.65:51038>: Error reading: Connection reset by peer
Sun Dec 15 05:58:23 2024 authpriv.info dropbear[8915]: Child connection from 80.64.30.65:40830
Sun Dec 15 05:58:25 2024 authpriv.warn dropbear[8915]: Login attempt for nonexistent user
Sun Dec 15 05:58:27 2024 authpriv.info dropbear[8915]: Exit before auth from <80.64.30.65:40830>: Error reading: Connection reset by peer
Sun Dec 15 05:58:27 2024 authpriv.info dropbear[8916]: Child connection from 80.64.30.65:40848
Sun Dec 15 05:58:29 2024 authpriv.warn dropbear[8916]: Login attempt for nonexistent user
Sun Dec 15 05:58:30 2024 authpriv.info dropbear[8916]: Exit before auth from <80.64.30.65:40848>: Error reading: Connection reset by peer
Sun Dec 15 05:58:30 2024 authpriv.info dropbear[8917]: Child connection from 80.64.30.65:40866
Sun Dec 15 05:58:32 2024 authpriv.warn dropbear[8917]: Login attempt for nonexistent user
Sun Dec 15 05:58:34 2024 authpriv.info dropbear[8917]: Exit before auth from <80.64.30.65:40866>: Error reading: Connection reset by peer
Sun Dec 15 05:58:34 2024 authpriv.info dropbear[8918]: Child connection from 80.64.30.65:58648
Sun Dec 15 05:58:36 2024 authpriv.warn dropbear[8918]: Login attempt for nonexistent user
Sun Dec 15 05:58:38 2024 authpriv.info dropbear[8918]: Exit before auth from <80.64.30.65:58648>: Error reading: Connection reset by peer
Sun Dec 15 06:03:08 2024 authpriv.info dropbear[8927]: Child connection from 5.135.238.150:51845
Sun Dec 15 06:03:08 2024 authpriv.info dropbear[8927]: Exit before auth from <5.135.238.150:51845>: Exited normally
Sun Dec 15 06:03:09 2024 authpriv.info dropbear[8928]: Child connection from 5.135.238.151:49541
Sun Dec 15 06:03:18 2024 authpriv.info dropbear[8929]: Child connection from 218.92.0.223:15236
Sun Dec 15 06:03:20 2024 authpriv.info dropbear[8928]: Exit before auth from <5.135.238.151:49541>: Exited normally
Sun Dec 15 06:03:21 2024 authpriv.info dropbear[8929]: Exit before auth from <218.92.0.223:15236>: Disconnect received
Sun Dec 15 06:03:35 2024 authpriv.info dropbear[8930]: Child connection from 218.92.0.232:14856
Sun Dec 15 06:03:38 2024 authpriv.info dropbear[8930]: Exit before auth from <218.92.0.232:14856>: Disconnect received
Sun Dec 15 06:03:52 2024 authpriv.info dropbear[8931]: Child connection from 218.92.0.225:56984
Sun Dec 15 06:03:54 2024 authpriv.info dropbear[8931]: Exit before auth from <218.92.0.225:56984>: Disconnect received
Sun Dec 15 06:04:20 2024 authpriv.info dropbear[8932]: Child connection from 218.92.0.227:40316
Sun Dec 15 06:04:21 2024 authpriv.info dropbear[8933]: Child connection from 2.57.122.33:34002
Sun Dec 15 06:04:21 2024 authpriv.info dropbear[8934]: Child connection from 2.57.122.32:56698
Sun Dec 15 06:04:22 2024 authpriv.info dropbear[8933]: Exit before auth from <2.57.122.33:34002>: Exited normally
Sun Dec 15 06:04:22 2024 authpriv.info dropbear[8934]: Exit before auth from <2.57.122.32:56698>: Exited normally
Sun Dec 15 06:04:22 2024 authpriv.info dropbear[8932]: Exit before auth from <218.92.0.227:40316>: Disconnect received
Sun Dec 15 06:06:10 2024 authpriv.info dropbear[8936]: Child connection from 84.21.173.136:52208
Sun Dec 15 06:06:11 2024 authpriv.info dropbear[8937]: Child connection from 84.21.173.136:52218
Sun Dec 15 06:06:11 2024 authpriv.info dropbear[8936]: Exit before auth from <84.21.173.136:52208>: Exited normally
Sun Dec 15 06:06:14 2024 authpriv.warn dropbear[8937]: Bad password attempt for 'root' from 84.21.173.136:52218
Sun Dec 15 06:06:15 2024 authpriv.info dropbear[8937]: Exit before auth from <84.21.173.136:52218>: (user 'root', 1 fails): Exited normally
Sun Dec 15 06:06:15 2024 authpriv.info dropbear[8938]: Child connection from 84.21.173.136:52220
Sun Dec 15 06:06:17 2024 authpriv.warn dropbear[8938]: Bad password attempt for 'root' from 84.21.173.136:52220
Sun Dec 15 06:06:17 2024 authpriv.info dropbear[8938]: Exit before auth from <84.21.173.136:52220>: (user 'root', 1 fails): Exited normally
Sun Dec 15 06:06:17 2024 authpriv.info dropbear[8939]: Child connection from 84.21.173.136:51516
Sun Dec 15 06:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 06:11:18 2024 authpriv.info dropbear[8939]: Exit before auth from <84.21.173.136:51516>: Timeout before auth
Sun Dec 15 06:12:36 2024 authpriv.info dropbear[8948]: Child connection from 124.48.105.57:33081
Sun Dec 15 06:13:16 2024 authpriv.info dropbear[8948]: Exit before auth from <124.48.105.57:33081>: Exited normally
Sun Dec 15 06:17:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:17:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 06:17:57 2024 authpriv.info dropbear[8950]: Child connection from 218.92.0.222:12640
Sun Dec 15 06:17:59 2024 authpriv.info dropbear[8950]: Exit before auth from <218.92.0.222:12640>: Disconnect received
Sun Dec 15 06:18:41 2024 authpriv.info dropbear[8951]: Child connection from 218.92.0.229:27990
Sun Dec 15 06:18:50 2024 authpriv.info dropbear[8952]: Child connection from 218.92.0.235:63102
Sun Dec 15 06:18:52 2024 authpriv.info dropbear[8952]: Exit before auth from <218.92.0.235:63102>: Disconnect received
Sun Dec 15 06:20:19 2024 authpriv.info dropbear[8953]: Child connection from 218.92.0.216:11326
Sun Dec 15 06:20:23 2024 authpriv.info dropbear[8953]: Exit before auth from <218.92.0.216:11326>: Disconnect received
Sun Dec 15 06:20:24 2024 authpriv.info dropbear[8954]: Child connection from 218.92.0.233:10616
Sun Dec 15 06:20:27 2024 authpriv.info dropbear[8954]: Exit before auth from <218.92.0.233:10616>: Disconnect received
Sun Dec 15 06:23:41 2024 authpriv.info dropbear[8951]: Exit before auth from <218.92.0.229:27990>: Timeout before auth
Sun Dec 15 06:27:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:27:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 06:32:44 2024 authpriv.info dropbear[8964]: Child connection from 218.92.0.230:13674
Sun Dec 15 06:32:46 2024 authpriv.info dropbear[8964]: Exit before auth from <218.92.0.230:13674>: Disconnect received
Sun Dec 15 06:33:53 2024 authpriv.info dropbear[8973]: Child connection from 218.92.0.114:38460
Sun Dec 15 06:33:57 2024 authpriv.info dropbear[8973]: Exit before auth from <218.92.0.114:38460>: Disconnect received
Sun Dec 15 06:34:25 2024 authpriv.info dropbear[8974]: Child connection from 218.92.0.226:52120
Sun Dec 15 06:34:29 2024 authpriv.info dropbear[8974]: Exit before auth from <218.92.0.226:52120>: Disconnect received
Sun Dec 15 06:36:19 2024 authpriv.info dropbear[8975]: Child connection from 218.92.0.198:33232
Sun Dec 15 06:36:23 2024 authpriv.info dropbear[8975]: Exit before auth from <218.92.0.198:33232>: Disconnect received
Sun Dec 15 06:37:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:37:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 06:41:24 2024 authpriv.info dropbear[8977]: Child connection from 85.192.56.68:15486
Sun Dec 15 06:41:25 2024 authpriv.warn dropbear[8977]: Bad password attempt for 'root' from 85.192.56.68:15486
Sun Dec 15 06:41:26 2024 authpriv.info dropbear[8977]: Exit before auth from <85.192.56.68:15486>: (user 'root', 1 fails): Error reading: Connection reset by peer
Sun Dec 15 06:46:23 2024 authpriv.info dropbear[8986]: Child connection from 80.64.30.65:37964
Sun Dec 15 06:46:24 2024 authpriv.warn dropbear[8986]: Login attempt for nonexistent user
Sun Dec 15 06:46:25 2024 authpriv.info dropbear[8986]: Exit before auth from <80.64.30.65:37964>: Error reading: Connection reset by peer
Sun Dec 15 06:46:26 2024 authpriv.info dropbear[8987]: Child connection from 80.64.30.65:37980
Sun Dec 15 06:46:28 2024 authpriv.warn dropbear[8987]: Login attempt for nonexistent user
Sun Dec 15 06:46:30 2024 authpriv.info dropbear[8987]: Exit before auth from <80.64.30.65:37980>: Error reading: Connection reset by peer
Sun Dec 15 06:46:30 2024 authpriv.info dropbear[8988]: Child connection from 80.64.30.65:37990
Sun Dec 15 06:46:32 2024 authpriv.warn dropbear[8988]: Login attempt for nonexistent user
Sun Dec 15 06:46:33 2024 authpriv.info dropbear[8988]: Exit before auth from <80.64.30.65:37990>: Error reading: Connection reset by peer
Sun Dec 15 06:46:34 2024 authpriv.info dropbear[8989]: Child connection from 80.64.30.65:45952
Sun Dec 15 06:46:37 2024 authpriv.warn dropbear[8989]: Login attempt for nonexistent user
Sun Dec 15 06:46:38 2024 authpriv.info dropbear[8989]: Exit before auth from <80.64.30.65:45952>: Error reading: Connection reset by peer
Sun Dec 15 06:46:39 2024 authpriv.info dropbear[8990]: Child connection from 80.64.30.65:45956
Sun Dec 15 06:46:40 2024 authpriv.warn dropbear[8990]: Login attempt for nonexistent user
Sun Dec 15 06:46:42 2024 authpriv.info dropbear[8990]: Exit before auth from <80.64.30.65:45956>: Error reading: Connection reset by peer
Sun Dec 15 06:47:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:47:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 06:47:50 2024 authpriv.info dropbear[8992]: Child connection from 218.92.0.219:39986
Sun Dec 15 06:47:52 2024 authpriv.info dropbear[8992]: Exit before auth from <218.92.0.219:39986>: Disconnect received
Sun Dec 15 06:49:02 2024 authpriv.info dropbear[8993]: Child connection from 218.92.0.218:10748
Sun Dec 15 06:49:05 2024 authpriv.info dropbear[8993]: Exit before auth from <218.92.0.218:10748>: Disconnect received
Sun Dec 15 06:49:46 2024 authpriv.info dropbear[8994]: Child connection from 194.169.175.37:60220
Sun Dec 15 06:49:48 2024 authpriv.warn dropbear[8994]: Bad password attempt for 'root' from 194.169.175.37:60220
Sun Dec 15 06:49:49 2024 authpriv.info dropbear[8994]: Exit before auth from <194.169.175.37:60220>: (user 'root', 1 fails): Exited normally
Sun Dec 15 06:52:17 2024 authpriv.info dropbear[8995]: Child connection from 218.92.0.227:14918
Sun Dec 15 06:52:20 2024 authpriv.info dropbear[8995]: Exit before auth from <218.92.0.227:14918>: Disconnect received
Sun Dec 15 06:53:10 2024 authpriv.info dropbear[8996]: Child connection from 218.92.0.235:28996
Sun Dec 15 06:53:12 2024 authpriv.info dropbear[8996]: Exit before auth from <218.92.0.235:28996>: Disconnect received
Sun Dec 15 06:57:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 06:57:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 07:04:22 2024 authpriv.info dropbear[9030]: Child connection from 218.92.0.229:20902
Sun Dec 15 07:04:24 2024 authpriv.info dropbear[9030]: Exit before auth from <218.92.0.229:20902>: Disconnect received
Sun Dec 15 07:05:54 2024 authpriv.info dropbear[9031]: Child connection from 218.92.0.231:41834
Sun Dec 15 07:05:56 2024 authpriv.info dropbear[9031]: Exit before auth from <218.92.0.231:41834>: Disconnect received
Sun Dec 15 07:06:01 2024 kern.info kernel: [77443.905706] mt7530-mdio mdio-bus:00 lan2: Link is Up - 1Gbps/Full - flow control off
Sun Dec 15 07:06:01 2024 kern.info kernel: [77443.905746] br-lan: port 2(lan2) entered blocking state
Sun Dec 15 07:06:01 2024 kern.info kernel: [77443.918733] br-lan: port 2(lan2) entered forwarding state
Sun Dec 15 07:06:01 2024 daemon.notice netifd: Network device 'lan2' link is up
Sun Dec 15 07:06:29 2024 daemon.notice netifd: Network device 'lan2' link is down
Sun Dec 15 07:06:29 2024 kern.info kernel: [77472.543076] br-lan: port 2(lan2) entered disabled state
Sun Dec 15 07:06:29 2024 kern.info kernel: [77472.543126] mt7530-mdio mdio-bus:00 lan2: Link is Down
Sun Dec 15 07:06:38 2024 kern.info kernel: [77481.431426] mt7530-mdio mdio-bus:00 lan2: Link is Up - 1Gbps/Full - flow control rx/tx
Sun Dec 15 07:06:38 2024 kern.info kernel: [77481.431473] br-lan: port 2(lan2) entered blocking state
Sun Dec 15 07:06:38 2024 kern.info kernel: [77481.444626] br-lan: port 2(lan2) entered forwarding state
Sun Dec 15 07:06:38 2024 daemon.notice netifd: Network device 'lan2' link is up
Sun Dec 15 07:07:09 2024 authpriv.info dropbear[9040]: Child connection from 192.168.1.172:51950
Sun Dec 15 07:07:16 2024 authpriv.notice dropbear[9040]: Password auth succeeded for 'root' from 192.168.1.172:51950
Sun Dec 15 07:07:16 2024 authpriv.info dropbear[9041]: Child connection from 192.168.1.172:51951
Sun Dec 15 07:07:17 2024 authpriv.notice dropbear[9041]: Password auth succeeded for 'root' from 192.168.1.172:51951
Sun Dec 15 07:07:31 2024 authpriv.info dropbear[9052]: Child connection from 192.168.1.172:51953
Sun Dec 15 07:07:31 2024 authpriv.info dropbear[9052]: Exit before auth from <192.168.1.172:51953>: (user 'root', 0 fails): Disconnect received
Sun Dec 15 07:07:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 07:07:34 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 07:08:21 2024 authpriv.info dropbear[9054]: Child connection from 218.92.0.221:51052
Sun Dec 15 07:08:23 2024 authpriv.info dropbear[9054]: Exit before auth from <218.92.0.221:51052>: Disconnect received
Sun Dec 15 07:09:50 2024 authpriv.info dropbear[9055]: Child connection from 2.57.122.32:44320
Sun Dec 15 07:09:51 2024 authpriv.info dropbear[9055]: Exit before auth from <2.57.122.32:44320>: Exited normally
Sun Dec 15 07:11:20 2024 authpriv.info dropbear[9057]: Child connection from 218.92.0.228:10608
Sun Dec 15 07:11:22 2024 authpriv.info dropbear[9057]: Exit before auth from <218.92.0.228:10608>: Disconnect received
Sun Dec 15 07:12:18 2024 authpriv.info dropbear[9058]: Child connection from 2.57.122.33:46350
Sun Dec 15 07:12:19 2024 authpriv.info dropbear[9058]: Exit before auth from <2.57.122.33:46350>: Exited normally
Sun Dec 15 07:13:04 2024 authpriv.info dropbear[9059]: Child connection from 192.168.1.172:52256
Sun Dec 15 07:13:04 2024 authpriv.info dropbear[9059]: Exit before auth from <192.168.1.172:52256>: (user 'root', 0 fails): Disconnect received
Sun Dec 15 01:02:45 2024 authpriv.info dropbear[8439]: Child connection from 101.36.112.240:24486
Sun Dec 15 01:02:47 2024 authpriv.warn dropbear[8439]: Bad password attempt for 'root' from 101.36.112.240:24486
Sun Dec 15 01:02:47 2024 authpriv.info dropbear[8439]: Exit before auth from <101.36.112.240:24486>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:47 2024 authpriv.info dropbear[8440]: Child connection from 101.36.112.240:25064
Sun Dec 15 01:02:48 2024 authpriv.warn dropbear[8440]: Bad password attempt for 'root' from 101.36.112.240:25064
Sun Dec 15 01:02:49 2024 authpriv.info dropbear[8449]: Child connection from 101.36.112.240:25470
Sun Dec 15 01:02:49 2024 authpriv.info dropbear[8440]: Exit before auth from <101.36.112.240:25064>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:50 2024 authpriv.warn dropbear[8449]: Bad password attempt for 'root' from 101.36.112.240:25470
Sun Dec 15 01:02:51 2024 authpriv.info dropbear[8449]: Exit before auth from <101.36.112.240:25470>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:51 2024 authpriv.info dropbear[8450]: Child connection from 101.36.112.240:25970
Sun Dec 15 01:02:52 2024 authpriv.warn dropbear[8450]: Bad password attempt for 'root' from 101.36.112.240:25970
Sun Dec 15 01:02:53 2024 authpriv.info dropbear[8451]: Child connection from 101.36.112.240:26486
Sun Dec 15 01:02:53 2024 authpriv.info dropbear[8450]: Exit before auth from <101.36.112.240:25970>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:54 2024 authpriv.warn dropbear[8451]: Bad password attempt for 'root' from 101.36.112.240:26486
Sun Dec 15 01:02:55 2024 authpriv.info dropbear[8451]: Exit before auth from <101.36.112.240:26486>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:55 2024 authpriv.info dropbear[8452]: Child connection from 101.36.112.240:27000
Sun Dec 15 01:02:56 2024 authpriv.warn dropbear[8452]: Bad password attempt for 'root' from 101.36.112.240:27000
Sun Dec 15 01:02:57 2024 authpriv.info dropbear[8452]: Exit before auth from <101.36.112.240:27000>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:57 2024 authpriv.info dropbear[8453]: Child connection from 101.36.112.240:27560
Sun Dec 15 01:02:58 2024 authpriv.warn dropbear[8453]: Bad password attempt for 'root' from 101.36.112.240:27560
Sun Dec 15 01:02:59 2024 authpriv.info dropbear[8453]: Exit before auth from <101.36.112.240:27560>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:02:59 2024 authpriv.info dropbear[8454]: Child connection from 101.36.112.240:28044
Sun Dec 15 01:03:00 2024 authpriv.warn dropbear[8454]: Bad password attempt for 'root' from 101.36.112.240:28044
Sun Dec 15 01:03:01 2024 authpriv.info dropbear[8454]: Exit before auth from <101.36.112.240:28044>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:01 2024 authpriv.info dropbear[8455]: Child connection from 101.36.112.240:28518
Sun Dec 15 01:03:02 2024 authpriv.warn dropbear[8455]: Bad password attempt for 'root' from 101.36.112.240:28518
Sun Dec 15 01:03:02 2024 authpriv.info dropbear[8455]: Exit before auth from <101.36.112.240:28518>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:03 2024 authpriv.info dropbear[8456]: Child connection from 101.36.112.240:28980
Sun Dec 15 01:03:04 2024 authpriv.warn dropbear[8456]: Bad password attempt for 'root' from 101.36.112.240:28980
Sun Dec 15 01:03:04 2024 authpriv.info dropbear[8456]: Exit before auth from <101.36.112.240:28980>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:04 2024 authpriv.info dropbear[8457]: Child connection from 101.36.112.240:29418
Sun Dec 15 01:03:05 2024 authpriv.warn dropbear[8457]: Bad password attempt for 'root' from 101.36.112.240:29418
Sun Dec 15 01:03:06 2024 authpriv.info dropbear[8458]: Child connection from 101.36.112.240:29918
Sun Dec 15 01:03:06 2024 authpriv.info dropbear[8457]: Exit before auth from <101.36.112.240:29418>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:07 2024 authpriv.warn dropbear[8458]: Bad password attempt for 'root' from 101.36.112.240:29918
Sun Dec 15 01:03:08 2024 authpriv.info dropbear[8458]: Exit before auth from <101.36.112.240:29918>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:08 2024 authpriv.info dropbear[8459]: Child connection from 101.36.112.240:30398
Sun Dec 15 01:03:09 2024 authpriv.warn dropbear[8459]: Bad password attempt for 'root' from 101.36.112.240:30398
Sun Dec 15 01:03:10 2024 authpriv.info dropbear[8459]: Exit before auth from <101.36.112.240:30398>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:10 2024 authpriv.info dropbear[8460]: Child connection from 101.36.112.240:30974
Sun Dec 15 01:03:12 2024 authpriv.warn dropbear[8460]: Bad password attempt for 'root' from 101.36.112.240:30974
Sun Dec 15 01:03:12 2024 authpriv.info dropbear[8461]: Child connection from 101.36.112.240:31514
Sun Dec 15 01:03:12 2024 authpriv.info dropbear[8460]: Exit before auth from <101.36.112.240:30974>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:13 2024 authpriv.warn dropbear[8461]: Bad password attempt for 'root' from 101.36.112.240:31514
Sun Dec 15 01:03:14 2024 authpriv.info dropbear[8462]: Child connection from 101.36.112.240:31936
Sun Dec 15 01:03:14 2024 authpriv.info dropbear[8461]: Exit before auth from <101.36.112.240:31514>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:15 2024 authpriv.warn dropbear[8462]: Bad password attempt for 'root' from 101.36.112.240:31936
Sun Dec 15 01:03:16 2024 authpriv.info dropbear[8462]: Exit before auth from <101.36.112.240:31936>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:16 2024 authpriv.info dropbear[8463]: Child connection from 101.36.112.240:32454
Sun Dec 15 01:03:17 2024 authpriv.warn dropbear[8463]: Bad password attempt for 'root' from 101.36.112.240:32454
Sun Dec 15 01:03:18 2024 authpriv.info dropbear[8463]: Exit before auth from <101.36.112.240:32454>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:18 2024 authpriv.info dropbear[8464]: Child connection from 101.36.112.240:32934
Sun Dec 15 01:03:19 2024 authpriv.warn dropbear[8464]: Bad password attempt for 'root' from 101.36.112.240:32934
Sun Dec 15 01:03:20 2024 authpriv.info dropbear[8465]: Child connection from 101.36.112.240:33486
Sun Dec 15 01:03:20 2024 authpriv.info dropbear[8464]: Exit before auth from <101.36.112.240:32934>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:21 2024 authpriv.warn dropbear[8465]: Bad password attempt for 'root' from 101.36.112.240:33486
Sun Dec 15 01:03:22 2024 authpriv.info dropbear[8465]: Exit before auth from <101.36.112.240:33486>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:22 2024 authpriv.info dropbear[8466]: Child connection from 101.36.112.240:33986
Sun Dec 15 01:03:23 2024 authpriv.warn dropbear[8466]: Bad password attempt for 'root' from 101.36.112.240:33986
Sun Dec 15 01:03:24 2024 authpriv.info dropbear[8466]: Exit before auth from <101.36.112.240:33986>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:24 2024 authpriv.info dropbear[8467]: Child connection from 101.36.112.240:34480
Sun Dec 15 01:03:25 2024 authpriv.warn dropbear[8467]: Bad password attempt for 'root' from 101.36.112.240:34480
Sun Dec 15 01:03:26 2024 authpriv.info dropbear[8468]: Child connection from 101.36.112.240:34964
Sun Dec 15 01:03:26 2024 authpriv.info dropbear[8467]: Exit before auth from <101.36.112.240:34480>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:27 2024 authpriv.warn dropbear[8468]: Bad password attempt for 'root' from 101.36.112.240:34964
Sun Dec 15 01:03:28 2024 authpriv.info dropbear[8468]: Exit before auth from <101.36.112.240:34964>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:28 2024 authpriv.info dropbear[8469]: Child connection from 101.36.112.240:35478
Sun Dec 15 01:03:29 2024 authpriv.warn dropbear[8469]: Bad password attempt for 'root' from 101.36.112.240:35478
Sun Dec 15 01:03:29 2024 authpriv.info dropbear[8469]: Exit before auth from <101.36.112.240:35478>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:29 2024 authpriv.info dropbear[8470]: Child connection from 101.36.112.240:35940
Sun Dec 15 01:03:31 2024 authpriv.warn dropbear[8470]: Bad password attempt for 'root' from 101.36.112.240:35940
Sun Dec 15 01:03:31 2024 authpriv.info dropbear[8470]: Exit before auth from <101.36.112.240:35940>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:31 2024 authpriv.info dropbear[8471]: Child connection from 101.36.112.240:36454
Sun Dec 15 01:03:32 2024 authpriv.warn dropbear[8471]: Bad password attempt for 'root' from 101.36.112.240:36454
Sun Dec 15 01:03:33 2024 authpriv.info dropbear[8471]: Exit before auth from <101.36.112.240:36454>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:33 2024 authpriv.info dropbear[8472]: Child connection from 101.36.112.240:36948
Sun Dec 15 01:03:34 2024 authpriv.warn dropbear[8472]: Bad password attempt for 'root' from 101.36.112.240:36948
Sun Dec 15 01:03:35 2024 authpriv.info dropbear[8472]: Exit before auth from <101.36.112.240:36948>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:35 2024 authpriv.info dropbear[8473]: Child connection from 101.36.112.240:37408
Sun Dec 15 01:03:36 2024 authpriv.warn dropbear[8473]: Bad password attempt for 'root' from 101.36.112.240:37408
Sun Dec 15 01:03:37 2024 authpriv.info dropbear[8473]: Exit before auth from <101.36.112.240:37408>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:37 2024 authpriv.info dropbear[8474]: Child connection from 101.36.112.240:37886
Sun Dec 15 01:03:38 2024 authpriv.warn dropbear[8474]: Bad password attempt for 'root' from 101.36.112.240:37886
Sun Dec 15 01:03:39 2024 authpriv.info dropbear[8474]: Exit before auth from <101.36.112.240:37886>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:39 2024 authpriv.info dropbear[8475]: Child connection from 101.36.112.240:38348
Sun Dec 15 01:03:40 2024 authpriv.warn dropbear[8475]: Bad password attempt for 'root' from 101.36.112.240:38348
Sun Dec 15 01:03:41 2024 authpriv.info dropbear[8475]: Exit before auth from <101.36.112.240:38348>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:41 2024 authpriv.info dropbear[8476]: Child connection from 101.36.112.240:38890
Sun Dec 15 01:03:42 2024 authpriv.warn dropbear[8476]: Bad password attempt for 'root' from 101.36.112.240:38890
Sun Dec 15 01:03:43 2024 authpriv.info dropbear[8477]: Child connection from 101.36.112.240:39422
Sun Dec 15 01:03:43 2024 authpriv.info dropbear[8476]: Exit before auth from <101.36.112.240:38890>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:44 2024 authpriv.warn dropbear[8477]: Bad password attempt for 'root' from 101.36.112.240:39422
Sun Dec 15 01:03:44 2024 authpriv.info dropbear[8477]: Exit before auth from <101.36.112.240:39422>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:44 2024 authpriv.info dropbear[8478]: Child connection from 101.36.112.240:39894
Sun Dec 15 01:03:46 2024 authpriv.warn dropbear[8478]: Bad password attempt for 'root' from 101.36.112.240:39894
Sun Dec 15 01:03:46 2024 authpriv.info dropbear[8478]: Exit before auth from <101.36.112.240:39894>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:46 2024 authpriv.info dropbear[8479]: Child connection from 101.36.112.240:40386
Sun Dec 15 01:03:47 2024 authpriv.warn dropbear[8479]: Bad password attempt for 'root' from 101.36.112.240:40386
Sun Dec 15 01:03:48 2024 authpriv.info dropbear[8479]: Exit before auth from <101.36.112.240:40386>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:48 2024 authpriv.info dropbear[8480]: Child connection from 101.36.112.240:40940
Sun Dec 15 01:03:49 2024 authpriv.warn dropbear[8480]: Bad password attempt for 'root' from 101.36.112.240:40940
Sun Dec 15 01:03:50 2024 authpriv.info dropbear[8480]: Exit before auth from <101.36.112.240:40940>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:50 2024 authpriv.info dropbear[8481]: Child connection from 101.36.112.240:41390
Sun Dec 15 01:03:51 2024 authpriv.warn dropbear[8481]: Bad password attempt for 'root' from 101.36.112.240:41390
Sun Dec 15 01:03:52 2024 authpriv.info dropbear[8481]: Exit before auth from <101.36.112.240:41390>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:52 2024 authpriv.info dropbear[8482]: Child connection from 101.36.112.240:41906
Sun Dec 15 01:03:53 2024 authpriv.warn dropbear[8482]: Bad password attempt for 'root' from 101.36.112.240:41906
Sun Dec 15 01:03:54 2024 authpriv.info dropbear[8482]: Exit before auth from <101.36.112.240:41906>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:54 2024 authpriv.info dropbear[8483]: Child connection from 101.36.112.240:42444
Sun Dec 15 01:03:55 2024 authpriv.warn dropbear[8483]: Bad password attempt for 'root' from 101.36.112.240:42444
Sun Dec 15 01:03:56 2024 authpriv.info dropbear[8483]: Exit before auth from <101.36.112.240:42444>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:56 2024 authpriv.info dropbear[8484]: Child connection from 101.36.112.240:43088
Sun Dec 15 01:03:57 2024 authpriv.warn dropbear[8484]: Bad password attempt for 'root' from 101.36.112.240:43088
Sun Dec 15 01:03:58 2024 authpriv.info dropbear[8484]: Exit before auth from <101.36.112.240:43088>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:58 2024 authpriv.info dropbear[8485]: Child connection from 101.36.112.240:43550
Sun Dec 15 01:03:59 2024 authpriv.warn dropbear[8485]: Bad password attempt for 'root' from 101.36.112.240:43550
Sun Dec 15 01:03:59 2024 authpriv.info dropbear[8485]: Exit before auth from <101.36.112.240:43550>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:03:59 2024 authpriv.info dropbear[8486]: Child connection from 101.36.112.240:44064
Sun Dec 15 01:04:01 2024 authpriv.warn dropbear[8486]: Bad password attempt for 'root' from 101.36.112.240:44064
Sun Dec 15 01:04:01 2024 authpriv.info dropbear[8486]: Exit before auth from <101.36.112.240:44064>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:01 2024 authpriv.info dropbear[8487]: Child connection from 101.36.112.240:44588
Sun Dec 15 01:04:03 2024 authpriv.warn dropbear[8487]: Bad password attempt for 'root' from 101.36.112.240:44588
Sun Dec 15 01:04:03 2024 authpriv.info dropbear[8487]: Exit before auth from <101.36.112.240:44588>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:03 2024 authpriv.info dropbear[8488]: Child connection from 101.36.112.240:45118
Sun Dec 15 01:04:04 2024 authpriv.warn dropbear[8488]: Bad password attempt for 'root' from 101.36.112.240:45118
Sun Dec 15 01:04:05 2024 authpriv.info dropbear[8489]: Child connection from 101.36.112.240:45652
Sun Dec 15 01:04:05 2024 authpriv.info dropbear[8488]: Exit before auth from <101.36.112.240:45118>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:06 2024 authpriv.warn dropbear[8489]: Bad password attempt for 'root' from 101.36.112.240:45652
Sun Dec 15 01:04:07 2024 authpriv.info dropbear[8489]: Exit before auth from <101.36.112.240:45652>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:07 2024 authpriv.info dropbear[8490]: Child connection from 101.36.112.240:46206
Sun Dec 15 01:04:08 2024 authpriv.warn dropbear[8490]: Bad password attempt for 'root' from 101.36.112.240:46206
Sun Dec 15 01:04:09 2024 authpriv.info dropbear[8490]: Exit before auth from <101.36.112.240:46206>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:09 2024 authpriv.info dropbear[8491]: Child connection from 101.36.112.240:46688
Sun Dec 15 01:04:10 2024 authpriv.warn dropbear[8491]: Bad password attempt for 'root' from 101.36.112.240:46688
Sun Dec 15 01:04:10 2024 authpriv.info dropbear[8491]: Exit before auth from <101.36.112.240:46688>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:10 2024 authpriv.info dropbear[8492]: Child connection from 101.36.112.240:47172
Sun Dec 15 01:04:12 2024 authpriv.warn dropbear[8492]: Bad password attempt for 'root' from 101.36.112.240:47172
Sun Dec 15 01:04:12 2024 authpriv.info dropbear[8492]: Exit before auth from <101.36.112.240:47172>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:12 2024 authpriv.info dropbear[8493]: Child connection from 101.36.112.240:47680
Sun Dec 15 01:04:13 2024 authpriv.warn dropbear[8493]: Bad password attempt for 'root' from 101.36.112.240:47680
Sun Dec 15 01:04:14 2024 authpriv.info dropbear[8494]: Child connection from 101.36.112.240:48184
Sun Dec 15 01:04:14 2024 authpriv.info dropbear[8493]: Exit before auth from <101.36.112.240:47680>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:15 2024 authpriv.warn dropbear[8494]: Bad password attempt for 'root' from 101.36.112.240:48184
Sun Dec 15 01:04:16 2024 authpriv.info dropbear[8494]: Exit before auth from <101.36.112.240:48184>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:16 2024 authpriv.info dropbear[8495]: Child connection from 101.36.112.240:48706
Sun Dec 15 01:04:17 2024 authpriv.warn dropbear[8495]: Bad password attempt for 'root' from 101.36.112.240:48706
Sun Dec 15 01:04:18 2024 authpriv.info dropbear[8495]: Exit before auth from <101.36.112.240:48706>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:18 2024 authpriv.info dropbear[8496]: Child connection from 101.36.112.240:49308
Sun Dec 15 01:04:19 2024 authpriv.warn dropbear[8496]: Bad password attempt for 'root' from 101.36.112.240:49308
Sun Dec 15 01:04:20 2024 authpriv.info dropbear[8497]: Child connection from 101.36.112.240:49804
Sun Dec 15 01:04:20 2024 authpriv.info dropbear[8496]: Exit before auth from <101.36.112.240:49308>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:21 2024 authpriv.warn dropbear[8497]: Bad password attempt for 'root' from 101.36.112.240:49804
Sun Dec 15 01:04:21 2024 authpriv.info dropbear[8497]: Exit before auth from <101.36.112.240:49804>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:21 2024 authpriv.info dropbear[8498]: Child connection from 101.36.112.240:50328
Sun Dec 15 01:04:23 2024 authpriv.warn dropbear[8498]: Bad password attempt for 'root' from 101.36.112.240:50328
Sun Dec 15 01:04:23 2024 authpriv.info dropbear[8498]: Exit before auth from <101.36.112.240:50328>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:23 2024 authpriv.info dropbear[8499]: Child connection from 101.36.112.240:50904
Sun Dec 15 01:04:25 2024 authpriv.warn dropbear[8499]: Bad password attempt for 'root' from 101.36.112.240:50904
Sun Dec 15 01:04:25 2024 authpriv.info dropbear[8499]: Exit before auth from <101.36.112.240:50904>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:25 2024 authpriv.info dropbear[8500]: Child connection from 101.36.112.240:51364
Sun Dec 15 01:04:26 2024 authpriv.warn dropbear[8500]: Bad password attempt for 'root' from 101.36.112.240:51364
Sun Dec 15 01:04:27 2024 authpriv.info dropbear[8500]: Exit before auth from <101.36.112.240:51364>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:27 2024 authpriv.info dropbear[8501]: Child connection from 101.36.112.240:51940
Sun Dec 15 01:04:28 2024 authpriv.warn dropbear[8501]: Bad password attempt for 'root' from 101.36.112.240:51940
Sun Dec 15 01:04:29 2024 authpriv.info dropbear[8502]: Child connection from 101.36.112.240:52484
Sun Dec 15 01:04:29 2024 authpriv.info dropbear[8501]: Exit before auth from <101.36.112.240:51940>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:30 2024 authpriv.warn dropbear[8502]: Bad password attempt for 'root' from 101.36.112.240:52484
Sun Dec 15 01:04:31 2024 authpriv.info dropbear[8502]: Exit before auth from <101.36.112.240:52484>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:31 2024 authpriv.info dropbear[8503]: Child connection from 101.36.112.240:53004
Sun Dec 15 01:04:32 2024 authpriv.warn dropbear[8503]: Bad password attempt for 'root' from 101.36.112.240:53004
Sun Dec 15 01:04:33 2024 authpriv.info dropbear[8503]: Exit before auth from <101.36.112.240:53004>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:33 2024 authpriv.info dropbear[8504]: Child connection from 101.36.112.240:53462
Sun Dec 15 01:04:34 2024 authpriv.warn dropbear[8504]: Bad password attempt for 'root' from 101.36.112.240:53462
Sun Dec 15 01:04:34 2024 authpriv.info dropbear[8504]: Exit before auth from <101.36.112.240:53462>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:34 2024 authpriv.info dropbear[8505]: Child connection from 101.36.112.240:53992
Sun Dec 15 01:04:36 2024 authpriv.warn dropbear[8505]: Bad password attempt for 'root' from 101.36.112.240:53992
Sun Dec 15 01:04:36 2024 authpriv.info dropbear[8505]: Exit before auth from <101.36.112.240:53992>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:36 2024 authpriv.info dropbear[8506]: Child connection from 101.36.112.240:54522
Sun Dec 15 01:04:37 2024 authpriv.warn dropbear[8506]: Bad password attempt for 'root' from 101.36.112.240:54522
Sun Dec 15 01:04:38 2024 authpriv.info dropbear[8506]: Exit before auth from <101.36.112.240:54522>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:38 2024 authpriv.info dropbear[8507]: Child connection from 101.36.112.240:55062
Sun Dec 15 01:04:39 2024 authpriv.warn dropbear[8507]: Bad password attempt for 'root' from 101.36.112.240:55062
Sun Dec 15 01:04:40 2024 authpriv.info dropbear[8507]: Exit before auth from <101.36.112.240:55062>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:40 2024 authpriv.info dropbear[8508]: Child connection from 101.36.112.240:55658
Sun Dec 15 01:04:41 2024 authpriv.warn dropbear[8508]: Bad password attempt for 'root' from 101.36.112.240:55658
Sun Dec 15 01:04:42 2024 authpriv.info dropbear[8509]: Child connection from 101.36.112.240:56284
Sun Dec 15 01:04:42 2024 authpriv.info dropbear[8508]: Exit before auth from <101.36.112.240:55658>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:43 2024 authpriv.warn dropbear[8509]: Bad password attempt for 'root' from 101.36.112.240:56284
Sun Dec 15 01:04:44 2024 authpriv.info dropbear[8509]: Exit before auth from <101.36.112.240:56284>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:44 2024 authpriv.info dropbear[8510]: Child connection from 101.36.112.240:56766
Sun Dec 15 01:04:45 2024 authpriv.warn dropbear[8510]: Bad password attempt for 'root' from 101.36.112.240:56766
Sun Dec 15 01:04:46 2024 authpriv.info dropbear[8510]: Exit before auth from <101.36.112.240:56766>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:46 2024 authpriv.info dropbear[8511]: Child connection from 101.36.112.240:57290
Sun Dec 15 01:04:47 2024 authpriv.warn dropbear[8511]: Bad password attempt for 'root' from 101.36.112.240:57290
Sun Dec 15 01:04:47 2024 authpriv.info dropbear[8511]: Exit before auth from <101.36.112.240:57290>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:47 2024 authpriv.info dropbear[8512]: Child connection from 101.36.112.240:57830
Sun Dec 15 01:04:48 2024 authpriv.warn dropbear[8512]: Bad password attempt for 'root' from 101.36.112.240:57830
Sun Dec 15 01:04:49 2024 authpriv.info dropbear[8512]: Exit before auth from <101.36.112.240:57830>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:49 2024 authpriv.info dropbear[8513]: Child connection from 101.36.112.240:58370
Sun Dec 15 01:04:50 2024 authpriv.warn dropbear[8513]: Bad password attempt for 'root' from 101.36.112.240:58370
Sun Dec 15 01:04:51 2024 authpriv.info dropbear[8514]: Child connection from 101.36.112.240:58888
Sun Dec 15 01:04:51 2024 authpriv.info dropbear[8513]: Exit before auth from <101.36.112.240:58370>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:52 2024 authpriv.warn dropbear[8514]: Bad password attempt for 'root' from 101.36.112.240:58888
Sun Dec 15 01:04:53 2024 authpriv.info dropbear[8514]: Exit before auth from <101.36.112.240:58888>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:53 2024 authpriv.info dropbear[8515]: Child connection from 101.36.112.240:59552
Sun Dec 15 01:04:54 2024 authpriv.warn dropbear[8515]: Bad password attempt for 'root' from 101.36.112.240:59552
Sun Dec 15 01:04:55 2024 authpriv.info dropbear[8515]: Exit before auth from <101.36.112.240:59552>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:55 2024 authpriv.info dropbear[8516]: Child connection from 101.36.112.240:60092
Sun Dec 15 01:04:56 2024 authpriv.warn dropbear[8516]: Bad password attempt for 'root' from 101.36.112.240:60092
Sun Dec 15 01:04:57 2024 authpriv.info dropbear[8516]: Exit before auth from <101.36.112.240:60092>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:57 2024 authpriv.info dropbear[8517]: Child connection from 101.36.112.240:60652
Sun Dec 15 01:04:58 2024 authpriv.warn dropbear[8517]: Bad password attempt for 'root' from 101.36.112.240:60652
Sun Dec 15 01:04:58 2024 authpriv.info dropbear[8517]: Exit before auth from <101.36.112.240:60652>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:04:59 2024 authpriv.info dropbear[8518]: Child connection from 101.36.112.240:61144
Sun Dec 15 01:05:00 2024 authpriv.warn dropbear[8518]: Bad password attempt for 'root' from 101.36.112.240:61144
Sun Dec 15 01:05:01 2024 authpriv.info dropbear[8518]: Exit before auth from <101.36.112.240:61144>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:01 2024 authpriv.info dropbear[8519]: Child connection from 101.36.112.240:61802
Sun Dec 15 01:05:02 2024 authpriv.warn dropbear[8519]: Bad password attempt for 'root' from 101.36.112.240:61802
Sun Dec 15 01:05:02 2024 authpriv.info dropbear[8519]: Exit before auth from <101.36.112.240:61802>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:02 2024 authpriv.info dropbear[8520]: Child connection from 101.36.112.240:62366
Sun Dec 15 01:05:04 2024 authpriv.warn dropbear[8520]: Bad password attempt for 'root' from 101.36.112.240:62366
Sun Dec 15 01:05:04 2024 authpriv.info dropbear[8520]: Exit before auth from <101.36.112.240:62366>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:04 2024 authpriv.info dropbear[8521]: Child connection from 101.36.112.240:62956
Sun Dec 15 01:05:05 2024 authpriv.warn dropbear[8521]: Bad password attempt for 'root' from 101.36.112.240:62956
Sun Dec 15 01:05:06 2024 authpriv.info dropbear[8521]: Exit before auth from <101.36.112.240:62956>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:06 2024 authpriv.info dropbear[8522]: Child connection from 101.36.112.240:63456
Sun Dec 15 01:05:07 2024 authpriv.warn dropbear[8522]: Bad password attempt for 'root' from 101.36.112.240:63456
Sun Dec 15 01:05:08 2024 authpriv.info dropbear[8523]: Child connection from 101.36.112.240:63960
Sun Dec 15 01:05:08 2024 authpriv.info dropbear[8522]: Exit before auth from <101.36.112.240:63456>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:09 2024 authpriv.warn dropbear[8523]: Bad password attempt for 'root' from 101.36.112.240:63960
Sun Dec 15 01:05:10 2024 authpriv.info dropbear[8523]: Exit before auth from <101.36.112.240:63960>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:10 2024 authpriv.info dropbear[8524]: Child connection from 101.36.112.240:64450
Sun Dec 15 01:05:11 2024 authpriv.warn dropbear[8524]: Bad password attempt for 'root' from 101.36.112.240:64450
Sun Dec 15 01:05:12 2024 authpriv.info dropbear[8524]: Exit before auth from <101.36.112.240:64450>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:12 2024 authpriv.info dropbear[8525]: Child connection from 101.36.112.240:10092
Sun Dec 15 01:05:13 2024 authpriv.warn dropbear[8525]: Bad password attempt for 'root' from 101.36.112.240:10092
Sun Dec 15 01:05:14 2024 authpriv.info dropbear[8526]: Child connection from 101.36.112.240:10600
Sun Dec 15 01:05:14 2024 authpriv.info dropbear[8525]: Exit before auth from <101.36.112.240:10092>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:15 2024 authpriv.warn dropbear[8526]: Bad password attempt for 'root' from 101.36.112.240:10600
Sun Dec 15 01:05:15 2024 authpriv.info dropbear[8526]: Exit before auth from <101.36.112.240:10600>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:15 2024 authpriv.info dropbear[8527]: Child connection from 101.36.112.240:11162
Sun Dec 15 01:05:16 2024 authpriv.warn dropbear[8527]: Bad password attempt for 'root' from 101.36.112.240:11162
Sun Dec 15 01:05:17 2024 authpriv.info dropbear[8527]: Exit before auth from <101.36.112.240:11162>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:17 2024 authpriv.info dropbear[8528]: Child connection from 101.36.112.240:11822
Sun Dec 15 01:05:18 2024 authpriv.warn dropbear[8528]: Bad password attempt for 'root' from 101.36.112.240:11822
Sun Dec 15 01:05:19 2024 authpriv.info dropbear[8528]: Exit before auth from <101.36.112.240:11822>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:19 2024 authpriv.info dropbear[8529]: Child connection from 101.36.112.240:12264
Sun Dec 15 01:05:20 2024 authpriv.warn dropbear[8529]: Bad password attempt for 'root' from 101.36.112.240:12264
Sun Dec 15 01:05:21 2024 authpriv.info dropbear[8530]: Child connection from 101.36.112.240:12784
Sun Dec 15 01:05:21 2024 authpriv.info dropbear[8529]: Exit before auth from <101.36.112.240:12264>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:22 2024 authpriv.warn dropbear[8530]: Bad password attempt for 'root' from 101.36.112.240:12784
Sun Dec 15 01:05:23 2024 authpriv.info dropbear[8530]: Exit before auth from <101.36.112.240:12784>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:23 2024 authpriv.info dropbear[8531]: Child connection from 101.36.112.240:13370
Sun Dec 15 01:05:24 2024 authpriv.warn dropbear[8531]: Bad password attempt for 'root' from 101.36.112.240:13370
Sun Dec 15 01:05:25 2024 authpriv.info dropbear[8531]: Exit before auth from <101.36.112.240:13370>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:25 2024 authpriv.info dropbear[8532]: Child connection from 101.36.112.240:13898
Sun Dec 15 01:05:26 2024 authpriv.warn dropbear[8532]: Bad password attempt for 'root' from 101.36.112.240:13898
Sun Dec 15 01:05:27 2024 authpriv.info dropbear[8532]: Exit before auth from <101.36.112.240:13898>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:27 2024 authpriv.info dropbear[8533]: Child connection from 101.36.112.240:14496
Sun Dec 15 01:05:28 2024 authpriv.warn dropbear[8533]: Bad password attempt for 'root' from 101.36.112.240:14496
Sun Dec 15 01:05:28 2024 authpriv.info dropbear[8533]: Exit before auth from <101.36.112.240:14496>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:28 2024 authpriv.info dropbear[8534]: Child connection from 101.36.112.240:15002
Sun Dec 15 01:05:29 2024 authpriv.warn dropbear[8534]: Bad password attempt for 'root' from 101.36.112.240:15002
Sun Dec 15 01:05:30 2024 authpriv.info dropbear[8534]: Exit before auth from <101.36.112.240:15002>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:30 2024 authpriv.info dropbear[8535]: Child connection from 101.36.112.240:15548
Sun Dec 15 01:05:31 2024 authpriv.warn dropbear[8535]: Bad password attempt for 'root' from 101.36.112.240:15548
Sun Dec 15 01:05:32 2024 authpriv.info dropbear[8535]: Exit before auth from <101.36.112.240:15548>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:32 2024 authpriv.info dropbear[8536]: Child connection from 101.36.112.240:16054
Sun Dec 15 01:05:33 2024 authpriv.warn dropbear[8536]: Bad password attempt for 'root' from 101.36.112.240:16054
Sun Dec 15 01:05:34 2024 authpriv.info dropbear[8537]: Child connection from 101.36.112.240:16626
Sun Dec 15 01:05:34 2024 authpriv.info dropbear[8536]: Exit before auth from <101.36.112.240:16054>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:35 2024 authpriv.warn dropbear[8537]: Bad password attempt for 'root' from 101.36.112.240:16626
Sun Dec 15 01:05:36 2024 authpriv.info dropbear[8537]: Exit before auth from <101.36.112.240:16626>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:36 2024 authpriv.info dropbear[8538]: Child connection from 101.36.112.240:17172
Sun Dec 15 01:05:37 2024 authpriv.warn dropbear[8538]: Bad password attempt for 'root' from 101.36.112.240:17172
Sun Dec 15 01:05:38 2024 authpriv.info dropbear[8538]: Exit before auth from <101.36.112.240:17172>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:38 2024 authpriv.info dropbear[8539]: Child connection from 101.36.112.240:17720
Sun Dec 15 01:05:39 2024 authpriv.warn dropbear[8539]: Bad password attempt for 'root' from 101.36.112.240:17720
Sun Dec 15 01:05:39 2024 authpriv.info dropbear[8539]: Exit before auth from <101.36.112.240:17720>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:39 2024 authpriv.info dropbear[8540]: Child connection from 101.36.112.240:18212
Sun Dec 15 01:05:40 2024 authpriv.warn dropbear[8540]: Bad password attempt for 'root' from 101.36.112.240:18212
Sun Dec 15 01:05:41 2024 authpriv.info dropbear[8540]: Exit before auth from <101.36.112.240:18212>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:42 2024 authpriv.info dropbear[8541]: Child connection from 101.36.112.240:18756
Sun Dec 15 01:05:43 2024 authpriv.warn dropbear[8541]: Bad password attempt for 'root' from 101.36.112.240:18756
Sun Dec 15 01:05:44 2024 authpriv.info dropbear[8541]: Exit before auth from <101.36.112.240:18756>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:44 2024 authpriv.info dropbear[8542]: Child connection from 101.36.112.240:19734
Sun Dec 15 01:05:45 2024 authpriv.warn dropbear[8542]: Bad password attempt for 'root' from 101.36.112.240:19734
Sun Dec 15 01:05:46 2024 authpriv.info dropbear[8542]: Exit before auth from <101.36.112.240:19734>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:46 2024 authpriv.info dropbear[8543]: Child connection from 101.36.112.240:20286
Sun Dec 15 01:05:47 2024 authpriv.warn dropbear[8543]: Bad password attempt for 'root' from 101.36.112.240:20286
Sun Dec 15 01:05:48 2024 authpriv.info dropbear[8543]: Exit before auth from <101.36.112.240:20286>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:48 2024 authpriv.info dropbear[8544]: Child connection from 101.36.112.240:20896
Sun Dec 15 01:05:49 2024 authpriv.warn dropbear[8544]: Bad password attempt for 'root' from 101.36.112.240:20896
Sun Dec 15 01:05:50 2024 authpriv.info dropbear[8544]: Exit before auth from <101.36.112.240:20896>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:50 2024 authpriv.info dropbear[8545]: Child connection from 101.36.112.240:21412
Sun Dec 15 01:05:51 2024 authpriv.warn dropbear[8545]: Bad password attempt for 'root' from 101.36.112.240:21412
Sun Dec 15 01:05:52 2024 authpriv.info dropbear[8546]: Child connection from 101.36.112.240:22030
Sun Dec 15 01:05:52 2024 authpriv.info dropbear[8545]: Exit before auth from <101.36.112.240:21412>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:53 2024 authpriv.warn dropbear[8546]: Bad password attempt for 'root' from 101.36.112.240:22030
Sun Dec 15 01:05:54 2024 authpriv.info dropbear[8546]: Exit before auth from <101.36.112.240:22030>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:54 2024 authpriv.info dropbear[8547]: Child connection from 101.36.112.240:22568
Sun Dec 15 01:05:55 2024 authpriv.warn dropbear[8547]: Bad password attempt for 'root' from 101.36.112.240:22568
Sun Dec 15 01:05:56 2024 authpriv.info dropbear[8547]: Exit before auth from <101.36.112.240:22568>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:56 2024 authpriv.info dropbear[8548]: Child connection from 101.36.112.240:23128
Sun Dec 15 01:05:57 2024 authpriv.warn dropbear[8548]: Bad password attempt for 'root' from 101.36.112.240:23128
Sun Dec 15 01:05:58 2024 authpriv.info dropbear[8548]: Exit before auth from <101.36.112.240:23128>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:58 2024 authpriv.info dropbear[8549]: Child connection from 101.36.112.240:23710
Sun Dec 15 01:05:59 2024 authpriv.warn dropbear[8549]: Bad password attempt for 'root' from 101.36.112.240:23710
Sun Dec 15 01:05:59 2024 authpriv.info dropbear[8549]: Exit before auth from <101.36.112.240:23710>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:05:59 2024 authpriv.info dropbear[8550]: Child connection from 101.36.112.240:24244
Sun Dec 15 01:06:00 2024 authpriv.warn dropbear[8550]: Bad password attempt for 'root' from 101.36.112.240:24244
Sun Dec 15 01:06:01 2024 authpriv.info dropbear[8551]: Child connection from 101.36.112.240:24772
Sun Dec 15 01:06:01 2024 authpriv.info dropbear[8550]: Exit before auth from <101.36.112.240:24244>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:02 2024 authpriv.warn dropbear[8551]: Bad password attempt for 'root' from 101.36.112.240:24772
Sun Dec 15 01:06:03 2024 authpriv.info dropbear[8551]: Exit before auth from <101.36.112.240:24772>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:03 2024 authpriv.info dropbear[8552]: Child connection from 101.36.112.240:25316
Sun Dec 15 01:06:04 2024 authpriv.warn dropbear[8552]: Bad password attempt for 'root' from 101.36.112.240:25316
Sun Dec 15 01:06:05 2024 authpriv.info dropbear[8553]: Child connection from 101.36.112.240:25848
Sun Dec 15 01:06:05 2024 authpriv.info dropbear[8552]: Exit before auth from <101.36.112.240:25316>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:06 2024 authpriv.warn dropbear[8553]: Bad password attempt for 'root' from 101.36.112.240:25848
Sun Dec 15 01:06:07 2024 authpriv.info dropbear[8553]: Exit before auth from <101.36.112.240:25848>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:07 2024 authpriv.info dropbear[8554]: Child connection from 101.36.112.240:26408
Sun Dec 15 01:06:08 2024 authpriv.warn dropbear[8554]: Bad password attempt for 'root' from 101.36.112.240:26408
Sun Dec 15 01:06:09 2024 authpriv.info dropbear[8554]: Exit before auth from <101.36.112.240:26408>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:09 2024 authpriv.info dropbear[8555]: Child connection from 101.36.112.240:26984
Sun Dec 15 01:06:10 2024 authpriv.warn dropbear[8555]: Bad password attempt for 'root' from 101.36.112.240:26984
Sun Dec 15 01:06:11 2024 authpriv.info dropbear[8555]: Exit before auth from <101.36.112.240:26984>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:06:11 2024 authpriv.info dropbear[8556]: Child connection from 101.36.112.240:27538
Sun Dec 15 01:06:12 2024 authpriv.warn dropbear[8556]: Bad password attempt for 'root' from 101.36.112.240:27538
Sun Dec 15 01:06:13 2024 authpriv.info dropbear[8556]: Exit before auth from <101.36.112.240:27538>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:07:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:07:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 01:17:08 2024 authpriv.info dropbear[8567]: Child connection from 80.64.30.65:54962
Sun Dec 15 01:17:09 2024 authpriv.warn dropbear[8567]: Login attempt for nonexistent user
Sun Dec 15 01:17:11 2024 authpriv.info dropbear[8567]: Exit before auth from <80.64.30.65:54962>: Error reading: Connection reset by peer
Sun Dec 15 01:17:11 2024 authpriv.info dropbear[8568]: Child connection from 80.64.30.65:43060
Sun Dec 15 01:17:14 2024 authpriv.warn dropbear[8568]: Login attempt for nonexistent user
Sun Dec 15 01:17:15 2024 authpriv.info dropbear[8568]: Exit before auth from <80.64.30.65:43060>: Error reading: Connection reset by peer
Sun Dec 15 01:17:15 2024 authpriv.info dropbear[8569]: Child connection from 80.64.30.65:43068
Sun Dec 15 01:17:17 2024 authpriv.warn dropbear[8569]: Login attempt for nonexistent user
Sun Dec 15 01:17:19 2024 authpriv.info dropbear[8569]: Exit before auth from <80.64.30.65:43068>: Error reading: Connection reset by peer
Sun Dec 15 01:17:19 2024 authpriv.info dropbear[8570]: Child connection from 80.64.30.65:43074
Sun Dec 15 01:17:21 2024 authpriv.warn dropbear[8570]: Login attempt for nonexistent user
Sun Dec 15 01:17:23 2024 authpriv.info dropbear[8570]: Exit before auth from <80.64.30.65:43074>: Error reading: Connection reset by peer
Sun Dec 15 01:17:23 2024 authpriv.info dropbear[8571]: Child connection from 80.64.30.65:54818
Sun Dec 15 01:17:25 2024 authpriv.warn dropbear[8571]: Login attempt for nonexistent user
Sun Dec 15 01:17:26 2024 authpriv.info dropbear[8571]: Exit before auth from <80.64.30.65:54818>: Error reading: Connection reset by peer
Sun Dec 15 01:17:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:17:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 01:22:02 2024 authpriv.info dropbear[8572]: Child connection from 85.192.56.68:53284
Sun Dec 15 01:22:04 2024 authpriv.warn dropbear[8572]: Bad password attempt for 'root' from 85.192.56.68:53284
Sun Dec 15 01:22:05 2024 authpriv.info dropbear[8572]: Exit before auth from <85.192.56.68:53284>: (user 'root', 1 fails): Error reading: Connection reset by peer
Sun Dec 15 01:26:03 2024 authpriv.info dropbear[8582]: Child connection from 83.222.191.58:49451
Sun Dec 15 01:26:05 2024 authpriv.info dropbear[8582]: Exit before auth from <83.222.191.58:49451>: Unexpected packet type 20, expected 21
Sun Dec 15 01:26:20 2024 authpriv.info dropbear[8583]: Child connection from 194.169.175.37:56868
Sun Dec 15 01:26:22 2024 authpriv.warn dropbear[8583]: Bad password attempt for 'root' from 194.169.175.37:56868
Sun Dec 15 01:26:23 2024 authpriv.info dropbear[8583]: Exit before auth from <194.169.175.37:56868>: (user 'root', 1 fails): Exited normally
Sun Dec 15 01:27:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:27:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 01:37:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:37:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 01:39:44 2024 authpriv.info dropbear[8593]: Child connection from 87.120.117.228:49988
Sun Dec 15 01:39:46 2024 authpriv.info dropbear[8593]: Exit before auth from <87.120.117.228:49988>: Exited normally
Sun Dec 15 01:39:52 2024 authpriv.info dropbear[8594]: Child connection from 87.120.117.228:59988
Sun Dec 15 01:39:56 2024 authpriv.warn dropbear[8594]: Login attempt for nonexistent user
Sun Dec 15 01:39:56 2024 authpriv.info dropbear[8594]: Exit before auth from <87.120.117.228:59988>: Exited normally
Sun Dec 15 01:47:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:47:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 01:52:18 2024 authpriv.info dropbear[8605]: Child connection from 2.57.122.189:54016
Sun Dec 15 01:52:19 2024 authpriv.info dropbear[8605]: Exit before auth from <2.57.122.189:54016>: Exited normally
Sun Dec 15 01:57:26 2024 authpriv.info dropbear[8606]: Child connection from 147.185.132.111:56566
Sun Dec 15 01:57:26 2024 authpriv.info dropbear[8606]: Exit before auth from <147.185.132.111:56566>: Exited normally
Sun Dec 15 01:57:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 01:57:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:03:52 2024 authpriv.info dropbear[8615]: Child connection from 80.64.30.65:50110
Sun Dec 15 02:03:54 2024 authpriv.warn dropbear[8615]: Login attempt for nonexistent user
Sun Dec 15 02:03:56 2024 authpriv.info dropbear[8615]: Exit before auth from <80.64.30.65:50110>: Error reading: Connection reset by peer
Sun Dec 15 02:03:56 2024 authpriv.info dropbear[8616]: Child connection from 80.64.30.65:50112
Sun Dec 15 02:03:58 2024 authpriv.warn dropbear[8616]: Login attempt for nonexistent user
Sun Dec 15 02:03:59 2024 authpriv.info dropbear[8616]: Exit before auth from <80.64.30.65:50112>: Error reading: Connection reset by peer
Sun Dec 15 02:03:59 2024 authpriv.info dropbear[8617]: Child connection from 80.64.30.65:50120
Sun Dec 15 02:04:01 2024 authpriv.warn dropbear[8617]: Login attempt for nonexistent user
Sun Dec 15 02:04:03 2024 authpriv.info dropbear[8617]: Exit before auth from <80.64.30.65:50120>: Error reading: Connection reset by peer
Sun Dec 15 02:04:03 2024 authpriv.info dropbear[8618]: Child connection from 80.64.30.65:38450
Sun Dec 15 02:04:05 2024 authpriv.warn dropbear[8618]: Login attempt for nonexistent user
Sun Dec 15 02:04:06 2024 authpriv.info dropbear[8618]: Exit before auth from <80.64.30.65:38450>: Error reading: Connection reset by peer
Sun Dec 15 02:04:07 2024 authpriv.info dropbear[8619]: Child connection from 80.64.30.65:38468
Sun Dec 15 02:04:09 2024 authpriv.warn dropbear[8619]: Login attempt for nonexistent user
Sun Dec 15 02:04:10 2024 authpriv.info dropbear[8619]: Exit before auth from <80.64.30.65:38468>: Error reading: Connection reset by peer
Sun Dec 15 02:07:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:07:32 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:30:50 2024 authpriv.info dropbear[8639]: Child connection from 85.192.56.68:31246
Sun Dec 15 02:30:52 2024 authpriv.warn dropbear[8639]: Bad password attempt for 'root' from 85.192.56.68:31246
Sun Dec 15 02:30:52 2024 authpriv.info dropbear[8639]: Exit before auth from <85.192.56.68:31246>: (user 'root', 1 fails): Error reading: Connection reset by peer
Sun Dec 15 02:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:40:22 2024 authpriv.info dropbear[8651]: Child connection from 92.255.85.253:23686
Sun Dec 15 02:40:22 2024 authpriv.info dropbear[8651]: Early exit: Failed socket address: Socket not connected
Sun Dec 15 02:40:22 2024 authpriv.info dropbear[8652]: Child connection from 92.255.85.253:28855
Sun Dec 15 02:40:23 2024 authpriv.info dropbear[8652]: Exit before auth from <92.255.85.253:28855>: Exited normally
Sun Dec 15 02:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 02:50:37 2024 authpriv.info dropbear[8662]: Child connection from 80.64.30.65:39426
Sun Dec 15 02:50:38 2024 authpriv.warn dropbear[8662]: Login attempt for nonexistent user
Sun Dec 15 02:50:40 2024 authpriv.info dropbear[8662]: Exit before auth from <80.64.30.65:39426>: Error reading: Connection reset by peer
Sun Dec 15 02:50:40 2024 authpriv.info dropbear[8663]: Child connection from 80.64.30.65:39430
Sun Dec 15 02:50:42 2024 authpriv.warn dropbear[8663]: Login attempt for nonexistent user
Sun Dec 15 02:50:43 2024 authpriv.info dropbear[8663]: Exit before auth from <80.64.30.65:39430>: Error reading: Connection reset by peer
Sun Dec 15 02:50:44 2024 authpriv.info dropbear[8664]: Child connection from 80.64.30.65:36252
Sun Dec 15 02:50:46 2024 authpriv.warn dropbear[8664]: Login attempt for nonexistent user
Sun Dec 15 02:50:48 2024 authpriv.info dropbear[8664]: Exit before auth from <80.64.30.65:36252>: Error reading: Connection reset by peer
Sun Dec 15 02:50:48 2024 authpriv.info dropbear[8665]: Child connection from 80.64.30.65:36254
Sun Dec 15 02:50:50 2024 authpriv.warn dropbear[8665]: Login attempt for nonexistent user
Sun Dec 15 02:50:52 2024 authpriv.info dropbear[8665]: Exit before auth from <80.64.30.65:36254>: Error reading: Connection reset by peer
Sun Dec 15 02:50:52 2024 authpriv.info dropbear[8666]: Child connection from 80.64.30.65:54218
Sun Dec 15 02:50:54 2024 authpriv.warn dropbear[8666]: Login attempt for nonexistent user
Sun Dec 15 02:50:56 2024 authpriv.info dropbear[8666]: Exit before auth from <80.64.30.65:54218>: Error reading: Connection reset by peer
Sun Dec 15 02:51:29 2024 authpriv.info dropbear[8667]: Child connection from 59.127.74.209:37036
Sun Dec 15 02:51:32 2024 authpriv.warn dropbear[8667]: Login attempt for nonexistent user
Sun Dec 15 02:51:35 2024 authpriv.info dropbear[8667]: Exit before auth from <59.127.74.209:37036>: Max auth tries reached - user 'is invalid'
Sun Dec 15 02:56:11 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 02:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 02:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:02:28 2024 daemon.warn dnsmasq[9]: ignoring query from non-local network 167.94.145.109
Sun Dec 15 03:02:29 2024 daemon.warn dnsmasq[10]: ignoring query from non-local network 167.94.145.109
Sun Dec 15 03:02:30 2024 daemon.warn dnsmasq[11]: ignoring query from non-local network 167.94.145.109
Sun Dec 15 03:02:33 2024 daemon.warn dnsmasq[12]: ignoring query from non-local network 167.94.145.109
Sun Dec 15 03:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:16:09 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 03:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:24:03 2024 authpriv.info dropbear[8697]: Child connection from 87.120.113.180:47010
Sun Dec 15 03:24:04 2024 authpriv.info dropbear[8697]: Exit before auth from <87.120.113.180:47010>: Exited normally
Sun Dec 15 03:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:27:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:37:06 2024 authpriv.info dropbear[8716]: Child connection from 80.64.30.65:48758
Sun Dec 15 03:37:08 2024 authpriv.warn dropbear[8716]: Login attempt for nonexistent user
Sun Dec 15 03:37:10 2024 authpriv.info dropbear[8716]: Exit before auth from <80.64.30.65:48758>: Error reading: Connection reset by peer
Sun Dec 15 03:37:10 2024 authpriv.info dropbear[8717]: Child connection from 80.64.30.65:48788
Sun Dec 15 03:37:12 2024 authpriv.warn dropbear[8717]: Login attempt for nonexistent user
Sun Dec 15 03:37:13 2024 authpriv.info dropbear[8717]: Exit before auth from <80.64.30.65:48788>: Error reading: Connection reset by peer
Sun Dec 15 03:37:14 2024 authpriv.info dropbear[8718]: Child connection from 80.64.30.65:44368
Sun Dec 15 03:37:16 2024 authpriv.warn dropbear[8718]: Login attempt for nonexistent user
Sun Dec 15 03:37:17 2024 authpriv.info dropbear[8718]: Exit before auth from <80.64.30.65:44368>: Error reading: Connection reset by peer
Sun Dec 15 03:37:17 2024 authpriv.info dropbear[8719]: Child connection from 80.64.30.65:44372
Sun Dec 15 03:37:20 2024 authpriv.warn dropbear[8719]: Login attempt for nonexistent user
Sun Dec 15 03:37:22 2024 authpriv.info dropbear[8719]: Exit before auth from <80.64.30.65:44372>: Error reading: Connection reset by peer
Sun Dec 15 03:37:22 2024 authpriv.info dropbear[8720]: Child connection from 80.64.30.65:54658
Sun Dec 15 03:37:24 2024 authpriv.warn dropbear[8720]: Login attempt for nonexistent user
Sun Dec 15 03:37:25 2024 authpriv.info dropbear[8720]: Exit before auth from <80.64.30.65:54658>: Error reading: Connection reset by peer
Sun Dec 15 03:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:37:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:47:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:53:57 2024 authpriv.info dropbear[8731]: Child connection from 46.19.143.66:54430
Sun Dec 15 03:53:59 2024 authpriv.warn dropbear[8731]: Bad password attempt for 'root' from 46.19.143.66:54430
Sun Dec 15 03:54:00 2024 authpriv.info dropbear[8731]: Exit before auth from <46.19.143.66:54430>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:00 2024 authpriv.info dropbear[8732]: Child connection from 46.19.143.66:54448
Sun Dec 15 03:54:02 2024 authpriv.warn dropbear[8732]: Bad password attempt for 'root' from 46.19.143.66:54448
Sun Dec 15 03:54:03 2024 authpriv.info dropbear[8732]: Exit before auth from <46.19.143.66:54448>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:03 2024 authpriv.info dropbear[8733]: Child connection from 46.19.143.66:33660
Sun Dec 15 03:54:05 2024 authpriv.warn dropbear[8733]: Bad password attempt for 'root' from 46.19.143.66:33660
Sun Dec 15 03:54:06 2024 authpriv.info dropbear[8733]: Exit before auth from <46.19.143.66:33660>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:06 2024 authpriv.info dropbear[8734]: Child connection from 46.19.143.66:33674
Sun Dec 15 03:54:08 2024 authpriv.warn dropbear[8734]: Bad password attempt for 'root' from 46.19.143.66:33674
Sun Dec 15 03:54:09 2024 authpriv.info dropbear[8734]: Exit before auth from <46.19.143.66:33674>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:09 2024 authpriv.info dropbear[8735]: Child connection from 46.19.143.66:33684
Sun Dec 15 03:54:11 2024 authpriv.warn dropbear[8735]: Bad password attempt for 'root' from 46.19.143.66:33684
Sun Dec 15 03:54:12 2024 authpriv.info dropbear[8735]: Exit before auth from <46.19.143.66:33684>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:12 2024 authpriv.info dropbear[8736]: Child connection from 46.19.143.66:33700
Sun Dec 15 03:54:14 2024 authpriv.warn dropbear[8736]: Bad password attempt for 'root' from 46.19.143.66:33700
Sun Dec 15 03:54:14 2024 authpriv.info dropbear[8736]: Exit before auth from <46.19.143.66:33700>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:15 2024 authpriv.info dropbear[8737]: Child connection from 46.19.143.66:43328
Sun Dec 15 03:54:16 2024 authpriv.warn dropbear[8737]: Bad password attempt for 'root' from 46.19.143.66:43328
Sun Dec 15 03:54:17 2024 authpriv.info dropbear[8737]: Exit before auth from <46.19.143.66:43328>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:18 2024 authpriv.info dropbear[8738]: Child connection from 46.19.143.66:43354
Sun Dec 15 03:54:19 2024 authpriv.info dropbear[8739]: Child connection from 85.192.56.68:4124
Sun Dec 15 03:54:20 2024 authpriv.warn dropbear[8738]: Bad password attempt for 'root' from 46.19.143.66:43354
Sun Dec 15 03:54:20 2024 authpriv.info dropbear[8738]: Exit before auth from <46.19.143.66:43354>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:21 2024 authpriv.warn dropbear[8739]: Bad password attempt for 'root' from 85.192.56.68:4124
Sun Dec 15 03:54:21 2024 authpriv.info dropbear[8740]: Child connection from 46.19.143.66:43378
Sun Dec 15 03:54:21 2024 authpriv.info dropbear[8739]: Exit before auth from <85.192.56.68:4124>: (user 'root', 1 fails): Error reading: Connection reset by peer
Sun Dec 15 03:54:23 2024 authpriv.warn dropbear[8740]: Bad password attempt for 'root' from 46.19.143.66:43378
Sun Dec 15 03:54:23 2024 authpriv.info dropbear[8740]: Exit before auth from <46.19.143.66:43378>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:24 2024 authpriv.info dropbear[8741]: Child connection from 46.19.143.66:59052
Sun Dec 15 03:54:27 2024 authpriv.warn dropbear[8741]: Bad password attempt for 'root' from 46.19.143.66:59052
Sun Dec 15 03:54:27 2024 authpriv.info dropbear[8741]: Exit before auth from <46.19.143.66:59052>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:28 2024 authpriv.info dropbear[8742]: Child connection from 46.19.143.66:59054
Sun Dec 15 03:54:30 2024 authpriv.warn dropbear[8742]: Bad password attempt for 'root' from 46.19.143.66:59054
Sun Dec 15 03:54:30 2024 authpriv.info dropbear[8742]: Exit before auth from <46.19.143.66:59054>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:31 2024 authpriv.info dropbear[8743]: Child connection from 46.19.143.66:59060
Sun Dec 15 03:54:32 2024 authpriv.warn dropbear[8743]: Bad password attempt for 'root' from 46.19.143.66:59060
Sun Dec 15 03:54:34 2024 authpriv.info dropbear[8743]: Exit before auth from <46.19.143.66:59060>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:34 2024 authpriv.info dropbear[8744]: Child connection from 46.19.143.66:43876
Sun Dec 15 03:54:44 2024 authpriv.warn dropbear[8744]: Bad password attempt for 'root' from 46.19.143.66:43876
Sun Dec 15 03:54:45 2024 authpriv.info dropbear[8744]: Exit before auth from <46.19.143.66:43876>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:45 2024 authpriv.info dropbear[8745]: Child connection from 46.19.143.66:41730
Sun Dec 15 03:54:47 2024 authpriv.warn dropbear[8745]: Bad password attempt for 'root' from 46.19.143.66:41730
Sun Dec 15 03:54:48 2024 authpriv.info dropbear[8745]: Exit before auth from <46.19.143.66:41730>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:48 2024 authpriv.info dropbear[8746]: Child connection from 46.19.143.66:41736
Sun Dec 15 03:54:50 2024 authpriv.warn dropbear[8746]: Bad password attempt for 'root' from 46.19.143.66:41736
Sun Dec 15 03:54:51 2024 authpriv.info dropbear[8746]: Exit before auth from <46.19.143.66:41736>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:52 2024 authpriv.info dropbear[8747]: Child connection from 46.19.143.66:41770
Sun Dec 15 03:54:54 2024 authpriv.warn dropbear[8747]: Bad password attempt for 'root' from 46.19.143.66:41770
Sun Dec 15 03:54:55 2024 authpriv.info dropbear[8747]: Exit before auth from <46.19.143.66:41770>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:55 2024 authpriv.info dropbear[8748]: Child connection from 46.19.143.66:40180
Sun Dec 15 03:54:57 2024 authpriv.warn dropbear[8748]: Bad password attempt for 'root' from 46.19.143.66:40180
Sun Dec 15 03:54:58 2024 authpriv.info dropbear[8748]: Exit before auth from <46.19.143.66:40180>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:54:58 2024 authpriv.info dropbear[8749]: Child connection from 46.19.143.66:40186
Sun Dec 15 03:55:00 2024 authpriv.warn dropbear[8749]: Bad password attempt for 'root' from 46.19.143.66:40186
Sun Dec 15 03:55:01 2024 authpriv.info dropbear[8749]: Exit before auth from <46.19.143.66:40186>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:02 2024 authpriv.info dropbear[8750]: Child connection from 46.19.143.66:40202
Sun Dec 15 03:55:03 2024 authpriv.warn dropbear[8750]: Login attempt for nonexistent user
Sun Dec 15 03:55:04 2024 authpriv.info dropbear[8750]: Exit before auth from <46.19.143.66:40202>: Exited normally
Sun Dec 15 03:55:05 2024 authpriv.info dropbear[8751]: Child connection from 46.19.143.66:50618
Sun Dec 15 03:55:07 2024 authpriv.warn dropbear[8751]: Login attempt for nonexistent user
Sun Dec 15 03:55:08 2024 authpriv.info dropbear[8751]: Exit before auth from <46.19.143.66:50618>: Exited normally
Sun Dec 15 03:55:08 2024 authpriv.info dropbear[8752]: Child connection from 46.19.143.66:50626
Sun Dec 15 03:55:11 2024 authpriv.warn dropbear[8752]: Bad password attempt for 'root' from 46.19.143.66:50626
Sun Dec 15 03:55:12 2024 authpriv.info dropbear[8752]: Exit before auth from <46.19.143.66:50626>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:12 2024 authpriv.info dropbear[8753]: Child connection from 46.19.143.66:50632
Sun Dec 15 03:55:15 2024 authpriv.warn dropbear[8753]: Bad password attempt for 'root' from 46.19.143.66:50632
Sun Dec 15 03:55:15 2024 authpriv.info dropbear[8753]: Exit before auth from <46.19.143.66:50632>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:16 2024 authpriv.info dropbear[8754]: Child connection from 46.19.143.66:53578
Sun Dec 15 03:55:17 2024 authpriv.warn dropbear[8754]: Bad password attempt for 'root' from 46.19.143.66:53578
Sun Dec 15 03:55:18 2024 authpriv.info dropbear[8754]: Exit before auth from <46.19.143.66:53578>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:18 2024 authpriv.info dropbear[8755]: Child connection from 46.19.143.66:53598
Sun Dec 15 03:55:20 2024 authpriv.warn dropbear[8755]: Bad password attempt for 'root' from 46.19.143.66:53598
Sun Dec 15 03:55:21 2024 authpriv.info dropbear[8755]: Exit before auth from <46.19.143.66:53598>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:21 2024 authpriv.info dropbear[8756]: Child connection from 46.19.143.66:53634
Sun Dec 15 03:55:23 2024 authpriv.warn dropbear[8756]: Bad password attempt for 'root' from 46.19.143.66:53634
Sun Dec 15 03:55:24 2024 authpriv.info dropbear[8756]: Exit before auth from <46.19.143.66:53634>: (user 'root', 1 fails): Exited normally
Sun Dec 15 03:55:24 2024 authpriv.info dropbear[8757]: Child connection from 46.19.143.66:48984
Sun Dec 15 03:55:26 2024 authpriv.warn dropbear[8757]: Login attempt for nonexistent user
Sun Dec 15 03:55:27 2024 authpriv.info dropbear[8757]: Exit before auth from <46.19.143.66:48984>: Exited normally
Sun Dec 15 03:55:27 2024 authpriv.info dropbear[8758]: Child connection from 46.19.143.66:48986
Sun Dec 15 03:55:29 2024 authpriv.warn dropbear[8758]: Login attempt for nonexistent user
Sun Dec 15 03:55:30 2024 authpriv.info dropbear[8758]: Exit before auth from <46.19.143.66:48986>: Exited normally
Sun Dec 15 03:56:16 2024 authpriv.info dropbear[8759]: Child connection from 159.89.47.106:60000
Sun Dec 15 03:56:16 2024 authpriv.info dropbear[8759]: Exit before auth from <159.89.47.106:60000>: Exited normally
Sun Dec 15 03:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 03:57:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 03:59:57 2024 authpriv.info dropbear[8768]: Child connection from 194.169.175.37:49072
Sun Dec 15 03:59:59 2024 authpriv.warn dropbear[8768]: Bad password attempt for 'root' from 194.169.175.37:49072
Sun Dec 15 04:00:00 2024 authpriv.info dropbear[8768]: Exit before auth from <194.169.175.37:49072>: (user 'root', 1 fails): Exited normally
Sun Dec 15 04:02:35 2024 authpriv.info dropbear[8769]: Child connection from 2.57.122.33:56982
Sun Dec 15 04:02:35 2024 authpriv.info dropbear[8769]: Exit before auth from <2.57.122.33:56982>: Exited normally
Sun Dec 15 04:07:21 2024 authpriv.info dropbear[8771]: Child connection from 218.92.0.198:50012
Sun Dec 15 04:07:22 2024 authpriv.info dropbear[8772]: Child connection from 218.92.0.220:17872
Sun Dec 15 04:07:23 2024 authpriv.info dropbear[8771]: Exit before auth from <218.92.0.198:50012>: Disconnect received
Sun Dec 15 04:07:24 2024 authpriv.info dropbear[8772]: Exit before auth from <218.92.0.220:17872>: Disconnect received
Sun Dec 15 04:07:26 2024 authpriv.info dropbear[8773]: Child connection from 218.92.0.218:43344
Sun Dec 15 04:07:28 2024 authpriv.info dropbear[8773]: Exit before auth from <218.92.0.218:43344>: Disconnect received
Sun Dec 15 04:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:07:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:07:35 2024 daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
Sun Dec 15 04:11:26 2024 authpriv.info dropbear[8782]: Child connection from 218.92.0.235:31028
Sun Dec 15 04:11:31 2024 authpriv.info dropbear[8782]: Exit before auth from <218.92.0.235:31028>: Disconnect received
Sun Dec 15 04:11:58 2024 authpriv.info dropbear[8783]: Child connection from 218.92.0.220:56930
Sun Dec 15 04:12:00 2024 authpriv.info dropbear[8783]: Exit before auth from <218.92.0.220:56930>: Disconnect received
Sun Dec 15 04:13:19 2024 authpriv.info dropbear[8784]: Child connection from 205.210.31.199:62914
Sun Dec 15 04:13:21 2024 authpriv.info dropbear[8784]: Exit before auth from <205.210.31.199:62914>: Error reading: Connection reset by peer
Sun Dec 15 04:15:50 2024 authpriv.info dropbear[8785]: Child connection from 218.92.0.237:48292
Sun Dec 15 04:15:58 2024 authpriv.info dropbear[8785]: Exit before auth from <218.92.0.237:48292>: Disconnect received
Sun Dec 15 04:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: RSN: Group rekeying completed with 10:13:31:60:42:9b [GTK=CCMP]
Sun Dec 15 04:17:33 2024 daemon.notice wpa_supplicant[1478]: wl0-sta0: Unknown event 37
Sun Dec 15 04:17:36 2024 authpriv.info dropbear[8786]: Child connection from 218.92.0.112:17294