No internet via Wi-Fi

Today I ran into another problem. Very poor internet on a smartphone connected to a router via Wi-Fi. The Internet is very slow, about 1 megabit or not at all. Even with access to the router settings site, there are problems. I'm trying to go to 192.168.1.1, it doesn't work. I disconnect from the router, connect back, and the site 192.168.1.1 works. I restart the router. The Internet works for about a minute and then disappears again.

I turned on the PC, there are no problems on the PC and the speed test shows from 30 to 70 megabits. On a smartphone, 1 megabit or even a speed test cannot be carried out.

What exactly happened today? I haven't seen this problem before...

I publish System Log. I'm sure it isn't, but maybe it will help in some way.

Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.000000] Linux version 5.15.118 (builder@buildhost) (mipsel-openwrt-linux-musl-gcc (OpenWrt GCC 12.3.0 r23228-cd17d8df2a) 12.3.0, GNU ld (GNU Binutils) 2.40.0) #0 Mon Jun 26 11:20:39 2023
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Board has DDR2
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Analog PMU set to hw control
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Digital PMU set to hw control
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] SoC Type: MediaTek MT7628AN ver:1 eco:2
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] printk: bootconsole [early0] enabled
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] CPU0 revision is: 00019655 (MIPS 24KEc)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] MIPS: machine is TP-Link TL-WR840N v4
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Initrd not found or empty - disabling initrd
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Primary instruction cache 64kB, VIPT, 4-way, linesize 32 bytes.
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Primary data cache 32kB, 4-way, PIPT, no aliases, linesize 32 bytes
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Zone ranges:
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000]   Normal   [mem 0x0000000000000000-0x0000000003ffffff]
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Movable zone start for each node
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Early memory node ranges
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000]   node   0: [mem 0x0000000000000000-0x0000000003ffffff]
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Initmem setup node 0 [mem 0x0000000000000000-0x0000000003ffffff]
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.000000] pcpu-alloc: s0 r0 d32768 u32768 alloc=1*32768
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.000000] pcpu-alloc: [0] 0
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Built 1 zonelists, mobility grouping on.  Total pages: 16240
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.000000] Kernel command line: console=ttyS0,115200 rootfstype=squashfs,jffs2
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Dentry cache hash table entries: 8192 (order: 3, 32768 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Inode-cache hash table entries: 4096 (order: 2, 16384 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Writing ErrCtl register=00035140
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Readback ErrCtl register=00035140
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] mem auto-init: stack:off, heap alloc:off, heap free:off
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] Memory: 56084K/65536K available (5951K kernel code, 607K rwdata, 748K rodata, 1196K init, 217K bss, 9452K reserved, 0K cma-reserved)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] SLUB: HWalign=32, Order=0-3, MinObjects=0, CPUs=1, Nodes=1
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] NR_IRQS: 256
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] intc: using register map from devicetree
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] CPU Clock: 580MHz
Tue Sep  5 15:31:40 2023 kern.crit kernel: [    0.000000] timer_probe: no matching timers found
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000000] clocksource: MIPS: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 6590553264 ns
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.000002] sched_clock: 32 bits at 290MHz, resolution 3ns, wraps every 7405115902ns
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.007645] Calibrating delay loop... 385.84 BogoMIPS (lpj=1929216)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.073568] pid_max: default: 32768 minimum: 301
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.079190] Mount-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.086221] Mountpoint-cache hash table entries: 1024 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.103239] clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604462750000 ns
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.112783] futex hash table entries: 256 (order: -1, 3072 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.119558] pinctrl core: initialized pinctrl subsystem
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.126908] NET: Registered PF_NETLINK/PF_ROUTE protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.133296] thermal_sys: Registered thermal governor 'step_wise'
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.150661] clocksource: Switched to clocksource MIPS
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.163232] NET: Registered PF_INET protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.168233] IP idents hash table entries: 2048 (order: 2, 16384 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.176460] tcp_listen_portaddr_hash hash table entries: 512 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.184604] Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.192057] TCP established hash table entries: 1024 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.199445] TCP bind hash table entries: 1024 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.206263] TCP: Hash tables configured (established 1024 bind 1024)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.212596] UDP hash table entries: 256 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.218897] UDP-Lite hash table entries: 256 (order: 0, 4096 bytes, linear)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.226146] NET: Registered PF_UNIX/PF_LOCAL protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.231682] PCI: CLS 0 bytes, default 32
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.240449] workingset: timestamp_bits=14 max_order=14 bucket_order=0
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.254099] squashfs: version 4.0 (2009/01/31) Phillip Lougher
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.259700] jffs2: version 2.2 (NAND) (SUMMARY) (LZMA) (RTIME) (CMODE_PRIORITY) (c) 2001-2006 Red Hat, Inc.
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.271182] Block layer SCSI generic (bsg) driver version 0.4 loaded (major 252)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.281808] mt7621_gpio 10000600.gpio: registering 32 gpios
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.287497] mt7621_gpio 10000600.gpio: registering 32 gpios
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.293239] mt7621_gpio 10000600.gpio: registering 32 gpios
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.299316] Serial: 8250/16550 driver, 16 ports, IRQ sharing enabled
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.308994] printk: console [ttyS0] disabled
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.313251] 10000c00.uartlite: ttyS0 at MMIO 0x10000c00 (irq = 28, base_baud = 2500000) is a 16550A
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.321999] printk: console [ttyS0] enabled
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.330393] printk: bootconsole [early0] disabled
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.341961] spi-mt7621 10000b00.spi: sys_freq: 193333333
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.373467] spi-nor spi0.0: gd25q64 (8192 Kbytes)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.378334] 4 fixed-partitions partitions found on MTD device spi0.0
Tue Sep  5 15:31:40 2023 kern.err kernel: [    0.384905] OF: Bad cell count for /palmbus@10000000/spi@b00/flash@0/partitions
Tue Sep  5 15:31:40 2023 kern.err kernel: [    0.392390] OF: Bad cell count for /palmbus@10000000/spi@b00/flash@0/partitions
Tue Sep  5 15:31:40 2023 kern.err kernel: [    0.400152] OF: Bad cell count for /palmbus@10000000/spi@b00/flash@0/partitions
Tue Sep  5 15:31:40 2023 kern.err kernel: [    0.407648] OF: Bad cell count for /palmbus@10000000/spi@b00/flash@0/partitions
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.415681] Creating 4 MTD partitions on "spi0.0":
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.420570] 0x000000000000-0x000000020000 : "boot"
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.429972] 0x000000020000-0x0000007c0000 : "firmware"
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.437251] 2 tplink-fw partitions found on MTD device firmware
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.443377] Creating 2 MTD partitions on "firmware":
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.448422] 0x000000000000-0x0000002322f4 : "kernel"
Tue Sep  5 15:31:40 2023 kern.warn kernel: [    0.453473] mtd: partition "kernel" doesn't end on an erase/write block -- force read-only
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.465265] 0x0000002322f4-0x0000007a0000 : "rootfs"
Tue Sep  5 15:31:40 2023 kern.warn kernel: [    0.470340] mtd: partition "rootfs" doesn't start on an erase/write block boundary -- force read-only
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.481189] mtd: setting mtd3 (rootfs) as root device
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.487499] 1 squashfs-split partitions found on MTD device rootfs
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.493887] 0x000000580000-0x0000007a0000 : "rootfs_data"
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.500892] 0x0000007c0000-0x0000007d0000 : "config"
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    0.509254] 0x0000007d0000-0x000000800000 : "factory"
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.568878] rt3050-esw 10110000.esw: mediatek esw at 0xb0110000, irq 25 initialized
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.577774] mtk_soc_eth 10100000.ethernet eth0: mediatek frame engine at 0xb0100000, irq 5
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.588904] NET: Registered PF_INET6 protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.601990] Segment Routing with IPv6
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.605829] In-situ OAM (IOAM) with IPv6
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.609999] NET: Registered PF_PACKET protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.615402] bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this.
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.628958] 8021q: 802.1Q VLAN Support v1.8
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.648119] VFS: Mounted root (squashfs filesystem) readonly on device 31:3.
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.661987] Freeing unused kernel image (initmem) memory: 1196K
Tue Sep  5 15:31:40 2023 kern.warn kernel: [    0.668009] This architecture does not have kernel memory protection.
Tue Sep  5 15:31:40 2023 kern.info kernel: [    0.674587] Run /sbin/init as init process
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.678741]   with arguments:
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.678749]     /sbin/init
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.678758]   with environment:
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.678764]     HOME=/
Tue Sep  5 15:31:40 2023 kern.debug kernel: [    0.678770]     TERM=linux
Tue Sep  5 15:31:40 2023 user.info kernel: [    1.704975] init: Console is alive
Tue Sep  5 15:31:40 2023 user.info kernel: [    1.709155] init: - watchdog -
Tue Sep  5 15:31:40 2023 user.info kernel: [    3.021542] kmodloader: loading kernel modules from /etc/modules-boot.d/*
Tue Sep  5 15:31:40 2023 user.info kernel: [    3.120248] kmodloader: done loading kernel modules from /etc/modules-boot.d/*
Tue Sep  5 15:31:40 2023 user.info kernel: [    3.138364] init: - preinit -
Tue Sep  5 15:31:40 2023 kern.info kernel: [    3.616101] rt3050-esw 10110000.esw: port 0 link up
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    4.818628] random: jshn: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    5.018950] random: jshn: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    5.304003] random: jshn: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.info kernel: [    5.918739] rt3050-esw 10110000.esw: port 0 link down
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    6.113486] random: procd: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [    8.612341] jffs2: notice: (292) jffs2_build_xattr_subsystem: complete building xattr subsystem, 54 of xdatum (41 unchecked, 13 orphan) and 75 of xref (18 dead, 0 orphan) found.
Tue Sep  5 15:31:40 2023 user.info kernel: [    8.635069] mount_root: switching to jffs2 overlay
Tue Sep  5 15:31:40 2023 kern.warn kernel: [    8.649757] overlayfs: upper fs does not support tmpfile.
Tue Sep  5 15:31:40 2023 user.warn kernel: [    8.669300] urandom-seed: Seeding with /etc/urandom.seed
Tue Sep  5 15:31:40 2023 kern.info kernel: [    8.976339] rt3050-esw 10110000.esw: port 0 link up
Tue Sep  5 15:31:40 2023 kern.info kernel: [    8.983107] IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready
Tue Sep  5 15:31:40 2023 kern.info kernel: [    8.990070] IPv6: ADDRCONF(NETDEV_CHANGE): eth0.1: link becomes ready
Tue Sep  5 15:31:40 2023 kern.info kernel: [    9.472337] rt3050-esw 10110000.esw: port 1 link up
Tue Sep  5 15:31:40 2023 user.info kernel: [    9.566900] procd: - early -
Tue Sep  5 15:31:40 2023 user.info kernel: [    9.570271] procd: - watchdog -
Tue Sep  5 15:31:40 2023 user.info kernel: [   10.419815] procd: - watchdog -
Tue Sep  5 15:31:40 2023 user.info kernel: [   10.425183] procd: - ubus -
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   10.621631] random: ubusd: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   10.631848] random: ubusd: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   10.639167] random: ubusd: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 user.info kernel: [   10.667209] procd: - init -
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   12.008169] random: jshn: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   12.069813] random: ubusd: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   12.096106] random: ubus: uninitialized urandom read (4 bytes read)
Tue Sep  5 15:31:40 2023 user.info kernel: [   12.523140] kmodloader: loading kernel modules from /etc/modules.d/*
Tue Sep  5 15:31:40 2023 user.info kernel: [   12.932303] urngd: v1.0.2 started.
Tue Sep  5 15:31:40 2023 kern.info kernel: [   13.162261] Loading modules backported from Linux version v6.1.24-0-g0102425ac76b
Tue Sep  5 15:31:40 2023 kern.info kernel: [   13.169885] Backport generated by backports.git v5.15.92-1-44-gd6ea70fafd36
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   13.277943] random: crng init done
Tue Sep  5 15:31:40 2023 kern.notice kernel: [   13.281496] random: 22 urandom warning(s) missed due to ratelimiting
Tue Sep  5 15:31:40 2023 kern.info kernel: [   13.646263] mt76_wmac 10300000.wmac: ASIC revision: 76280001
Tue Sep  5 15:31:40 2023 kern.info kernel: [   14.673612] mt76_wmac 10300000.wmac: Firmware Version: 20151201
Tue Sep  5 15:31:40 2023 kern.info kernel: [   14.679656] mt76_wmac 10300000.wmac: Build Time: 20151201183641
Tue Sep  5 15:31:40 2023 kern.info kernel: [   14.700668] mt76_wmac 10300000.wmac: firmware init done
Tue Sep  5 15:31:40 2023 kern.info kernel: [   14.815131] rt3050-esw 10110000.esw: port 1 link down
Tue Sep  5 15:31:40 2023 kern.debug kernel: [   14.872820] ieee80211 phy0: Selected rate control algorithm 'minstrel_ht'
Tue Sep  5 15:31:40 2023 kern.info kernel: [   15.046390] PPP generic driver version 2.4.2
Tue Sep  5 15:31:40 2023 kern.info kernel: [   15.134310] NET: Registered PF_PPPOX protocol family
Tue Sep  5 15:31:40 2023 kern.info kernel: [   15.220158] wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information.
Tue Sep  5 15:31:40 2023 kern.info kernel: [   15.228194] wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld <Jason@zx2c4.com>. All Rights Reserved.
Tue Sep  5 15:31:40 2023 user.info kernel: [   15.284152] kmodloader: done loading kernel modules from /etc/modules.d/*
Tue Sep  5 15:31:40 2023 kern.info kernel: [   17.369173] rt3050-esw 10110000.esw: port 1 link up
Tue Sep  5 15:31:42 2023 user.notice dnsmasq: DNS rebinding protection is active, will discard upstream RFC1918 responses!
Tue Sep  5 15:31:42 2023 user.notice dnsmasq: Allowing 127.0.0.0/8 responses
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: DNS service limited to local subnets
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:31:44 2023 daemon.warn dnsmasq[1]: no servers found in /tmp/resolv.conf.d/resolv.conf.auto, will retry
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Sep  5 15:31:44 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 6 names
Tue Sep  5 15:31:44 2023 authpriv.info dropbear[985]: Not backgrounding
Tue Sep  5 15:31:47 2023 user.notice pbr: Reloading pbr due to firewall action: includes
Tue Sep  5 15:31:52 2023 daemon.notice wpa_supplicant[1314]: Successfully initialized wpa_supplicant
Tue Sep  5 15:31:52 2023 kern.info kernel: [   30.348835] rt3050-esw 10110000.esw: port 0 link down
Tue Sep  5 15:31:52 2023 kern.info kernel: [   30.354004] rt3050-esw 10110000.esw: port 1 link down
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: bonding
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: 8021ad
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: 8021q
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: macvlan
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: veth
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: bridge
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: Network device
Tue Sep  5 15:31:52 2023 user.notice : Added device handler type: tunnel
Tue Sep  5 15:31:55 2023 kern.info kernel: [   33.393443] rt3050-esw 10110000.esw: port 0 link up
Tue Sep  5 15:31:56 2023 kern.info kernel: [   34.279077] rt3050-esw 10110000.esw: port 1 link up
Tue Sep  5 15:31:57 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/network
Tue Sep  5 15:31:57 2023 user.notice ucitrack: Setting up /etc/config/network reload dependency on /etc/config/wireless
Tue Sep  5 15:31:57 2023 user.notice ucitrack: Setting up /etc/config/luci-splash reload dependency on /etc/config/firewall
Tue Sep  5 15:31:57 2023 user.notice ucitrack: Setting up /etc/config/qos reload dependency on /etc/config/firewall
Tue Sep  5 15:31:58 2023 user.notice ucitrack: Setting up /etc/config/miniupnpd reload dependency on /etc/config/firewall
Tue Sep  5 15:31:58 2023 user.notice ucitrack: Setting up /etc/config/odhcpd reload dependency on /etc/config/dhcp
Tue Sep  5 15:31:59 2023 user.notice ucitrack: Setting up non-init /etc/config/fstab reload handler: /sbin/block mount
Tue Sep  5 15:31:59 2023 user.notice ucitrack: Setting up /etc/config/system reload trigger for non-procd /etc/init.d/led
Tue Sep  5 15:31:59 2023 user.notice ucitrack: Setting up /etc/config/luci_statistics reload dependency on /etc/config/system
Tue Sep  5 15:31:59 2023 user.notice ucitrack: Setting up /etc/config/dhcp reload dependency on /etc/config/system
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.049061] br-lan: port 1(eth0.1) entered blocking state
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.054674] br-lan: port 1(eth0.1) entered disabled state
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.060562] device eth0.1 entered promiscuous mode
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.065504] device eth0 entered promiscuous mode
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.100961] br-lan: port 1(eth0.1) entered blocking state
Tue Sep  5 15:32:02 2023 kern.info kernel: [   41.106483] br-lan: port 1(eth0.1) entered forwarding state
Tue Sep  5 15:32:02 2023 daemon.notice netifd: Interface 'lan' is enabled
Tue Sep  5 15:32:02 2023 daemon.notice netifd: Interface 'lan' is setting up now
Tue Sep  5 15:32:02 2023 daemon.notice netifd: Interface 'lan' is now up
Tue Sep  5 15:32:02 2023 daemon.notice netifd: bridge 'br-lan' link is up
Tue Sep  5 15:32:02 2023 daemon.notice netifd: Interface 'lan' has link connectivity
Tue Sep  5 15:32:02 2023 daemon.notice netifd: VLAN 'eth0.1' link is up
Tue Sep  5 15:32:02 2023 daemon.notice netifd: Interface 'WARP' is setting up now
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'loopback' is enabled
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'loopback' is setting up now
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'loopback' is now up
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'wan' is enabled
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Network device 'eth0' link is up
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Network device 'lo' link is up
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'loopback' has link connectivity
Tue Sep  5 15:32:03 2023 daemon.notice netifd: VLAN 'eth0.2' link is up
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'wan' has link connectivity
Tue Sep  5 15:32:03 2023 daemon.notice netifd: Interface 'wan' is setting up now
Tue Sep  5 15:32:03 2023 kern.info kernel: [   42.101340] IPv6: ADDRCONF(NETDEV_CHANGE): br-lan: link becomes ready
Tue Sep  5 15:32:04 2023 daemon.notice netifd: wan (2048): udhcpc: started, v1.36.1
Tue Sep  5 15:32:06 2023 daemon.notice netifd: Interface 'WARP' is now down
Tue Sep  5 15:32:06 2023 daemon.notice netifd: wan (2048): udhcpc: broadcasting discover
Tue Sep  5 15:32:06 2023 daemon.notice netifd: wan (2048): udhcpc: broadcasting select for 192.168.91.123, server 192.168.88.1
Tue Sep  5 15:32:06 2023 daemon.notice netifd: wan (2048): udhcpc: lease of 192.168.91.123 obtained from 192.168.88.1, lease time 10800
Tue Sep  5 15:32:06 2023 user.notice firewall: Reloading firewall due to ifup of lan (br-lan)
Tue Sep  5 15:32:07 2023 daemon.notice netifd: Interface 'WARP' is setting up now
Tue Sep  5 15:32:07 2023 daemon.notice netifd: Interface 'wan' is now up
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using nameserver 192.168.200.8#53
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using nameserver 77.88.8.8#53
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:32:07 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:32:09 2023 daemon.notice netifd: Interface 'WARP' is now up
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using nameserver 1.1.1.1#53
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using nameserver 192.168.200.8#53
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using nameserver 77.88.8.8#53
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:32:09 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:32:09 2023 daemon.notice netifd: Network device 'WARP' link is up
Tue Sep  5 15:32:10 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led wlan2g
Tue Sep  5 15:32:10 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led lan
Tue Sep  5 15:32:10 2023 daemon.notice procd: /etc/rc.d/S96led: setting up led wan
Tue Sep  5 15:32:11 2023 daemon.notice hostapd: Configuration file: /var/run/hostapd-phy0.conf (phy phy0-ap0) --> new PHY
Tue Sep  5 15:32:11 2023 kern.info kernel: [   49.526912] br-lan: port 2(phy0-ap0) entered blocking state
Tue Sep  5 15:32:11 2023 kern.info kernel: [   49.532680] br-lan: port 2(phy0-ap0) entered disabled state
Tue Sep  5 15:32:11 2023 kern.info kernel: [   49.538779] device phy0-ap0 entered promiscuous mode
Tue Sep  5 15:32:11 2023 daemon.notice hostapd: phy0-ap0: interface state UNINITIALIZED->COUNTRY_UPDATE
Tue Sep  5 15:32:12 2023 kern.info kernel: [   50.903929] IPv6: ADDRCONF(NETDEV_CHANGE): phy0-ap0: link becomes ready
Tue Sep  5 15:32:12 2023 kern.info kernel: [   50.910986] br-lan: port 2(phy0-ap0) entered blocking state
Tue Sep  5 15:32:12 2023 kern.info kernel: [   50.916673] br-lan: port 2(phy0-ap0) entered forwarding state
Tue Sep  5 15:32:12 2023 daemon.notice hostapd: phy0-ap0: interface state COUNTRY_UPDATE->ENABLED
Tue Sep  5 15:32:12 2023 daemon.notice hostapd: phy0-ap0: AP-ENABLED
Tue Sep  5 15:32:13 2023 daemon.info procd: - init complete -
Tue Sep  5 15:41:02 2023 daemon.notice netifd: Wireless device 'radio0' is now up
Tue Sep  5 15:41:02 2023 daemon.notice netifd: Network device 'phy0-ap0' link is up
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: exiting on receipt of SIGTERM
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: started, version 2.89 cachesize 1000
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: DNS service limited to local subnets
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: compile time options: IPv6 GNU-getopt no-DBus UBus no-i18n no-IDN DHCP no-DHCPv6 no-Lua TFTP no-conntrack no-ipset no-nftset no-auth no-cryptohash no-DNSSEC no-ID loop-detect inotify dumpfile
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: UBus support enabled: connected to system bus
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq-dhcp[1]: DHCP, IP range 192.168.1.100 -- 192.168.1.249, lease time 12h
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using nameserver 1.1.1.1#53
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using nameserver 192.168.200.8#53
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using nameserver 77.88.8.8#53
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: read /etc/hosts - 12 names
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq[1]: read /tmp/hosts/dhcp.cfg01411c - 8 names
Tue Sep  5 15:41:02 2023 daemon.info dnsmasq-dhcp[1]: read /etc/ethers - 0 addresses
Tue Sep  5 15:41:03 2023 user.notice pbr: Reloading pbr due to firewall action: includes
Tue Sep  5 15:41:09 2023 user.notice pbr: Reloading pbr lan interface routing due to ifup of lan (br-lan)
Tue Sep  5 15:41:15 2023 user.notice pbr: Reloading pbr loopback interface routing due to ifup of loopback (lo)
Tue Sep  5 15:41:18 2023 user.notice firewall: Reloading firewall due to ifup of WARP (WARP)
Tue Sep  5 15:41:18 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) 192.168.1.10 b4:2e:99:97:0c:23
Tue Sep  5 15:41:18 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.10 b4:2e:99:97:0c:23
Tue Sep  5 15:41:18 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.10 b4:2e:99:97:0c:23
Tue Sep  5 15:41:18 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.10 b4:2e:99:97:0c:23 K14M-PC
Tue Sep  5 15:41:20 2023 user.notice pbr: Reloading pbr due to firewall action: includes
Tue Sep  5 15:41:22 2023 user.notice pbr: Reloading pbr WARP interface routing due to ifup of WARP (WARP)
Tue Sep  5 15:41:26 2023 user.notice firewall: Reloading firewall due to ifup of wan (eth0.2)
Tue Sep  5 15:41:28 2023 user.notice pbr: Reloading pbr due to firewall action: includes
Tue Sep  5 15:41:31 2023 user.notice pbr: Reloading pbr wan interface routing due to ifup of wan (eth0.2)
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[2]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[3]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[4]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:36 2023 daemon.warn dnsmasq[5]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:37 2023 daemon.warn dnsmasq[6]: possible DNS-rebind attack detected: dns.msftncsi.com
Tue Sep  5 15:41:43 2023 daemon.err uhttpd[1611]: [info] luci: accepted login on / for root from 192.168.1.10
Tue Sep  5 15:42:16 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: wwwww.wtf
Tue Sep  5 15:42:28 2023 daemon.info hostapd: phy0-ap0: STA e0:1f:88:c5:ab:f6 IEEE 802.11: authenticated
Tue Sep  5 15:42:28 2023 daemon.info hostapd: phy0-ap0: STA e0:1f:88:c5:ab:f6 IEEE 802.11: associated (aid 1)
Tue Sep  5 15:42:28 2023 daemon.notice hostapd: phy0-ap0: AP-STA-CONNECTED e0:1f:88:c5:ab:f6 auth_alg=open
Tue Sep  5 15:42:28 2023 daemon.info hostapd: phy0-ap0: STA e0:1f:88:c5:ab:f6 WPA: pairwise key handshake completed (RSN)
Tue Sep  5 15:42:28 2023 daemon.notice hostapd: phy0-ap0: EAPOL-4WAY-HS-COMPLETED e0:1f:88:c5:ab:f6
Tue Sep  5 15:42:29 2023 daemon.info dnsmasq-dhcp[1]: DHCPDISCOVER(br-lan) e0:1f:88:c5:ab:f6
Tue Sep  5 15:42:29 2023 daemon.info dnsmasq-dhcp[1]: DHCPOFFER(br-lan) 192.168.1.11 e0:1f:88:c5:ab:f6
Tue Sep  5 15:42:29 2023 daemon.info dnsmasq-dhcp[1]: DHCPREQUEST(br-lan) 192.168.1.11 e0:1f:88:c5:ab:f6
Tue Sep  5 15:42:29 2023 daemon.info dnsmasq-dhcp[1]: DHCPACK(br-lan) 192.168.1.11 e0:1f:88:c5:ab:f6 K14M-Android
Tue Sep  5 15:42:31 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:42:33 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:42:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:42:39 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:42:39 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:42:49 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:42:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:42:54 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:42:56 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:42:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:05 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:06 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:43:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:13 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:13 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:43:16 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:19 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:19 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:43:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:31 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:35 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:43:35 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:45 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:45 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:43:49 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:43:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:56 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:43:56 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:01 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:01 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:44:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:07 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:44:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:17 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:44:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:29 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:44:29 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:36 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:40 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:44 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:44:46 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:44:48 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:44:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:45:20 2023 user.notice pbr: Activating traffic killswitch [✓]
Tue Sep  5 15:45:21 2023 user.notice pbr: Setting up routing for 'wan/eth0.2/192.168.88.1' [✓]
Tue Sep  5 15:45:23 2023 user.notice pbr: Setting up routing for 'WARP/172.16.0.2' [✓]
Tue Sep  5 15:45:23 2023 user.notice pbr: Routing 'Internet' via wan [✓]
Tue Sep  5 15:45:24 2023 user.notice pbr: Deactivating traffic killswitch [✓]
Tue Sep  5 15:45:24 2023 user.notice pbr: service monitoring interfaces: wan WARP
Tue Sep  5 15:45:25 2023 user.notice pbr: service (nft) started with gateways: wan/eth0.2/192.168.88.1 [✓] WARP/172.16.0.2
Tue Sep  5 15:45:29 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:45:29 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:45:41 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:45:41 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:45:42 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:45:46 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:45:48 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:45:53 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:45:54 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:45:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:45:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:45:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:00 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:46:04 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:46:10 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:46:10 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:13 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:46:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:46:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:46:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:27 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:46:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:41 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:46:53 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:46:54 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:46:54 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:47:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:47:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:47:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:47:21 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:47:21 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:47:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:47:26 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:47:35 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:47:38 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:47:38 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:47:40 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:47:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:48:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:48:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:05 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:05 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:49:05 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:49:11 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:49:13 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:49:23 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:49:25 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:49:25 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:29 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:49:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:32 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:49:43 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:49:43 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:49:52 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:49:52 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:50:02 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:50:06 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:50:18 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:50:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:50:51 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:51:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:51:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:51:03 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:51:05 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:51:16 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:52:16 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:52:16 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:52:25 2023 daemon.notice netifd: Network device 'WARP' link is down
Tue Sep  5 15:52:26 2023 daemon.notice netifd: Interface 'WARP' is now down
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: reading /tmp/resolv.conf.d/resolv.conf.auto
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using nameserver 192.168.200.8#53
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using nameserver 77.88.8.8#53
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for test
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for onion
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for localhost
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for local
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for invalid
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for bind
Tue Sep  5 15:52:26 2023 daemon.info dnsmasq[1]: using only locally-known addresses for lan
Tue Sep  5 15:52:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:52:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:52:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:52:30 2023 user.notice pbr: Activating traffic killswitch [✓]
Tue Sep  5 15:52:32 2023 user.notice pbr: Setting up routing for 'wan/eth0.2/192.168.88.1' [✓]
Tue Sep  5 15:52:33 2023 user.notice pbr: Setting up routing for 'WARP/0.0.0.0' [✓]
Tue Sep  5 15:52:34 2023 user.notice pbr: Routing 'Internet' via wan [✓]
Tue Sep  5 15:52:34 2023 user.notice pbr: Deactivating traffic killswitch [✓]
Tue Sep  5 15:52:35 2023 user.notice pbr: service monitoring interfaces: wan WARP
Tue Sep  5 15:52:35 2023 user.notice pbr: Reloading pbr WARP interface routing due to ifdown of WARP ()
Tue Sep  5 15:52:39 2023 user.notice pbr: Activating traffic killswitch [✓]
Tue Sep  5 15:52:41 2023 user.notice pbr: Setting up routing for 'wan/eth0.2/192.168.88.1' [✓]
Tue Sep  5 15:52:42 2023 user.notice pbr: Setting up routing for 'WARP/0.0.0.0' [✓]
Tue Sep  5 15:52:43 2023 user.notice pbr: Routing 'Internet' via wan [✓]
Tue Sep  5 15:52:43 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:52:43 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:52:43 2023 user.notice pbr: Deactivating traffic killswitch [✓]
Tue Sep  5 15:52:44 2023 user.notice pbr: service monitoring interfaces: wan WARP
Tue Sep  5 15:52:46 2023 user.notice pbr: Activating traffic killswitch [✓]
Tue Sep  5 15:52:48 2023 user.notice pbr: Setting up routing for 'wan/eth0.2/192.168.88.1' [✓]
Tue Sep  5 15:52:49 2023 user.notice pbr: Setting up routing for 'WARP/0.0.0.0' [✓]
Tue Sep  5 15:52:50 2023 user.notice pbr: Routing 'Internet' via wan [✓]
Tue Sep  5 15:52:50 2023 user.notice pbr: Deactivating traffic killswitch [✓]
Tue Sep  5 15:52:50 2023 user.notice pbr: service monitoring interfaces: wan WARP
Tue Sep  5 15:52:57 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:54:24 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:54:28 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:54:30 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:54:34 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:54:37 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:54:39 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:54:40 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:54:42 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:54:46 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:54:47 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:55:00 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:55:00 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:55:09 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:55:09 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:55:19 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:55:22 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:55:35 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:56:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:56:08 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:56:20 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:56:20 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:56:22 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:56:33 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:57:33 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:57:33 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:57:33 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:57:47 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:57:47 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:57:47 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: w.wwwww.wtf
Tue Sep  5 15:58:00 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: retracker.sevstar.net
Tue Sep  5 15:58:00 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf
Tue Sep  5 15:58:14 2023 daemon.warn dnsmasq[1]: possible DNS-rebind attack detected: u.wwwww.wtf