What's new
  • SNBForums Code of Conduct

    SNBForums is a community for everyone, no matter what their level of experience.

    Please be tolerant and patient of others, especially newcomers. We are all here to share and learn!

    The rules are simple: Be patient, be nice, be helpful or be gone!

Asus RT-AC56U Question

main

New Around Here
I have an assus router running merlin that always shows SYN packets coming in the logs.
Is this normal or someone is trying to hack me?
This was happening for a long time, even when the router was running with default firmware.

May 6 14:07:03 kernel: DROP IN=ppp0 OUT= MAC= SRC=202.188.205.115 DST=82.77.76.94 LEN=48 TOS=0x00 PREC=0x00 TTL=135 ID=5061 DF PROTO=TCP SPT=50997 DPT=44614 SEQ=3240552478 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (020405AC01010402)
May 6 14:07:03 kernel: DROP IN=ppp0 OUT= MAC= SRC=85.222.16.246 DST=82.77.76.94 LEN=48 TOS=0x00 PREC=0x00 TTL=114 ID=31465 DF PROTO=TCP SPT=5082 DPT=443 SEQ=45667272 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (0204058C01010402)
May 6 14:10:04 kernel: DROP IN=ppp0 OUT= MAC= SRC=123.207.89.179 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=238 ID=11407 PROTO=TCP SPT=57774 DPT=1433 SEQ=343106888 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:10:18 kernel: DROP IN=ppp0 OUT= MAC= SRC=151.250.71.206 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=53084 PROTO=TCP SPT=43586 DPT=23 SEQ=1380797534 ACK=0 WINDOW=18641 RES=0x00 SYN URGP=0
May 6 14:10:33 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.177.186.109 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=50519 DPT=22 SEQ=2100761562 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
May 6 14:10:47 kernel: DROP IN=ppp0 OUT= MAC= SRC=163.172.210.67 DST=82.77.76.94 LEN=431 TOS=0x00 PREC=0x00 TTL=51 ID=27377 DF PROTO=UDP SPT=5084 DPT=5060 LEN=411
May 6 14:10:49 kernel: DROP IN=ppp0 OUT= MAC= SRC=169.54.233.121 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=21888 DPT=502 SEQ=117854433 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
May 6 14:12:12 kernel: DROP IN=ppp0 OUT= MAC= SRC=45.55.12.151 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=49161 DPT=115 SEQ=2593799253 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
May 6 14:12:28 kernel: DROP IN=ppp0 OUT= MAC= SRC=27.254.96.49 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=41443 PROTO=TCP SPT=40292 DPT=23 SEQ=1820978602 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:12:57 kernel: DROP IN=ppp0 OUT= MAC= SRC=89.248.168.204 DST=82.77.76.94 LEN=247 TOS=0x00 PREC=0x00 TTL=251 ID=54321 PROTO=UDP SPT=47704 DPT=53413 LEN=227
May 6 14:14:08 kernel: DROP IN=ppp0 OUT= MAC= SRC=212.129.1.60 DST=82.77.76.94 LEN=437 TOS=0x00 PREC=0x00 TTL=54 ID=58228 DF PROTO=UDP SPT=7694 DPT=5060 LEN=417
May 6 14:14:34 kernel: DROP IN=ppp0 OUT= MAC= SRC=188.16.45.20 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=57 ID=29352 PROTO=TCP SPT=51064 DPT=23 SEQ=1380797534 ACK=0 WINDOW=61768 RES=0x00 SYN URGP=0
May 6 14:14:55 kernel: DROP IN=ppp0 OUT= MAC= SRC=37.148.208.15 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=32709 PROTO=TCP SPT=54122 DPT=1433 SEQ=2602382850 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:15:37 kernel: DROP IN=ppp0 OUT= MAC= SRC=210.37.2.181 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=55495 PROTO=TCP SPT=53058 DPT=23 SEQ=2202834062 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:17:06 kernel: DROP IN=ppp0 OUT= MAC= SRC=37.61.220.243 DST=82.77.76.94 LEN=433 TOS=0x00 PREC=0x00 TTL=58 ID=42548 DF PROTO=UDP SPT=25952 DPT=5060 LEN=413
May 6 14:17:24 kernel: DROP IN=ppp0 OUT= MAC= SRC=203.195.209.108 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=2230 PROTO=TCP SPT=49295 DPT=23 SEQ=2119582975 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:18:38 kernel: DROP IN=ppp0 OUT= MAC= SRC=93.174.93.136 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=251 ID=31347 PROTO=TCP SPT=52895 DPT=8893 SEQ=406852752 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:18:57 kernel: DROP IN=ppp0 OUT= MAC= SRC=163.172.135.224 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=20803 PROTO=TCP SPT=49166 DPT=3128 SEQ=3856470309 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:19:17 kernel: DROP IN=ppp0 OUT= MAC= SRC=112.72.15.14 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=52 ID=6052 PROTO=TCP SPT=43063 DPT=23 SEQ=1380797534 ACK=0 WINDOW=45871 RES=0x00 SYN URGP=0
May 6 14:19:36 kernel: DROP IN=ppp0 OUT= MAC= SRC=212.47.241.246 DST=82.77.76.94 LEN=432 TOS=0x00 PREC=0x00 TTL=50 ID=4595 DF PROTO=UDP SPT=5596 DPT=5071 LEN=412
May 6 14:19:40 kernel: DROP IN=ppp0 OUT= MAC= SRC=122.114.13.88 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=113 ID=256 PROTO=TCP SPT=25933 DPT=80 SEQ=1682767872 ACK=0 WINDOW=16384 RES=0x00 SYN URGP=0
May 6 14:20:05 kernel: DROP IN=ppp0 OUT= MAC= SRC=123.207.4.86 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=22950 PROTO=TCP SPT=53482 DPT=1433 SEQ=4076605537 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:20:22 kernel: DROP IN=ppp0 OUT= MAC= SRC=198.20.69.74 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=115 ID=7752 PROTO=TCP SPT=24366 DPT=2404 SEQ=2556011902 ACK=0 WINDOW=43279 RES=0x00 SYN URGP=0
May 6 14:21:10 kernel: DROP IN=ppp0 OUT= MAC= SRC=123.207.145.140 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=9335 PROTO=TCP SPT=59859 DPT=1433 SEQ=1467510192 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:23:31 kernel: DROP IN=ppp0 OUT= MAC= SRC=89.248.167.131 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=124 ID=44927 PROTO=TCP SPT=4006 DPT=6000 SEQ=1859890942 ACK=0 WINDOW=17539 RES=0x00 SYN URGP=0
May 6 14:24:59 kernel: DROP IN=ppp0 OUT= MAC= SRC=212.47.241.246 DST=82.77.76.94 LEN=432 TOS=0x00 PREC=0x00 TTL=50 ID=24811 DF PROTO=UDP SPT=5262 DPT=5070 LEN=412
May 6 14:25:58 kernel: DROP IN=ppp0 OUT= MAC= SRC=185.38.150.23 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=54321 PROTO=TCP SPT=46780 DPT=6379 SEQ=714108720 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
May 6 14:26:16 kernel: DROP IN=ppp0 OUT= MAC= SRC=51.15.161.147 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=35410 PROTO=TCP SPT=46956 DPT=5060 SEQ=1123407304 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:26:20 kernel: DROP IN=ppp0 OUT= MAC= SRC=163.172.109.187 DST=82.77.76.94 LEN=48 TOS=0x00 PREC=0x00 TTL=118 ID=25288 PROTO=TCP SPT=28529 DPT=22 SEQ=21318515 ACK=281794783 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (020405B401010402)
May 6 14:27:17 kernel: DROP IN=ppp0 OUT= MAC= SRC=59.45.175.11 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=61800 PROTO=TCP SPT=9090 DPT=22 SEQ=30000 ACK=0 WINDOW=65535 RES=0x00 SYN URGP=0
May 6 14:27:44 kernel: DROP IN=ppp0 OUT= MAC= SRC=189.47.198.170 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=56031 PROTO=TCP SPT=22905 DPT=23 SEQ=1380797534 ACK=0 WINDOW=64758 RES=0x00 SYN URGP=0
May 6 14:30:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=212.47.241.246 DST=82.77.76.94 LEN=432 TOS=0x00 PREC=0x00 TTL=50 ID=44964 DF PROTO=UDP SPT=5474 DPT=5072 LEN=412
May 6 14:30:24 kernel: DROP IN=ppp0 OUT= MAC= SRC=123.207.6.141 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=239 ID=37072 PROTO=TCP SPT=45754 DPT=1433 SEQ=2260326679 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
May 6 14:31:08 kernel: DROP IN=ppp0 OUT= MAC= SRC=182.186.156.237 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=236 ID=20991 PROTO=TCP SPT=7716 DPT=23 SEQ=2451 ACK=0 WINDOW=14600 RES=0x00 SYN URGP=0
May 6 14:32:21 kernel: DROP IN=ppp0 OUT= MAC= SRC=185.129.148.234 DST=82.77.76.94 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=20126 PROTO=TCP SPT=43626 DPT=3389 SEQ=1836847101 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0
 
A SYN packet is used when something tries to establish a new connection. The interesting bit here isn't the SYN flag, but the DPT (destination port). You will see they target a number of different ports, so most of these are most likely just your usual background noise of bots/spiders/malwares trying to connect to IP ranges in an attempt to find a potential target to compromise. 22 are attempts to locate a vulnerable SSH server, 5060 is looking for a vulnerable VoIP service, etc...
 
Ok, so it may be a direct attempt to find open ports in my firewall too?
These SYN logs have going on for more than a year and was hacked recently so I guess could be a connection to this. I tried to disable the internet and all access to internet and right after is back one the SYN packets start to go in, tried multiple public dns'es including Open DNS and same problem. How could get track of me back and send the packets? Any idea?
 
As I said, this is normal background noise on the Internet.
 
Now since the router firmware update I get many ACCEPT packets in the logs. Are these still background noise or should I be worried?

May 16 15:27:05 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=22829 PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:06 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=213.174.130.220 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=25827 DF PROTO=TCP SPT=58938 DPT=443 SEQ=1058991668 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:06 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=104.16.24.235 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=10976 DF PROTO=TCP SPT=58939 DPT=443 SEQ=505815411 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:11 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23079 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:12 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=13818 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:15 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=14353 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:15 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23295 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:16 kernel: DROP IN=ppp0 OUT= MAC= SRC=188.234.94.124 DST=79.116.34.38 LEN=141 TOS=0x00 PREC=0x00 TTL=119 ID=29494 PROTO=UDP SPT=49001 DPT=13019 LEN=121
May 16 15:27:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23466 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:19 kernel: DROP IN=ppp0 OUT= MAC= SRC=222.116.41.182 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=117 ID=27348 PROTO=UDP SPT=37048 DPT=13019 LEN=111
May 16 15:27:21 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23542 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:24 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=15972 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:25 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=16171 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:27 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23829 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:29 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=23900 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:29 kernel: DROP IN=ppp0 OUT= MAC= SRC=5.187.149.22 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=18535 PROTO=UDP SPT=12006 DPT=13019 LEN=111
May 16 15:27:30 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=17028 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:31 kernel: DROP IN=ppp0 OUT= MAC= SRC=87.255.31.168 DST=79.116.34.38 LEN=132 TOS=0x00 PREC=0x00 TTL=118 ID=24419 PROTO=UDP SPT=3328 DPT=13019 LEN=112
May 16 15:27:31 kernel: DROP IN=ppp0 OUT= MAC= SRC=87.255.31.168 DST=79.116.34.38 LEN=132 TOS=0x00 PREC=0x00 TTL=118 ID=24420 PROTO=UDP SPT=3328 DPT=13019 LEN=112
May 16 15:27:31 kernel: DROP IN=ppp0 OUT= MAC= SRC=212.109.30.204 DST=79.116.34.38 LEN=145 TOS=0x00 PREC=0x00 TTL=119 ID=22424 PROTO=UDP SPT=1094 DPT=13019 LEN=125
May 16 15:27:34 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=17737 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:35 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=24178 PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:41 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=172.217.22.195 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=29842 DF PROTO=TCP SPT=58962 DPT=443 SEQ=2727306791 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:41 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=24422 PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:42 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=24463 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:43 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=134.170.111.154 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=31970 DF PROTO=TCP SPT=58963 DPT=80 SEQ=2437277289 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:44 kernel: DROP IN=ppp0 OUT= MAC= SRC=85.4.192.65 DST=79.116.34.38 LEN=129 TOS=0x00 PREC=0x00 TTL=51 ID=0 DF PROTO=UDP SPT=64708 DPT=13019 LEN=109
May 16 15:27:45 kernel: DROP IN=ppp0 OUT= MAC= SRC=84.9.132.14 DST=79.116.34.38 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=2060 PROTO=TCP SPT=10168 DPT=23 SEQ=15853 ACK=0 WINDOW=14600 RES=0x00 SYN URGP=0
May 16 15:27:46 kernel: DROP IN=ppp0 OUT= MAC= SRC=81.163.35.180 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=113 ID=19900 PROTO=UDP SPT=1072 DPT=13019 LEN=111
May 16 15:27:46 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=24669 PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:47 kernel: DROP IN=ppp0 OUT= MAC= SRC=94.192.143.193 DST=79.116.34.38 LEN=131 TOS=0x00 PREC=0x00 TTL=122 ID=24705 DF PROTO=UDP SPT=43993 DPT=13019 LEN=111
May 16 15:27:48 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28305 DF PROTO=TCP SPT=58965 DPT=443 SEQ=4223648382 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:48 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=35.186.199.248 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=29450 DF PROTO=TCP SPT=58966 DPT=443 SEQ=2433116866 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28313 DF PROTO=TCP SPT=58968 DPT=443 SEQ=2126219976 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28314 DF PROTO=TCP SPT=58969 DPT=443 SEQ=3861979143 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.192 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=12105 DF PROTO=TCP SPT=58970 DPT=443 SEQ=2770388179 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28320 DF PROTO=TCP SPT=58971 DPT=443 SEQ=2793276605 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28322 DF PROTO=TCP SPT=58972 DPT=443 SEQ=1153842757 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28323 DF PROTO=TCP SPT=58973 DPT=443 SEQ=598873378 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.202 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=28324 DF PROTO=TCP SPT=58974 DPT=443 SEQ=3501289510 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 16 15:27:50 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=4.79.142.192 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=12116 DF PROTO=TCP SPT=58975 DPT=443 SEQ=2314838830 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
 
Anyone can answer this?

More logs:

May 17 12:51:15 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=95.85.16.212 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=6080 DF PROTO=TCP SPT=49188 DPT=443 SEQ=2675092901 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.132 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11484 DF PROTO=TCP SPT=49189 DPT=443 SEQ=944520482 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30401 DF PROTO=TCP SPT=49192 DPT=443 SEQ=1804315561 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30402 DF PROTO=TCP SPT=49193 DPT=443 SEQ=1289947830 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30403 DF PROTO=TCP SPT=49194 DPT=443 SEQ=2860918183 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30404 DF PROTO=TCP SPT=49195 DPT=443 SEQ=1012723855 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30405 DF PROTO=TCP SPT=49196 DPT=443 SEQ=3918820243 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30406 DF PROTO=TCP SPT=49197 DPT=443 SEQ=3063098052 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.132 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=11491 DF PROTO=TCP SPT=49198 DPT=443 SEQ=71749410 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30412 DF PROTO=TCP SPT=49199 DPT=443 SEQ=1785757401 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30413 DF PROTO=TCP SPT=49200 DPT=443 SEQ=2184137312 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30414 DF PROTO=TCP SPT=49201 DPT=443 SEQ=2481516006 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30415 DF PROTO=TCP SPT=49202 DPT=443 SEQ=2905073862 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30416 DF PROTO=TCP SPT=49203 DPT=443 SEQ=484355934 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.95 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=30431 DF PROTO=TCP SPT=49204 DPT=443 SEQ=1390226638 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=95.85.16.212 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=6114 DF PROTO=TCP SPT=49205 DPT=443 SEQ=3957466998 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=95.85.16.212 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=6115 DF PROTO=TCP SPT=49206 DPT=443 SEQ=2319575911 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=95.85.16.212 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=6116 DF PROTO=TCP SPT=49207 DPT=443 SEQ=731887383 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:16 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=95.85.16.212 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=6117 DF PROTO=TCP SPT=49208 DPT=443 SEQ=4161486470 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:23 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=74.125.206.155 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=20899 DF PROTO=TCP SPT=49217 DPT=443 SEQ=2725953499 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:23 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=74.125.206.155 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=20900 DF PROTO=TCP SPT=49218 DPT=443 SEQ=4276138631 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:23 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=74.125.206.155 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=20901 DF PROTO=TCP SPT=49219 DPT=443 SEQ=378901294 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:23 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=74.125.206.155 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=20902 DF PROTO=TCP SPT=49220 DPT=443 SEQ=3244754189 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
May 17 12:51:26 kernel: ACCEPT IN=br0 OUT=ppp0 SRC=192.168.1.29 DST=64.233.167.139 LEN=52 TOS=0x00 PREC=0x00 TTL=64 ID=27356 DF PROTO=TCP SPT=49227 DPT=443 SEQ=1414748774 ACK=0 WINDOW=64240 RES=0x00 SYN URGP=0 OPT (020405AC0103030801010402)
 
Last edited:

Latest threads

Support SNBForums w/ Amazon

If you'd like to support SNBForums, just use this link and buy anything on Amazon. Thanks!

Sign Up For SNBForums Daily Digest

Get an update of what's new every day delivered to your mailbox. Sign up here!
Back
Top