howardmoon
Occasional Visitor
Found some suspicious activity in my system log and was trying to figure it out. MAC address 00:30:88:01:b4:5c is a neighbor that was blocked in the wireless MAC filter long ago, but seems to be connecting anyway. Nothing shows in the Traffic Monitor, which I assume is normal? There were lots of bytes sent and received which concerns me. If this is hackage, how can I find out what was perused/pilfered?
Code:
Dec 31 18:00:33 pppd[692]: RP-PPPoE plugin version 3.11 compiled against pppd 2.4.5
Dec 31 18:00:33 pppd[693]: pppd 2.4.5 started by adm1n, uid 0
Dec 31 18:00:34 pppd[693]: PPP session is 4952 (0x1358)
Dec 31 18:00:34 pppd[693]: Connected to 00:30:88:01:b4:5c via interface eth0
Dec 31 18:00:34 pppd[693]: Using interface ppp0
Dec 31 18:00:34 pppd[693]: Connect: ppp0 <--> eth0
Dec 31 18:00:34 pppd[693]: CHAP authentication succeeded: CHAP authentication success, unit 172
Dec 31 18:00:34 pppd[693]: CHAP authentication succeeded
Dec 31 18:00:34 pppd[693]: peer from calling number 00:30:88:01:B4:5C authorized
Dec 31 18:00:35 pppd[693]: local IP address (my external subnet).23
Dec 31 18:00:35 pppd[693]: remote IP address (my external subnet).1
(large part of logs missing or dates above wrong)
Nov 20 13:29:15 pppd[693]: System time change detected.
Nov 20 19:15:36 pppd[693]: Connect time 346.6 minutes.
Nov 20 19:15:36 pppd[693]: Sent 57986977 bytes, received 921643464 bytes.
Nov 20 19:15:39 pppd[693]: Modem hangup
Nov 20 19:15:49 pppd[693]: PPP session is 5904 (0x1710)
Nov 20 19:15:49 pppd[693]: Connected to 00:30:88:01:b4:5c via interface eth0
Nov 20 19:15:49 pppd[693]: Using interface ppp0
Nov 20 19:15:49 pppd[693]: Connect: ppp0 <--> eth0
Nov 20 19:15:49 pppd[693]: CHAP authentication succeeded: CHAP authentication success, unit 172
Nov 20 19:15:49 pppd[693]: CHAP authentication succeeded
Nov 20 19:15:49 pppd[693]: peer from calling number 00:30:88:01:B4:5C authorized
Nov 20 19:15:50 miniupnpd[1315]: Failed to get IP for interface ppp0
Nov 20 19:15:50 miniupnpd[1315]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 20 19:15:50 miniupnpd[1315]: Failed to get IP for interface ppp0
Nov 20 19:15:50 miniupnpd[1315]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 20 19:15:50 miniupnpd[1315]: Failed to get IP for interface ppp0
Nov 20 19:15:50 miniupnpd[1315]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 20 19:15:50 pppd[693]: local IP address (my external subnet).23
Nov 20 19:15:50 pppd[693]: remote IP address (my external subnet).1
Nov 21 01:31:14 pppd[693]: No response to 10 echo-requests
Nov 21 01:31:14 pppd[693]: Serial link appears to be disconnected.
Nov 21 01:31:14 pppd[693]: Connect time 375.4 minutes.
Nov 21 01:31:14 pppd[693]: Sent 27628529 bytes, received 849282991 bytes.
Nov 21 01:31:20 pppd[693]: Connection terminated.
Nov 21 01:31:20 pppd[693]: Sent PADT
Nov 21 01:31:20 pppd[693]: Modem hangup
Nov 21 01:31:35 pppd[693]: PPP session is 168 (0xa8)
Nov 21 01:31:35 pppd[693]: Connected to 00:30:88:01:b4:5c via interface eth0
Nov 21 01:31:35 pppd[693]: Using interface ppp0
Nov 21 01:31:35 pppd[693]: Connect: ppp0 <--> eth0
Nov 21 01:31:36 pppd[693]: CHAP authentication succeeded: CHAP authentication success, unit 172
Nov 21 01:31:36 pppd[693]: CHAP authentication succeeded
Nov 21 01:31:36 pppd[693]: peer from calling number 00:30:88:01:B4:5C authorized
Nov 21 01:31:36 miniupnpd[2589]: Failed to get IP for interface ppp0
Nov 21 01:31:36 miniupnpd[2589]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 21 01:31:36 miniupnpd[2589]: Failed to get IP for interface ppp0
Nov 21 01:31:36 miniupnpd[2589]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 21 01:31:36 miniupnpd[2589]: Failed to get IP for interface ppp0
Nov 21 01:31:36 miniupnpd[2589]: SendNATPMPPublicAddressChangeNotification: cannot get public IP address, stopping
Nov 21 01:31:36 pppd[693]: local IP address (my external subnet).23
Nov 21 01:31:36 pppd[693]: remote IP address (my external subnet).1
Nov 21 01:31:36 dnsmasq[4353]: read /etc/hosts - 5 addresses
Nov 21 01:31:36 dnsmasq[4353]: read /etc/hosts.dnsmasq - 29 addresses
Nov 21 01:31:36 dnsmasq-dhcp[4353]: read /etc/ethers - 29 addresses
Nov 21 01:31:36 dnsmasq[4353]: using nameserver 8.8.8.8#53
Nov 21 01:31:36 dnsmasq[4353]: using nameserver 8.8.4.4#53
Nov 21 01:31:36 rc_service: ip-up 4368:notify_rc start_firewall
Nov 21 01:31:36 start_nat_rules: apply the nat_rules(/tmp/nat_rules_ppp0_eth0)!
Nov 21 01:31:36 dnsmasq[4353]: exiting on receipt of SIGTERM
Nov 21 01:31:36 rc_service: ip-up 4368:notify_rc stop_upnp
Nov 21 01:31:36 rc_service: waitting "start_firewall" via ip-up ...
Nov 21 01:31:36 dnsmasq[4387]: started, version 2.72test3 cachesize 1500
Nov 21 01:31:36 dnsmasq[4387]: warning: interface ppp1* does not currently exist
Nov 21 01:31:36 dnsmasq[4387]: asynchronous logging enabled, queue limit is 5 messages
Nov 21 01:31:36 dnsmasq-dhcp[4387]: DHCP, IP range 192.168.1.2 -- 192.168.1.254, lease time 1d
Nov 21 01:31:36 dnsmasq[4387]: read /etc/hosts - 5 addresses
Nov 21 01:31:36 dnsmasq[4387]: read /etc/hosts.dnsmasq - 29 addresses
Nov 21 01:31:36 dnsmasq-dhcp[4387]: read /etc/ethers - 29 addresses
Nov 21 01:31:36 dnsmasq[4387]: using nameserver 8.8.8.8#53
Nov 21 01:31:36 dnsmasq[4387]: using nameserver 8.8.4.4#53
Nov 21 01:31:37 rc_service: ip-up 4368:notify_rc start_upnp
Nov 21 01:31:37 rc_service: waitting "stop_upnp" via ip-up ...
Nov 21 01:31:37 miniupnpd[2589]: shutting down MiniUPnPd
Nov 21 01:31:38 miniupnpd[4411]: HTTP listening on port 52560
Nov 21 01:31:38 miniupnpd[4411]: Listening for NAT-PMP/PCP traffic on port 5351
Nov 21 01:31:38 WAN Connection: WAN was restored.