[Wien] sollte ich mir sorgen machen???

Markus Kittenberger (spam-protected)
So Mai 9 22:13:06 CEST 2010


nun wenn sich wirklich von deinem router aus wer bei gri97 einloggt soltest
du dir sorgen amchen,..

lg Markus

2010/5/9 Felix Ehritz <(spam-protected)>

>  Mein log!
>
> Der log von meinem knoten hp4 78.41.112.81
>
> Mich hat chris angerufen, ob ich mich bei ihm am router einlogge…natürlich
> nicht.
>
> panelost.gri97.wien.funkfeuer.a
>
>
>
>
>
> May  9 21:33:33 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 28654 from 193.238.159.6 on eth0 (1424 Bytes)
>
> May  9 21:33:47 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 28718 from 193.238.159.6 on eth0 (628 Bytes)
>
> May  9 21:35:02 v10 daemon.info dnsmasq[1117]: read /etc/hosts - 1
> addresses
>
> May  9 21:35:14 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29107 from 193.238.159.6 on eth0 (1464 Bytes)
>
> May  9 21:35:34 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29199 from 193.238.159.6 on eth0 (1432 Bytes)
>
> May  9 21:35:43 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29237 from 193.238.159.6 on eth0 (1460 Bytes)
>
> May  9 21:35:52 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29282 from 193.238.159.6 on eth0 (1312 Bytes)
>
> May  9 21:36:02 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29327 from 193.238.159.6 on eth0 (1428 Bytes)
>
> May  9 21:36:45 v10 authpriv.info dropbear[14162]: Child connection from
> 200.30.189.102:38011
>
> May  9 21:36:45 v10 authpriv.info dropbear[14163]: Child connection from
> 200.30.189.102:38012
>
> May  9 21:36:46 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29533 from 193.238.159.6 on eth0 (1444 Bytes)
>
> *May  9 21:36:48 v10 authpriv.warn dropbear[14162]: login attempt for
> nonexistent user from 200.30.189.102:38011*
>
> *May  9 21:36:48 v10 authpriv.warn dropbear[14163]: login attempt for
> nonexistent user from 200.30.189.102:38012*
>
> *May  9 21:36:49 v10 authpriv.info dropbear[14162]: exit before auth:
> Disconnect received*
>
> *May  9 21:36:49 v10 authpriv.info dropbear[14163]: exit before auth:
> Disconnect received*
>
> *May  9 21:36:49 v10 authpriv.info dropbear[14164]: Child connection from
> 200.30.189.102:38170*
>
> *May  9 21:36:49 v10 authpriv.info dropbear[14165]: Child connection from
> 200.30.189.102:38177*
>
> *May  9 21:36:53 v10 authpriv.warn dropbear[14165]: login attempt for
> nonexistent user from 200.30.189.102:38177*
>
> *May  9 21:36:53 v10 authpriv.warn dropbear[14164]: login attempt for
> nonexistent user from 200.30.189.102:38170*
>
> *May  9 21:36:53 v10 authpriv.info dropbear[14165]: exit before auth:
> Disconnect received*
>
> *May  9 21:36:53 v10 authpriv.info dropbear[14164]: exit before auth:
> Disconnect received*
>
> *May  9 21:36:54 v10 authpriv.info dropbear[14166]: Child connection from
> 200.30.189.102:47130*
>
> *May  9 21:36:56 v10 authpriv.warn dropbear[14166]: login attempt for
> nonexistent user from 200.30.189.102:47130*
>
> *May  9 21:36:57 v10 authpriv.info dropbear[14167]: Child connection from
> 200.30.189.102:47107*
>
> *May  9 21:36:57 v10 authpriv.info dropbear[14166]: exit before auth:
> Disconnect received*
>
> *May  9 21:36:57 v10 authpriv.info dropbear[14168]: Child connection from
> 200.30.189.102:49842*
>
> *May  9 21:37:00 v10 authpriv.warn dropbear[14167]: login attempt for
> nonexistent user from 200.30.189.102:47107*
>
> *May  9 21:37:00 v10 authpriv.warn dropbear[14168]: login attempt for
> nonexistent user from 200.30.189.102:49842*
>
> *May  9 21:37:01 v10 authpriv.info dropbear[14167]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:01 v10 authpriv.info dropbear[14169]: Child connection from
> 200.30.189.102:51014*
>
> *May  9 21:37:01 v10 authpriv.info dropbear[14168]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:01 v10 authpriv.info dropbear[14170]: Child connection from
> 200.30.189.102:51019*
>
> *May  9 21:37:01 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29604 from 193.238.159.6 on eth0 (1420 Bytes)*
>
> *May  9 21:37:05 v10 authpriv.warn dropbear[14169]: login attempt for
> nonexistent user from 200.30.189.102:51014*
>
> *May  9 21:37:06 v10 authpriv.warn dropbear[14170]: login attempt for
> nonexistent user from 200.30.189.102:51019*
>
> *May  9 21:37:06 v10 authpriv.info dropbear[14169]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:06 v10 authpriv.info dropbear[14170]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:06 v10 authpriv.info dropbear[14175]: Child connection from
> 200.30.189.102:55083*
>
> *May  9 21:37:06 v10 authpriv.info dropbear[14176]: Child connection from
> 200.30.189.102:55091*
>
> *May  9 21:37:10 v10 authpriv.warn dropbear[14175]: login attempt for
> nonexistent user from 200.30.189.102:55083*
>
> *May  9 21:37:10 v10 authpriv.warn dropbear[14176]: login attempt for
> nonexistent user from 200.30.189.102:55091*
>
> *May  9 21:37:10 v10 authpriv.info dropbear[14175]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:11 v10 authpriv.info dropbear[14176]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:11 v10 authpriv.info dropbear[14177]: Child connection from
> 200.30.189.102:58579*
>
> *May  9 21:37:11 v10 authpriv.info dropbear[14178]: Child connection from
> 200.30.189.102:58581*
>
> *May  9 21:37:17 v10 authpriv.warn dropbear[14177]: login attempt for
> nonexistent user from 200.30.189.102:58579*
>
> *May  9 21:37:17 v10 authpriv.warn dropbear[14178]: login attempt for
> nonexistent user from 200.30.189.102:58581*
>
> *May  9 21:37:17 v10 authpriv.info dropbear[14177]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:17 v10 authpriv.info dropbear[14178]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:18 v10 authpriv.info dropbear[14179]: Child connection from
> 200.30.189.102:35027*
>
> *May  9 21:37:18 v10 authpriv.info dropbear[14180]: Child connection from
> 200.30.189.102:35028*
>
> *May  9 21:37:21 v10 authpriv.warn dropbear[14179]: login attempt for
> nonexistent user from 200.30.189.102:35027*
>
> *May  9 21:37:21 v10 authpriv.warn dropbear[14180]: login attempt for
> nonexistent user from 200.30.189.102:35028*
>
> *May  9 21:37:22 v10 authpriv.info dropbear[14179]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:22 v10 authpriv.info dropbear[14180]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:22 v10 authpriv.info dropbear[14181]: Child connection from
> 200.30.189.102:38521*
>
> *May  9 21:37:22 v10 authpriv.info dropbear[14182]: Child connection from
> 200.30.189.102:38524*
>
> *May  9 21:37:26 v10 authpriv.warn dropbear[14181]: login attempt for
> nonexistent user from 200.30.189.102:38521*
>
> *May  9 21:37:26 v10 authpriv.warn dropbear[14182]: login attempt for
> nonexistent user from 200.30.189.102:38524*
>
> *May  9 21:37:27 v10 authpriv.info dropbear[14181]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:27 v10 authpriv.info dropbear[14182]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:27 v10 authpriv.info dropbear[14183]: Child connection from
> 200.30.189.102:42316*
>
> *May  9 21:37:27 v10 authpriv.info dropbear[14184]: Child connection from
> 200.30.189.102:42321*
>
> *May  9 21:37:30 v10 authpriv.warn dropbear[14184]: login attempt for
> nonexistent user from 200.30.189.102:42321*
>
> *May  9 21:37:30 v10 authpriv.warn dropbear[14183]: login attempt for
> nonexistent user from 200.30.189.102:42316*
>
> *May  9 21:37:31 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 29740 from 193.238.159.6 on eth0 (1444 Bytes)*
>
> *May  9 21:37:31 v10 authpriv.info dropbear[14184]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:31 v10 authpriv.info dropbear[14183]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:31 v10 authpriv.info dropbear[14185]: Child connection from
> 200.30.189.102:45430*
>
> *May  9 21:37:31 v10 authpriv.info dropbear[14186]: Child connection from
> 200.30.189.102:45444*
>
> *May  9 21:37:35 v10 authpriv.warn dropbear[14185]: login attempt for
> nonexistent user from 200.30.189.102:45430*
>
> *May  9 21:37:35 v10 authpriv.warn dropbear[14186]: login attempt for
> nonexistent user from 200.30.189.102:45444*
>
> *May  9 21:37:36 v10 authpriv.info dropbear[14186]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:36 v10 authpriv.info dropbear[14185]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:36 v10 authpriv.info dropbear[14187]: Child connection from
> 200.30.189.102:48776*
>
> *May  9 21:37:36 v10 authpriv.info dropbear[14188]: Child connection from
> 200.30.189.102:48777*
>
> *May  9 21:37:39 v10 authpriv.warn dropbear[14188]: login attempt for
> nonexistent user from 200.30.189.102:48777*
>
> *May  9 21:37:39 v10 authpriv.warn dropbear[14187]: login attempt for
> nonexistent user from 200.30.189.102:48776*
>
> *May  9 21:37:40 v10 authpriv.info dropbear[14188]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:40 v10 authpriv.info dropbear[14187]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:40 v10 authpriv.info dropbear[14189]: Child connection from
> 200.30.189.102:51996*
>
> *May  9 21:37:40 v10 authpriv.info dropbear[14190]: Child connection from
> 200.30.189.102:51998*
>
> *May  9 21:37:44 v10 authpriv.warn dropbear[14189]: login attempt for
> nonexistent user from 200.30.189.102:51996*
>
> *May  9 21:37:44 v10 authpriv.warn dropbear[14190]: login attempt for
> nonexistent user from 200.30.189.102:51998*
>
> *May  9 21:37:44 v10 authpriv.info dropbear[14189]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:44 v10 authpriv.info dropbear[14190]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:45 v10 authpriv.info dropbear[14191]: Child connection from
> 200.30.189.102:55387*
>
> *May  9 21:37:45 v10 authpriv.info dropbear[14192]: Child connection from
> 200.30.189.102:55402*
>
> *May  9 21:37:48 v10 authpriv.warn dropbear[14191]: login attempt for
> nonexistent user from 200.30.189.102:55387*
>
> *May  9 21:37:48 v10 authpriv.warn dropbear[14192]: login attempt for
> nonexistent user from 200.30.189.102:55402*
>
> *May  9 21:37:49 v10 authpriv.info dropbear[14191]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:49 v10 authpriv.info dropbear[14192]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:49 v10 authpriv.info dropbear[14193]: Child connection from
> 200.30.189.102:59241*
>
> *May  9 21:37:49 v10 authpriv.info dropbear[14194]: Child connection from
> 200.30.189.102:59248*
>
> *May  9 21:37:52 v10 authpriv.warn dropbear[14193]: login attempt for
> nonexistent user from 200.30.189.102:59241*
>
> *May  9 21:37:52 v10 authpriv.warn dropbear[14194]: login attempt for
> nonexistent user from 200.30.189.102:59248*
>
> *May  9 21:37:53 v10 authpriv.info dropbear[14194]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:53 v10 authpriv.info dropbear[14193]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:53 v10 authpriv.info dropbear[14195]: Child connection from
> 200.30.189.102:34263*
>
> *May  9 21:37:53 v10 authpriv.info dropbear[14196]: Child connection from
> 200.30.189.102:34264*
>
> *May  9 21:37:57 v10 authpriv.warn dropbear[14195]: login attempt for
> nonexistent user from 200.30.189.102:34263*
>
> *May  9 21:37:57 v10 authpriv.warn dropbear[14196]: login attempt for
> nonexistent user from 200.30.189.102:34264*
>
> *May  9 21:37:58 v10 authpriv.info dropbear[14195]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:58 v10 authpriv.info dropbear[14196]: exit before auth:
> Disconnect received*
>
> *May  9 21:37:58 v10 authpriv.info dropbear[14197]: Child connection from
> 200.30.189.102:37230*
>
> *May  9 21:37:58 v10 authpriv.info dropbear[14198]: Child connection from
> 200.30.189.102:37260*
>
> *May  9 21:38:01 v10 authpriv.warn dropbear[14197]: login attempt for
> nonexistent user from 200.30.189.102:37230*
>
> *May  9 21:38:01 v10 authpriv.warn dropbear[14198]: login attempt for
> nonexistent user from 200.30.189.102:37260*
>
> *May  9 21:38:02 v10 authpriv.info dropbear[14197]: exit before auth:
> Disconnect received*
>
> *May  9 21:38:02 v10 authpriv.info dropbear[14198]: exit before auth:
> Disconnect received*
>
> *May  9 21:38:11 v10 authpriv.info dropbear[14203]: Child connection from
> 200.30.189.102:39737*
>
> May  9 21:38:13 v10 authpriv.info dropbear[14203]: exit before auth:
> Exited normally
>
> May  9 21:38:35 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30036 from 193.238.159.6 on eth0 (1452 Bytes)
>
> May  9 21:38:35 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30039 from 193.238.159.6 on eth0 (1452 Bytes)
>
> May  9 21:38:39 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30059 from 193.238.159.6 on eth0 (1396 Bytes)
>
> May  9 21:39:25 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30270 from 193.238.159.6 on eth0 (1448 Bytes)
>
> May  9 21:39:43 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30355 from 193.238.159.6 on eth0 (1388 Bytes)
>
> May  9 21:39:47 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30376 from 193.238.159.6 on eth0 (1472 Bytes)
>
> May  9 21:39:53 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30400 from 193.238.159.6 on eth0 (1444 Bytes)
>
> May  9 21:40:01 v10 daemon.info dnsmasq[1117]: read /etc/hosts - 1
> addresses
>
> May  9 21:40:24 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30540 from 193.238.159.6 on eth0 (1464 Bytes)
>
> May  9 21:40:33 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30580 from 193.238.159.6 on eth0 (988 Bytes)
>
> May  9 21:41:24 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30817 from 193.238.159.6 on eth0 (1400 Bytes)
>
> May  9 21:41:29 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30836 from 193.238.159.6 on eth0 (1460 Bytes)
>
> May  9 21:41:59 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 30978 from 193.238.159.6 on eth0 (1464 Bytes)
>
> May  9 21:42:12 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31036 from 193.238.159.6 on eth0 (1460 Bytes)
>
> May  9 21:42:30 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31121 from 193.238.159.6 on eth0 (1452 Bytes)
>
> May  9 21:42:36 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31145 from 193.238.159.6 on eth0 (1396 Bytes)
>
> May  9 21:43:15 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31301 from 193.238.159.6 on eth0 (1436 Bytes)
>
> May  9 21:43:28 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31360 from 193.238.159.6 on eth0 (1396 Bytes)
>
> May  9 21:43:58 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31499 from 193.238.159.6 on eth0 (1444 Bytes)
>
> May  9 21:45:01 v10 daemon.info dnsmasq[1117]: read /etc/hosts - 1
> addresses
>
> May  9 21:45:38 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 31949 from 193.238.159.6 on eth0 (352 Bytes)
>
> May  9 21:45:52 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32013 from 193.238.159.6 on eth0 (1404 Bytes)
>
> May  9 21:46:08 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32083 from 193.238.159.6 on eth0 (1436 Bytes)
>
> May  9 21:46:21 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32145 from 193.238.159.6 on eth0 (1376 Bytes)
>
> May  9 21:46:27 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32174 from 193.238.159.6 on eth0 (1460 Bytes)
>
> May  9 21:48:43 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32802 from 193.238.159.6 on eth0 (1464 Bytes)
>
> May  9 21:48:54 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32855 from 193.238.159.6 on eth0 (1404 Bytes)
>
> May  9 21:49:05 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 32902 from 193.238.159.6 on eth0 (1472 Bytes)
>
> May  9 21:50:02 v10 daemon.info dnsmasq[1117]: read /etc/hosts - 1
> addresses
>
> May  9 21:50:20 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33244 from 193.238.159.6 on eth0 (1472 Bytes)
>
> May  9 21:51:07 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33462 from 193.238.159.6 on eth0 (1392 Bytes)
>
> May  9 21:51:18 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33519 from 193.238.159.6 on eth0 (1380 Bytes)
>
> May  9 21:51:22 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33539 from 193.238.159.6 on eth0 (1044 Bytes)
>
> May  9 21:51:38 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33587 from 193.238.159.6 on eth0 (1472 Bytes)
>
> May  9 21:51:52 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33657 from 193.238.159.6 on eth0 (1452 Bytes)
>
> May  9 21:51:54 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33669 from 193.238.159.6 on eth0 (1448 Bytes)
>
> May  9 21:52:02 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33705 from 193.238.159.6 on eth0 (1348 Bytes)
>
> May  9 21:52:21 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33791 from 193.238.159.6 on eth0 (1428 Bytes)
>
> May  9 21:52:22 v10 daemon.info olsrd[1097]: detected duplicate packet
> with seqnr 33798 from 193.238.159.6 on eth0 (1436 Bytes)
>
> --
> Wien mailing list
> (spam-protected)
> http://lists.funkfeuer.at/mailman/listinfo/wien
>
-------------- nächster Teil --------------
Ein Dateianhang mit HTML-Daten wurde abgetrennt...
URL: <http://lists.funkfeuer.at/pipermail/wien/attachments/20100509/7d85699a/attachment.htm>


Mehr Informationen über die Mailingliste Wien