aabbc1
Stamm User
- Registriert
- 8. Januar 2011
- Beiträge
- 1.022
- Reaktionspunkte
- 266
- Punkte
- 1.665
das ist der gesamte Log, denn ich nach Raspi Neustart habe
BTW: Wie kann ich gbox ausschalten?
2020/01/03 16:03:04 00000000 s >> OSCam << cardserver log switched, version 1.20_svn, build r11537 (arm-linux-gnueabihf)
2020/01/03 16:03:04 00000000 s (main) System name = Linux
2020/01/03 16:03:04 00000000 s (main) Host name = raspberrypi
2020/01/03 16:03:04 00000000 s (main) Release = 4.19.58-v7+
2020/01/03 16:03:04 00000000 s (main) Version = #1245 SMP Fri Jul 12 17:25:51 BST 2019
2020/01/03 16:03:04 00000000 s (main) Machine = armv7l
2020/01/03 16:03:04 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 13389
2020/01/03 16:03:04 00000000 s (config) userdb reloaded: 2 accounts loaded, 0 expired, 0 disabled
2020/01/03 16:03:04 00000000 s (main) signal handling initialized
2020/01/03 16:03:04 00000000 s (config) 13 tier-id's loaded
2020/01/03 16:03:04 00000000 s (net) newcamd: initialized (fd=5, port=22000)
2020/01/03 16:03:04 00000000 s (net) -> CAID: 1830 PROVID: 003411
2020/01/03 16:03:04 00000000 s (net) cccam: initialized (fd=6, port=3200)
2020/01/03 16:03:04 00000000 s (net) gbox: initialized (fd=7, port=7004)
2020/01/03 16:03:04 00000000 s (reader) HD04 [mouse] creating thread for device /dev/ttyUSB0
2020/01/03 16:03:04 00000000 s (reader) UM02/UM01 [mouse] creating thread for device /dev/ttyUSB1
2020/01/03 16:03:04 00000000 s (main) waiting for local card init
2020/01/03 16:03:04 1CE4F32D h (webif) webif: decompressed 179776 bytes back into 443592 bytes
2020/01/03 16:03:04 1CE4F32D h (webif) HTTP Server running. ip=0.0.0.0 port=16002
2020/01/03 16:03:04 6E2FC794 r (reader) UM02/UM01 [mouse] Reader initialized (device=/dev/ttyUSB1, detect=cd, mhz=357, cardmhz=357)
2020/01/03 16:03:04 2F559ACA r (reader) HD04 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2020/01/03 16:03:05 2F559ACA r (reader) HD04 [mouse] card detected
2020/01/03 16:03:05 6E2FC794 r (reader) UM02/UM01 [mouse] card detected
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] ATR: 3F FF 95 00 FF 91 81 71 FE 57 00 44 4E 41 53 50 34 32 30 20 52 65 76 53 36 30 17
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] Setting baudrate to 111600 bps
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] detected nagra merlin card in CAK7 mode
2020/01/03 16:03:07 2F559ACA r (reader) HD04 [mouse] Rom revision: DNASP420 RevS60
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [mouse] ready for requests
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [mouse] found card system nagra merlin
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] ROM: D N A S P 4 2 0
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] REV: R e v S 6 0
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] SER: ############
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] CAID: 186A
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 34 11 (sysid)
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] Provider Sys ID: 34 11 is active to: 2020/02/24
2020/01/03 16:03:08 6E2FC794 r (reader) UM02/UM01 [mouse] Error activating card.
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] -----------------------------------------
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |id |tier |valid from |valid to |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] +----+--------+------------+------------+
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|006C |2017/01/01 |2017/01/02 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|0BEA |2019/08/20 |2020/02/20 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|0FD2 |2019/08/20 |2020/02/20 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] -----------------------------------------
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 00 00
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 80 11
2020/01/03 16:03:12 6E2FC794 r (reader) UM02/UM01 [mouse] Error activating card.
2020/01/03 16:03:17 6E2FC794 r (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:17 6E2FC794 r (reader) UM02/UM01 [mouse] THIS WAS A FAILED START ATTEMPT No 1 out of max allotted of 1
2020/01/03 16:03:17 6E2FC794 r (reader) UM02/UM01 [mouse] card initializing error
2020/01/03 16:03:18 00000000 s (main) init for all local cards done
2020/01/03 16:03:18 00000000 s (emmcache) loaded 0 emmcache records from /tmp/.oscam/oscam.emmcache in 0 ms
2020/01/03 16:03:18 00000000 s (emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms
2020/01/03 16:03:18 5077F0D8 c (gbox) new connection from 127.0.0.1
2020/01/03 16:03:18 48CF6606 c (client) anonymous disconnected from 192.168.178.47
2020/01/03 16:03:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:24 386E13E0 c (-) -- Skipped 3 duplicated log lines --
2020/01/03 16:03:24 386E13E0 c (client) encrypted cccam-client 192.168.178.47 granted (vu+_uno4k, au=auto (2 reader))
2020/01/03 16:03:25 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:07A6CC52BF437ED2472E867C972FA37A): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:36 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:36 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:895313DAEE568C0B437A0F9BFC6577D8): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:45 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:45 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:01243F13B4DC4D7084207E781F73E7B1): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:48 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:55 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:55 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:5B2B26FBE7828FF1CDD7B4406E20897D): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:58 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:05 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:05 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:F54D6C94BE9AC1506A544AD225A48A8B): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:08 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:15 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:15 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:1D14F95CFA4AA57B1C29E25A35C5DE7C): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:25 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:25 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:68318FC3A004F5C78A42CC4EFD907FA9): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:35 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:35 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:4C91F0D0163B89E2FE4377E3A938545A): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:45 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:45 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:50719BDB2A3EF4DC4BF2D0E01465D98F): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:48 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:58 386E13E0 c (-) -- Skipped 2 duplicated log lines --
2020/01/03 16:04:58 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:B2F7633C59C567F14D6894741CDDA266): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:03 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:08 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:74B9699D0D496D2336E49F21C5A81A35): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:08 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:18 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:18 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:FAB8A4BDCCE086FCCAE393D25549AB70): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:28 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:28 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92
BC831E78D35CE5B12E312316704C381): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:38 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:38 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:764DF320DF1C13D94B80F535DC45F090): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:49 386E13E0 c (-) -- Skipped 2 duplicated log lines --
2020/01/03 16:05:49 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:C146017D7BDF96A6E6060EED43F0579F): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:53 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:59 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:59 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:711F7AFB503DF0DE57DBC03B2DDEDE12): rejected group (0 ms) (no matching reader)
2020/01/03 16:06:03 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:06:09 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:06:09 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:64406D6D4BB776C0BD15B6169B67FB7C): rejected group (0 ms) (no matching reader)
2020/01/03 16:06:13 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:04 00000000 s (main) System name = Linux
2020/01/03 16:03:04 00000000 s (main) Host name = raspberrypi
2020/01/03 16:03:04 00000000 s (main) Release = 4.19.58-v7+
2020/01/03 16:03:04 00000000 s (main) Version = #1245 SMP Fri Jul 12 17:25:51 BST 2019
2020/01/03 16:03:04 00000000 s (main) Machine = armv7l
2020/01/03 16:03:04 00000000 s (main) creating pidfile /tmp/.oscam/oscam.pid with pid 13389
2020/01/03 16:03:04 00000000 s (config) userdb reloaded: 2 accounts loaded, 0 expired, 0 disabled
2020/01/03 16:03:04 00000000 s (main) signal handling initialized
2020/01/03 16:03:04 00000000 s (config) 13 tier-id's loaded
2020/01/03 16:03:04 00000000 s (net) newcamd: initialized (fd=5, port=22000)
2020/01/03 16:03:04 00000000 s (net) -> CAID: 1830 PROVID: 003411
2020/01/03 16:03:04 00000000 s (net) cccam: initialized (fd=6, port=3200)
2020/01/03 16:03:04 00000000 s (net) gbox: initialized (fd=7, port=7004)
2020/01/03 16:03:04 00000000 s (reader) HD04 [mouse] creating thread for device /dev/ttyUSB0
2020/01/03 16:03:04 00000000 s (reader) UM02/UM01 [mouse] creating thread for device /dev/ttyUSB1
2020/01/03 16:03:04 00000000 s (main) waiting for local card init
2020/01/03 16:03:04 1CE4F32D h (webif) webif: decompressed 179776 bytes back into 443592 bytes
2020/01/03 16:03:04 1CE4F32D h (webif) HTTP Server running. ip=0.0.0.0 port=16002
2020/01/03 16:03:04 6E2FC794 r (reader) UM02/UM01 [mouse] Reader initialized (device=/dev/ttyUSB1, detect=cd, mhz=357, cardmhz=357)
2020/01/03 16:03:04 2F559ACA r (reader) HD04 [mouse] Reader initialized (device=/dev/ttyUSB0, detect=cd, mhz=357, cardmhz=357)
2020/01/03 16:03:05 2F559ACA r (reader) HD04 [mouse] card detected
2020/01/03 16:03:05 6E2FC794 r (reader) UM02/UM01 [mouse] card detected
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] ATR: 3F FF 95 00 FF 91 81 71 FE 57 00 44 4E 41 53 50 34 32 30 20 52 65 76 53 36 30 17
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] Setting baudrate to 111600 bps
2020/01/03 16:03:06 2F559ACA r (reader) HD04 [mouse] detected nagra merlin card in CAK7 mode
2020/01/03 16:03:07 2F559ACA r (reader) HD04 [mouse] Rom revision: DNASP420 RevS60
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [mouse] ready for requests
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [mouse] found card system nagra merlin
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] THIS WAS A SUCCESSFUL START ATTEMPT No 1 out of max allotted of 1
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] ROM: D N A S P 4 2 0
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] REV: R e v S 6 0
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] SER: ############
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] CAID: 186A
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 34 11 (sysid)
2020/01/03 16:03:08 2F559ACA r (reader) HD04 [nagra merlin] Provider Sys ID: 34 11 is active to: 2020/02/24
2020/01/03 16:03:08 6E2FC794 r (reader) UM02/UM01 [mouse] Error activating card.
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] -----------------------------------------
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |id |tier |valid from |valid to |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] +----+--------+------------+------------+
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|006C |2017/01/01 |2017/01/02 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|0BEA |2019/08/20 |2020/02/20 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] |8011|0FD2 |2019/08/20 |2020/02/20 |
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] -----------------------------------------
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 00 00
2020/01/03 16:03:09 2F559ACA r (reader) HD04 [nagra merlin] Prv.ID: 00 00 80 11
2020/01/03 16:03:12 6E2FC794 r (reader) UM02/UM01 [mouse] Error activating card.
2020/01/03 16:03:17 6E2FC794 r (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:17 6E2FC794 r (reader) UM02/UM01 [mouse] THIS WAS A FAILED START ATTEMPT No 1 out of max allotted of 1
2020/01/03 16:03:17 6E2FC794 r (reader) UM02/UM01 [mouse] card initializing error
2020/01/03 16:03:18 00000000 s (main) init for all local cards done
2020/01/03 16:03:18 00000000 s (emmcache) loaded 0 emmcache records from /tmp/.oscam/oscam.emmcache in 0 ms
2020/01/03 16:03:18 00000000 s (emmcache) loaded 0 emmstat records from /tmp/.oscam/oscam.emmstat in 0 ms
2020/01/03 16:03:18 5077F0D8 c (gbox) new connection from 127.0.0.1
2020/01/03 16:03:18 48CF6606 c (client) anonymous disconnected from 192.168.178.47
2020/01/03 16:03:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:24 386E13E0 c (-) -- Skipped 3 duplicated log lines --
2020/01/03 16:03:24 386E13E0 c (client) encrypted cccam-client 192.168.178.47 granted (vu+_uno4k, au=auto (2 reader))
2020/01/03 16:03:25 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:07A6CC52BF437ED2472E867C972FA37A): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:36 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:36 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:895313DAEE568C0B437A0F9BFC6577D8): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:45 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:45 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:01243F13B4DC4D7084207E781F73E7B1): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:48 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:03:55 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:03:55 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:5B2B26FBE7828FF1CDD7B4406E20897D): rejected group (0 ms) (no matching reader)
2020/01/03 16:03:58 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:05 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:05 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:F54D6C94BE9AC1506A544AD225A48A8B): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:08 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:15 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:15 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:1D14F95CFA4AA57B1C29E25A35C5DE7C): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:25 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:25 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:68318FC3A004F5C78A42CC4EFD907FA9): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:35 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:35 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:4C91F0D0163B89E2FE4377E3A938545A): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:45 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:04:45 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:50719BDB2A3EF4DC4BF2D0E01465D98F): rejected group (0 ms) (no matching reader)
2020/01/03 16:04:48 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:04:58 386E13E0 c (-) -- Skipped 2 duplicated log lines --
2020/01/03 16:04:58 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:B2F7633C59C567F14D6894741CDDA266): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:03 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:08 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:74B9699D0D496D2336E49F21C5A81A35): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:08 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:18 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:18 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:FAB8A4BDCCE086FCCAE393D25549AB70): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:18 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:28 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:28 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92

2020/01/03 16:05:28 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:38 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:38 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:764DF320DF1C13D94B80F535DC45F090): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:38 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:49 386E13E0 c (-) -- Skipped 2 duplicated log lines --
2020/01/03 16:05:49 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:C146017D7BDF96A6E6060EED43F0579F): rejected group (0 ms) (no matching reader)
2020/01/03 16:05:53 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:05:59 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:05:59 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:711F7AFB503DF0DE57DBC03B2DDEDE12): rejected group (0 ms) (no matching reader)
2020/01/03 16:06:03 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
2020/01/03 16:06:09 386E13E0 c (-) -- Skipped 1 duplicated log lines --
2020/01/03 16:06:09 386E13E0 c (ecm) vu+_uno4k (1838@000000/0000/372D/92:64406D6D4BB776C0BD15B6169B67FB7C): rejected group (0 ms) (no matching reader)
2020/01/03 16:06:13 5077F0D8 c (gbox) -> ATTACK ALERT from IP 127.0.0.1 - peer sends wrong local password
BTW: Wie kann ich gbox ausschalten?