Code Monkey home page Code Monkey logo

sing-box's Introduction

sing-box

The universal proxy platform.

Packaging status

Documentation

https://sing-box.sagernet.org

Support

https://community.sagernet.org/c/sing-box/

License

Copyright (C) 2022 by nekohasekai <[email protected]>

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU General Public License for more details.

You should have received a copy of the GNU General Public License
along with this program. If not, see <http://www.gnu.org/licenses/>.

In addition, no derivative work may use the name or imply association
with this application without prior consent.

sing-box's People

Contributors

0x7d274284 avatar aire1 avatar arm64v8a avatar database64128 avatar drprofesq avatar dyhkwong avatar ernado avatar h1jk avatar hatune-miku avatar hiddify-com avatar ikirby avatar johnthecoderpro avatar kkocdko avatar lyc8503 avatar mahdi-zarei avatar mazzz1y avatar nekohasekai avatar printfer avatar reeceyng avatar renovate[bot] avatar seiuneko avatar septs avatar shadow750d6 avatar siwee avatar testwill avatar weltolk avatar xiaokangwang avatar xyenon avatar zakuwaki avatar zedifen avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

sing-box's Issues

多个tags编译后,运行报错

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

编译选项:
go install -v -tags with_clash_api,with_quic github.com/sagernet/sing-box/cmd/sing-box@latest
没有报错。

sing-box run -c config.json报错

panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x28 pc=0xb25d12]

goroutine 1 [running]:
github.com/sagernet/sing-box/experimental/clashapi.(*Server).Close(0xc00008cbe0)
        /home/go/pkg/mod/github.com/sagernet/[email protected]/experimental/clashapi/server.go:107 +0x32
github.com/sagernet/sing/common.Close({0xc0000d9b38?, 0x4, 0x0?})
        /home/go/pkg/mod/github.com/sagernet/[email protected]/common/cond.go:324 +0xa4
github.com/sagernet/sing-box.(*Box).Close(0xc000286000)
        /home/go/pkg/mod/github.com/sagernet/[email protected]/box.go:232 +0x15b
github.com/sagernet/sing-box.(*Box).Start(0xc00019b0b0?)
        /home/go/pkg/mod/github.com/sagernet/[email protected]/box.go:173 +0x39
main.run()
        /home/go/pkg/mod/github.com/sagernet/[email protected]/cmd/sing-box/cmd_run.go:74 +0x23c
main.glob..func3(0x14b0340?, {0xdc47e8?, 0x2?, 0x2?})
        /home/go/pkg/mod/github.com/sagernet/[email protected]/cmd/sing-box/cmd_run.go:25 +0x1d
github.com/spf13/cobra.(*Command).execute(0x14b0340, {0xc000044a20, 0x2, 0x2})
        /home/go/pkg/mod/github.com/spf13/[email protected]/command.go:876 +0x67b
github.com/spf13/cobra.(*Command).ExecuteC(0x14b05c0)
        /home/go/pkg/mod/github.com/spf13/[email protected]/command.go:990 +0x3bd
github.com/spf13/cobra.(*Command).Execute(...)
        /home/go/pkg/mod/github.com/spf13/[email protected]/command.go:918
main.main()
        /home/go/pkg/mod/github.com/sagernet/[email protected]/cmd/sing-box/main.go:29 +0x25

Version of sing-box

$ sing-box --version
# Paste output here
# sing-box version
sing-box 1.0 (go1.19, linux, amd64, CGO enabled)

Server and client configuration file

# paste json here

outbound只有hysteria服务器
单个tags正常运行,加了clash api报错

log日志经常有ERROR提示

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

log里面经常有ERROR

Version of sing-box

$ sing-box version
sing-box 1.0-rc1 (go1.19, linux/amd64, CGO enabled)
# Paste output here

Server and client configuration file

client
{
    "log": {
        "disabled": false,
        "level": "info",
        "output": "",
        "timestamp": true
    },
    "dns": {
        "servers": [
            {
                "tag":"ct-dns",
                "address":"218.2.135.1",
                "detour":"direct-out"
            },
            {
                "tag": "dns",
                "address": "https://1.1.1.1/dns-query",
                "detour": "direct-out"
            },
            {
                "tag": "local-dns",
                "address": "10.223.2.1",
                "detour": "direct-out"
            }
        ],
        "rules": [
            {
                "domain": [
                    "locaodomain.com",
                    "localdomain.corp"
                ],
                "server": "local-dns"
            },
            {
                "geosite":"cn",
                "server":"ct-dns"
            },
            {
                "geosite":"geolocation-!cn",
                "server":"dns"
            }
        ],
        "final": "local-dns",
        "strategy": "prefer_ipv4"
    },
    "inbounds": [
        {
            "type": "mixed",
            "tag": "mixed-in",
            "listen": "::",
            "listen_port": 8000,
            "sniff": true,
            "domain_strategy": "prefer_ipv4"
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "tag": "direct-out"
        },
        {
            "type": "socks",
            "tag": "socks-out",
            "server": "---",
            "server_port": 1080,
            "version": "5",
            "username": "---",
            "password": "---"
        },
        {
            "type": "socks",
            "tag": "homeproxy",
            "server": "---",
            "server_port": 20000,
            "version": "5"
        },
        {
            "type": "hysteria",
            "tag": "tp-hysteria",
            "server": "---",
            "server_port": 8080,
            "up_mbps": 100,
            "down_mbps": 100,
            "obfs": "---",
            "auth": "password",
            "auth_str": "---",
            "disable_mtu_discovery": false,
            "tls": {
                "enabled": true,
                "server_name": "--",
                "insecure": false
            }
        },
        {
            "type": "dns",
            "tag": "dns-out"
        }
    ],
    "route": {
        "geoip": {
            "path": "/usr/local/etc/sing-box/geoip.db",
            "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
            "download_detour": "tp-hysteria"
        },
        "geosite": {
            "path": "/usr/local/etc/sing-box/geosite.db",
            "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
            "download_detour": "tp-hysteria"
        },
        "rules": [
            {
                "protocol": "dns",
                "outbound": "dns-out"
            },
            {
                "ip_cidr": "192.168.100.0/24",
                "outbound": "homeproxy"
            },
            {
                "geosite": "cn",
                "geoip": "cn",
                "ip_cidr": "10.0.0.0/8",
                "outbound": "direct-out"
            }
        ],
        "final": "tp-hysteria"
    },
    "experimental": {}
}

server:

{
    "log": {
        "disabled": false,
        "level": "info",
        "output": "",
        "timestamp": true
    },
    "inbounds": [
        {
            "type": "hysteria",
            "tag": "hysteria-in",
            "listen": "::",
            "listen_port": 8080,
            "sniff": false,
            "sniff_override_destination": false,
            "up_mbps": 100,
            "down_mbps": 100,
            "obfs": "---",
            "auth": "---",
            "auth_str": "---",
            "disable_mtu_discovery": false,
            "tls": {
                "enabled": true,
                "server_name": "---",
                "certificate_path": "/root/.acme.sh/---ullchain.cer",
                "key_path": "/root/.acme.sh/---.key"
            }
        },
        {
            "type": "socks",
            "tag": "socks-in",
            "listen": "::",
            "listen_port": 1080,
            "users": [
                {
                    "username": "---",
                    "password": "---"
                }
            ]
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "tag": "direct-out"
        }
    ],
    "route": {},
    "experimental": {}
}

Server and client log file

# paste log here
# server
+0800 2022-09-07 11:46:53 ERROR [2734683599] inbound/hysteria[hysteria-in]: process stream from ---:2504: upload: EOF | download: stream 32 canceled with error code 0
# client
Sep 07 11:43:47 server sing-box[11189]: 183 ERROR [1715174101] inbound/mixed[mixed-in]: process connection from [::ffff:10.222.203.52]:58402: upload: EOF | download: readfrom tcp 10.223.2.5:8000->10.222.203.52:58402: Read on stream 16 canceled with error code 0
Sep 07 11:44:14 server sing-box[11189]: 210 ERROR [2448672323] inbound/mixed[mixed-in]: process connection from [::ffff:10.222.203.52]:58399: upload: EOF | download: readfrom tcp 10.223.2.5:8000->10.222.203.52:58399: Read on stream 12 canceled with error code 0
Sep 07 11:44:16 server sing-box[11189]: 212 ERROR [4098925082] inbound/mixed[mixed-in]: process connection from [::ffff:10.222.203.52]:58410: upload: EOF | download: readfrom tcp 10.223.2.5:8000->10.222.203.52:58410: Read on stream 20 canceled with error code 0

DNS

一个局域网下的 2 台设备,IP 分别为 192.168.1.2 和 192.168.1.5 。两台使用同样的配置文件,曾经同时运行过 sing-box (作为网关)。
现在 192.168.1.5 正常,192.168.1.2 总是会尝试连接到 192.168.1.5 的 DNS。

我做了以下操作仍然有问题:

两设备同时重装过系统,测试时只开了 192.168.1.2
重启过路由器
重启过虚拟机环境
修改过配置文件的10几种参数(各种tag、IP等)

root@tunnel:~# ip a
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
    link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
    inet 127.0.0.1/8 scope host lo
       valid_lft forever preferred_lft forever
    inet6 ::1/128 scope host
       valid_lft forever preferred_lft forever
2: ens192: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq state UP group default qlen 1000
    link/ether 00:0c:29:09:de:23 brd ff:ff:ff:ff:ff:ff
    altname enp11s0
    inet 192.168.1.2/24 brd 192.168.1.255 scope global ens192
       valid_lft forever preferred_lft forever
    inet6 240e:390:7806:d7f0:20c:29ff:fe09:de23/64 scope global dynamic mngtmpaddr
       valid_lft 259200sec preferred_lft 172800sec
    inet6 fe80::20c:29ff:fe09:de23/64 scope link
       valid_lft forever preferred_lft forever
root@tunnel:~# ./sing-box run
INFO[0000] router: loaded geoip database: 1 codes
INFO[0000] router: loaded geosite database: 1260 codes
INFO[0000] router: updated default interface ens192, index 2
INFO[0000] inbound/tun[tun-in]: started at tun0
INFO[0000] inbound/mixed[mixed-in]: tcp server started at [::]:1080
INFO[0000] clash-api: restful api listening at [::]:9090
INFO[0000] sing-box started (0.344s)
INFO[0003] [1223400112] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:48073
INFO[0003] [1223400112] inbound/tun[tun-in]: inbound packet connection to 192.168.1.5:53
INFO[0003] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0004] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0005] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
ERROR[0006] [1223400112] dns: exchange failed for 0.debian.pool.ntp.org.: read tcp 192.168.1.2:53602->*.*.*.*:4443: read: connection reset by peer
INFO[0008] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0009] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0010] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
ERROR[0011] [1223400112] dns: exchange failed for 0.debian.pool.ntp.org.: read tcp 192.168.1.2:53628->*.*.*.*:4443: read: connection reset by peer
INFO[0013] [3199036542] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:57118
INFO[0013] [3199036542] inbound/tun[tun-in]: inbound packet connection to 192.168.1.5:53
INFO[0013] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0014] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853
INFO[0015] outbound/shadowsocks[CN2SS]: outbound multiplex connection to 8.8.8.8:853

Wireguard outbound (server side)

I have complied with wireguard option but still get this error
FATAL[0000] create service: parse outbound[0]: WireGuard is not included in this build, rebuild with -tags with_wireguard

Shadowsocks relay doesn't work for me

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

I can both connect these 2 service. So i'm sure the basic config is good.
But when I add relay part like relay-structure.

      "destinations": [
        {
          "server": "222.222.222.222",
          "server_port": 8080,
          "password": "HyVta+GNgKhpsrNUTNykQg=="
        }

I can't connect it.

VPS1 log

sing-box[10278]: INFO[0019] [211937545] inbound/shadowsocks[0]: inbound connection from [::ffff:my_local_ip]:6717
sing-box[10278]: ERROR[0019] [211937545] inbound/shadowsocks[0]: process connection from [::ffff:my_local_ip]:6717: shadowsocks: serve TCP from [::ffff:my_local_ip]:6717: invalid request

VPS2 have no log

Version of sing-box

$ sing-box --version
sing-box version nightly (go1.19 linux/amd64)

Server and client configuration file

Server No.1

{       
  "inbounds": [
    { 
      "type": "shadowsocks",
      "listen": "::",
      "listen_port": 8089,
      "method": "2022-blake3-aes-128-gcm",
      "password": "TAxFqoWSEc0phlr3096a4w==",
      "destinations": [
        {
          "server": "222.222.222.222",
          "server_port": 8080,
          "password": "HyVta+GNgKhpsrNUTNykQg=="
        }
      ]
    }
  ]
}

Server No.2

{
  "inbounds": [
    {
      "type": "shadowsocks",
      "listen": "::",
      "listen_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "HyVta+GNgKhpsrNUTNykQg=="
    }
  ]
}

Client side

    {
      "type": "shadowsocks",
      "server": "111.111.111.111",
      "server_port": 8089,
      "method": "2022-blake3-aes-128-gcm",
      "password": "TAxFqoWSEc0phlr3096a4w=="
    }

DNS cannot route to direct outbound

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

I added three domain names to the direct routing, including route and dns route.

But, the speed of these websites was still very slow. And I found it's using alidns from remote service to resolve these 3 website.

However the connection was direct. So I think it's only my dns route fail.

Relevant logs:

DEBUG[0631] [3584963253] router: sniffed protocol: tls, domain: www.bilibili.com
DEBUG[0631] [3584963253] router: match[1] domain_keyword=[bilibili.com bilivideo.com netease.com] => direct-out
INFO[0631] [3584963253] outbound/direct[direct-out]: outbound connection to [::ffff:45.40.60.170]:443
INFO[0633] [127784800] inbound/tproxy[tproxy-in]: inbound connection to [::ffff:45.40.60.170]:443
DEBUG[0633] [127784800] router: sniffed protocol: tls, domain: api.vc.bilibili.com
DEBUG[0633] [127784800] router: match[1] domain_keyword=[bilibili.com bilivideo.com netease.com] => direct-out
INFO[0633] [127784800] outbound/direct[direct-out]: outbound connection to [::ffff:45.40.60.170]:443

Version of sing-box

❯ ./sing-box version

sing-box version nightly (go1.19 linux/amd64)

Server and client configuration file

Server configuration

{
  "inbounds": [
    {
      "type": "shadowsocks",
      "listen": "::",
      "listen_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "8JCsPssfgS8tiRwiMlhARg=="
    }
  ]
}

Client configuration

{
  "dns": {
    "servers": [
      {
        "tag": "google",
        "address": "8.8.8.8"
      },
      {
        "tag": "alidns",
        "address": "223.5.5.5",
        "address_strategy": "prefer_ipv4"
      }
    ],
    "rules": [
      {
        "domain_keyword": [
          "bilibili.com",
          "bilivideo.com",
          "netease.com"
          ],
        "invert": false,
        "server": "alidns"
      }
    ]
  },
  "inbounds": [
    {
      "type": "tproxy",
      "tag": "tproxy-in",

      "listen": "::",
      "listen_port": 10800,
      "sniff": true
    }
  ],
  "outbounds": [
    {
      "type": "shadowsocks",
      "server": "my.domain",
      "server_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "8JCsPssfgS8tiRwiMlhARg=="
    },
    {
      "type": "direct",
      "tag": "direct-out"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    }
  ],
  "route": {
    "rules": [
      {
        "port": 53,
        "outbound": "dns-out"
      },
      {
        "domain_keyword": [
          "bilibili.com",
          "bilivideo.com",
          "netease.com"
          ],
        "invert": false,
        "outbound": "direct-out"
      },
      {
        "ip_cidr": [
          "223.5.5.5/32"
        ],
        "invert": false,
        "outbound": "direct-out"
      }
    ],
    "auto_detect_interface": true
  }
}

Bug Report: weird connection hanged

sing version

sing-box 1.0 (go1.18.5, linux, amd64, CGO disabled)
latest in dev branch

sing config

{
    "log": {
        "level": "debug"
    },
    "inbounds": [
        {
            "tag": "http",
            "type": "http",
            "listen": "127.0.0.1",
            "listen_port": 1081,
            "sniff": true,
            "sniff_override_destination": true
        }
    ],
    "outbounds": [
        {
            "tag": "direct",
            "type": "direct"
        }
    ]
}

bug reproduce

# all on vps
# ok
curl -L go.dev
# ok
curl -L google.com 

# use sing http
export http_proxy=http://127.0.0.1:1081 https_proxy=http://127.0.0.1:1081
# ok
curl -L go.dev
# proceed but hanged
curl -L google.com 

无法透过tailscale传输

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

客户端和服务端均安装tailscale
客户端指定的地址设置tailscale的ip地址无法连接

Version of sing-box

$ sing-box version
# ./sing-box version
sing-box 1.0-rc1 (go1.19, linux/amd64, CGO enabled)
# Paste output here

Server and client configuration file

# paste json here

server:

{
    "log": {
        "disabled": false,
        "level": "info",
        "output": "",
        "timestamp": true
    },
    "dns": {
        "strategy": "ipv4_only"
    },
    "inbounds": [
        {
            "type": "socks",
            "tag": "socks-in",
            "listen": "::",
            "listen_port": 1080,
            "users": [
                {
                    "username": "admin",
                    "password": "password"
                }
            ]
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "tag": "direct-out"
        }
    ],
    "route": {},
    "experimental": {}
}

client

{
    "log": {
        "disabled": false,
        "level": "debug",
        "output": "",
        "timestamp": true
    },
    "dns": {
        "servers": [
            {
                "tag": "dns",
                "address": "https://1.1.1.1/dns-query",
                "detour": "direct"
            },
            {
                "tag": "local-dns",
                "address": "10.222.2.1",
                "detour": "direct"
            }
        ],
        "rules": [
            {
                "domain": [
                    "company.com",
                    "company.corp"
                ],
                "server": "local-dns"
            }
        ],
        "final": "dns",
        "strategy": "prefer_ipv4"
    },
    "inbounds": [
        {
            "type": "mixed",
            "tag": "mixed-in",
            "listen": "::",
            "listen_port": 5080,
            "sniff": true,
            "domain_strategy": "prefer_ipv4"
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "tag": "direct-out"
        },
        {
            "type": "socks",
            "tag": "socks-out",
            "server": "100.114.115.40",
            "server_port": 1080,
            "version": "5",
            "username": "admin",
            "password": "password"
        },
        {
            "type": "dns",
            "tag": "dns-out"
        }
    ],
    "route": {
        "geoip": {
            "path": "",
            "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
            "download_detour": "socks-out"
        },
        "geosite": {
            "path": "",
            "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
            "download_detour": "socks-out"
        },
        "rules": [
            {
                "protocol": "dns",
                "outbound": "dns-out"
            },
            {
                "geosite": "cn",
                "geoip": "cn",
                "ip_cidr":["192.168.100.0/24","10.0.0.0/8"],
                "outbound": "direct-out"
            }
        ],
        "final": "socks-out"
    },
    "experimental": {}
}

Server and client log file

# paste log here
# ./sing-box run -c config.json 
+0800 2022-09-05 17:06:10 INFO router: loaded geoip database: 250 codes
+0800 2022-09-05 17:06:10 INFO router: loaded geosite database: 1025 codes
+0800 2022-09-05 17:06:10 INFO router: updated default interface ens192, index 2
+0800 2022-09-05 17:06:10 INFO inbound/mixed[mixed-in]: tcp server started at [::]:5080
+0800 2022-09-05 17:06:10 INFO sing-box started (0.44s)
+0800 2022-09-05 17:06:12 INFO [4008109978] inbound/mixed[mixed-in]: inbound connection from [::ffff:127.0.0.1]:51432
+0800 2022-09-05 17:06:12 INFO [4008109978] inbound/mixed[mixed-in]: inbound connection to 172.67.75.172:80
+0800 2022-09-05 17:06:12 DEBUG [4008109978] router: sniffed protocol: http, domain: ip.sb
+0800 2022-09-05 17:06:12 INFO [4008109978] outbound/socks[socks-out]: outbound connection to 172.67.75.172:80
+0800 2022-09-05 17:06:17 DEBUG [4008109978] inbound/mixed[mixed-in]: connection closed: process connection from [::ffff:127.0.0.1]:51432: dial tcp 100.114.115.40:1080: i/o timeout

Feature request: Search assets in XDG Base Directory by default for Linux

Hi,
Currently, sing-box only searches assets in the current working directory by default.
It would be nice to also search for other directories by default:

  • $XDG_DATA_DIRS/sing-box or /usr/local/share/sing-box or /usr/share/sing-box
  • $XDG_DATA_HOME/sing-box or ~/.local/share/sing-box
  • that same path as executable

Also, download assets to $XDG_DATA_HOME/sing-box or ~/.local/share/sing-box by default might be a good idea.
ref: v2fly/v2ray-core#1578

sniffed dns request mismatch domain list

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

When using dns rules to lookup domain for anti dns pollution, a weird mismatch behavior appears when a dns request is sniffed and redirected to internal dns, and mismatched in domain list.

For example, in the following log, first a tcp connection comes in and is sniffed domain clientservices.googleapis.com. This domain has service in mainland China and has @cn attribute in rule, and should be resolved in dns rule [0]., while mismatched and a remote dns record(blocked by gfw) is cached. Then, when route by domain, it is routed to direct, while get a cached and blocked ip when perform ipv4_only domain strategy. And the connection fails.

Version of sing-box

$ sing-box version
sing-box 1.0-beta3 (go1.18.5, linux/amd64, CGO disabled)

Server and client configuration file

{
    "log": {
        "level": "debug",
        "timestamp": false
    },
    "dns": {
        "servers": [
            {
                "tag": "local-adguard",
                "address": "127.0.0.1",
                "detour": "direct"
            },
            {
                "tag": "remote-adguard",
                "address": "127.0.0.1",
                "detour": "proxy"
            }
        ],
        "rules": [
            {
                "server": "local-adguard",
                "disable_cache": false,
                "geosite": [
                    "private",
                    "cn"
                ]
            },
            {
                "server": "remote-adguard",
                "disable_cache": false,
                "inbound": [
                    "socks",
                    "http",
                    "shadowsocks"
                ]
            }
        ]
    },
    "route": {
        "rules": [
            {
                "outbound": "dns",
                "inbound": [
                    "dns-tunnel"
                ]
            },
            {
                "outbound": "dns",
                "port": 53
            },
            {
                "outbound": "direct",
                "geosite": [
                    "private",
                    "cn"
                ],
                "geoip": [
                    "private",
                    "cn"
                ]
            },
            {
                "outbound": "proxy",
                "inbound": [
                    "socks",
                    "http",
                    "shadowsocks"
                ]
            }
        ]
    },
    "inbounds": [
        {
            "tag": "dns-tunnel",
            "type": "direct",
            "listen": "0.0.0.0",
            "listen_port": 5353
        },
        {
            "tag": "socks",
            "type": "socks",
            "listen": "0.0.0.0",
            "listen_port": 1080,
            "sniff": true,
            "sniff_override_destination": true
        },
        {
            "tag": "http",
            "type": "http",
            "listen": "0.0.0.0",
            "listen_port": 1081,
            "sniff": true,
            "sniff_override_destination": true
        },
        {
            "tag": "shadowsocks",
            "type": "shadowsocks",
            "listen": "0.0.0.0",
            "listen_port": 12306,
            "sniff": true,
            "sniff_override_destination": true,
            "method": "chacha20-ietf-poly1305",
            "password": "MyShadowSocks"
        }
    ],
    "outbounds": [
        {
            "tag": "direct",
            "type": "direct",
            "domain_strategy": "ipv4_only"
        },
        {
            "tag": "dns",
            "type": "dns"
        },
        {
            "tag": "proxy"
        }
    ]
}

Server and client log file

Sep 04 09:54:44 ICL sing[17279]: INFO[0004] [4225494766] inbound/shadowsocks[shadowsocks]: inbound connection to 8.8.4.4:53
Sep 04 09:54:44 ICL sing[17279]: DEBUG[0004] [4225494766] router: sniffed protocol: dns
Sep 04 09:54:44 ICL sing[17279]: DEBUG[0004] [4225494766] router: match[1] port=53 => dns
Sep 04 09:54:44 ICL sing[17279]: DEBUG[0004] [4225494766] dns: exchange clientservices.googleapis.com A INET
Sep 04 09:54:44 ICL sing[17279]: DEBUG[0004] [4225494766] dns: match[1] inbound=[socks http shadowsocks] => remote-adguard
Sep 04 09:54:44 ICL sing[17279]: INFO[0004] outbound/trojan[proxy]: outbound multiplex packet connection to 127.0.0.1:53
Sep 04 09:54:44 ICL sing[17279]: INFO[0004] [4225494766] dns: exchanged clientservices.googleapis.com. A 172.217.164.99

Sep 04 09:54:45 ICL sing[17279]: INFO[0004] [3666427029] inbound/shadowsocks[shadowsocks]: inbound connection from 127.0.0.1:34798
Sep 04 09:54:45 ICL sing[17279]: INFO[0004] [3040906465] inbound/shadowsocks[shadowsocks]: inbound connection to 172.217.164.99:443
Sep 04 09:54:45 ICL sing[17279]: DEBUG[0004] [3040906465] router: sniffed protocol: tls, domain: clientservices.googleapis.com
Sep 04 09:54:45 ICL sing[17279]: DEBUG[0004] [3040906465] router: match[2] geosite=[private cn scholar-database] geoip=[private cn] => direct
Sep 04 09:54:45 ICL sing[17279]: INFO[0004] [3040906465] outbound/direct[direct]: outbound connection to clientservices.googleapis.com:443
Sep 04 09:54:45 ICL sing[17279]: DEBUG[0004] [3040906465] dns: lookup domain clientservices.googleapis.com
Sep 04 09:54:45 ICL sing[17279]: DEBUG[0004] [3040906465] dns: match[0] geosite=[private cn scholar-database] => local-adguard
Sep 04 09:54:45 ICL sing[17279]: INFO[0004] [3040906465] dns: lookup succeed for clientservices.googleapis.com: 172.217.164.99
Sep 04 09:54:50 ICL sing[17279]: ERROR[0009] [3666427029] inbound/shadowsocks[shadowsocks]: process connection from 127.0.0.1:34798: shadowsocks: serve TCP from 127.0.0.1:34798: dial tcp 172.217.164.99:443: i/o timeout

bad timestamp: received 1663118260, diff 38s

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

ss服务端, 测试"method": "2022-blake3-aes-128-gcm",有下面的报错 bad timestamp: received 1663118260, diff 38s,如果把 "method": 设置为none则正常

Version of sing-box

$ sing-box version
sing-box 1.0.3 (go1.18.5, linux/amd64, CGO enabled)

Server and client configuration file

Server

{
  "inbounds": [
    {
      "type": "shadowsocks",
      "listen": "0.0.0.0",
      "listen_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "8JCsPssfgS8tiRwiMlhARg=="
    }
  ]
}

client

{
  "inbounds": [
    {
      "type": "mixed",
      "listen": "127.0.0.1",
      "listen_port": 1080
    }
  ],
  "outbounds": [
    {
      "type": "shadowsocks",
      "server": "<ip>",
      "server_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "8JCsPssfgS8tiRwiMlhARg=="
    }
  ]
}

Server and client log file

server

INFO[0044] [2566610793] inbound/shadowsocks[0]: inbound connection from <ip>:58921
ERROR[0044] [2566610793] inbound/shadowsocks[0]: process connection from <ip>:58921: shadowsocks: serve TCP from <ip>:58921: bad timestamp: received 1663118259, diff 39s
INFO[0046] [1622256361] inbound/shadowsocks[0]: inbound connection from <ip>:53377
ERROR[0046] [1622256361] inbound/shadowsocks[0]: process connection from <ip>:53377: shadowsocks: serve TCP from <ip>:53377: bad timestamp: received 1663118260, diff 38s
ERROR[0046] [1622256361] inbound/shadowsocks[0]: process connection from <ip>:53377: shadowsocks: serve TCP from <ip>:53377: bad timestamp: received 1663118260, diff 38s

client

←[36mINFO←[0m[0000] inbound/mixed[0]: tcp server started at 127.0.0.1:1080
←[36mINFO←[0m[0000] sing-box started (0.00s)
←[36mINFO←[0m[0027] [←[38;5;85m2222579602←[0m] inbound/mixed[0]: inbound connection from 127.0.0.1:57934
←[36mINFO←[0m[0027] [←[38;5;85m2222579602←[0m] inbound/mixed[0]: inbound connection to <ip>:443
←[36mINFO←[0m[0027] [←[38;5;85m2222579602←[0m] outbound/shadowsocks[0]: outbound connection to <ip>:443
←[36mINFO←[0m[0027] [←[38;5;70m3391827766←[0m] inbound/mixed[0]: inbound connection from 127.0.0.1:57936
←[36mINFO←[0m[0027] [←[38;5;70m3391827766←[0m] inbound/mixed[0]: inbound connection to <ip>:443
←[36mINFO←[0m[0027] [←[38;5;70m3391827766←[0m] outbound/shadowsocks[0]: outbound connection to <ip>:443
←[37mDEBUG←[0m[0029] [←[38;5;70m3391827766←[0m] inbound/mixed[0]: connection closed: process connection from 127.0.0.1:57936: download: EOF | upload: EOF
←[37mDEBUG←[0m[0029] [←[38;5;85m2222579602←[0m] inbound/mixed[0]: connection closed: process connection from 127.0.0.1:57934: download: EOF | upload: EOF
←[36mINFO←[0m[0029] [←[38;5;145m2258986369←[0m] inbound/mixed[0]: inbound connection from 127.0.0.1:57938
←[36mINFO←[0m[0029] [←[38;5;145m2258986369←[0m] inbound/mixed[0]: inbound connection to <ip>:443
←[36mINFO←[0m[0029] [←[38;5;145m2258986369←[0m] outbound/shadowsocks[0]: outbound connection to <ip>:443

Weird connection hanged

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

bug reproduce

# all work are on vps

# use pure curl
# ok
curl -L go.dev
# ok
curl -L google.com 

# use sing http
export http_proxy=http://127.0.0.1:1081 https_proxy=http://127.0.0.1:1081
# ok
curl -L go.dev
# proceed but hanged
curl -L google.com 

Version of sing-box

$ ./sing-box version
sing-box 1.0 (go1.18.5, linux, amd64, CGO disabled)

Server and client configuration file

{
    "log": {
        "level": "debug"
    },
    "inbounds": [
        {
            "tag": "http",
            "type": "http",
            "listen": "127.0.0.1",
            "listen_port": 1081
        }
    ],
    "outbounds": [
        {
            "tag": "direct",
            "type": "direct"
        }
    ]
}

Server and client log file

log for curl -L google.com

INFO[0000] inbound/http[http]: tcp server started at 127.0.0.1:1081
INFO[0000] sing-box started (0.00s)
INFO[0004] [2253046751] inbound/http[http]: inbound connection from 127.0.0.1:33804
INFO[0004] [2253046751] inbound/http[http]: inbound connection to google.com:80
INFO[0004] [2253046751] outbound/direct[direct]: outbound connection to google.com:80
DEBUG[0004] [2253046751] dns: lookup domain google.com
INFO[0004] [2253046751] dns: lookup succeed for google.com: 142.250.72.142 2607:f8b0:4007:819::200e
INFO[0004] [2253046751] inbound/http[http]: inbound connection to www.google.com:80
INFO[0004] [2253046751] outbound/direct[direct]: outbound connection to www.google.com:80
DEBUG[0004] [2253046751] dns: lookup domain www.google.com
INFO[0004] [2253046751] dns: lookup succeed for www.google.com: 142.250.176.4 2607:f8b0:4007:814::2004

and curl stuck on

# omit 
(function(){google.jl={blt:'none',chnk:0,dw:false,dwu:true,emtn:0,end:0,ine:false,injs:'none',injt:0,injth:0,injv2:false,lls:'default',pdt:0,rep:0,snet:true,strt:0,ubm:false,uwp:true};})();(function(){var pmc='{\x22d\x22:{},\x22sb_he\x22:{\x22agen\x22:true,\x22cgen\x22:true,\x22client\x22:\x22heirloom-hp\x22,\x22dh\x22:true,\x22dhqt\x22:true,\x22ds\x22:\x22\x22,\x22ffql\x22:\x22en\x22,\x22fl\x22:true,\x22host\x22:\x22google.com\x22,\x22isbh\x22:28,\x22jsonp\x22:true,\x22msgs\x22:{\x22cibl\x22:\x22Clear Search\x22,\x22dym\x22:\x22Did you mean:\x22,\x22lcky\x22:\x22I\\u0026#39;m Feeling Luck

then use ctrl+c to break curl

DEBUG[0046] [2253046751] inbound/http[http]: connection closed: process connection from 127.0.0.1:33804: read http request: EOF

For curl -L go.dev, it runs and gracefully ends.

INFO[0103] [4065723772] inbound/http[http]: inbound connection from 127.0.0.1:41394
INFO[0103] [4065723772] inbound/http[http]: inbound connection to go.dev:80
INFO[0103] [4065723772] outbound/direct[direct]: outbound connection to go.dev:80
DEBUG[0103] [4065723772] dns: lookup domain go.dev
INFO[0103] [4065723772] dns: lookup succeed for go.dev: 216.239.38.21 216.239.32.21 216.239.36.21 216.239.34.21 2001:4860:4802:38::15 2001:4860:4802:36::15 2001:4860:4802:32::15 2001:4860:4802:34::15
INFO[0103] [1900140681] inbound/http[http]: inbound connection from 127.0.0.1:41398
INFO[0103] [1900140681] inbound/http[http]: inbound connection to go.dev:443
INFO[0103] [1900140681] outbound/direct[direct]: outbound connection to go.dev:443
DEBUG[0103] [1900140681] dns: lookup domain go.dev
INFO[0103] [1900140681] dns: lookup succeed for go.dev: 216.239.38.21 216.239.32.21 216.239.36.21 216.239.34.21 2001:4860:4802:38::15 2001:4860:4802:36::15 2001:4860:4802:32::15 2001:4860:4802:34::15
DEBUG[0103] [1900140681] inbound/http[http]: connection closed: process connection from 127.0.0.1:41398: download: readfrom tcp 127.0.0.1:1081->127.0.0.1:41398: use of closed network connection | upload: readfrom tcp 149.57.141.76:54864->216.239.38.21:443: splice: connection reset by peer
DEBUG[0103] [4065723772] inbound/http[http]: connection closed: process connection from 127.0.0.1:41394: read http request: EOF

sing-box vmess ws/grpc restart very often, & can't voice call!

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

I'm quite excited to try sing-box and share accounts for my group. I got feedback that all kinds of vmess can't make voice call/video call especially for whatsapp. I tried trojan and vmess with ws/grpc transport with only result vmess can't make voice calls/video calls, didn't test the meeting app.
i tried to enable mux with sagernet app, but all seems to be failing. sing-box restarts very frequently like every 2-5 minutes span in inbound vmess. and the last one about routes, I added geosite:google, geoip:google but all udp are not filtered by that rule. lastly, outbound store_selected experimental clash in selector not working? every time the server restarts the sing-box will return to the default order.

Version of sing-box

$ sing-box version
# Paste output here
sing-box 1.1-beta3 (go1.19, linux/amd64, CGO enabled)

Server and client configuration file

# paste json here
{
  "log": {
    "disabled": false,
    "level": "error",
    "output": "/etc/nginx/sing-box/sing-box-wss.log",
    "timestamp": true
  },
  "dns": {
    "servers": [
      {
        "tag": "google",
        "address": "https://8.8.8.8/dns-query",
        "address_strategy": "prefer_ipv4",
        "strategy": "prefer_ipv4",
        "detour": "direct"
      },
      {
        "tag": "cloudflare",
        "address": "https://1.1.1.1/dns-query",
        "address_strategy": "prefer_ipv4",
        "strategy": "prefer_ipv4",
        "detour": "direct"
      }
    ]
  },
  "inbounds": [
    {
      "type": "vmess",
      "tag": "vmess-ws",
      "listen": "127.0.0.1",
      "listen_port": 2080,
      "tcp_fast_open": false,
      "sniff": false,
      "sniff_override_destination": false,
      "domain_strategy": "prefer_ipv4",
      "proxy_protocol": false,
      "users": [
        {
          "name": "names",
          "uuid": "UUID",
          "alterId": 0
        }
      ],
      "transport": {
        "type": "ws",
        "path": "/vmess"
      }
    }
  ],
  "outbounds": [
    {
      "type": "direct",
      "tag": "direct",
      "bind_interface": "ens3"
    },
    {
      "type": "block",
      "tag": "block"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    },
    {
      "type": "selector",
      "tag": "GLOBAL",
      "outbounds": [
        "direct",
        "sock-out",
        "wind-out"
      ]
    },
    {
      "type": "selector",
      "tag": "INDO",
      "outbounds": [
        "wind-out",
        "sock-out",
        "direct"
      ]
    },
    {
      "type": "selector",
      "tag": "GOOGLE",
      "outbounds": [
        "sock-out",
        "wind-out",
        "direct"
      ]
    },
    {
      "type": "direct",
      "tag": "sock-out",
      "bind_interface": "kantor"
    },
    {
      "type": "direct",
      "tag": "wind-out",
      "bind_interface": "remote"
    }
  ],
  "route": {
    "geoip": {
      "path": "/etc/nginx/sing-box/geoip.db",
      "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
      "download_detour": "direct"
    },
    "geosite": {
      "path": "/etc/nginx/sing-box/geosite.db",
      "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
      "download_detour": "direct"
    },
    "rules": [
      {
        "domain_suffix": [
          "www.gstatic.com",
          "connectivitycheck.gstatic.com",
          "bing.com",
          "cp.cloudflare.com",
          "api.v2fly.org",
          "www.google.com"
        ],
        "outbound": "direct"
      },
      {
        "protocol": "dns",
        "outbound": "dns-out"
      },
      {
        "ip_cidr": [
          "1.0.0.1/32"
        ],
        "outbound": "direct"
      },
      {
        "ip_cidr": [
          "2001:148f:fffe::1"
        ],
        "outbound": "sock-out"
      },
      {
        "geosite": [
          "speedtest"
        ],
        "domain_keyword": [
          "speedtest",
          "speedtestcustom"
        ],
        "outbound": "direct"
      },
      {
        "geosite": [
          "google",
          "youtube"
        ],
        "geoip": [
          "google"
        ],
        "outbound": "GOOGLE"
      },
      {
        "geosite": "netflix",
        "domain_keyword": [
          "netflix"
        ],
        "domain_suffix": [
          ".id",
          "co.id",
          "ac.id",
          "or.id",
          "go.id",
          "my.id",
          "web.id",
          "biz.id",
          "net.id",
          "mil.id",
          "sch.id",
          "desa.id",
          "ponpes.id"
        ],
        "geoip": [
          "netflix"
        ],
        "outbound": "INDO"
      },
      {
        "geoip": [
          "id"
        ],
        "outbound": "direct"
      },
      {
        "ip_version": 6,
        "outbound": "sock-out"
      },
      {
        "network": "tcp",
        "outbound": "GLOBAL"
      }
    ]
  },
  "experimental": {
    "clash_api": {
      "external_controller": "0.0.0.0:9081",
      "external_ui": "/etc/nginx/sing-box/yacd-gh-pages/",
      "secret": "passowrd",
      "default_mode": "rule",
      "store_selected": true,
      "cache_file": "/etc/nginx/sing-box/conf/wss.db"
    }
  }
}

Server and client log file

# paste log here
0700 2022-09-12 18:24:30 INFO [1842541650] outbound/direct[direct]: outbound connection to 13.107.21.200:80
+0700 2022-09-12 18:24:30 DEBUG [1004531221] inbound/vmess[vmess-ws]: connection closed: process connection from 182.4.38.60:13170: upload: EOF | download: EOF
+0700 2022-09-12 18:24:30 INFO [1360147938] inbound/vmess[vmess-ws]: inbound connection from 140.213.59.33:13174
+0700 2022-09-12 18:24:30 INFO [1800923178] inbound/vmess[vmess-ws]: inbound connection from 106.154.140.201:13188
+0700 2022-09-12 18:24:30 INFO [149325350] inbound/vmess[vmess-ws]: inbound connection from 106.154.140.201:13202
+0700 2022-09-12 18:24:30 INFO [1427389688] inbound/vmess[vmess-ws]: [randomorang-1] inbound connection to gstatic.com:443
+0700 2022-09-12 18:24:30 DEBUG [1427389688] dns: lookup domain gstatic.com
+0700 2022-09-12 18:24:30 INFO [1427389688] dns: lookup succeed for gstatic.com: 142.251.12.120 142.251.12.94 2404:6800:4003:c11::78 2404:6800:4003:c11::5e
+0700 2022-09-12 18:24:30 DEBUG [1427389688] dns: resolved [142.251.12.120 142.251.12.94 2404:6800:4003:c11::78 2404:6800:4003:c11::5e]
+0700 2022-09-12 18:24:30 DEBUG [1427389688] router: match[5] geosite=[google youtube] geoip=google => GOOGLE
+0700 2022-09-12 18:24:30 INFO [1427389688] outbound/direct[jala-out]: outbound connection to gstatic.com:443
+0700 2022-09-12 18:24:30 DEBUG [1263100432] inbound/vmess[vmess-ws]: connection closed: process connection from 182.4.38.60:26640: download: read tcp 192.168.70.220:13730->173.194.77.188:5228: read: connection reset by peer | upload: E>
+0700 2022-09-12 18:24:30 ERROR [149325350] inbound/vmess[vmess-ws]: process connection from 106.154.140.201:13202: mux unsupported
+0700 2022-09-12 18:24:30 ERROR [1800923178] inbound/vmess[vmess-ws]: process connection from 106.154.140.201:13188: mux unsupported
+0700 2022-09-12 18:24:31 DEBUG [3863138593] inbound/vmess[vmess-ws]: connection closed: process connection from 114.124.175.154:6738: upload: EOF | download: read tcp 100.95.224.138:12778->18.161.49.55:443: read: connection reset by pe>
+0700 2022-09-12 18:24:31 INFO [1813939797] inbound/vmess[vmess-ws]: inbound connection from 140.213.35.195:13210
+0700 2022-09-12 18:24:31 INFO [3067849866] inbound/vmess[vmess-ws]: [oneswae] inbound connection to bing.com:80
+0700 2022-09-12 18:24:31 DEBUG [3067849866] dns: lookup domain bing.com
+0700 2022-09-12 18:24:31 INFO [3067849866] dns: lookup succeed for bing.com: 13.107.21.200 204.79.197.200 2620:1ec:c11::200
+0700 2022-09-12 18:24:31 DEBUG [3067849866] dns: resolved [13.107.21.200 204.79.197.200 2620:1ec:c11::200]
+0700 2022-09-12 18:24:31 DEBUG [3067849866] router: match[0] domainSuffix=[www.gstatic.com connectivitycheck.gstatic.com bing.com...] => direct
+0700 2022-09-12 18:24:31 INFO [3067849866] outbound/direct[direct]: outbound connection to bing.com:80
+0700 2022-09-12 18:24:31 INFO [437991300] inbound/vmess[vmess-ws]: inbound connection from 112.215.237.93:13222
+0700 2022-09-12 18:24:31 DEBUG [1813939797] inbound/vmess[vmess-ws]: connection closed: process connection from 140.213.35.195:13210: upload: EOF | download: EOF
+0700 2022-09-12 18:24:31 INFO [3938305468] inbound/vmess[vmess-ws]: [Sevior] inbound packet connection to 9.9.9.9:53
+0700 2022-09-12 18:24:31 DEBUG [3938305468] router: match[2] ipcidr=[1.0.0.1/32 1.0.0.2/32 1.0.0.3/32...] => direct
+0700 2022-09-12 18:24:31 INFO [3938305468] outbound/direct[direct]: outbound packet connection
+0700 2022-09-12 18:24:31 INFO [3270311707] inbound/vmess[vmess-ws]: inbound connection from 182.4.38.60:13226

Routing problem on Linux and Android

Since global DNS proxies like android netd use the source address of the network interface to access DNS, there is currently no way to gracefully hijack DNS requests without making the device inaccessible from others.

This issue is opened to track down how to fix this.

Temporary workaround: Add option to route all connections to tun.

In Linux's scenario: Check if systemd-resolved uses SO_BINDTOINTERFACE, if not, try adding a dport 53 rule.

In Android's scenario: use ndc to create a VPN managed by android, since android 10 cancels the ndc resolver command, it is also necessary to implement the android‘s binder protocol to configure the VPN DNS.

If this is too much work, it will probably be put on hold for now.

how to use sing-box on android phone?

I download the file named "sing-box-1.0-android-arm64.tar.gz"
then I decompression the file ,and do not see any files ending with apk

I'm confused on how to use it, any pointers would be greatly appreciated

Feature request: shadowsocks AEAD inbound Single-port Multi-user

Hi, sing-box has already implemented single-port multi-user for aead2022. However, many low-end devices can only run shadowsocks-libev which only supports old aead methods like chacha20-ietf-poly1305 and aes-128-gcm. It is worth considering to add multi-user support for these methods. Meanwhile, it's more better if different users can use different aead ciphers in multi-user mode.

Xray supports it by ranging all users https://github.com/XTLS/Xray-core/blob/33755d6e908227f270881e7b859eabedb393c3dc/proxy/shadowsocks/protocol.go#L93-L111

请问有没有计划做health_check这样的功能?

类似于clash的url-test
像下面代码这样的功能,可能会占用更多的内存,但应该挺实用的

  "outbounds": [
    {
      "type": "balance",
      "tag": "balance",
      "outbounds": [
        "proxy-a",
        "proxy-b",
        "proxy-c"
      ],
      "health_check": "http://www.gstatic.com/generate_204"
    }
  ]
}

zerossl证书获取失败

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

使用zerossl无法获取证书

Version of sing-box

$ sing-box --version
# Paste output here
./sing-box version
sing-box 1.0 (go1.19, linux, amd64, CGO enabled)

Server and client configuration file

# paste json here
"inbounds": [
        {
            "type": "trojan",
            "tag": "trojan-in",
            "listen": "::",
            "listen_port": 443,
            "tcp_fast_open": false,
            "sniff": false,
            "sniff_override_destination": false,
            "proxy_protocol": false,
            "users": [
                {
                    "name": "aaa",
                    "password": "bbb"
                }
            ],
            "tls": {
                "enabled": true,
                "server_name": "ap1.domain.xyz",
                "alpn": [],
                "min_version": "",
                "max_version": "",
                "cipher_suites": [],
                "certificate": "",
                "certificate_path": "",
                "key": "",
                "key_path": "",
                "acme": {
                    "domain": ["ap1.domain.xyz","ap2.domain.xyz","ap3.domain.xyz","ap4.domain.xyz","ap5.domain.xyz"],
                    "data_directory": "",
                    "default_server_name": "",
                    "email": "[email protected]",
                    "provider": "zerossl",
                    "disable_http_challenge": false,
                    "disable_tls_alpn_challenge": false,
                    "alternative_http_port": 0,
                    "alternative_tls_port": 0
                }
            },
            "fallback": {},
            "transport": {
                "type":"ws",
                "path":"/api"
            }
        }
    ],

Slow Shadowsocks + ShadowTLS on Windows

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

When connecting via sing-box on android, the speed is about 400Mbps, but when connected on windows, the speed is about 30Mbps (both tested with speedtest.net). Server max speed is 1Gbps.

Version of sing-box

windows amd64 version 1.1b4

Server and client configuration file

Client:

{
  "dns": {
     "servers": [
         {
           "tag": "google",
           "address": "tls://1.1.1.1",
           "detour": "direct"
         }
     ],
     "strategy": "ipv4_only"
   },
  "inbounds": [
    {
      "type": "tun",
      "tag": "tun-in",
      "interface_name": "tun0",
      "inet4_address": "172.19.0.1/30",
      "inet6_address": "fdfe:dcba:9876::1/128",
      "mtu": 1500,
      "auto_route": true,
      "strict_route": true,
      "sniff": true,
      "stack": "gvisor"
    }
  ],
  "outbounds": [
    {
      "type": "shadowsocks",
      "tag": "shadowsocks-out",
      "method": "2022-blake3-aes-128-gcm",
      "password": "****",
      "multiplex": {
        "enabled": true,
        "max_connections": 4,
        "min_streams": 4
      },
      "domain_strategy": "ipv4_only",
      "detour": "shadowtls-out"
    },
    {
      "type": "shadowtls",
      "tag": "shadowtls-out",
      "server": "****",
      "server_port": 8443,
      "tls": {
        "enabled": true,
        "server_name": "cloudflare.com"
      }
    },
    {
      "type": "direct",
      "tag": "direct"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    }
  ],
  "route": {
    "rules": [
      {
        "protocol": "dns",
        "outbound": "dns-out"
      }
    ],
    
    "geoip": {
      "path": "geoip.db",
      "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
      "download_detour": "direct"
    },
	
    "geosite": {
      "path": "geosite.db",
      "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
      "download_detour": "direct"
    },
	
	"final": "shadowsocks-out",
	"auto_detect_interface": true
  }
}

Server config similar to example in documentation

Server and client log file

the logs are almost identical to the android logs, no errors or crashes, just logs

Panic, Termux on Android

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

已出现两次,目前仅保存了这部分日志,等待再次复现贴出完整日志

Version of sing-box

$ sing-box version
[sing-box-1.1-beta4-android-arm64.tar.gz](https://github.com/SagerNet/sing-box/releases/download/v1.1-beta4/sing-box-1.1-beta4-android-arm64.tar.gz)

Server and client configuration file

{
    "log": {
        "disabled": true,
        "level": "error",
        "timestamp": true
    },
    "dns": {
        "servers": [
            {
                "tag": "dns",
                "address": "tls://223.5.5.5",
                "strategy": "ipv4_only",
                "detour": "direct"
            }
        ],
        "strategy": "ipv4_only"
    },
    "inbounds": [
        {
            "type": "tun",
            "inet4_address": "172.19.0.1/30",
            "inet6_address": "fdfe:dcba:9876::1/126",
            "mtu": 1500,
            "auto_route": true,
            "endpoint_independent_nat": false,
            "stack": "system",
            "sniff": true,
            "sniff_override_destination": false
        }
    ],
    "outbounds": [
        {
            "type": "selector",
            "tag": "proxy",
            "outbounds": [
                "us-ss",
                "sg-trojan"
            ],
            "default": "us-ss"
        },
        {
            "type": "shadowsocks",
            "tag": "us-ss",
            "server": "xxx",
            "server_port": 23333,
            "method": "2022-blake3-aes-128-gcm",
            "password": "xxx",
            "udp_over_tcp": true
        },
        {
            "type": "trojan",
            "tag": "sg-trojan",
            "server": "xxx",
            "server_port": 443,
            "password": "xxx",
            "network": "tcp",
            "tls": {
                "enabled": true,
                "server_name": "xxx",
                "alpn": [
                    "http/1.1"
                ]
            },
            "transport": {
                "type": "ws",
                "path": "/xxx",
                "headers": {
                    "Host": "xxx"
                },
                "max_early_data": 2048,
                "early_data_header_name": "Sec-WebSocket-Protocol"
            }
        },
        {
            "type": "direct",
            "tag": "direct"
        },
        {
            "type": "block",
            "tag": "block"
        },
        {
            "type": "dns",
            "tag": "dns-out"
        }
    ],
    "route": {
        "rules": [
            {
                "protocol": "dns",
                "outbound": "dns-out"
            },
            {
                "geosite": "google",
                "outbound": "proxy"
            },
            {
                "geosite": "cn",
                "outbound": "direct"
            },
            {
                "ip_cidr": [
                    "xxx/32"
                ],
                "outbound": "direct"
            },
            {
                "geoip": "private",
                "outbound": "direct"
            },
            {
                "geoip": "cn",
                "outbound": "direct"
            }
        ],
        "auto_detect_interface": true
    },
    "experimental": {
        "clash_api": {
            "external_controller": "127.0.0.1:9090",
            "external_ui": "yacd",
            "secret": ""
        }
    }
}

Server and client log file

/data/adb/sing/sing-box run -c /data/adb/sing/config.json

panic: alloc bad size: 0

goroutine 21 [running]:
github.com/sagernet/sing/common/buf.(*defaultAllocator).Get(0x40?, 0x8?)
        pkg/mod/github.com/sagernet/[email protected]/common/buf/alloc.go:42 +0x170
github.com/sagernet/sing/common/buf.Get(...)
        pkg/mod/github.com/sagernet/[email protected]/common/buf/pool.go:4
github.com/sagernet/sing/common/buf.NewSize(0x4000027bd8?)
        pkg/mod/github.com/sagernet/[email protected]/common/buf/buffer.go:54 +0xac
github.com/sagernet/sing/common/buf.(*Buffer).ToOwned(0x4000027d20)
        pkg/mod/github.com/sagernet/[email protected]/common/buf/buffer.go:397 +0x28
github.com/sagernet/sing-tun.(*System).processIPv4UDP(0x400013c120, {0x40003fe000, 0x1c, 0x800}, {0x40003fe014, 0x8, 0x7ec})
        pkg/mod/github.com/sagernet/[email protected]/system.go:306 +0x260
github.com/sagernet/sing-tun.(*System).processIPv4(0x5dc?, {0x40003fe000?, 0x400013c000?, 0x0?})
        pkg/mod/github.com/sagernet/[email protected]/system.go:219 +0x134
github.com/sagernet/sing-tun.(*System).tunLoop(0x400013c120)
        pkg/mod/github.com/sagernet/[email protected]/system.go:131 +0x248
created by github.com/sagernet/sing-tun.(*System).Start
        pkg/mod/github.com/sagernet/[email protected]/system.go:106 +0x4d0

macos arm编译失败。

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

同步到最新git (afc2f50)

macos arm编译报错:
$CGO_ENABLED=0 GOOS=darwin GOARCH=arm64 go build -ldflags "-w -s" -trimpath ./cmd/sing-box/
# github.com/sagernet/sing-box/inbound
inbound/tproxy.go:102:55: not enough arguments in call to redir.DialUDP have (*net.UDPAddr, *net.UDPAddr) want (string, *net.UDPAddr, *net.UDPAddr)
inbound/tun.go:78:36: too many arguments in call to tun.Open have (string, netip.Prefix, netip.Prefix, uint32, bool) want (string)
inbound/tun.go:82:12: cannot use tunIf (variable of type uintptr) as type tun.Tun in assignment: uintptr does not implement tun.Tun (missing Close method)
inbound/tun.go:83:36: cannot use tunIf (variable of type uintptr) as type tun.Tun in argument to tun.NewGVisor: uintptr does not implement tun.Tun (missing Close method)

另外,git (afc2f50) linux amd64编译正常,但是手动go get -u ./...更新所有依赖后编译失败
$CGO_ENABLED=0 GOOS=linux GOARCH=amd64 go build -ldflags "-w -s" -trimpath ./cmd/sing-box/
报错:
# gvisor.dev/gvisor/pkg/waiter /root/go/pkg/mod/gvisor.dev/[email protected]/pkg/waiter/waiter.go:139:2: undefined: waiterEntry /root/go/pkg/mod/gvisor.dev/[email protected]/pkg/waiter/waiter.go:210:7: undefined: waiterList
# gvisor.dev/gvisor/pkg/buffer /root/go/pkg/mod/gvisor.dev/[email protected]/pkg/buffer/buffer.go:30:2: undefined: bufferEntry /root/go/pkg/mod/gvisor.dev/[email protected]/pkg/buffer/view.go:32:7: undefined: bufferList

Version of sing-box

git (afc2f50)

Server and client configuration file

# paste json here

日志时间显示异常

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

服务器日志时间显示异常

Version of sing-box

$ sing-box version
sing-box 1.0-beta2.c6ef276 (go1.19, linux/amd64, CGO disabled)

Server and client configuration file

{
  "level": "info",
  "output": "/var/log/sing-box/output.log",
  "timestamp": true
}

Server and client log file

0 INFO router: loaded geoip database: 8 codes
0 INFO router: loaded geosite database: 1040 codes
0 INFO inbound/mixed[0]: tcp server started at [::]:2080
0 INFO inbound/trojan[trojan-ws-in]: tcp server started at 127.0.0.1:1234
0 INFO inbound/trojan[trojan-in]: tcp server started at [::]:6443
0 INFO sing-box started (0.800s)
1 INFO [1190656836] inbound/trojan[trojan-in]: inbound connection from [*]:53296
2 INFO [3565374130] inbound/trojan[trojan-in]: [*] inbound packet connection to 77.70.80.3:24471
2 INFO [3565374130] outbound/direct[direct]: outbound packet connection
9 INFO [1398763587] inbound/trojan[trojan-in]: inbound connection from [*]:53456
9 INFO [2204401665] inbound/trojan[trojan-in]: [*] inbound connection to 140.82.114.26:443
9 INFO [2204401665] outbound/direct[direct]: outbound connection to 140.82.114.26:443
22 INFO [483527538] inbound/trojan[trojan-in]: inbound connection from [*]:50786
22 INFO [3782869504] inbound/trojan[trojan-ws-in]: [*] inbound connection to 81.28.12.12:443
22 INFO [3782869504] outbound/direct[direct]: outbound connection to 81.28.12.12:443
22 INFO [1079382560] inbound/trojan[trojan-in]: [*] inbound packet connection to 130.158.6.110:5004
22 INFO [1079382560] outbound/direct[direct]: outbound packet connection
22 INFO [2326993217] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.gstatic.com:80
22 INFO [2326993217] outbound/direct[direct]: outbound connection to www.gstatic.com:80
22 INFO outbound/direct[direct]: outbound connection to 1.1.1.1:853
22 INFO [2326993217] dns: lookup succeed for www.gstatic.com: 142.250.66.99 2404:6800:4005:800::2003
25 INFO [2533053488] inbound/trojan[trojan-ws-in]: [*] inbound connection to sing-box.sagernet.org:443
25 INFO [2533053488] outbound/direct[direct]: outbound connection to sing-box.sagernet.org:443
25 INFO [2533053488] dns: lookup succeed for sing-box.sagernet.org: 172.67.164.149 104.21.91.14 2606:4700:3032::6815:5b0e 2606:4700:3033::ac43:a495
25 INFO [3853740635] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
25 INFO [3853740635] outbound/direct[direct]: outbound connection to www.google.com:443
25 INFO [3853740635] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
25 INFO [2432428358] inbound/trojan[trojan-ws-in]: [*] inbound connection to accounts.google.com:443
25 INFO [2495100119] inbound/trojan[trojan-ws-in]: [*] inbound connection to sing-box.sagernet.org:443
25 INFO [2495100119] outbound/direct[direct]: outbound connection to sing-box.sagernet.org:443
25 INFO [2495100119] dns: lookup succeed for sing-box.sagernet.org: 172.67.164.149 104.21.91.14 2606:4700:3032::6815:5b0e 2606:4700:3033::ac43:a495
25 INFO [2432428358] outbound/direct[direct]: outbound connection to accounts.google.com:443
25 INFO [2432428358] dns: lookup succeed for accounts.google.com: 142.250.66.109 2404:6800:4005:800::200d
26 INFO [3043038983] inbound/trojan[trojan-ws-in]: [*] inbound connection to api.github.com:443
26 INFO [3043038983] outbound/direct[direct]: outbound connection to api.github.com:443
26 INFO [3043038983] dns: lookup succeed for api.github.com: 20.205.243.168
26 INFO [3586882573] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
26 INFO [3586882573] outbound/direct[direct]: outbound connection to www.google.com:443
26 INFO [3586882573] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
26 INFO [3614863669] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
26 INFO [3614863669] outbound/direct[direct]: outbound connection to www.google.com:443
26 INFO [3614863669] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
27 INFO [1694993669] inbound/trojan[trojan-ws-in]: [*] inbound connection to *.ct.*:443
27 INFO [1694993669] outbound/direct[direct]: outbound connection to *.ct.*:443
27 INFO [1520098416] inbound/trojan[trojan-ws-in]: [*] inbound connection to irine-sistiana.gitbook.io:443
27 INFO [1520098416] outbound/direct[direct]: outbound connection to irine-sistiana.gitbook.io:443
27 INFO [1520098416] dns: lookup succeed for irine-sistiana.gitbook.io: 104.18.0.145 104.18.1.145 2606:4700::6812:91 2606:4700::6812:191
28 INFO [1694993669] dns: lookup succeed for *.ct.*: 159.75.30.155
29 INFO [547646919] inbound/trojan[trojan-ws-in]: [*] inbound connection to google.com:443
29 INFO [547646919] outbound/direct[direct]: outbound connection to google.com:443
29 INFO [547646919] dns: lookup succeed for google.com: 142.250.66.78 2404:6800:4005:801::200e
29 INFO [2938911735] inbound/trojan[trojan-ws-in]: [*] inbound connection to history.google.com:443
29 INFO [2938911735] outbound/direct[direct]: outbound connection to history.google.com:443
29 INFO [2938911735] dns: lookup succeed for history.google.com: 172.217.194.139 172.217.194.138 172.217.194.101 172.217.194.102 172.217.194.113 172.217.194.100 2404:6800:4008:c01::64 2404:6800:4008:c01::8b 2404:6800:4008:c01::65 2404:6800:4008:c01::66
29 INFO [1254802207] inbound/trojan[trojan-ws-in]: [*] inbound connection to play.google.com:443
29 INFO [1254802207] outbound/direct[direct]: outbound connection to play.google.com:443
30 INFO [1254802207] dns: lookup succeed for play.google.com: 172.217.27.14 2404:6800:4005:820::200e
30 INFO [4076792473] inbound/trojan[trojan-ws-in]: [*] inbound connection to play.google.com:443
30 INFO [4076792473] outbound/direct[direct]: outbound connection to play.google.com:443
30 INFO [4076792473] dns: lookup succeed for play.google.com: 172.217.27.14 2404:6800:4005:820::200e
44 INFO [4086291307] inbound/trojan[trojan-in]: inbound connection from [*]:36180
44 INFO [3692462194] inbound/trojan[trojan-in]: inbound connection from [*]:36182
44 INFO [405584117] inbound/trojan[trojan-in]: [*] inbound connection to 8.8.8.8:53
44 INFO [405584117] dns: exchanged www.google.com. AAAA 2404:6800:4005:809::2004
44 INFO [405584117] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [405584117] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [3509356804] inbound/trojan[trojan-in]: [*] inbound connection to 1.1.1.1:53
44 INFO [3509356804] dns: exchanged www.google.com. AAAA 2404:6800:4005:809::2004
44 INFO [3509356804] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [3509356804] dns: exchanged www.google.com. A 142.250.66.100
50 INFO [405584117] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO outbound/direct[direct]: outbound connection to 1.1.1.1:853
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.google.com. unknown (type 65) 65
50 INFO [3509356804] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO [405584117] dns: exchanged www.google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged www.gstatic.com. AAAA 2404:6800:4005:800::2003
50 INFO [3509356804] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.gstatic.com. AAAA 2404:6800:4005:800::2003
50 INFO [98364247] inbound/trojan[trojan-in]: inbound connection from [*]:36208
50 INFO [3152865443] inbound/trojan[trojan-in]: inbound connection from [*]:36206
50 INFO [933397007] inbound/trojan[trojan-in]: inbound connection from [*]:36222
50 INFO [4022753619] inbound/trojan[trojan-in]: inbound connection from [*]:36230
50 INFO [1556721823] inbound/trojan[trojan-in]: inbound connection from [*]:36234
50 INFO [2643392117] inbound/trojan[trojan-in]: [*] inbound connection to 8.8.8.8:53
50 INFO [2643392117] dns: exchanged google.com. A 142.250.66.78
50 INFO [1080951945] inbound/trojan[trojan-in]: [*] inbound connection to 1.1.1.1:53
50 INFO [1080951945] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e

tls测试配置文件报错

先用只有一个inbound的配置文件获取域名证书
然后在完整的配置文件里面指定其他inbound的证书路径及证书名称(下面的配置文件)

测试报错

报错信息:

./sing-box check -c config.json 
FATAL[0000] parse inbound[1]: parse x509 key pair: tls: failed to find any PEM data in certificate input

证书目录:

ls /usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/*/
/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/a.domain.com/:
a.domain.com.crt  a.domain.com.json  a.domain.com.key

/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/b.domain.com/:
b.domain.com.crt  b.domain.com.json  b.domain.com.key

/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/c.domain.com/:
c.domain.com.crt  c.domain.com.json  c.domain.com.key

/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/d.domain.com/:
d.domain.com.crt  d.domain.com.json  d.domain.com.key

/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/e.domain.com/:
e.domain.com.crt  e.domain.com.json  e.domain.com.key

server config

{
    "log": {
        "disabled": false,
        "level": "debug",
        "output": "",
        "timestamp": true
    },
    "dns": {},
    "inbounds": [
        {
            "type": "hysteria",
            "tag": "hysteria-in",
            "listen": "::",
            "listen_port": 8001,
            "sniff": false,
            "sniff_override_destination": false,
            "domain_strategy": "ipv4_only",
            "up": "100 Mbps",
            "up_mbps": 100,
            "down": "100 Mbps",
            "down_mbps": 100,
            "obfs": "fuck me till the daylight",
            "auth": "",
            "auth_str": "",
            "recv_window_conn": 0,
            "recv_window_client": 0,
            "max_conn_client": 0,
            "disable_mtu_discovery": false,
            "tls": {
                "enabled": true,
                "server_name": "a.domain.com",
                "alpn": [],
                "min_version": "",
                "max_version": "",
                "cipher_suites": [],
                "certificate": "",
                "certificate_path": "",
                "key": "",
                "key_path": "",
                "acme": {
                    "domain": [
                        "a.domain.com",
                        "b.domain.com",
                        "c.domain.com",
                        "d.domain.com",
                        "e.domain.com"
                    ],
                    "data_directory": "/usr/local/etc/sing-box/tls",
                    "default_server_name": "",
                    "email": "[email protected]",
                    "provider": "zerossl",
                    "disable_http_challenge": false,
                    "disable_tls_alpn_challenge": false,
                    "alternative_http_port": 0,
                    "alternative_tls_port": 0,
                    "external_account": {
                        "key_id": "key_id",
                        "mac_key": "mac_key"
                    }
                }
            }
        },
        {
            "type": "naive",
            "tag": "naive-in",
            "listen": "::",
            "listen_port": 8002,
            "tcp_fast_open": false,
            "sniff": false,
            "sniff_override_destination": false,
            "domain_strategy": "ipv4_only",
            "proxy_protocol": false,
            "network": "udp",
            "users": [
                {
                    "username": "sekai",
                    "password": "password"
                }
            ],
            "tls": {
                "enabled": true,
                "server_name": "",
                "alpn": [],
                "min_version": "",
                "max_version": "",
                "cipher_suites": [],
                "certificate": "b.domain.com.crt",
                "certificate_path": "/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/b.domain.com/",
                "key": "b.domain.com.key",
                "key_path": "/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/b.domain.com/"
            }
        },
        {
            "type": "trojan",
            "tag": "trojan-in",
            "listen": "::",
            "listen_port": 8003,
            "tcp_fast_open": false,
            "sniff": false,
            "sniff_override_destination": false,
            "domain_strategy": "ipv4_only",
            "proxy_protocol": false,
            "users": [
                {
                    "name": "user@trojan",
                    "password": "8JCsPssfgS8tiRwiMlhARg=="
                }
            ],
            "tls": {
                "enabled": true,
                "server_name": "c.domain.com",
                "alpn": [],
                "min_version": "",
                "max_version": "",
                "cipher_suites": [],
                "certificate": "c.domain.com.crt",
                "certificate_path": "/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/c.domain.com/",
                "key": "c.domain.com.key",
                "key_path": "/usr/local/etc/sing-box/tls/certificates/acme.zerossl.com-v2-dv90/c.domain.com/"
            },
            "fallback": {},
            "transport": {
                "type": "http",
                "host": [],
                "path": "",
                "method": "",
                "headers": {}
            }
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "tag": "direct-out"
        }
    ],
    "route": {},
    "experimental": {}
}

parse x509 key pair: tls: failed to find any PEM data in certificate input

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

服务器端配置hysteria
### 配置文件修改后恢复正常
惭愧惭愧

自签证书,hysteria中运行正常
singbox显示
FATAL[0000] create service: parse inbound[0]: parse x509 key pair: tls: failed to find any PEM data in certificate input

Version of sing-box

1.0

Server and client configuration file

{ "inbounds": [ { "type": "hysteria", "tag": "hysteria-in", "listen": "::", "listen_port": 5353, "up": "100 Mbps", "down": "100 Mbps", "disable_mtu_discovery": false, "tls": { "enabled": true, "certificate": "/root/certificate.pem", **改为 "certificate_path": "/root/certificate.pem",正常运行** "key": "/root/key.pem" **改为 "key_path": "/root/key.pem",正常运行** 惭愧惭愧 } } ] }

Server and client log file

FATAL[0000] create service: parse inbound[0]: parse x509 key pair: tls: failed to find any PEM data in certificate input
root@racknerd-0d6900:~#

Unstable wireguard outbound

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

Sometimes I can't connect to wireguard outbound. I can't find why and when but a few sing-box restarts helps me. Maybe someone will find something

I'm sure:

  1. Built-in kernel WireGuard works without problems
  2. It is not related to the server. Tried with different servers.

Version of sing-box

$ sing-box version
sing-box 1.0-rc1.1b091c9 (go1.19, linux/amd64, CGO enabled)

Server and client configuration file

{
  "log": {
    "disabled": false,
    "level": "trace",
    "timestamp": true
  },
  "dns": {
    "servers": [
      {
        "address": "8.8.8.8",
        "detour": "trojan-out"
      }
    ]
  },
  "inbounds": [
    {
      "type": "tun",
      "tag": "tun-in",
      "interface_name": "tun0",
      "inet4_address": "172.19.0.1/30",
      "auto_route": true,
      "strict_route": true,
      "endpoint_independent_nat": false,
      "stack": "gvisor",
      "sniff": true
    }
  ],
  "outbounds": [
    {
      "type": "trojan",
      "tag": "trojan-out",
      "server": "xxx",
      "server_port": 443,
      "password": "xxx",
      "tls": {
        "enabled": true,
        "server_name": "xxx",
        "insecure": false
      }
    },
    {
      "type": "wireguard",
      "tag": "wireguard-out",
      "server": "xxx",
      "server_port": 443,
      "local_address": [
        "xxx"
      ],
      "private_key": "xxx",
      "peer_public_key": "xxx",
      "network": "tcp"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    },
    {
      "type": "direct",
      "tag": "direct-out"
    }
  ],
  "route": {
    "auto_detect_interface": true,
    "rules": [
      {
        "protocol": "dns",
        "outbound": "dns-out"
      },
      {
        "process_name": [
          "curl"
        ],
        "outbound": "direct-out"
      },
      {
        "ip_cidr": [
          "10.20.0.0/16"
        ],
        "outbound": "wireguard-out"
      },
      {
        "inbound": [
          "tun-in"
        ],
        "outbound": "trojan-out"
      }
    ]
  }
}

Server and client log file

...
DEBUG outbound/wireguard[wireguard-out]: peer(xxx) - sending handshake initiation
DEBUG [4160455671] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1337496048] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1518388251] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [3758994572] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1354837602] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [2110156446] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1394581047] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [2637748633] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [430661640] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1923633015] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG [1031922839] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
DEBUG outbound/wireguard[wireguard-out]: peer(xxx) - handshake did not complete after 5 seconds, retrying (try 2)
DEBUG outbound/wireguard[wireguard-out]: peer(xxx) - sending handshake initiation
DEBUG [890638734] inbound/tun[tun-in]: connection closed: EOF | upstream: context canceled
...

After some sing-box restarts it works:

DEBUG [80267569] router: match[3] inbound=tun-in ipcidr=10.20.0.0/16 => wireguard-out
INFO [80267569] outbound/wireguard[wireguard-out]: outbound connection to 10.20.66.145:3306
DEBUG outbound/wireguard[wireguard-out]: peer(xxx) - sending handshake initiation
DEBUG outbound/wireguard[wireguard-out]: peer(xxx) - received handshake response

And then again..

need help about clash-api

i use nginx as front and sing-box trojan as backend. i did try add clash-api and added them to nginx with path /clash. i placed the static assets of yacd-gh-pages to /var/www/yacd-gh-pages.
I tried call them in IP:9090 got error like this
{"message":"Unauthorized"}

i also tried to access domain/clash got me not found

sing-box version:
sing-box 1.0 (go1.19, linux, amd64, CGO enabled)
sing-box config:

{
    "log":{
      "disabled":false,
      "level":"debug",
      "output":"/etc/sing-box/box.log",
      "timestamp":true
    },
    "dns":{
      "servers":[
        {
          "tag":"google",
          "address":"https://8.8.8.8/dns-query",
          "address_strategy":"prefer_ipv4",
          "strategy":"prefer_ipv6",
          "detour":"direct"
        },
        {
          "tag":"cloudflare",
          "address":"https://1.1.1.1/dns-query",
          "address_strategy":"prefer_ipv4",
          "strategy":"prefer_ipv6",
          "detour":"direct"
        }
      ]
    },
    "inbounds":[
      {
        "type":"trojan",
        "tag":"trojan-ws",
        "listen":"127.0.0.1",
        "listen_port":1080,
        "tcp_fast_open":false,
        "sniff":false,
        "sniff_override_destination":false,
        "domain_strategy":"prefer_ipv6",
        "proxy_protocol":false,
        "users":[
          {
            "name":"synricha",
            "password":"synricha"
          }
        ],
        "transport":{
          "type":"ws",
          "path":"/synricha-trojan",
          "max_early_data":2048,
          "early_data_header_name":"Sec-WebSocket-Protocol"
        }
      }
    ],
    "outbounds":[
      {
        "type":"direct",
        "tag":"direct",
        "bind_interface": "ens3"
      },
      {
        "type":"block",
        "tag":"block"
      },
      {
        "type":"dns",
        "tag":"dns-out"
      }
    ],
    "route":{
      "geoip":{
        "path":"/etc/sing-box/geoip.db",
        "download_url":"https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
        "download_detour":"direct"
      },
      "geosite":{
        "path":"/etc/sing-box/geosite.db",
        "download_url":"https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
        "download_detour":"direct"
      },
      "rules":[
        {
          "geosite":"cn",
          "geoip":"cn",
          "outbound":"block"
        },
        {
          "protocol":"dns",
          "outbound":"dns-out"
        },
        {
          "geosite":"category-ads-all",
          "outbound":"block"
        },
        {
          "geosite":"netflix",
          "geoip":"netflix",
          "outbound":"direct"
        },
        {
          "network":"tcp,udp",
          "outbound":"direct"
        }
      ]
    },
    "experimental": {
      "clash_api": {
        "external_controller": "0.0.0.0:9090",
        "external_ui": "/var/www/yacd-gh-pages",
        "secret": "123456"
      }
    }
}

nginx config:

location /clash {
        proxy_pass http://127.0.0.1:9090;
        proxy_http_version                 1.1;
        proxy_cache_bypass                 $http_upgrade;
        
        # Proxy headers
        proxy_set_header Upgrade           $http_upgrade;
        proxy_set_header Connection        $connection_upgrade;
        proxy_set_header Host              $host;
        proxy_set_header X-Real-IP         $remote_addr;
        proxy_set_header Forwarded         $proxy_add_forwarded;
        proxy_set_header X-Forwarded-For   $proxy_add_x_forwarded_for;
        proxy_set_header X-Forwarded-Proto $scheme;
        proxy_set_header X-Forwarded-Host  $host;
        proxy_set_header X-Forwarded-Port  $server_port;
        
        # Proxy timeouts
        proxy_connect_timeout              75s;
        proxy_send_timeout                 1071906480m;
        proxy_read_timeout                 1071906480m;
    }

日志时间显示异常

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

服务器日志时间显示异常

Version of sing-box

$ sing-box version
sing-box 1.0-beta2.c6ef276 (go1.19, linux/amd64, CGO disabled)

Server and client configuration file

{
  "level": "info",
  "output": "/var/log/sing-box/output.log",
  "timestamp": true
}

Server and client log file

0 INFO router: loaded geoip database: 8 codes
0 INFO router: loaded geosite database: 1040 codes
0 INFO inbound/mixed[0]: tcp server started at [::]:2080
0 INFO inbound/trojan[trojan-ws-in]: tcp server started at 127.0.0.1:1234
0 INFO inbound/trojan[trojan-in]: tcp server started at [::]:6443
0 INFO sing-box started (0.800s)
1 INFO [1190656836] inbound/trojan[trojan-in]: inbound connection from [*]:53296
2 INFO [3565374130] inbound/trojan[trojan-in]: [*] inbound packet connection to 77.70.80.3:24471
2 INFO [3565374130] outbound/direct[direct]: outbound packet connection
9 INFO [1398763587] inbound/trojan[trojan-in]: inbound connection from [*]:53456
9 INFO [2204401665] inbound/trojan[trojan-in]: [*] inbound connection to 140.82.114.26:443
9 INFO [2204401665] outbound/direct[direct]: outbound connection to 140.82.114.26:443
22 INFO [483527538] inbound/trojan[trojan-in]: inbound connection from [*]:50786
22 INFO [3782869504] inbound/trojan[trojan-ws-in]: [*] inbound connection to 81.28.12.12:443
22 INFO [3782869504] outbound/direct[direct]: outbound connection to 81.28.12.12:443
22 INFO [1079382560] inbound/trojan[trojan-in]: [*] inbound packet connection to 130.158.6.110:5004
22 INFO [1079382560] outbound/direct[direct]: outbound packet connection
22 INFO [2326993217] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.gstatic.com:80
22 INFO [2326993217] outbound/direct[direct]: outbound connection to www.gstatic.com:80
22 INFO outbound/direct[direct]: outbound connection to 1.1.1.1:853
22 INFO [2326993217] dns: lookup succeed for www.gstatic.com: 142.250.66.99 2404:6800:4005:800::2003
25 INFO [2533053488] inbound/trojan[trojan-ws-in]: [*] inbound connection to sing-box.sagernet.org:443
25 INFO [2533053488] outbound/direct[direct]: outbound connection to sing-box.sagernet.org:443
25 INFO [2533053488] dns: lookup succeed for sing-box.sagernet.org: 172.67.164.149 104.21.91.14 2606:4700:3032::6815:5b0e 2606:4700:3033::ac43:a495
25 INFO [3853740635] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
25 INFO [3853740635] outbound/direct[direct]: outbound connection to www.google.com:443
25 INFO [3853740635] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
25 INFO [2432428358] inbound/trojan[trojan-ws-in]: [*] inbound connection to accounts.google.com:443
25 INFO [2495100119] inbound/trojan[trojan-ws-in]: [*] inbound connection to sing-box.sagernet.org:443
25 INFO [2495100119] outbound/direct[direct]: outbound connection to sing-box.sagernet.org:443
25 INFO [2495100119] dns: lookup succeed for sing-box.sagernet.org: 172.67.164.149 104.21.91.14 2606:4700:3032::6815:5b0e 2606:4700:3033::ac43:a495
25 INFO [2432428358] outbound/direct[direct]: outbound connection to accounts.google.com:443
25 INFO [2432428358] dns: lookup succeed for accounts.google.com: 142.250.66.109 2404:6800:4005:800::200d
26 INFO [3043038983] inbound/trojan[trojan-ws-in]: [*] inbound connection to api.github.com:443
26 INFO [3043038983] outbound/direct[direct]: outbound connection to api.github.com:443
26 INFO [3043038983] dns: lookup succeed for api.github.com: 20.205.243.168
26 INFO [3586882573] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
26 INFO [3586882573] outbound/direct[direct]: outbound connection to www.google.com:443
26 INFO [3586882573] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
26 INFO [3614863669] inbound/trojan[trojan-ws-in]: [*] inbound connection to www.google.com:443
26 INFO [3614863669] outbound/direct[direct]: outbound connection to www.google.com:443
26 INFO [3614863669] dns: lookup succeed for www.google.com: 142.250.66.100 2404:6800:4005:809::2004
27 INFO [1694993669] inbound/trojan[trojan-ws-in]: [*] inbound connection to *.ct.*:443
27 INFO [1694993669] outbound/direct[direct]: outbound connection to *.ct.*:443
27 INFO [1520098416] inbound/trojan[trojan-ws-in]: [*] inbound connection to irine-sistiana.gitbook.io:443
27 INFO [1520098416] outbound/direct[direct]: outbound connection to irine-sistiana.gitbook.io:443
27 INFO [1520098416] dns: lookup succeed for irine-sistiana.gitbook.io: 104.18.0.145 104.18.1.145 2606:4700::6812:91 2606:4700::6812:191
28 INFO [1694993669] dns: lookup succeed for *.ct.*: 159.75.30.155
29 INFO [547646919] inbound/trojan[trojan-ws-in]: [*] inbound connection to google.com:443
29 INFO [547646919] outbound/direct[direct]: outbound connection to google.com:443
29 INFO [547646919] dns: lookup succeed for google.com: 142.250.66.78 2404:6800:4005:801::200e
29 INFO [2938911735] inbound/trojan[trojan-ws-in]: [*] inbound connection to history.google.com:443
29 INFO [2938911735] outbound/direct[direct]: outbound connection to history.google.com:443
29 INFO [2938911735] dns: lookup succeed for history.google.com: 172.217.194.139 172.217.194.138 172.217.194.101 172.217.194.102 172.217.194.113 172.217.194.100 2404:6800:4008:c01::64 2404:6800:4008:c01::8b 2404:6800:4008:c01::65 2404:6800:4008:c01::66
29 INFO [1254802207] inbound/trojan[trojan-ws-in]: [*] inbound connection to play.google.com:443
29 INFO [1254802207] outbound/direct[direct]: outbound connection to play.google.com:443
30 INFO [1254802207] dns: lookup succeed for play.google.com: 172.217.27.14 2404:6800:4005:820::200e
30 INFO [4076792473] inbound/trojan[trojan-ws-in]: [*] inbound connection to play.google.com:443
30 INFO [4076792473] outbound/direct[direct]: outbound connection to play.google.com:443
30 INFO [4076792473] dns: lookup succeed for play.google.com: 172.217.27.14 2404:6800:4005:820::200e
44 INFO [4086291307] inbound/trojan[trojan-in]: inbound connection from [*]:36180
44 INFO [3692462194] inbound/trojan[trojan-in]: inbound connection from [*]:36182
44 INFO [405584117] inbound/trojan[trojan-in]: [*] inbound connection to 8.8.8.8:53
44 INFO [405584117] dns: exchanged www.google.com. AAAA 2404:6800:4005:809::2004
44 INFO [405584117] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [405584117] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [3509356804] inbound/trojan[trojan-in]: [*] inbound connection to 1.1.1.1:53
44 INFO [3509356804] dns: exchanged www.google.com. AAAA 2404:6800:4005:809::2004
44 INFO [3509356804] dns: exchanged www.google.com. A 142.250.66.100
44 INFO [3509356804] dns: exchanged www.google.com. A 142.250.66.100
50 INFO [405584117] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO outbound/direct[direct]: outbound connection to 1.1.1.1:853
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [3509356804] dns: exchanged google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.google.com. unknown (type 65) 65
50 INFO [3509356804] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e
50 INFO [405584117] dns: exchanged www.google.com. unknown (type 65) 65
50 INFO [405584117] dns: exchanged www.gstatic.com. AAAA 2404:6800:4005:800::2003
50 INFO [3509356804] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged google.com. A 142.250.66.78
50 INFO [405584117] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.gstatic.com. A 142.250.66.99
50 INFO [3509356804] dns: exchanged www.gstatic.com. AAAA 2404:6800:4005:800::2003
50 INFO [98364247] inbound/trojan[trojan-in]: inbound connection from [*]:36208
50 INFO [3152865443] inbound/trojan[trojan-in]: inbound connection from [*]:36206
50 INFO [933397007] inbound/trojan[trojan-in]: inbound connection from [*]:36222
50 INFO [4022753619] inbound/trojan[trojan-in]: inbound connection from [*]:36230
50 INFO [1556721823] inbound/trojan[trojan-in]: inbound connection from [*]:36234
50 INFO [2643392117] inbound/trojan[trojan-in]: [*] inbound connection to 8.8.8.8:53
50 INFO [2643392117] dns: exchanged google.com. A 142.250.66.78
50 INFO [1080951945] inbound/trojan[trojan-in]: [*] inbound connection to 1.1.1.1:53
50 INFO [1080951945] dns: exchanged google.com. AAAA 2404:6800:4005:801::200e

panic: buffer overflow

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

panic with tun inbound (with endpoint_independent_nat enabled) and socks outbound

>.\sing-box.exe run -c config.json
INFO[0000] router: loaded geosite database: 1000 codes
INFO[0000] router: updated default interface WLAN, index 5
INFO[0000] inbound/tun[tun-in]: started at tun0
INFO[0000] sing-box started (0.199s)
INFO[0000] [844441377] inbound/tun[tun-in]: inbound packet connection from 172.19.0.1:137
INFO[0000] [844441377] inbound/tun[tun-in]: inbound packet connection to 172.19.0.3:137
DEBUG[0000] [844441377] router: found process path: :System
INFO[0000] [844441377] outbound/socks[proxy]: outbound packet connection to 172.19.0.3:137
panic: buffer overflow: cap 8116,start 0, need 10

goroutine 99 [running]:
github.com/sagernet/sing/common/buf.(*Buffer).ExtendHeader(0xc000556d50, 0xa)
        github.com/sagernet/[email protected]/common/buf/buffer.go:150 +0x1b9
github.com/sagernet/sing/protocol/socks.(*AssociatePacketConn).WritePacket(0xc000242120, 0xc000556d50, {{{0x0, 0xffffac130003}, 0xc000004060}, 0x89, {0x0, 0x0}})
        github.com/sagernet/[email protected]/protocol/socks/packet.go:102 +0x139
github.com/sagernet/sing/common/bufio.CopyPacketWithSrcBuffer({0x242f24303a0?, 0xc000242120}, {0x242f2430400, 0xc00006f4a0})
        github.com/sagernet/[email protected]/common/bufio/conn.go:252 +0x163
github.com/sagernet/sing/common/bufio.CopyPacket({0x242f24303a0, 0xc000242120}, {0x242f24303c0?, 0xc000330000?})
        github.com/sagernet/[email protected]/common/bufio/conn.go:166 +0x2e5
github.com/sagernet/sing/common/bufio.CopyPacketConn.func1({0x0?, 0xc0000bbfd0?})
        github.com/sagernet/[email protected]/common/bufio/conn.go:352 +0x6c
github.com/sagernet/sing/common/task.Any.func1()
        github.com/sagernet/[email protected]/common/task/task.go:43 +0x37
created by github.com/sagernet/sing/common/task.Any
        github.com/sagernet/[email protected]/common/task/task.go:42 +0xa5

Version of sing-box

2ce09b6

$ sing-box --version
sing-box version nightly (go1.18.4 windows/amd64)

Server and client configuration file

client only, not related to server

{
  "log": {
    "level": "trace"
  },
  "dns": {
    "servers": [
      {
        "tag": "proxy_dns",
        "address": "1.1.1.1",
        "address_strategy": "ipv4_only",
        "detour": "proxy"
      },
      {
        "tag": "direct_dns",
        "address": "223.5.5.5",
        "address_strategy": "ipv4_only",
        "detour": "direct"
      }
    ],
    "rules": [
      {
        "server": "direct_dns",
        "geosite": [
          "cn"
        ]
      }
    ]
  },
  "inbounds": [
    {
      "type": "tun",
      "tag": "tun-in",
      "inet4_address": "172.19.0.1/30",
      "inet6_address": "fdfe:dcba:9876::1/128",
      "mtu": 1500,
      "auto_route": true,
      "endpoint_independent_nat": false,
      "sniff": true,
      "sniff_override_destination": false
    }
  ],
  "outbounds": [
    {
      "type": "socks",
      "tag": "proxy",
      "server": "127.0.0.1",
      "server_port": 1080
    },
    {
      "type": "direct",
      "tag": "direct"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    }
  ],
  "route": {
    "auto_detect_interface": true,
    "rules": [
      {
        "process_name": [
          "v2ray.exe"
        ],
        "outbound": "direct"
      },
      {
        "protocol": [
          "dns"
        ],
        "outbound": "dns-out"
      }
    ]
  }
}

DNS rule问题

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

https://github.com/SagerNet/sing-box/issues/75#issue-1367323826相同的问题
source_ip_cidr 10.0.0.0/8
指定的domain未被指定的dns server解析

Version of sing-box

$ sing-box version
# Paste output here
sing-box 1.0.441bad5 (go1.19.1, darwin/amd64, CGO disabled)

Server and client configuration file

"dns": {
        "servers": [
            {
                "tag": "dns",
                "address": "https://1.1.1.1/dns-query",
                "detour": "direct-out"
            },
            {
                "tag": "local-dns",
                "address": "10.222.2.1",
                "detour": "direct-out"
            },
            {
                "tag": "homedns",
                "address": "192.168.100.10",
                "detour": "direct-out"
            }
        ],
        "rules": [
            {
                "domain": [
                    "domain.com",
                    "domain.corp"
                ],
                "source_ip_cidr": "10.0.0.0/8",
                "server": "local-dns"
            },
            {
                "source_ip_cidr": "192.168.100.0/24",
                "geosite": "cn",
                "server": "homedns"
            },
            {
                "geosite": "geolocation-!cn",
                "server": "dns"
            }
        ],
        "final": "dns",
        "strategy": "prefer_ipv4"
    },

Server and client log file

# paste log here
+0800 2022-09-09 15:23:31 INFO [1743663395] inbound/mixed[mixed-in]: inbound connection from [::ffff:10.222.203.52]:50830
+0800 2022-09-09 15:23:31 INFO [1762715518] dns: lookup succeed for cnvpn.domain.com: ----
+0800 2022-09-09 15:23:31 DEBUG [1762715518] dns: resolved [公网IP]
+0800 2022-09-09 15:23:31 DEBUG [1762715518] router: match[2] geosite=cn geoip=[cn private] => direct-out
+0800 2022-09-09 15:23:31 INFO [1762715518] outbound/direct[direct-out]: outbound connection to cnvpn.domain.com:443
+0800 2022-09-09 15:23:31 INFO [1743663395] inbound/mixed[mixed-in]: inbound connection to cnvpn.domain.com:443
+0800 2022-09-09 15:23:31 DEBUG [1743663395] router: sniffed protocol: tls, domain: cnvpn.domain.com
+0800 2022-09-09 15:23:31 DEBUG [1743663395] dns: lookup domain cnvpn.domain.com
+0800 2022-09-09 15:23:31 INFO [1743663395] dns: lookup succeed for cnvpn.domain.com: 公网IP
+0800 2022-09-09 15:23:31 DEBUG [1743663395] dns: resolved [公网IP]
+0800 2022-09-09 15:23:31 DEBUG [1743663395] router: match[2] geosite=cn geoip=[cn private] => direct-out
+0800 2022-09-09 15:23:31 INFO [1743663395] outbound/direct[direct-out]: outbound connection to cnvpn.domain.com:443

log format

can i customize log format?
like this:
timestamp inbound/type[tag] source_ip:source_port--> outbound/type[tag] dst:dst_port

Feature request: SIGHUP handling

I know one can update configs using the Clash API. But such a feature plays well with systemd.service's ExecReload and makes life easier.

source_ip_cidr不起作用

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

2个outbound:
1.一个家里,转发访问家里服务的 home-hysteria
2.一个VPS,外网访问的 tp-hysteria

在公司内网10.0.0.0/8网段内,访问192.168.100.0/24网段的时候
route设置
source_ip_cidr 10.0.0.0/8
ip_cidr 192.168.100.0/24
outbound: home-hysteria
不起作用

Version of sing-box

$ sing-box version
# Paste output here
sing-box 1.0.f376683 (go1.19.1, darwin/amd64, CGO disabled)

Server and client configuration file

# paste json here
{
  "route": {
        "geoip": {
            "path": "./geoip.db",
            "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
            "download_detour": "tp-hysteria"
        },
        "geosite": {
            "path": "./geosite.db",
            "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
            "download_detour": "tp-hysteria"
        },
        "rules": [
            {
                "protocol": "dns",
                "outbound": "dns-out"
            },
            {
                "ip_cidr": "192.168.100.0/24",
                "source_ip_cidr": "10.0.0.0/8",
                "outbound": "home-hysteria"
            },
            {
                "geosite": "geolocation-!cn",
                "geoip": "!cn",
                "outbound": "tp-hysteria"
            }
        ],
        "final": "tp-hysteria"
    }
}

Server and client log file

# paste log here
+0800 2022-09-09 13:46:43 INFO [4260291969] inbound/mixed[mixed-in]: inbound connection from [::ffff:10.222.203.52]:56877
+0800 2022-09-09 13:46:43 INFO [4260291969] inbound/mixed[mixed-in]: inbound connection to 192.168.100.1:80
+0800 2022-09-09 13:46:43 DEBUG [4260291969] router: sniffed protocol: http, domain: 192.168.100.1
+0800 2022-09-09 13:46:43 INFO [4260291969] outbound/hysteria[tp-hysteria]: outbound connection to 192.168.100.1:80
+0800 2022-09-09 13:46:44 DEBUG [4260291969] inbound/mixed[mixed-in]: connection closed: process connection from [::ffff:10.222.203.52]:56877: download: EOF | upload: EOF

[Feature Request] Support exists preconfigured tun device for linux

Currently, sing-box tun mode is only supported when run as root.
Using an unprivileged user, even when user and group set when tun device created is result permission denied.
It would be helpful to support tun device managed by another program such as NetworkManager, so sing-box itself can run as a non-root user.

Failutre in bufio.CopyOnce

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

sing-box as navie server.

Client access to the website occasionally times out. The server is on localhost.

Version of sing-box

1.0-rc1

Server and client configuration file

{
    "inbounds": [
        {
            "type": "naive",
            "listen": "::",
            "listen_port": 8443,
            "network": "tcp",
            "users": [
                {
                    "username": "",
                    "password": ""
                }
            ],
            "tls": {
                "enabled": true,
                "certificate_path": "",
                "key_path": ""
            }
        }
    ],
    "outbounds": [
        {
            "type": "direct",
            "domain_strategy": "ipv4_only"
        }
    ]
}

Server and client log file

Server

INFO[0004] [3038983691] inbound/naive[0]: inbound connection from 172.20.0.1:50424
INFO[0004] [3038983691] inbound/naive[0]: inbound connection to www.google.com:443
INFO[0004] [3038983691] outbound/direct[0]: outbound connection to www.google.com:443
DEBUG[0004] [3038983691] dns: lookup domain www.google.com
INFO[0004] [3038983691] dns: lookup succeed for www.google.com: 142.251.42.196
INFO[0005] [1496234055] inbound/naive[0]: inbound connection from 172.20.0.1:50424
INFO[0005] [1496234055] inbound/naive[0]: inbound connection to www.gstatic.com:443
INFO[0005] [1496234055] outbound/direct[0]: outbound connection to www.gstatic.com:443
DEBUG[0005] [1496234055] dns: lookup domain www.gstatic.com
INFO[0005] [1496234055] dns: lookup succeed for www.gstatic.com: 172.217.175.3
INFO[0005] [3376297454] inbound/naive[0]: inbound connection from 172.20.0.1:50424
INFO[0005] [3376297454] inbound/naive[0]: inbound connection to www.gstatic.com:443
INFO[0005] [3376297454] outbound/direct[0]: outbound connection to www.gstatic.com:443
DEBUG[0005] [3376297454] dns: lookup domain www.gstatic.com
INFO[0005] [3376297454] dns: lookup succeed for www.gstatic.com: 172.217.175.3
INFO[0005] [875479440] inbound/naive[0]: inbound connection from 172.20.0.1:50424
INFO[0005] [875479440] inbound/naive[0]: inbound connection to content-autofill.googleapis.com:443
INFO[0005] [875479440] outbound/direct[0]: outbound connection to content-autofill.googleapis.com:443
DEBUG[0005] [875479440] dns: lookup domain content-autofill.googleapis.com
INFO[0005] [875479440] dns: lookup succeed for content-autofill.googleapis.com: 142.251.42.170
INFO[0005] [3893485358] inbound/naive[0]: inbound connection from 172.20.0.1:50424
INFO[0005] [3893485358] inbound/naive[0]: inbound connection to apis.google.com:443
INFO[0005] [3893485358] outbound/direct[0]: outbound connection to apis.google.com:443
DEBUG[0005] [3893485358] dns: lookup domain apis.google.com
INFO[0005] [3893485358] dns: lookup succeed for apis.google.com: 142.251.42.142
DEBUG[0007] [3376297454] inbound/naive[0]: connection closed: process connection from 172.20.0.1:50424: upload: EOF | download: read tcp 172.20.0.2:33446->172.217.175.3:443: use of closed network connection | upstream: context canceled

Feature request: Prometheus metrics

I think it is good to have something to monitor service stats. With v2ray/xray we can use v2ray-exporter -- tool which converts built-in stats into prometheus metrics.

I think it is possible to serve /metrics path directly by sing-box and avoid to use external exporters.

For example:

{
    "stats": {
        "enabled": true
    },
    "inbounds": [
      {
        "type": "prometheus",
        "tag": "prometeus-in",
        "listen": "::",
        "listen_port": 1080,
        "path": "/metrics",
        // basic auth
        "users": [
            {
              "username": "admin",
              "password": "admin"
            }
          ]
      }
    ]
}

Wrong behaviour of UDP NAT

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

UDP Connections routing to direct-out were blocked when endpoint_independent_nat was enabled.
Tested via NatTypeTester v5.0.

Logs:

Commit: f13ecbd: https://paste.debian.net/plainh/2f4d0603

Commit: e4cece6 (git HEAD): https://paste.debian.net/plainh/9cf3e758
It crashes immediately with Out of Memory error when there's new UDP connection.
But works fine if endpoint_independent_nat is disabled.

Version of sing-box

$ sing-box version
sing-box 0.1.0 (go1.18.4, linux, arm64, CGO disabled)

Server and client configuration file

{
  "dns": {
    "servers": [
      {
        "tag": "google",
        "address": "tls://8.8.8.8"
      },
      {
        "tag": "local",
        "address": "223.5.5.5",
        "detour": "direct"
      }
    ],
    "rules": [
      {
        "domain": "mydomain.com",
        "geosite": "cn",
        "server": "local"
      }
    ],
    "strategy": "ipv4_only"
  },
  "inbounds": [
    {
      "type": "tun",
      "interface_name": "emortal-singbox",
      "inet4_address": "172.19.0.1/30",
      "auto_route": true,
      "sniff": true,
      "endpoint_independent_nat": true
    }
  ],
  "outbounds": [
    {
      "type": "shadowsocks",
      "tag": "proxy",
      "server": "-",
      "server_port": 0,
      "method": "aes-128-gcm",
      "password": "-"
    },
    {
      "type": "direct",
      "tag": "direct"
    },
    {
      "type": "block",
      "tag": "block"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    }
  ],
  "route": {
   "geoip": {
      "path": "/etc/homeproxy/resources/geoip.db",
      "download_url": "https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
      "download_detour": "proxy"
    },
    "geosite": {
      "path": "/etc/homeproxy/resources/geosite.db",
      "download_url": "https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
      "download_detour": "proxy"
    },
    "rules": [
      {
        "protocol": "dns",
        "outbound": "dns-out"
      },
      {
        "geosite": "category-ads-all",
        "outbound": "block"
      },
      {
        "geosite": "cn",
        "geoip": "cn",
        "outbound": "direct"
      }
    ],
    "auto_detect_interface": true
  }
}

Suggestion: using yamux as default

When enabling multiplexing, smux v1 is default method and will regularly cause a connection block.

This topic also discusses smux vs yamux. Maybe bandwidth usage is a key metric to proxy tool, but stable should also be considered.

This comment analyze the reason and I overwrite the yamux default config by setting MultiplexBufferSize = 16 * 1024 * 1024 and really have a good performance.

func yaMuxConfig() *yamux.Config {
	config := yamux.DefaultConfig()
	config.LogOutput = io.Discard
	config.StreamCloseTimeout = C.TCPTimeout
	config.StreamOpenTimeout = C.TCPTimeout
	config.MaxStreamWindowSize = C.MultiplexBufferSize
	return config
}

UDP dns doesn't work with smux

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

Shadowsocks outbound with smux opening got conflict with regular udp dns, like 1.0.0.1.
Opening a new website will cost me 30 more seconds.

However, I found doh will work.

client log shows:

ERROR[0006] [2871464325] dns: exchange failed for firestore.googleapis.com.: EOF
ERROR[0006] [930651629] dns: exchange failed for mozilla.cloudflare-dns.com.: EOF
ERROR[0006] [4145510467] dns: exchange failed for mail-api.proton.me.: EOF
ERROR[0006] [1411735066] dns: exchange failed for firestore.googleapis.com.: EOF
ERROR[0006] [3676137539] dns: exchange failed for www.google.com.: EOF
ERROR[0006] [2883351011] dns: exchange failed for mtalk.google.com.: EOF
ERROR[0006] [3576654604] dns: exchange failed for mail-api.proton.me.: EOF
ERROR[0006] [2883351011] dns: exchange failed for mtalk.google.com.: EOF

server log shows:

INFO[0386] [2817473387] router: inbound multiplex packet connection
INFO[0386] [2817473387] outbound/direct: outbound packet connection
ERROR[0387] [2498430584] router: upload: short buffer | download: read udp [::]:35414: use of closed network connection
INFO[0388] [2817473387] router: inbound multiplex packet connection to 1.0.0.1:53
INFO[0388] [2817473387] outbound/direct: outbound packet connection
INFO[0388] [2817473387] router: inbound multiplex connection to 172.217.31.131:443
INFO[0388] [2817473387] outbound/direct: outbound connection to 172.217.31.131:443
INFO[0388] [2817473387] router: inbound multiplex connection to 172.217.31.131:443
INFO[0388] [2817473387] outbound/direct: outbound connection to 172.217.31.131:443
INFO[0388] [2817473387] router: inbound multiplex packet connection
INFO[0388] [2817473387] outbound/direct: outbound packet connection
ERROR[0391] [2817473387] router: upload: short buffer | download: read udp [::]:58957: use of closed network connection
INFO[0391] [2817473387] router: inbound multiplex packet connection to 1.0.0.1:53
INFO[0391] [2817473387] outbound/direct: outbound packet connection

Version of sing-box

$ sing-box --version
sing-box version nightly (go1.19 linux/amd64)

Server and client configuration file

Smux openning

      "multiplex": {
        "enabled": true,
        "protocol": "smux",
        "max_connections": 4,
        "min_streams": 4
      }

Dns part of client that CANNOT connect website

  "dns": {
    "servers": [
      {
        "tag": "cf",
        "address": "1.0.0.1"
      }
   ]
}

Dns part of client that CAN connect website

  "dns": {
    "servers": [
      {
        "tag": "cf_doh",
        "address": "https://1.0.0.1/dns-query"
      }
   ]
}

Server side

{
  "dns": {
    "servers": [
      {
        "tag": "local",
        "address": "1.0.0.1"
      }
    ]
  },
  "inbounds": [
    {
      "type": "shadowsocks",
      "listen": "::",
      "listen_port": 8080,
      "method": "2022-blake3-aes-128-gcm",
      "password": "secret"
    }
  ]
}

TUN inbound leaks memory on Windows

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, etc).

Description of the problem

TUN inbound leaks memory on Windows.
pprof001.svg
image

Version of sing-box

b526ab2

Server and client configuration file

can be reproduce with a "passthrough" config

{
	"log": {
		"level": "trace"
	},
	"inbounds": [
		{
			"type": "tun",
			"tag": "tun-in",
			"inet4_address": "172.19.0.1/30",
			"mtu": 1500,
			"auto_route": true,
			"endpoint_independent_nat": true,
			"sniff": true,
			"sniff_override_destination": false
		}
	],
	"outbounds": [
		{
			"type": "direct",
			"tag": "direct"
		}
	],
	"route": {
		"auto_detect_interface": true
	}
}

UDP Traffic

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

Why UDP traffic not sniffed, in openclash client games traffic is UDP but i checked in sing-box marked as TCP and in my config route all TCP traffic using wireguard-outbound so as the result ping become higher.

openclash log
image

Version of sing-box

$ sing-box --version
sing-box 1.0 (go1.19, linux, amd64, CGO enabled)

Server and client configuration file

{
    "log":{
      "disabled":false,
      "level":"debug",
      "output":"/etc/sing-box/box.log",
      "timestamp":true
    },
    "dns":{
      "servers":[
        {
          "tag":"google",
          "address":"https://8.8.8.8/dns-query",
          "address_strategy":"prefer_ipv4",
          "strategy":"prefer_ipv6",
          "detour":"direct"
        },
        {
          "tag":"cloudflare",
          "address":"https://1.1.1.1/dns-query",
          "address_strategy":"prefer_ipv4",
          "strategy":"prefer_ipv6",
          "detour":"direct"
        }
      ]
    },
    "inbounds":[
      {
        "type":"trojan",
        "tag":"trojan-ws",
        "listen":"127.0.0.1",
        "listen_port":1080,
        "tcp_fast_open":false,
        "sniff":true,
        "sniff_override_destination":false,
        "domain_strategy":"prefer_ipv6",
        "proxy_protocol":false,
        "users":[
          {
            "name":"synricha",
            "password":"synricha"
          }
        ],
        "transport":{
          "type":"ws",
          "path":"/synricha-trojan",
          "max_early_data":2048,
          "early_data_header_name":"Sec-WebSocket-Protocol"
        }
      }
    ],
    "outbounds":[
      {
        "type":"direct",
        "tag":"direct",
        "bind_interface": "ens3"
      },
      {
        "type":"block",
        "tag":"block"
      },
      {
        "type":"dns",
        "tag":"dns-out"
      },
      {
        "type":"wireguard",
        "tag":"wireguard-out",
        "server":"162.159.192.10",
        "server_port":1701,
        "local_address":[
          "172sadasdasds.16.0.2/32",
          "2606:4sadsadsa:2226:3383/128"
        ],
        "private_key":"+sadsad",
        "peer_public_key":"sdsadsdwPfgyo=",
        "mtu":1380,
        
        "bind_interface": "ens3",
        "connect_timeout": "3s",
        "tcp_fast_open": false,
        "domain_strategy": "prefer_ipv6",
        "fallback_delay": "300ms"
      },
      {
        "type": "selector",
        "tag": "TrafficTCP",
  
        "outbounds": [
          "wireguard-out",
          "direct"
        ],
        "default": "wireguard-out"
      },
      {
        "type": "selector",
        "tag": "TrafficAds",

        "outbounds": [
          "block",
          "wireguard-out",
          "direct"
        ],
        "default": "block"
      }
    ],
    "route":{
      "geoip":{
        "path":"/etc/sing-box/geoip.db",
        "download_url":"https://github.com/SagerNet/sing-geoip/releases/latest/download/geoip.db",
        "download_detour":"direct"
      },
      "geosite":{
        "path":"/etc/sing-box/geosite.db",
        "download_url":"https://github.com/SagerNet/sing-geosite/releases/latest/download/geosite.db",
        "download_detour":"direct"
      },
      "rules":[
        {
          "protocol":"dns",
          "outbound":"dns-out"
        },
        {
          "geosite":"category-ads-all",
          "outbound":"TrafficAds"
        },
        {
          "geosite":"netflix",
          "geoip":"netflix",
          "outbound":"direct"
        },
        {
          "network":"udp",
          "outbound":"direct"
        },
        {
          "network":"tcp",
          "outbound":"TrafficTCP"
        }
      ]
    },
    "experimental": {
      "clash_api": {
        "external_controller": "127.0.0.1:9090",
        "external_ui": "/etc/sing-box/yacd-gh-pages/",
        "secret": "123456"
      }
    }
}

Server and client log file

0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
28 INFO [2004757561] inbound/trojan[trojan-ws]: [synricha] inbound connection to 47.241.21.126:443
28 DEBUG [2004757561] router: match[6] network=tcp => TrafficTCP
28 INFO [2004757561] outbound/wireguard[wireguard-out]: outbound connection to 47.241.21.126:443
28 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
28 INFO [450568262] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
28 DEBUG [450568262] router: sniffed packet protocol: dns
28 DEBUG [450568262] router: match[1] protocol=dns => dns-out
28 DEBUG [450568262] dns: exchange portal.fb.com A INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange g.whatsapp.net AAAA INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange g.whatsapp.net A INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange mqtt-mini.facebook.com AAAA INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange portal.fb.com AAAA INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange mqtt-mini.facebook.com A INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange mtalk.google.com A INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 DEBUG [450568262] dns: exchange mtalk.google.com AAAA INET
28 INFO [450568262] outbound/direct[direct]: outbound connection to 8.8.8.8:443
28 INFO [450568262] dns: exchanged mtalk.google.com. CNAME mobile-gtalk.l.google.com.
28 INFO [450568262] dns: exchanged mtalk.google.com. AAAA 2404:6800:4003:c04::bc
28 INFO [450568262] dns: exchanged g.whatsapp.net. CNAME chat.cdn.whatsapp.net.
28 INFO [450568262] dns: exchanged g.whatsapp.net. A 157.240.13.55
28 INFO [450568262] dns: exchanged portal.fb.com. CNAME star.c10r.facebook.com.
28 INFO [450568262] dns: exchanged portal.fb.com. A 157.240.208.16
28 INFO [450568262] dns: exchanged g.whatsapp.net. CNAME chat.cdn.whatsapp.net.
28 INFO [450568262] dns: exchanged g.whatsapp.net. AAAA 2a03:2880:f24d:c7:face:b00c:0:7260
28 INFO [450568262] dns: exchanged mqtt-mini.facebook.com. CNAME mqtt-mini.c10r.facebook.com.
28 INFO [450568262] dns: exchanged mqtt-mini.facebook.com. A 157.240.13.32
28 INFO [450568262] dns: exchanged portal.fb.com. CNAME star.c10r.facebook.com.
28 INFO [450568262] dns: exchanged portal.fb.com. AAAA 2a03:2880:f04d:11:face:b00c:0:2
28 INFO [450568262] dns: exchanged mqtt-mini.facebook.com. CNAME mqtt-mini.c10r.facebook.com.
28 INFO [450568262] dns: exchanged mqtt-mini.facebook.com. AAAA 2a03:2880:f14d:83:face:b00c:0:1ea0
28 INFO [450568262] dns: exchanged mtalk.google.com. CNAME mobile-gtalk.l.google.com.
28 INFO [450568262] dns: exchanged mtalk.google.com. A 74.125.68.188
28 INFO [2946732946] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
28 DEBUG [2946732946] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
28 DEBUG [2946732946] dns: lookup domain mqtt-mini.facebook.com
28 INFO [2946732946] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.13.32
28 DEBUG [2946732946] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.13.32]
28 DEBUG [2946732946] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
28 INFO [2946732946] outbound/direct[direct]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
28 INFO [2946732946] outbound/direct[direct]: outbound connection to 157.240.13.32:443
28 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
28 INFO [526397343] inbound/trojan[trojan-ws]: [synricha] inbound connection to www.google.com:80
28 DEBUG [526397343] router: sniffed protocol: http, domain: www.google.com
28 DEBUG [526397343] dns: lookup domain www.google.com
28 INFO [1046791879] inbound/trojan[trojan-ws]: [synricha] inbound connection to mtalk.google.com:5228
28 DEBUG [1046791879] router: sniffed protocol: tls, domain: mtalk.google.com
28 DEBUG [1046791879] dns: lookup domain mtalk.google.com
28 INFO [1046791879] dns: lookup succeed for mtalk.google.com: 2404:6800:4003:c04::bc 74.125.68.188
28 DEBUG [1046791879] dns: resolved [2404:6800:4003:c04::bc 74.125.68.188]
28 DEBUG [1046791879] router: match[6] network=tcp => TrafficTCP
28 INFO [1046791879] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c04::bc]:5228
28 INFO [526397343] dns: lookup succeed for www.google.com: 2404:6800:4003:c11::68 2404:6800:4003:c11::63 2404:6800:4003:c11::69 2404:6800:4003:c11::67 142.251.12.105 142.251.12.104 142.251.12.147 142.251.12.99 142.251.12.106 142.251.12.103
28 DEBUG [526397343] dns: resolved [2404:6800:4003:c11::68 2404:6800:4003:c11::63 2404:6800:4003:c11::69 2404:6800:4003:c11::67 142.251.12.105 142.251.12.104 142.251.12.147 142.251.12.99 142.251.12.106 142.251.12.103]
28 DEBUG [526397343] router: match[6] network=tcp => TrafficTCP
28 INFO [526397343] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::68]:80
28 INFO [536181235] inbound/trojan[trojan-ws]: [synricha] inbound connection to [2a03:2880:f24d:c7:face:b00c:0:7260]:5222
28 DEBUG [536181235] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
28 INFO [536181235] outbound/direct[direct]: outbound connection to [2a03:2880:f24d:c7:face:b00c:0:7260]:5222
29 INFO [327664598] inbound/trojan[trojan-ws]: [synricha] inbound connection to www.google.com:80
29 DEBUG [327664598] router: sniffed protocol: http, domain: www.google.com
29 DEBUG [327664598] dns: lookup domain www.google.com
29 INFO [327664598] dns: lookup succeed for www.google.com: 2404:6800:4003:c11::68 2404:6800:4003:c11::63 2404:6800:4003:c11::69 2404:6800:4003:c11::67 142.251.12.105 142.251.12.104 142.251.12.147 142.251.12.99 142.251.12.106 142.251.12.103
29 DEBUG [327664598] dns: resolved [2404:6800:4003:c11::68 2404:6800:4003:c11::63 2404:6800:4003:c11::69 2404:6800:4003:c11::67 142.251.12.105 142.251.12.104 142.251.12.147 142.251.12.99 142.251.12.106 142.251.12.103]
29 DEBUG [327664598] router: match[6] network=tcp => TrafficTCP
29 INFO [327664598] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::68]:80
32 INFO [246967576] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
32 DEBUG [246967576] router: match[6] network=tcp => TrafficTCP
32 INFO [246967576] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
35 DEBUG [450568262] dns: exchange graph.facebook.com AAAA INET
35 DEBUG [450568262] dns: exchange graph.facebook.com A INET
35 INFO [450568262] dns: exchanged graph.facebook.com. CNAME api.facebook.com.
35 INFO [450568262] dns: exchanged graph.facebook.com. CNAME star.c10r.facebook.com.
35 INFO [450568262] dns: exchanged graph.facebook.com. AAAA 2a03:2880:f04d:11:face:b00c:0:2
35 INFO [450568262] dns: exchanged graph.facebook.com. CNAME api.facebook.com.
35 INFO [450568262] dns: exchanged graph.facebook.com. CNAME star.c10r.facebook.com.
35 INFO [450568262] dns: exchanged graph.facebook.com. A 157.240.7.20
35 DEBUG [450568262] dns: exchange router.miwifi.com AAAA INET
35 DEBUG [450568262] dns: exchange router.miwifi.com A INET
35 INFO [450568262] dns: exchanged router.miwifi.com. A 47.241.25.102
35 INFO [989986240] inbound/trojan[trojan-ws]: [synricha] inbound connection to graph.facebook.com:443
35 DEBUG [989986240] router: sniffed protocol: tls, domain: graph.facebook.com
35 DEBUG [989986240] dns: lookup domain graph.facebook.com
35 INFO [989986240] dns: lookup succeed for graph.facebook.com: 2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20
35 DEBUG [989986240] dns: resolved [2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20]
35 DEBUG [989986240] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
35 INFO [989986240] outbound/direct[direct]: outbound connection to [2a03:2880:f04d:11:face:b00c:0:2]:443
35 INFO [989986240] outbound/direct[direct]: outbound connection to 157.240.7.20:443
35 INFO [1162355699] inbound/trojan[trojan-ws]: [synricha] inbound connection to graph.facebook.com:443
35 DEBUG [1162355699] router: sniffed protocol: tls, domain: graph.facebook.com
35 DEBUG [1162355699] dns: lookup domain graph.facebook.com
35 INFO [1162355699] dns: lookup succeed for graph.facebook.com: 2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20
35 DEBUG [1162355699] dns: resolved [2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20]
35 DEBUG [1162355699] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
35 INFO [1162355699] outbound/direct[direct]: outbound connection to [2a03:2880:f04d:11:face:b00c:0:2]:443
35 INFO [1162355699] outbound/direct[direct]: outbound connection to 157.240.7.20:443
35 INFO [2588753361] inbound/trojan[trojan-ws]: [synricha] inbound connection to graph.facebook.com:443
35 DEBUG [2588753361] router: sniffed protocol: tls, domain: graph.facebook.com
35 DEBUG [2588753361] dns: lookup domain graph.facebook.com
35 INFO [2588753361] dns: lookup succeed for graph.facebook.com: 2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20
35 DEBUG [2588753361] dns: resolved [2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20]
35 DEBUG [2588753361] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
35 INFO [2588753361] outbound/direct[direct]: outbound connection to [2a03:2880:f04d:11:face:b00c:0:2]:443
35 INFO [2588753361] outbound/direct[direct]: outbound connection to 157.240.7.20:443
35 INFO [635696671] inbound/trojan[trojan-ws]: [synricha] inbound connection to c.whatsapp.net:80
35 DEBUG [635696671] router: sniffed protocol: http, domain: c.whatsapp.net
35 DEBUG [635696671] dns: lookup domain c.whatsapp.net
35 INFO [635696671] dns: lookup succeed for c.whatsapp.net: 3.33.252.61 15.197.206.217 15.197.210.208 3.33.221.48
35 DEBUG [635696671] dns: resolved [3.33.252.61 15.197.206.217 15.197.210.208 3.33.221.48]
35 DEBUG [635696671] router: match[6] network=tcp => TrafficTCP
35 INFO [635696671] outbound/wireguard[wireguard-out]: outbound connection to 3.33.252.61:80
35 INFO [2849514257] inbound/trojan[trojan-ws]: [synricha] inbound connection to router.miwifi.com:443
35 DEBUG [2849514257] router: sniffed protocol: tls, domain: router.miwifi.com
35 DEBUG [2849514257] dns: lookup domain router.miwifi.com
35 INFO [2849514257] dns: lookup succeed for router.miwifi.com: 47.241.25.102
35 DEBUG [2849514257] dns: resolved [47.241.25.102]
35 DEBUG [2849514257] router: match[0] geosite=cn geoip=cn => block
35 INFO [2849514257] outbound/block[block]: blocked connection to router.miwifi.com:443
36 DEBUG [450568262] dns: exchange tdm.mgapex.com A INET
36 DEBUG [450568262] dns: exchange tdm.mgapex.com AAAA INET
36 DEBUG [450568262] dns: exchange itop.mgapex.com AAAA INET
36 INFO [450568262] dns: exchanged tdm.mgapex.com. A 34.248.0.30
36 INFO [450568262] dns: exchanged tdm.mgapex.com. A 52.214.175.246
36 DEBUG [450568262] dns: exchange cloudctrl.mgapex.com A INET
36 DEBUG [450568262] dns: exchange itop.mgapex.com A INET
36 DEBUG [450568262] dns: exchange cloudctrl.mgapex.com AAAA INET
36 INFO [450568262] dns: exchanged itop.mgapex.com. A 52.16.17.160
36 INFO [450568262] dns: exchanged itop.mgapex.com. A 54.74.13.13
36 INFO [450568262] dns: exchanged itop.mgapex.com. A 52.212.43.30
36 INFO [450568262] dns: exchanged cloudctrl.mgapex.com. A 54.77.226.249
36 INFO [450568262] dns: exchanged cloudctrl.mgapex.com. A 63.32.121.85
36 INFO [2856933298] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
36 DEBUG [2856933298] router: sniffed protocol: tls, domain: tdm.mgapex.com
36 DEBUG [2856933298] dns: lookup domain tdm.mgapex.com
36 INFO [2856933298] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
36 DEBUG [2856933298] dns: resolved [34.248.0.30 52.214.175.246]
36 DEBUG [2856933298] router: match[6] network=tcp => TrafficTCP
36 INFO [2856933298] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
36 INFO [1054503781] inbound/trojan[trojan-ws]: [synricha] inbound connection to cloudctrl.mgapex.com:443
36 DEBUG [1054503781] router: sniffed protocol: tls, domain: cloudctrl.mgapex.com
36 DEBUG [1054503781] dns: lookup domain cloudctrl.mgapex.com
36 INFO [1054503781] dns: lookup succeed for cloudctrl.mgapex.com: 54.77.226.249 63.32.121.85
36 DEBUG [1054503781] dns: resolved [54.77.226.249 63.32.121.85]
36 DEBUG [1054503781] router: match[6] network=tcp => TrafficTCP
36 INFO [1054503781] outbound/wireguard[wireguard-out]: outbound connection to 54.77.226.249:443
36 INFO [998012149] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
36 DEBUG [998012149] router: sniffed protocol: tls, domain: itop.mgapex.com
36 DEBUG [998012149] dns: lookup domain itop.mgapex.com
36 INFO [998012149] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 54.74.13.13 52.212.43.30
36 DEBUG [998012149] dns: resolved [52.16.17.160 54.74.13.13 52.212.43.30]
36 DEBUG [998012149] router: match[6] network=tcp => TrafficTCP
36 INFO [998012149] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
37 INFO [4103951112] inbound/trojan[trojan-ws]: [synricha] inbound connection to mtalk.google.com:5228
37 DEBUG [4103951112] router: sniffed protocol: tls, domain: mtalk.google.com
37 DEBUG [4103951112] dns: lookup domain mtalk.google.com
37 INFO [4103951112] dns: lookup succeed for mtalk.google.com: 2404:6800:4003:c04::bc 74.125.68.188
37 DEBUG [4103951112] dns: resolved [2404:6800:4003:c04::bc 74.125.68.188]
37 DEBUG [4103951112] router: match[6] network=tcp => TrafficTCP
37 INFO [4103951112] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c04::bc]:5228
37 INFO [11455022] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
37 DEBUG [11455022] router: sniffed protocol: tls, domain: tdm.mgapex.com
37 DEBUG [11455022] dns: lookup domain tdm.mgapex.com
37 INFO [11455022] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
37 DEBUG [11455022] dns: resolved [34.248.0.30 52.214.175.246]
37 DEBUG [11455022] router: match[6] network=tcp => TrafficTCP
37 INFO [11455022] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
38 DEBUG [450568262] dns: exchange tgpa.mgapex.com AAAA INET
38 DEBUG [450568262] dns: exchange puffer.4.707369824.dmp.mgapex.com A INET
38 DEBUG [450568262] dns: exchange tgpa.mgapex.com A INET
38 DEBUG [450568262] dns: exchange puffer.4.707369824.dmp.mgapex.com AAAA INET
38 DEBUG [450568262] dns: exchange speedtest.mgapex.com A INET
38 DEBUG [450568262] dns: exchange speedtest.mgapex.com AAAA INET
38 INFO [450568262] dns: exchanged tgpa.mgapex.com. A 52.30.237.151
38 INFO [450568262] dns: exchanged tgpa.mgapex.com. A 34.248.152.69
38 INFO [450568262] dns: exchanged tgpa.mgapex.com. A 34.250.147.180
38 INFO [450568262] dns: exchanged puffer.4.707369824.dmp.mgapex.com. CNAME dmp-dolphin-zk-outer-elb-15522c154e43c632.elb.eu-west-1.amazonaws.com.
38 INFO [450568262] dns: exchanged puffer.4.707369824.dmp.mgapex.com. A 52.48.13.5
38 INFO [450568262] dns: exchanged speedtest.mgapex.com. A 54.216.181.116
38 INFO [450568262] dns: exchanged puffer.4.707369824.dmp.mgapex.com. CNAME dmp-dolphin-zk-outer-elb-15522c154e43c632.elb.eu-west-1.amazonaws.com.
38 INFO [2091963872] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
38 DEBUG [2091963872] router: sniffed protocol: tls, domain: itop.mgapex.com
38 DEBUG [2091963872] dns: lookup domain itop.mgapex.com
38 INFO [2091963872] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 54.74.13.13 52.212.43.30
38 DEBUG [2091963872] dns: resolved [52.16.17.160 54.74.13.13 52.212.43.30]
38 DEBUG [2091963872] router: match[6] network=tcp => TrafficTCP
38 INFO [2091963872] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
38 INFO [1197293052] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
38 DEBUG [1197293052] router: sniffed protocol: tls, domain: itop.mgapex.com
38 DEBUG [1197293052] dns: lookup domain itop.mgapex.com
38 INFO [1197293052] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 54.74.13.13 52.212.43.30
38 DEBUG [1197293052] dns: resolved [52.16.17.160 54.74.13.13 52.212.43.30]
38 DEBUG [1197293052] router: match[6] network=tcp => TrafficTCP
38 INFO [1197293052] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
39 INFO [340012384] inbound/trojan[trojan-ws]: [synricha] inbound connection to tgpa.mgapex.com:443
39 DEBUG [340012384] router: sniffed protocol: tls, domain: tgpa.mgapex.com
39 DEBUG [340012384] dns: lookup domain tgpa.mgapex.com
39 INFO [340012384] dns: lookup succeed for tgpa.mgapex.com: 52.30.237.151 34.248.152.69 34.250.147.180
39 DEBUG [340012384] dns: resolved [52.30.237.151 34.248.152.69 34.250.147.180]
39 DEBUG [340012384] router: match[6] network=tcp => TrafficTCP
39 INFO [340012384] outbound/wireguard[wireguard-out]: outbound connection to 52.30.237.151:443
39 INFO [4021135834] inbound/trojan[trojan-ws]: [synricha] inbound connection to graph.facebook.com:443
39 DEBUG [4021135834] router: sniffed protocol: tls, domain: graph.facebook.com
39 DEBUG [4021135834] dns: lookup domain graph.facebook.com
39 INFO [4021135834] dns: lookup succeed for graph.facebook.com: 2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20
39 DEBUG [4021135834] dns: resolved [2a03:2880:f04d:11:face:b00c:0:2 157.240.7.20]
39 DEBUG [4021135834] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
39 INFO [4021135834] outbound/direct[direct]: outbound connection to [2a03:2880:f04d:11:face:b00c:0:2]:443
39 INFO [4021135834] outbound/direct[direct]: outbound connection to 157.240.7.20:443
39 INFO [2004338395] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8085
39 DEBUG [2004338395] router: match[6] network=tcp => TrafficTCP
39 INFO [2004338395] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8085
39 INFO [2579223892] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
39 DEBUG [2579223892] router: match[6] network=tcp => TrafficTCP
39 INFO [2579223892] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
39 DEBUG [450568262] dns: exchange dl.listdl.com A INET
39 DEBUG [450568262] dns: exchange dl.listdl.com AAAA INET
39 INFO [450568262] dns: exchanged dl.listdl.com. CNAME dl.listdl.com.akamaized.net.
39 INFO [450568262] dns: exchanged dl.listdl.com. CNAME a3.v.akamai.net.
39 INFO [450568262] dns: exchanged dl.listdl.com. CNAME dl.listdl.com.akamaized.net.
39 INFO [450568262] dns: exchanged dl.listdl.com. CNAME a3.v.akamai.net.
39 INFO [450568262] dns: exchanged dl.listdl.com. A 119.110.115.168
39 INFO [450568262] dns: exchanged dl.listdl.com. A 119.110.115.186
39 INFO [3916180701] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
39 DEBUG [3916180701] router: sniffed protocol: tls, domain: tdm.mgapex.com
39 DEBUG [3916180701] dns: lookup domain tdm.mgapex.com
39 INFO [3916180701] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
39 DEBUG [3916180701] dns: resolved [34.248.0.30 52.214.175.246]
39 DEBUG [3916180701] router: match[6] network=tcp => TrafficTCP
39 INFO [3916180701] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
39 INFO [502231858] inbound/trojan[trojan-ws]: [synricha] inbound connection to dl.listdl.com:443
39 DEBUG [502231858] router: sniffed protocol: tls, domain: dl.listdl.com
39 DEBUG [502231858] dns: lookup domain dl.listdl.com
39 INFO [502231858] dns: lookup succeed for dl.listdl.com: 119.110.115.168 119.110.115.186
39 DEBUG [502231858] dns: resolved [119.110.115.168 119.110.115.186]
39 DEBUG [502231858] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
39 INFO [502231858] outbound/direct[direct]: outbound connection to 119.110.115.168:443
40 INFO [2589032075] inbound/trojan[trojan-ws]: [synricha] inbound connection to dl.listdl.com:443
40 DEBUG [2589032075] router: sniffed protocol: tls, domain: dl.listdl.com
40 DEBUG [2589032075] dns: lookup domain dl.listdl.com
40 INFO [2589032075] dns: lookup succeed for dl.listdl.com: 119.110.115.168 119.110.115.186
40 DEBUG [2589032075] dns: resolved [119.110.115.168 119.110.115.186]
40 DEBUG [2589032075] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
40 INFO [2589032075] outbound/direct[direct]: outbound connection to 119.110.115.168:443
40 DEBUG [450568262] dns: exchange dmp.mgapex.com AAAA INET
40 DEBUG [450568262] dns: exchange dmp.mgapex.com A INET
40 INFO [450568262] dns: exchanged dmp.mgapex.com. CNAME dmp-dolphin-add-outer-elb-d41c250dac1d436f.elb.eu-west-1.amazonaws.com.
40 INFO [450568262] dns: exchanged dmp.mgapex.com. CNAME dmp-dolphin-add-outer-elb-d41c250dac1d436f.elb.eu-west-1.amazonaws.com.
40 INFO [450568262] dns: exchanged dmp.mgapex.com. A 54.75.232.75
40 INFO [450568262] dns: exchanged dmp.mgapex.com. A 52.31.59.205
40 INFO [450568262] dns: exchanged dmp.mgapex.com. A 63.32.154.133
41 INFO [1437390709] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.31.59.205:50000
41 DEBUG [1437390709] router: match[6] network=tcp => TrafficTCP
41 INFO [1437390709] outbound/wireguard[wireguard-out]: outbound connection to 52.31.59.205:50000
41 INFO [727748805] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
41 DEBUG [727748805] router: match[6] network=tcp => TrafficTCP
41 INFO [727748805] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
41 DEBUG [450568262] dns: exchange bugly-android.mgapex.com A INET
41 DEBUG [450568262] dns: exchange bugly-android.mgapex.com AAAA INET
41 INFO [450568262] dns: exchanged bugly-android.mgapex.com. A 54.77.204.124
41 INFO [450568262] dns: exchanged bugly-android.mgapex.com. A 34.246.154.77
41 INFO [450568262] dns: exchanged bugly-android.mgapex.com. A 52.211.59.11
41 INFO [3901099248] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
41 DEBUG [3901099248] router: sniffed protocol: tls, domain: tdm.mgapex.com
41 DEBUG [3901099248] dns: lookup domain tdm.mgapex.com
41 INFO [3901099248] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
41 DEBUG [3901099248] dns: resolved [34.248.0.30 52.214.175.246]
41 DEBUG [3901099248] router: match[6] network=tcp => TrafficTCP
41 INFO [3901099248] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
41 INFO [2117334359] inbound/trojan[trojan-ws]: [synricha] inbound connection to bugly-android.mgapex.com:443
41 DEBUG [2117334359] router: sniffed protocol: tls, domain: bugly-android.mgapex.com
41 DEBUG [2117334359] dns: lookup domain bugly-android.mgapex.com
41 INFO [2117334359] dns: lookup succeed for bugly-android.mgapex.com: 54.77.204.124 34.246.154.77 52.211.59.11
41 DEBUG [2117334359] dns: resolved [54.77.204.124 34.246.154.77 52.211.59.11]
41 DEBUG [2117334359] router: match[6] network=tcp => TrafficTCP
41 INFO [2117334359] outbound/wireguard[wireguard-out]: outbound connection to 54.77.204.124:443
43 INFO [2812717482] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
43 DEBUG [2812717482] router: sniffed protocol: tls, domain: tdm.mgapex.com
43 DEBUG [2812717482] dns: lookup domain tdm.mgapex.com
43 INFO [2812717482] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
43 DEBUG [2812717482] dns: resolved [34.248.0.30 52.214.175.246]
43 DEBUG [2812717482] router: match[6] network=tcp => TrafficTCP
43 INFO [2812717482] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
43 INFO [436785810] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
43 DEBUG [436785810] router: match[6] network=tcp => TrafficTCP
43 INFO [436785810] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
43 DEBUG [450568262] dns: exchange download.2.707369824.dmp.mgapex.com A INET
43 DEBUG [450568262] dns: exchange download.2.707369824.dmp.mgapex.com AAAA INET
43 INFO [450568262] dns: exchanged download.2.707369824.dmp.mgapex.com. A 52.48.13.5
43 INFO [1310712832] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8085
43 DEBUG [1310712832] router: match[6] network=tcp => TrafficTCP
43 INFO [1310712832] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8085
44 INFO [1507560117] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
44 DEBUG [1507560117] router: sniffed protocol: tls, domain: tdm.mgapex.com
44 DEBUG [1507560117] dns: lookup domain tdm.mgapex.com
44 INFO [1507560117] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
44 DEBUG [1507560117] dns: resolved [34.248.0.30 52.214.175.246]
44 DEBUG [1507560117] router: match[6] network=tcp => TrafficTCP
44 INFO [1507560117] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
45 INFO [1306785352] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
45 DEBUG [1306785352] router: match[6] network=tcp => TrafficTCP
45 INFO [1306785352] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
45 INFO [2170823518] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.31.59.205:20000
45 DEBUG [2170823518] router: match[6] network=tcp => TrafficTCP
45 INFO [2170823518] outbound/wireguard[wireguard-out]: outbound connection to 52.31.59.205:20000
46 INFO [1093158946] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
46 DEBUG [1093158946] router: sniffed protocol: tls, domain: tdm.mgapex.com
46 DEBUG [1093158946] dns: lookup domain tdm.mgapex.com
46 INFO [1093158946] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
46 DEBUG [1093158946] dns: resolved [34.248.0.30 52.214.175.246]
46 DEBUG [1093158946] router: match[6] network=tcp => TrafficTCP
46 INFO [1093158946] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
47 INFO [2712638209] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
47 DEBUG [2712638209] router: match[6] network=tcp => TrafficTCP
47 INFO [2712638209] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
47 INFO [1122977913] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.31.59.205:20000
47 DEBUG [1122977913] router: match[6] network=tcp => TrafficTCP
47 INFO [1122977913] outbound/wireguard[wireguard-out]: outbound connection to 52.31.59.205:20000
48 INFO [1004095612] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
48 DEBUG [1004095612] router: sniffed protocol: tls, domain: tdm.mgapex.com
48 DEBUG [1004095612] dns: lookup domain tdm.mgapex.com
48 INFO [1004095612] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
48 DEBUG [1004095612] dns: resolved [34.248.0.30 52.214.175.246]
48 DEBUG [1004095612] router: match[6] network=tcp => TrafficTCP
48 INFO [1004095612] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
49 INFO [1330008653] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
49 DEBUG [1330008653] router: match[6] network=tcp => TrafficTCP
49 INFO [1330008653] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
49 DEBUG [450568262] dns: exchange us.wifiapi.micloud.xiaomi.net A INET
49 DEBUG [450568262] dns: exchange us.wifiapi.micloud.xiaomi.net AAAA INET
49 INFO [450568262] dns: exchanged us.wifiapi.micloud.xiaomi.net. A 47.241.65.164
49 INFO [450568262] dns: exchanged us.wifiapi.micloud.xiaomi.net. A 8.214.46.209
49 DEBUG [450568262] dns: exchange us.phonecallapi.micloud.xiaomi.net A INET
49 DEBUG [450568262] dns: exchange us.phonecallapi.micloud.xiaomi.net AAAA INET
49 INFO [450568262] dns: exchanged us.phonecallapi.micloud.xiaomi.net. A 8.214.46.209
49 INFO [450568262] dns: exchanged us.phonecallapi.micloud.xiaomi.net. A 47.241.65.164
49 INFO [484736611] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
49 DEBUG [484736611] router: sniffed protocol: tls, domain: tdm.mgapex.com
49 DEBUG [484736611] dns: lookup domain tdm.mgapex.com
49 INFO [484736611] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
49 DEBUG [484736611] dns: resolved [34.248.0.30 52.214.175.246]
49 DEBUG [484736611] router: match[6] network=tcp => TrafficTCP
49 INFO [484736611] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
49 INFO [120897963] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.wifiapi.micloud.xiaomi.net:443
49 DEBUG [120897963] router: sniffed protocol: tls, domain: us.wifiapi.micloud.xiaomi.net
49 DEBUG [120897963] dns: lookup domain us.wifiapi.micloud.xiaomi.net
49 INFO [120897963] dns: lookup succeed for us.wifiapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
49 DEBUG [120897963] dns: resolved [47.241.65.164 8.214.46.209]
49 DEBUG [120897963] router: match[0] geosite=cn geoip=cn => block
49 INFO [120897963] outbound/block[block]: blocked connection to us.wifiapi.micloud.xiaomi.net:443
49 INFO [2697159255] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.phonecallapi.micloud.xiaomi.net:443
49 DEBUG [2697159255] router: sniffed protocol: tls, domain: us.phonecallapi.micloud.xiaomi.net
49 DEBUG [2697159255] dns: lookup domain us.phonecallapi.micloud.xiaomi.net
49 INFO [2697159255] dns: lookup succeed for us.phonecallapi.micloud.xiaomi.net: 8.214.46.209 47.241.65.164
49 DEBUG [2697159255] dns: resolved [8.214.46.209 47.241.65.164]
49 DEBUG [2697159255] router: match[0] geosite=cn geoip=cn => block
49 INFO [2697159255] outbound/block[block]: blocked connection to us.phonecallapi.micloud.xiaomi.net:443
51 INFO [2547759159] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
51 DEBUG [2547759159] router: match[6] network=tcp => TrafficTCP
51 INFO [2547759159] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
52 INFO [2350101358] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
52 DEBUG [2350101358] router: match[6] network=tcp => TrafficTCP
52 INFO [2350101358] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
52 INFO [2997036269] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
52 DEBUG [2997036269] router: sniffed protocol: tls, domain: itop.mgapex.com
52 DEBUG [2997036269] dns: lookup domain itop.mgapex.com
52 INFO [2997036269] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 54.74.13.13 52.212.43.30
52 DEBUG [2997036269] dns: resolved [52.16.17.160 54.74.13.13 52.212.43.30]
52 DEBUG [2997036269] router: match[6] network=tcp => TrafficTCP
52 INFO [2997036269] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
52 INFO [2025924642] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 31.13.95.17:443
52 DEBUG [2025924642] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
52 INFO [2025924642] outbound/direct[direct]: outbound packet connection
52 DEBUG [450568262] dns: exchange gateway.instagram.com A INET
52 DEBUG [450568262] dns: exchange gateway.instagram.com AAAA INET
52 INFO [450568262] dns: exchanged gateway.instagram.com. CNAME msgr-latest.c10r.facebook.com.
52 INFO [450568262] dns: exchanged gateway.instagram.com. AAAA 2a03:2880:f04d:a:face:b00c:0:2825
52 INFO [450568262] dns: exchanged gateway.instagram.com. CNAME msgr-latest.c10r.facebook.com.
52 INFO [450568262] dns: exchanged gateway.instagram.com. A 157.240.208.9
53 INFO [3380018241] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
53 DEBUG [3380018241] router: sniffed packet protocol: quic, domain: gateway.instagram.com
53 DEBUG [3380018241] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
53 INFO [3380018241] outbound/direct[direct]: outbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
53 INFO [3322159041] inbound/trojan[trojan-ws]: [synricha] inbound connection to gateway.instagram.com:443
53 DEBUG [3322159041] router: sniffed protocol: tls, domain: gateway.instagram.com
53 DEBUG [3322159041] dns: lookup domain gateway.instagram.com
53 INFO [3322159041] dns: lookup succeed for gateway.instagram.com: 2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9
53 DEBUG [3322159041] dns: resolved [2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9]
53 DEBUG [3322159041] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
53 INFO [3322159041] outbound/direct[direct]: outbound connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
53 INFO [3322159041] outbound/direct[direct]: outbound connection to 157.240.208.9:443
54 DEBUG [450568262] dns: exchange lobby.mgapex.com A INET
54 DEBUG [450568262] dns: exchange lobby.mgapex.com AAAA INET
54 INFO [450568262] dns: exchanged lobby.mgapex.com. CNAME apex-lobby-outer-static-elb-abca3cfea52eadc1.elb.eu-west-1.amazonaws.com.
54 INFO [450568262] dns: exchanged lobby.mgapex.com. A 3.248.132.123
54 INFO [450568262] dns: exchanged lobby.mgapex.com. A 34.241.171.132
54 INFO [450568262] dns: exchanged lobby.mgapex.com. A 18.202.102.112
54 INFO [450568262] dns: exchanged lobby.mgapex.com. CNAME apex-lobby-outer-static-elb-abca3cfea52eadc1.elb.eu-west-1.amazonaws.com.
54 INFO [1307618407] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
54 DEBUG [1307618407] router: match[6] network=tcp => TrafficTCP
54 INFO [1307618407] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
54 INFO [1699130036] inbound/trojan[trojan-ws]: [synricha] inbound connection to 34.241.171.132:10500
54 DEBUG [1699130036] router: match[6] network=tcp => TrafficTCP
54 INFO [1699130036] outbound/wireguard[wireguard-out]: outbound connection to 34.241.171.132:10500
54 DEBUG [450568262] dns: exchange pay.mgapex.com AAAA INET
54 DEBUG [450568262] dns: exchange pay.mgapex.com A INET
54 INFO [450568262] dns: exchanged pay.mgapex.com. A 54.229.254.151
54 INFO [450568262] dns: exchanged pay.mgapex.com. A 34.240.0.44
54 INFO [450568262] dns: exchanged pay.mgapex.com. A 52.215.4.132
55 INFO [1180777883] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
55 DEBUG [1180777883] router: sniffed protocol: tls, domain: pay.mgapex.com
55 DEBUG [1180777883] dns: lookup domain pay.mgapex.com
55 INFO [1180777883] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
55 DEBUG [1180777883] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
55 DEBUG [1180777883] router: match[6] network=tcp => TrafficTCP
55 INFO [1180777883] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
55 INFO [322131317] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
55 DEBUG [322131317] router: sniffed protocol: tls, domain: pay.mgapex.com
55 DEBUG [322131317] dns: lookup domain pay.mgapex.com
55 INFO [322131317] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
55 DEBUG [322131317] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
55 DEBUG [322131317] router: match[6] network=tcp => TrafficTCP
55 INFO [322131317] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
55 INFO [122663435] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
55 DEBUG [122663435] router: sniffed protocol: tls, domain: pay.mgapex.com
55 DEBUG [122663435] dns: lookup domain pay.mgapex.com
55 INFO [122663435] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
55 DEBUG [122663435] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
55 DEBUG [122663435] router: match[6] network=tcp => TrafficTCP
55 INFO [122663435] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
55 INFO [1071226896] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
55 DEBUG [1071226896] router: sniffed protocol: tls, domain: pay.mgapex.com
55 DEBUG [1071226896] dns: lookup domain pay.mgapex.com
55 INFO [1071226896] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
55 DEBUG [1071226896] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
55 DEBUG [1071226896] router: match[6] network=tcp => TrafficTCP
55 INFO [1071226896] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
56 DEBUG [450568262] dns: exchange tab-mobile-cache-ireland.mgapex.com A INET
56 DEBUG [450568262] dns: exchange tab-mobile-cache-ireland.mgapex.com AAAA INET
56 INFO [450568262] dns: exchanged tab-mobile-cache-ireland.mgapex.com. A 54.154.190.40
56 INFO [450568262] dns: exchanged tab-mobile-cache-ireland.mgapex.com. A 99.80.212.168
56 INFO [450568262] dns: exchanged tab-mobile-cache-ireland.mgapex.com. A 54.72.75.241
56 INFO [4241362924] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
56 DEBUG [4241362924] router: match[6] network=tcp => TrafficTCP
56 INFO [4241362924] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
56 DEBUG [450568262] dns: exchange irl.voice.mgapex.com A INET
56 DEBUG [450568262] dns: exchange irl.voice.mgapex.com AAAA INET
56 INFO [450568262] dns: exchanged irl.voice.mgapex.com. A 54.195.50.52
56 INFO [450568262] dns: exchanged irl.voice.mgapex.com. A 54.195.135.30
56 INFO [2913463409] inbound/trojan[trojan-ws]: [synricha] inbound connection to tab-mobile-cache-ireland.mgapex.com:443
56 DEBUG [2913463409] router: sniffed protocol: tls, domain: tab-mobile-cache-ireland.mgapex.com
56 DEBUG [2913463409] dns: lookup domain tab-mobile-cache-ireland.mgapex.com
56 INFO [2913463409] dns: lookup succeed for tab-mobile-cache-ireland.mgapex.com: 54.154.190.40 99.80.212.168 54.72.75.241
56 DEBUG [2913463409] dns: resolved [54.154.190.40 99.80.212.168 54.72.75.241]
56 DEBUG [2913463409] router: match[6] network=tcp => TrafficTCP
56 INFO [2913463409] outbound/wireguard[wireguard-out]: outbound connection to 54.154.190.40:443
56 INFO [3646007772] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.195.50.52:8700
56 DEBUG [3646007772] router: match[6] network=tcp => TrafficTCP
56 INFO [3646007772] outbound/wireguard[wireguard-out]: outbound packet connection to 54.195.50.52:8700
56 DEBUG [450568262] dns: exchange pandora.mgapex.com A INET
56 DEBUG [450568262] dns: exchange pandora.mgapex.com AAAA INET
56 INFO [53893883] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
56 DEBUG [53893883] router: sniffed protocol: tls, domain: tdm.mgapex.com
56 DEBUG [53893883] dns: lookup domain tdm.mgapex.com
56 INFO [53893883] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
56 DEBUG [53893883] dns: resolved [34.248.0.30 52.214.175.246]
56 DEBUG [53893883] router: match[6] network=tcp => TrafficTCP
56 INFO [53893883] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
56 INFO [450568262] dns: exchanged pandora.mgapex.com. A 34.242.254.197
56 INFO [450568262] dns: exchanged pandora.mgapex.com. A 34.246.221.231
56 INFO [450568262] dns: exchanged pandora.mgapex.com. A 63.34.50.90
56 DEBUG [450568262] dns: exchange play-fe.googleapis.com AAAA INET
56 DEBUG [450568262] dns: exchange play-fe.googleapis.com A INET
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.100
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.101
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.139
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.138
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.102
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. A 142.251.12.113
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::71
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::64
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::65
56 INFO [450568262] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::66
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.66s)
0 INFO [4162064089] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 15.229.38.101:11001
0 DEBUG [4162064089] router: match[6] network=tcp => TrafficTCP
0 INFO [4162064089] outbound/wireguard[wireguard-out]: outbound packet connection to 15.229.38.101:11001
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [2693911151] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.195.50.52:8700
0 DEBUG [2693911151] router: match[6] network=tcp => TrafficTCP
0 INFO [2693911151] outbound/wireguard[wireguard-out]: outbound packet connection to 54.195.50.52:8700
0 INFO [76094753] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
0 INFO [753790479] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [753790479] router: match[6] network=tcp => TrafficTCP
0 INFO [753790479] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1885800684] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
0 DEBUG [1885800684] router: sniffed protocol: tls, domain: pay.mgapex.com
0 DEBUG [1885800684] dns: lookup domain pay.mgapex.com
0 INFO [1885800684] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [1885800684] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [1885800684] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 52.215.4.132 34.240.0.44
0 DEBUG [1885800684] dns: resolved [54.229.254.151 52.215.4.132 34.240.0.44]
0 DEBUG [1885800684] router: match[6] network=tcp => TrafficTCP
0 INFO [1885800684] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
0 DEBUG [76094753] router: match[6] network=tcp => TrafficTCP
0 INFO [76094753] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
0 INFO [17140992] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [17140992] router: sniffed packet protocol: dns
0 DEBUG [17140992] router: match[1] protocol=dns => dns-out
0 DEBUG [17140992] dns: exchange ae855230a232e5886.awsglobalaccelerator.com A INET
0 DEBUG [17140992] dns: exchange ire.csoversea.mgapex.com A INET
0 DEBUG [17140992] dns: exchange play-fe.googleapis.com AAAA INET
0 DEBUG [17140992] dns: exchange ae855230a232e5886.awsglobalaccelerator.com AAAA INET
0 DEBUG [17140992] dns: exchange ae855230a232e5886.awsglobalaccelerator.com A INET
0 DEBUG [17140992] dns: exchange alt3-mtalk.google.com AAAA INET
0 DEBUG [17140992] dns: exchange alt3-mtalk.google.com A INET
0 DEBUG [17140992] dns: exchange ire.csoversea.mgapex.com A INET
0 DEBUG [17140992] dns: exchange play-fe.googleapis.com AAAA INET
0 DEBUG [17140992] dns: exchange ae855230a232e5886.awsglobalaccelerator.com AAAA INET
0 INFO [2919075581] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
0 DEBUG [2919075581] router: match[6] network=tcp => TrafficTCP
0 INFO [2919075581] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.30.46.212
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.228.152.110
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.170.154.227
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.155.96.104
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 34.249.117.46
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.17.172.86
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.74.92.238
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 46.51.203.157
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 46.137.7.65
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.209.209.211
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.72.161.217
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 34.246.241.68
0 INFO [17140992] dns: exchanged ae855230a232e5886.awsglobalaccelerator.com. A 15.197.189.253
0 INFO [17140992] dns: exchanged ae855230a232e5886.awsglobalaccelerator.com. A 3.33.169.224
0 INFO [17140992] dns: exchanged alt3-mtalk.google.com. CNAME alt3.mobile-gtalk.l.google.com.
0 INFO [17140992] dns: exchanged alt3-mtalk.google.com. AAAA 2607:f8b0:4023:1004::bc
0 INFO [17140992] dns: exchanged ae855230a232e5886.awsglobalaccelerator.com. A 3.33.169.224
0 INFO [17140992] dns: exchanged ae855230a232e5886.awsglobalaccelerator.com. A 15.197.189.253
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::8a
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::66
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::64
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::71
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::71
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::64
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::65
0 INFO [17140992] dns: exchanged play-fe.googleapis.com. AAAA 2404:6800:4003:c11::66
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.155.96.104
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.72.161.217
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.30.46.212
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.170.154.227
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.17.172.86
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.74.92.238
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 54.228.152.110
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 46.137.7.65
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 52.209.209.211
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 34.249.117.46
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 46.51.203.157
0 INFO [17140992] dns: exchanged ire.csoversea.mgapex.com. A 34.246.241.68
0 INFO [17140992] dns: exchanged alt3-mtalk.google.com. CNAME alt3.mobile-gtalk.l.google.com.
0 INFO [17140992] dns: exchanged alt3-mtalk.google.com. A 142.250.115.188
1 DEBUG [17140992] dns: exchange adce8f4a746bc5bf3.awsglobalaccelerator.com AAAA INET
1 DEBUG [17140992] dns: exchange adce8f4a746bc5bf3.awsglobalaccelerator.com A INET
1 INFO [17140992] dns: exchanged adce8f4a746bc5bf3.awsglobalaccelerator.com. A 15.197.181.215
1 INFO [17140992] dns: exchanged adce8f4a746bc5bf3.awsglobalaccelerator.com. A 3.33.231.73
1 DEBUG [17140992] dns: exchange a2e7bccd5336d451e.awsglobalaccelerator.com AAAA INET
1 DEBUG [17140992] dns: exchange a2e7bccd5336d451e.awsglobalaccelerator.com A INET
1 INFO [1225718075] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.209.209.211:443
1 DEBUG [1225718075] router: match[6] network=tcp => TrafficTCP
1 INFO [1225718075] outbound/wireguard[wireguard-out]: outbound connection to 52.209.209.211:443
1 INFO [17140992] dns: exchanged a2e7bccd5336d451e.awsglobalaccelerator.com. A 3.33.231.192
1 INFO [17140992] dns: exchanged a2e7bccd5336d451e.awsglobalaccelerator.com. A 15.197.236.19
1 INFO [2832334714] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
1 DEBUG [17140992] dns: exchange a81652c6592a95cd8.awsglobalaccelerator.com A INET
1 DEBUG [17140992] dns: exchange a81652c6592a95cd8.awsglobalaccelerator.com AAAA INET
1 INFO [17140992] dns: exchanged a81652c6592a95cd8.awsglobalaccelerator.com. A 3.33.155.108
1 INFO [17140992] dns: exchanged a81652c6592a95cd8.awsglobalaccelerator.com. A 15.197.130.1
1 DEBUG [17140992] dns: exchange a3457c3ce947a11f6.awsglobalaccelerator.com AAAA INET
1 DEBUG [17140992] dns: exchange a3457c3ce947a11f6.awsglobalaccelerator.com A INET
1 INFO [17140992] dns: exchanged a3457c3ce947a11f6.awsglobalaccelerator.com. A 3.33.141.117
1 INFO [17140992] dns: exchanged a3457c3ce947a11f6.awsglobalaccelerator.com. A 15.197.152.219
1 DEBUG [2832334714] router: match[6] network=tcp => TrafficTCP
1 INFO [2832334714] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
1 DEBUG [17140992] dns: exchange a9c9c20ec0d75d5e7.awsglobalaccelerator.com A INET
1 DEBUG [17140992] dns: exchange a9c9c20ec0d75d5e7.awsglobalaccelerator.com AAAA INET
1 INFO [17140992] dns: exchanged a9c9c20ec0d75d5e7.awsglobalaccelerator.com. A 15.197.205.20
1 INFO [17140992] dns: exchanged a9c9c20ec0d75d5e7.awsglobalaccelerator.com. A 3.33.254.248
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.66s)
0 INFO [1526210626] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
0 DEBUG [1526210626] router: sniffed protocol: tls, domain: pay.mgapex.com
0 DEBUG [1526210626] dns: lookup domain pay.mgapex.com
0 INFO [1526210626] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [1526210626] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [168086377] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [168086377] router: sniffed packet protocol: dns
0 DEBUG [168086377] router: match[1] protocol=dns => dns-out
0 DEBUG [168086377] dns: exchange a9c9c20ec0d75d5e7.awsglobalaccelerator.com AAAA INET
0 INFO [168086377] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [1526210626] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
0 DEBUG [1526210626] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
0 DEBUG [1526210626] router: match[6] network=tcp => TrafficTCP
0 INFO [1526210626] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [3033635857] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.31.59.205:20000
0 DEBUG [3033635857] router: match[6] network=tcp => TrafficTCP
0 INFO [3033635857] outbound/wireguard[wireguard-out]: outbound connection to 52.31.59.205:20000
0 DEBUG [168086377] dns: exchange a6dde91be58423dbe.awsglobalaccelerator.com AAAA INET
0 DEBUG [168086377] dns: exchange a6dde91be58423dbe.awsglobalaccelerator.com A INET
0 INFO [168086377] dns: exchanged a6dde91be58423dbe.awsglobalaccelerator.com. A 75.2.14.77
0 INFO [168086377] dns: exchanged a6dde91be58423dbe.awsglobalaccelerator.com. A 99.83.180.119
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [1388549231] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
0 DEBUG [1388549231] router: sniffed protocol: tls, domain: itop.mgapex.com
0 DEBUG [1388549231] dns: lookup domain itop.mgapex.com
0 DEBUG [168086377] dns: exchange aa77c31adf765ff39.awsglobalaccelerator.com AAAA INET
0 DEBUG [168086377] dns: exchange aa77c31adf765ff39.awsglobalaccelerator.com A INET
0 INFO [1388549231] dns: lookup succeed for itop.mgapex.com: 52.212.43.30 54.74.13.13 52.16.17.160
0 DEBUG [1388549231] dns: resolved [52.212.43.30 54.74.13.13 52.16.17.160]
0 DEBUG [1388549231] router: match[6] network=tcp => TrafficTCP
0 INFO [1388549231] outbound/wireguard[wireguard-out]: outbound connection to 52.212.43.30:443
0 INFO [168086377] dns: exchanged aa77c31adf765ff39.awsglobalaccelerator.com. A 15.197.251.174
0 INFO [168086377] dns: exchanged aa77c31adf765ff39.awsglobalaccelerator.com. A 3.33.213.66
0 INFO [2754221660] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
0 DEBUG [2754221660] router: match[6] network=tcp => TrafficTCP
0 INFO [2754221660] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
0 DEBUG [168086377] dns: exchange aed1dffdd9658b955.awsglobalaccelerator.com A INET
0 DEBUG [168086377] dns: exchange aed1dffdd9658b955.awsglobalaccelerator.com AAAA INET
0 INFO [4060762616] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
0 DEBUG [4060762616] router: sniffed protocol: tls, domain: itop.mgapex.com
0 DEBUG [4060762616] dns: lookup domain itop.mgapex.com
0 INFO [4060762616] dns: lookup succeed for itop.mgapex.com: 52.212.43.30 54.74.13.13 52.16.17.160
0 DEBUG [4060762616] dns: resolved [52.212.43.30 54.74.13.13 52.16.17.160]
0 DEBUG [4060762616] router: match[6] network=tcp => TrafficTCP
0 INFO [4060762616] outbound/wireguard[wireguard-out]: outbound connection to 52.212.43.30:443
0 INFO [168086377] dns: exchanged aed1dffdd9658b955.awsglobalaccelerator.com. A 52.223.12.90
0 INFO [168086377] dns: exchanged aed1dffdd9658b955.awsglobalaccelerator.com. A 35.71.134.58
0 DEBUG [168086377] dns: exchange a4ba323ea16b08dc5.awsglobalaccelerator.com AAAA INET
0 DEBUG [168086377] dns: exchange a4ba323ea16b08dc5.awsglobalaccelerator.com A INET
0 INFO [168086377] dns: exchanged a4ba323ea16b08dc5.awsglobalaccelerator.com. A 99.83.245.184
0 INFO [168086377] dns: exchanged a4ba323ea16b08dc5.awsglobalaccelerator.com. A 75.2.112.126
1 INFO [2716056087] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
1 DEBUG [2716056087] router: match[6] network=tcp => TrafficTCP
1 INFO [2716056087] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
1 DEBUG [168086377] dns: exchange e13.whatsapp.net A INET
1 DEBUG [168086377] dns: exchange e13.whatsapp.net AAAA INET
1 DEBUG [168086377] dns: exchange a3529f85f06e78624.awsglobalaccelerator.com A INET
1 DEBUG [168086377] dns: exchange a3529f85f06e78624.awsglobalaccelerator.com AAAA INET
1 INFO [168086377] dns: exchanged e13.whatsapp.net. A 15.197.210.208
1 INFO [168086377] dns: exchanged e13.whatsapp.net. A 3.33.252.61
1 INFO [168086377] dns: exchanged e13.whatsapp.net. A 3.33.221.48
1 INFO [168086377] dns: exchanged e13.whatsapp.net. A 15.197.206.217
1 INFO [168086377] dns: exchanged a3529f85f06e78624.awsglobalaccelerator.com. A 99.83.220.136
1 INFO [168086377] dns: exchanged a3529f85f06e78624.awsglobalaccelerator.com. A 75.2.91.114
1 DEBUG [168086377] dns: exchange a96243ab9ab3ac94c.awsglobalaccelerator.com A INET
1 DEBUG [168086377] dns: exchange a96243ab9ab3ac94c.awsglobalaccelerator.com AAAA INET
1 INFO [168086377] dns: exchanged a96243ab9ab3ac94c.awsglobalaccelerator.com. A 3.33.184.58
1 INFO [168086377] dns: exchanged a96243ab9ab3ac94c.awsglobalaccelerator.com. A 15.197.161.119
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.77s)
0 INFO [233371283] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [233371283] router: sniffed packet protocol: dns
0 DEBUG [233371283] router: match[1] protocol=dns => dns-out
0 DEBUG [233371283] dns: exchange a96243ab9ab3ac94c.awsglobalaccelerator.com A INET
0 INFO [233371283] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [233371283] dns: exchanged a96243ab9ab3ac94c.awsglobalaccelerator.com. A 15.197.161.119
0 INFO [233371283] dns: exchanged a96243ab9ab3ac94c.awsglobalaccelerator.com. A 3.33.184.58
0 DEBUG [233371283] dns: exchange e14.whatsapp.net AAAA INET
0 DEBUG [233371283] dns: exchange e14.whatsapp.net A INET
0 INFO [233371283] dns: exchanged e14.whatsapp.net. A 3.33.252.61
0 INFO [233371283] dns: exchanged e14.whatsapp.net. A 15.197.206.217
0 INFO [233371283] dns: exchanged e14.whatsapp.net. A 3.33.221.48
0 INFO [233371283] dns: exchanged e14.whatsapp.net. A 15.197.210.208
0 DEBUG [233371283] dns: exchange ab41005e088133a63.awsglobalaccelerator.com A INET
0 DEBUG [233371283] dns: exchange ab41005e088133a63.awsglobalaccelerator.com AAAA INET
0 INFO [233371283] dns: exchanged ab41005e088133a63.awsglobalaccelerator.com. A 13.248.181.217
0 INFO [233371283] dns: exchanged ab41005e088133a63.awsglobalaccelerator.com. A 76.223.55.175
0 INFO [263906977] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [263906977] router: match[6] network=tcp => TrafficTCP
0 INFO [263906977] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 DEBUG [233371283] dns: exchange a7cddc2c0b6ef0f03.awsglobalaccelerator.com AAAA INET
0 DEBUG [233371283] dns: exchange a7cddc2c0b6ef0f03.awsglobalaccelerator.com A INET
0 INFO [233371283] dns: exchanged a7cddc2c0b6ef0f03.awsglobalaccelerator.com. A 75.2.103.140
0 INFO [233371283] dns: exchanged a7cddc2c0b6ef0f03.awsglobalaccelerator.com. A 99.83.197.239
0 INFO [249849679] inbound/trojan[trojan-ws]: [synricha] inbound connection to c.whatsapp.net:80
0 DEBUG [249849679] router: sniffed protocol: http, domain: c.whatsapp.net
0 DEBUG [249849679] dns: lookup domain c.whatsapp.net
0 INFO [249849679] dns: lookup succeed for c.whatsapp.net: 3.33.252.61 15.197.206.217 15.197.210.208 3.33.221.48
0 DEBUG [249849679] dns: resolved [3.33.252.61 15.197.206.217 15.197.210.208 3.33.221.48]
0 DEBUG [249849679] router: match[6] network=tcp => TrafficTCP
0 INFO [249849679] outbound/wireguard[wireguard-out]: outbound connection to 3.33.252.61:80
0 DEBUG [233371283] dns: exchange a02c4b035e315c055.awsglobalaccelerator.com A INET
0 DEBUG [233371283] dns: exchange a02c4b035e315c055.awsglobalaccelerator.com AAAA INET
0 INFO [233371283] dns: exchanged a02c4b035e315c055.awsglobalaccelerator.com. A 13.248.164.133
0 INFO [233371283] dns: exchanged a02c4b035e315c055.awsglobalaccelerator.com. A 76.223.52.125
0 DEBUG [233371283] dns: exchange a81fec0590899a37a.awsglobalaccelerator.com AAAA INET
0 DEBUG [233371283] dns: exchange a81fec0590899a37a.awsglobalaccelerator.com A INET
0 INFO [2554059765] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:5222
0 DEBUG [2554059765] router: match[6] network=tcp => TrafficTCP
0 INFO [2554059765] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:5222
0 INFO [233371283] dns: exchanged a81fec0590899a37a.awsglobalaccelerator.com. A 75.2.72.215
0 INFO [233371283] dns: exchanged a81fec0590899a37a.awsglobalaccelerator.com. A 99.83.153.121
0 DEBUG [233371283] dns: exchange a599e66c3a97e68c2.awsglobalaccelerator.com A INET
0 DEBUG [233371283] dns: exchange a599e66c3a97e68c2.awsglobalaccelerator.com AAAA INET
1 INFO [233371283] dns: exchanged a599e66c3a97e68c2.awsglobalaccelerator.com. A 15.197.222.39
1 INFO [233371283] dns: exchanged a599e66c3a97e68c2.awsglobalaccelerator.com. A 3.33.214.207
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [1138899377] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
0 DEBUG [1138899377] router: sniffed protocol: tls, domain: pay.mgapex.com
0 DEBUG [1138899377] dns: lookup domain pay.mgapex.com
0 INFO [1138899377] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [1138899377] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3742944064] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [3742944064] router: match[6] network=tcp => TrafficTCP
0 INFO [3742944064] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [1138899377] dns: lookup succeed for pay.mgapex.com: 34.240.0.44 52.215.4.132 54.229.254.151
0 DEBUG [1138899377] dns: resolved [34.240.0.44 52.215.4.132 54.229.254.151]
0 DEBUG [1138899377] router: match[6] network=tcp => TrafficTCP
0 INFO [1138899377] outbound/wireguard[wireguard-out]: outbound connection to 34.240.0.44:443
0 INFO [1250316036] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
0 DEBUG [1250316036] router: sniffed protocol: tls, domain: tdm.mgapex.com
0 DEBUG [1250316036] dns: lookup domain tdm.mgapex.com
0 INFO [95003180] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [95003180] router: sniffed packet protocol: dns
0 DEBUG [95003180] router: match[1] protocol=dns => dns-out
0 DEBUG [95003180] dns: exchange a599e66c3a97e68c2.awsglobalaccelerator.com A INET
0 INFO [2101078171] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [2101078171] router: match[6] network=tcp => TrafficTCP
0 INFO [2101078171] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [95003180] dns: exchanged a599e66c3a97e68c2.awsglobalaccelerator.com. A 15.197.222.39
0 INFO [95003180] dns: exchanged a599e66c3a97e68c2.awsglobalaccelerator.com. A 3.33.214.207
0 INFO [1250316036] dns: lookup succeed for tdm.mgapex.com: 52.214.175.246 34.248.0.30
0 DEBUG [1250316036] dns: resolved [52.214.175.246 34.248.0.30]
0 DEBUG [1250316036] router: match[6] network=tcp => TrafficTCP
0 INFO [1250316036] outbound/wireguard[wireguard-out]: outbound connection to 52.214.175.246:8013
0 INFO [1336798100] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
0 DEBUG [1336798100] router: sniffed protocol: tls, domain: pay.mgapex.com
0 DEBUG [1336798100] dns: lookup domain pay.mgapex.com
0 INFO [1336798100] dns: lookup succeed for pay.mgapex.com: 34.240.0.44 52.215.4.132 54.229.254.151
0 DEBUG [1336798100] dns: resolved [34.240.0.44 52.215.4.132 54.229.254.151]
0 DEBUG [1336798100] router: match[6] network=tcp => TrafficTCP
0 INFO [1336798100] outbound/wireguard[wireguard-out]: outbound connection to 34.240.0.44:443
0 INFO [538864618] inbound/trojan[trojan-ws]: [synricha] inbound connection to c.whatsapp.net:80
0 DEBUG [538864618] router: sniffed protocol: http, domain: c.whatsapp.net
0 DEBUG [538864618] dns: lookup domain c.whatsapp.net
0 INFO [538864618] dns: lookup succeed for c.whatsapp.net: 15.197.210.208 15.197.206.217 3.33.221.48 3.33.252.61
0 DEBUG [538864618] dns: resolved [15.197.210.208 15.197.206.217 3.33.221.48 3.33.252.61]
0 DEBUG [538864618] router: match[6] network=tcp => TrafficTCP
0 INFO [538864618] outbound/wireguard[wireguard-out]: outbound connection to 15.197.210.208:80
0 DEBUG [95003180] dns: exchange aa812fc71bfcb6f1c.awsglobalaccelerator.com A INET
0 DEBUG [95003180] dns: exchange aa812fc71bfcb6f1c.awsglobalaccelerator.com AAAA INET
0 INFO [95003180] dns: exchanged aa812fc71bfcb6f1c.awsglobalaccelerator.com. A 13.248.200.54
0 INFO [95003180] dns: exchanged aa812fc71bfcb6f1c.awsglobalaccelerator.com. A 76.223.74.41
0 INFO [3082260363] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.17.172.86:443
0 DEBUG [3082260363] router: match[6] network=tcp => TrafficTCP
0 INFO [3082260363] outbound/wireguard[wireguard-out]: outbound connection to 52.17.172.86:443
1 INFO [3253306154] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
1 DEBUG [3253306154] router: match[6] network=tcp => TrafficTCP
1 INFO [3253306154] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
1 DEBUG [95003180] dns: exchange android.clients.google.com AAAA INET
1 DEBUG [95003180] dns: exchange android.clients.google.com A INET
1 INFO [95003180] dns: exchanged android.clients.google.com. CNAME android.l.google.com.
1 INFO [95003180] dns: exchanged android.clients.google.com. CNAME android.l.google.com.
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.113
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.139
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.101
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.100
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.138
1 INFO [95003180] dns: exchanged android.clients.google.com. A 142.250.4.102
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.200.100
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.200.101
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.200.138
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.200.139
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.200.113
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.68.101
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.68.100
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.68.113
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.68.138
1 INFO [95003180] dns: exchanged android.clients.google.com. A 74.125.68.102
1 DEBUG [95003180] dns: exchange www.googleapis.com A INET
1 DEBUG [95003180] dns: exchange www.googleapis.com AAAA INET
1 INFO [95003180] dns: exchanged www.googleapis.com. A 74.125.24.95
1 INFO [95003180] dns: exchanged www.googleapis.com. A 142.251.10.95
1 INFO [95003180] dns: exchanged www.googleapis.com. A 142.251.12.95
1 INFO [95003180] dns: exchanged www.googleapis.com. A 172.217.194.95
1 INFO [95003180] dns: exchanged www.googleapis.com. A 142.250.4.95
1 INFO [95003180] dns: exchanged www.googleapis.com. A 74.125.200.95
1 INFO [95003180] dns: exchanged www.googleapis.com. AAAA 2404:6800:4003:c0f::5f
1 INFO [95003180] dns: exchanged www.googleapis.com. AAAA 2404:6800:4003:c11::5f
1 INFO [95003180] dns: exchanged www.googleapis.com. AAAA 2404:6800:4003:c04::5f
1 INFO [95003180] dns: exchanged www.googleapis.com. AAAA 2404:6800:4003:c06::5f
1 INFO [779466496] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
1 DEBUG [779466496] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
1 DEBUG [779466496] dns: lookup domain mqtt-mini.facebook.com
1 INFO [779466496] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.15.34
1 DEBUG [779466496] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.15.34]
1 DEBUG [779466496] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
1 INFO [779466496] outbound/direct[direct]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
1 INFO [779466496] outbound/direct[direct]: outbound connection to 157.240.15.34:443
1 DEBUG [95003180] dns: exchange people-pa.googleapis.com A INET
1 DEBUG [95003180] dns: exchange people-pa.googleapis.com AAAA INET
2 DEBUG [95003180] dns: exchange us.noteapi.micloud.xiaomi.net A INET
2 DEBUG [95003180] dns: exchange us.noteapi.micloud.xiaomi.net AAAA INET
2 INFO [95003180] dns: exchanged people-pa.googleapis.com. A 172.217.194.95
2 INFO [95003180] dns: exchanged people-pa.googleapis.com. AAAA 2404:6800:4003:c03::5f
2 INFO [95003180] dns: exchanged us.noteapi.micloud.xiaomi.net. A 47.241.65.164
2 INFO [95003180] dns: exchanged us.noteapi.micloud.xiaomi.net. A 8.214.46.209
2 INFO [3292415467] inbound/trojan[trojan-ws]: [synricha] inbound connection to userlocation.googleapis.com:443
2 DEBUG [3292415467] router: sniffed protocol: tls, domain: userlocation.googleapis.com
2 DEBUG [3292415467] dns: lookup domain userlocation.googleapis.com
2 INFO [3292415467] dns: lookup succeed for userlocation.googleapis.com: 2404:6800:4003:c04::5f 142.251.12.95
2 DEBUG [3292415467] dns: resolved [2404:6800:4003:c04::5f 142.251.12.95]
2 DEBUG [3292415467] router: match[6] network=tcp => TrafficTCP
2 INFO [3292415467] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c04::5f]:443
2 INFO [4173124888] inbound/trojan[trojan-ws]: [synricha] inbound connection to android.clients.google.com:443
2 DEBUG [4173124888] router: sniffed protocol: tls, domain: android.clients.google.com
2 DEBUG [4173124888] dns: lookup domain android.clients.google.com
2 INFO [4173124888] dns: lookup succeed for android.clients.google.com: 142.250.4.113 142.250.4.139 142.250.4.101 142.250.4.100 142.250.4.138 142.250.4.102 74.125.200.100 74.125.200.101 74.125.200.138 74.125.200.139 74.125.200.113 74.125.68.101 74.125.68.100 74.125.68.113 74.125.68.138 74.125.68.102
2 DEBUG [4173124888] dns: resolved [142.250.4.113 142.250.4.139 142.250.4.101 142.250.4.100 142.250.4.138 142.250.4.102 74.125.200.100 74.125.200.101 74.125.200.138 74.125.200.139 74.125.200.113 74.125.68.101 74.125.68.100 74.125.68.113 74.125.68.138 74.125.68.102]
2 DEBUG [4173124888] router: match[6] network=tcp => TrafficTCP
2 INFO [4173124888] outbound/wireguard[wireguard-out]: outbound connection to 142.250.4.113:443
2 INFO [3601531032] inbound/trojan[trojan-ws]: [synricha] inbound connection to www.googleapis.com:443
2 DEBUG [3601531032] router: sniffed protocol: tls, domain: www.googleapis.com
2 DEBUG [3601531032] dns: lookup domain www.googleapis.com
2 INFO [3601531032] dns: lookup succeed for www.googleapis.com: 2404:6800:4003:c0f::5f 2404:6800:4003:c11::5f 2404:6800:4003:c04::5f 2404:6800:4003:c06::5f 74.125.24.95 142.251.10.95 142.251.12.95 172.217.194.95 142.250.4.95 74.125.200.95
2 DEBUG [3601531032] dns: resolved [2404:6800:4003:c0f::5f 2404:6800:4003:c11::5f 2404:6800:4003:c04::5f 2404:6800:4003:c06::5f 74.125.24.95 142.251.10.95 142.251.12.95 172.217.194.95 142.250.4.95 74.125.200.95]
2 DEBUG [3601531032] router: match[6] network=tcp => TrafficTCP
2 INFO [3601531032] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c0f::5f]:443
2 INFO [4135155977] inbound/trojan[trojan-ws]: [synricha] inbound connection to people-pa.googleapis.com:443
2 DEBUG [4135155977] router: sniffed protocol: tls, domain: people-pa.googleapis.com
2 DEBUG [4135155977] dns: lookup domain people-pa.googleapis.com
2 INFO [4135155977] dns: lookup succeed for people-pa.googleapis.com: 2404:6800:4003:c03::5f 172.217.194.95
2 DEBUG [4135155977] dns: resolved [2404:6800:4003:c03::5f 172.217.194.95]
2 DEBUG [4135155977] router: match[6] network=tcp => TrafficTCP
2 INFO [4135155977] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c03::5f]:443
2 INFO [2606281788] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.noteapi.micloud.xiaomi.net:443
2 DEBUG [2606281788] router: sniffed protocol: tls, domain: us.noteapi.micloud.xiaomi.net
2 DEBUG [2606281788] dns: lookup domain us.noteapi.micloud.xiaomi.net
2 INFO [2606281788] dns: lookup succeed for us.noteapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
2 DEBUG [2606281788] dns: resolved [47.241.65.164 8.214.46.209]
2 DEBUG [2606281788] router: match[0] geosite=cn geoip=cn => block
2 INFO [2606281788] outbound/block[block]: blocked connection to us.noteapi.micloud.xiaomi.net:443
2 DEBUG [95003180] dns: exchange us.pdc.micloud.xiaomi.net A INET
2 DEBUG [95003180] dns: exchange us.pdc.micloud.xiaomi.net AAAA INET
2 INFO [95003180] dns: exchanged us.pdc.micloud.xiaomi.net. A 8.214.46.209
2 INFO [95003180] dns: exchanged us.pdc.micloud.xiaomi.net. A 47.241.65.164
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [651573651] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8080
0 DEBUG [651573651] router: match[6] network=tcp => TrafficTCP
0 INFO [651573651] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8080
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [557859725] inbound/trojan[trojan-ws]: [synricha] inbound connection to gateway.instagram.com:443
0 DEBUG [557859725] router: sniffed protocol: tls, domain: gateway.instagram.com
0 DEBUG [557859725] dns: lookup domain gateway.instagram.com
0 INFO [557859725] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [557859725] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3484749169] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 DEBUG [3484749169] router: sniffed packet protocol: quic, domain: gateway.instagram.com
0 DEBUG [3484749169] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
0 INFO [3484749169] outbound/direct[direct]: outbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 INFO [3418698393] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.pdc.micloud.xiaomi.net:443
0 DEBUG [3418698393] router: sniffed protocol: tls, domain: us.pdc.micloud.xiaomi.net
0 DEBUG [3418698393] dns: lookup domain us.pdc.micloud.xiaomi.net
0 INFO [3418698393] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3418698393] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [557859725] dns: lookup succeed for gateway.instagram.com: 2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9
0 DEBUG [557859725] dns: resolved [2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9]
0 DEBUG [557859725] router: match[6] network=tcp => TrafficTCP
0 INFO [557859725] outbound/wireguard[wireguard-out]: outbound connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 INFO [3418698393] dns: lookup succeed for us.pdc.micloud.xiaomi.net: 8.214.46.209 47.241.65.164
0 DEBUG [3418698393] dns: resolved [8.214.46.209 47.241.65.164]
0 DEBUG [3418698393] router: match[0] geosite=cn geoip=cn => block
0 INFO [3418698393] outbound/block[block]: blocked connection to 8.8.8.8:443
0 INFO [4203384318] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8080
0 DEBUG [4203384318] router: match[6] network=tcp => TrafficTCP
0 INFO [4203384318] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8080
0 INFO [2643628834] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [2643628834] router: match[6] network=tcp => TrafficTCP
0 INFO [2643628834] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1253744754] inbound/trojan[trojan-ws]: [synricha] inbound connection to graph.facebook.com:443
0 DEBUG [1253744754] router: sniffed protocol: tls, domain: graph.facebook.com
0 DEBUG [1253744754] dns: lookup domain graph.facebook.com
0 INFO [1784589689] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
0 DEBUG [1784589689] router: sniffed protocol: tls, domain: tdm.mgapex.com
0 DEBUG [1784589689] dns: lookup domain tdm.mgapex.com
0 INFO [2899437562] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [2899437562] router: sniffed packet protocol: dns
0 DEBUG [2899437562] router: match[1] protocol=dns => dns-out
0 DEBUG [2899437562] dns: exchange liteapi.ekatox.com A INET
0 DEBUG [2899437562] dns: exchange liteapi.ekatox.com AAAA INET
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 52.66.103.49
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 65.1.42.119
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 3.108.159.100
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 52.66.27.84
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 35.154.25.145
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 13.126.160.107
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 3.6.130.61
0 INFO [2899437562] dns: exchanged liteapi.ekatox.com. A 15.206.129.187
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [2559713095] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8080
0 DEBUG [2559713095] router: match[6] network=tcp => TrafficTCP
0 INFO [2559713095] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8080
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [2360363868] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
0 DEBUG [2360363868] router: sniffed protocol: tls, domain: tdm.mgapex.com
0 DEBUG [2360363868] dns: lookup domain tdm.mgapex.com
0 INFO [2360363868] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [2360363868] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [238807794] inbound/trojan[trojan-ws]: [synricha] inbound connection to gateway.instagram.com:443
0 DEBUG [238807794] router: sniffed protocol: tls, domain: gateway.instagram.com
0 DEBUG [238807794] dns: lookup domain gateway.instagram.com
0 INFO [238807794] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [238807794] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3149850509] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
0 DEBUG [3149850509] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
0 DEBUG [3149850509] dns: lookup domain mqtt-mini.facebook.com
0 INFO [3149850509] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3149850509] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [2233581232] inbound/trojan[trojan-ws]: [synricha] inbound connection to people-pa.googleapis.com:443
0 DEBUG [2233581232] router: sniffed protocol: tls, domain: people-pa.googleapis.com
0 DEBUG [2233581232] dns: lookup domain people-pa.googleapis.com
0 INFO [2233581232] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [2233581232] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [2360363868] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
0 DEBUG [2360363868] dns: resolved [34.248.0.30 52.214.175.246]
0 DEBUG [2360363868] router: match[6] network=tcp => TrafficTCP
0 INFO [2360363868] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:443
0 INFO [3149850509] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.7.32
0 DEBUG [3149850509] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.7.32]
0 DEBUG [3149850509] router: match[6] network=tcp => TrafficTCP
0 INFO [3149850509] outbound/wireguard[wireguard-out]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
0 INFO [2233581232] dns: lookup succeed for people-pa.googleapis.com: 2404:6800:4003:c00::5f 172.217.194.95
0 DEBUG [2233581232] dns: resolved [2404:6800:4003:c00::5f 172.217.194.95]
0 DEBUG [2233581232] router: match[6] network=tcp => TrafficTCP
0 INFO [2233581232] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c00::5f]:443
0 INFO [238807794] dns: lookup succeed for gateway.instagram.com: 2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9
0 DEBUG [238807794] dns: resolved [2a03:2880:f04d:a:face:b00c:0:2825 157.240.208.9]
0 DEBUG [238807794] router: match[6] network=tcp => TrafficTCP
0 INFO [238807794] outbound/wireguard[wireguard-out]: outbound connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [1978436398] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [1978436398] router: match[6] network=tcp => TrafficTCP
0 INFO [1978436398] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1312345525] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 DEBUG [1312345525] router: sniffed packet protocol: quic, domain: gateway.instagram.com
0 DEBUG [1312345525] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
0 INFO [1312345525] outbound/direct[direct]: outbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
0 INFO [1252476676] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [1252476676] router: match[6] network=tcp => TrafficTCP
0 INFO [1252476676] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1783797935] inbound/trojan[trojan-ws]: [synricha] inbound connection to 52.48.13.5:8085
0 DEBUG [1783797935] router: match[6] network=tcp => TrafficTCP
0 INFO [1783797935] outbound/wireguard[wireguard-out]: outbound connection to 52.48.13.5:8085
1 INFO [1226034579] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.75.232.75:50000
1 DEBUG [1226034579] router: match[6] network=tcp => TrafficTCP
1 INFO [1226034579] outbound/wireguard[wireguard-out]: outbound connection to 54.75.232.75:50000
2 INFO [1980721393] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
2 DEBUG [1980721393] router: match[6] network=tcp => TrafficTCP
2 INFO [1980721393] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
2 INFO [1059999886] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.75.232.75:50000
2 DEBUG [1059999886] router: match[6] network=tcp => TrafficTCP
2 INFO [1059999886] outbound/wireguard[wireguard-out]: outbound connection to 54.75.232.75:50000
2 INFO [3887508458] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.75.232.75:20000
2 DEBUG [3887508458] router: match[6] network=tcp => TrafficTCP
2 INFO [3887508458] outbound/wireguard[wireguard-out]: outbound connection to 54.75.232.75:20000
3 INFO [1396018691] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
3 DEBUG [1396018691] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
3 INFO [1396018691] outbound/direct[direct]: outbound packet connection
3 INFO [1833132593] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
3 DEBUG [1833132593] router: sniffed packet protocol: dns
3 DEBUG [1833132593] router: match[1] protocol=dns => dns-out
3 DEBUG [1833132593] dns: exchange e3.whatsapp.net A INET
3 DEBUG [1833132593] dns: exchange e3.whatsapp.net AAAA INET
3 INFO [1833132593] dns: exchanged e3.whatsapp.net. A 3.33.252.61
3 INFO [1833132593] dns: exchanged e3.whatsapp.net. A 15.197.206.217
3 INFO [1833132593] dns: exchanged e3.whatsapp.net. A 3.33.221.48
3 INFO [1833132593] dns: exchanged e3.whatsapp.net. A 15.197.210.208
3 INFO [1527128818] inbound/trojan[trojan-ws]: [synricha] inbound connection to 15.197.210.208:5222
3 DEBUG [1527128818] router: match[6] network=tcp => TrafficTCP
3 INFO [1527128818] outbound/wireguard[wireguard-out]: outbound connection to 15.197.210.208:5222
4 INFO [654905543] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
4 DEBUG [654905543] router: match[6] network=tcp => TrafficTCP
4 INFO [654905543] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
4 INFO [3742827359] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
4 DEBUG [3742827359] router: match[6] network=tcp => TrafficTCP
4 INFO [3742827359] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
4 DEBUG [1833132593] dns: exchange userlocation.googleapis.com AAAA INET
4 DEBUG [1833132593] dns: exchange userlocation.googleapis.com A INET
4 INFO [1833132593] dns: exchanged userlocation.googleapis.com. AAAA 2404:6800:4003:c03::5f
4 INFO [1833132593] dns: exchanged userlocation.googleapis.com. A 142.251.12.95
5 INFO [2136130043] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.75.232.75:20000
5 DEBUG [2136130043] router: match[6] network=tcp => TrafficTCP
5 INFO [2136130043] outbound/wireguard[wireguard-out]: outbound connection to 54.75.232.75:20000
5 INFO [855973783] inbound/trojan[trojan-ws]: [synricha] inbound connection to userlocation.googleapis.com:443
5 DEBUG [855973783] router: sniffed protocol: tls, domain: userlocation.googleapis.com
5 DEBUG [855973783] dns: lookup domain userlocation.googleapis.com
5 INFO [855973783] dns: lookup succeed for userlocation.googleapis.com: 2404:6800:4003:c03::5f 142.251.12.95
5 DEBUG [855973783] dns: resolved [2404:6800:4003:c03::5f 142.251.12.95]
5 DEBUG [855973783] router: match[6] network=tcp => TrafficTCP
5 INFO [855973783] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c03::5f]:443
5 INFO [3209229786] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to [2a03:2880:f04d:a:face:b00c:0:2825]:443
5 DEBUG [3209229786] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
5 INFO [3209229786] outbound/direct[direct]: outbound packet connection
6 INFO [102768048] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
6 DEBUG [102768048] router: match[6] network=tcp => TrafficTCP
6 INFO [102768048] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
8 INFO [1753546373] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
8 DEBUG [1753546373] router: match[6] network=tcp => TrafficTCP
8 INFO [1753546373] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
9 INFO [2945675172] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
9 DEBUG [2945675172] router: match[6] network=tcp => TrafficTCP
9 INFO [2945675172] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
11 INFO [2658920649] inbound/trojan[trojan-ws]: [synricha] inbound connection to cloudctrl.mgapex.com:443
11 DEBUG [2658920649] router: sniffed protocol: tls, domain: cloudctrl.mgapex.com
11 DEBUG [2658920649] dns: lookup domain cloudctrl.mgapex.com
11 INFO [2658920649] dns: lookup succeed for cloudctrl.mgapex.com: 54.77.226.249 63.32.121.85
11 DEBUG [2658920649] dns: resolved [54.77.226.249 63.32.121.85]
11 DEBUG [2658920649] router: match[6] network=tcp => TrafficTCP
11 INFO [2658920649] outbound/wireguard[wireguard-out]: outbound connection to 54.77.226.249:443
11 INFO [1072554658] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
11 DEBUG [1072554658] router: match[6] network=tcp => TrafficTCP
11 INFO [1072554658] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
12 INFO [1087119119] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
12 DEBUG [1087119119] router: sniffed protocol: tls, domain: tdm.mgapex.com
12 DEBUG [1087119119] dns: lookup domain tdm.mgapex.com
12 INFO [1087119119] dns: lookup succeed for tdm.mgapex.com: 34.248.0.30 52.214.175.246
12 DEBUG [1087119119] dns: resolved [34.248.0.30 52.214.175.246]
12 DEBUG [1087119119] router: match[6] network=tcp => TrafficTCP
12 INFO [1087119119] outbound/wireguard[wireguard-out]: outbound connection to 34.248.0.30:8013
13 INFO [212655155] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
13 DEBUG [212655155] router: sniffed packet protocol: dns
13 DEBUG [212655155] router: match[1] protocol=dns => dns-out
13 DEBUG [212655155] dns: exchange accounts.ea.com A INET
13 DEBUG [212655155] dns: exchange accounts.ea.com AAAA INET
13 INFO [212655155] dns: exchanged accounts.ea.com. A 159.153.191.240
13 INFO [163404478] inbound/trojan[trojan-ws]: [synricha] inbound connection to mtalk.google.com:5228
13 DEBUG [163404478] router: sniffed protocol: tls, domain: mtalk.google.com
13 DEBUG [163404478] dns: lookup domain mtalk.google.com
13 INFO [163404478] dns: lookup succeed for mtalk.google.com: 2404:6800:4003:c00::bc 172.217.194.188
13 DEBUG [163404478] dns: resolved [2404:6800:4003:c00::bc 172.217.194.188]
13 DEBUG [163404478] router: match[6] network=tcp => TrafficTCP
13 INFO [163404478] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c00::bc]:5228
13 INFO [2875843967] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
13 DEBUG [2875843967] router: match[6] network=tcp => TrafficTCP
13 INFO [2875843967] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
13 INFO [2556152654] inbound/trojan[trojan-ws]: [synricha] inbound connection to accounts.ea.com:443
13 DEBUG [2556152654] router: sniffed protocol: tls, domain: accounts.ea.com
13 DEBUG [2556152654] dns: lookup domain accounts.ea.com
13 INFO [2556152654] dns: lookup succeed for accounts.ea.com: 159.153.191.240
13 DEBUG [2556152654] dns: resolved [159.153.191.240]
13 DEBUG [2556152654] router: match[6] network=tcp => TrafficTCP
13 INFO [2556152654] outbound/wireguard[wireguard-out]: outbound connection to 159.153.191.240:443
15 DEBUG [212655155] dns: exchange signin.ea.com AAAA INET
15 DEBUG [212655155] dns: exchange signin.ea.com A INET
15 INFO [212655155] dns: exchanged signin.ea.com. A 159.153.191.239
15 INFO [1483564283] inbound/trojan[trojan-ws]: [synricha] inbound connection to signin.ea.com:443
15 DEBUG [1483564283] router: sniffed protocol: tls, domain: signin.ea.com
15 DEBUG [1483564283] dns: lookup domain signin.ea.com
15 INFO [1483564283] dns: lookup succeed for signin.ea.com: 159.153.191.239
15 DEBUG [1483564283] dns: resolved [159.153.191.239]
15 DEBUG [1483564283] router: match[6] network=tcp => TrafficTCP
15 INFO [1483564283] outbound/wireguard[wireguard-out]: outbound connection to 159.153.191.239:443
15 INFO [4242892065] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
15 DEBUG [4242892065] router: match[6] network=tcp => TrafficTCP
15 INFO [4242892065] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
16 DEBUG [212655155] dns: exchange us.pdc.micloud.xiaomi.net AAAA INET
17 INFO [591233005] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.pdc.micloud.xiaomi.net:443
17 DEBUG [591233005] router: sniffed protocol: tls, domain: us.pdc.micloud.xiaomi.net
17 DEBUG [591233005] dns: lookup domain us.pdc.micloud.xiaomi.net
17 INFO [591233005] dns: lookup succeed for us.pdc.micloud.xiaomi.net: 8.214.46.209 47.241.65.164
17 DEBUG [591233005] dns: resolved [8.214.46.209 47.241.65.164]
17 DEBUG [591233005] router: match[0] geosite=cn geoip=cn => block
17 INFO [591233005] outbound/block[block]: blocked connection to us.pdc.micloud.xiaomi.net:443
17 DEBUG [212655155] dns: exchange eaassets-a.akamaihd.net A INET
17 DEBUG [212655155] dns: exchange eaassets-a.akamaihd.net AAAA INET
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. CNAME eaassets-a.akamaihd.net.edgesuite.net.
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. CNAME a743.g.akamai.net.
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. CNAME eaassets-a.akamaihd.net.edgesuite.net.
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. CNAME a743.g.akamai.net.
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. A 119.110.115.73
17 INFO [212655155] dns: exchanged eaassets-a.akamaihd.net. A 119.110.115.74
17 INFO [3473251463] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
17 DEBUG [3473251463] router: match[6] network=tcp => TrafficTCP
17 INFO [3473251463] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
17 INFO [960235942] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
17 DEBUG [960235942] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
17 DEBUG [960235942] dns: lookup domain eaassets-a.akamaihd.net
17 INFO [960235942] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
17 DEBUG [960235942] dns: resolved [119.110.115.73 119.110.115.74]
17 DEBUG [960235942] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
17 INFO [960235942] outbound/direct[direct]: outbound connection to 119.110.115.73:443
17 INFO [1650340148] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
17 DEBUG [1650340148] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
17 DEBUG [1650340148] dns: lookup domain eaassets-a.akamaihd.net
17 INFO [2332983037] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [2332983037] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [2332983037] dns: lookup domain eaassets-a.akamaihd.net
17 INFO [2865655669] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [2865655669] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [2865655669] dns: lookup domain eaassets-a.akamaihd.net
18 INFO [2332983037] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [2332983037] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [2332983037] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [2332983037] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [1650340148] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [1650340148] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [1650340148] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [1650340148] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [2865655669] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [2865655669] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [2865655669] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [2865655669] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [2216193938] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [2216193938] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [2216193938] dns: lookup domain eaassets-a.akamaihd.net
18 INFO [2216193938] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [2216193938] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [2216193938] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [2216193938] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [415014596] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [415014596] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [415014596] dns: lookup domain eaassets-a.akamaihd.net
18 INFO [415014596] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [415014596] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [415014596] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [415014596] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 DEBUG [212655155] dns: exchange client-api.arkoselabs.com A INET
18 DEBUG [212655155] dns: exchange client-api.arkoselabs.com AAAA INET
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. CNAME client-api.arkoselabs.com.cdn.cloudflare.net.
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. A 172.64.145.27
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. A 104.18.42.229
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. CNAME client-api.arkoselabs.com.cdn.cloudflare.net.
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. AAAA 2606:4700:4400::ac40:911b
18 INFO [212655155] dns: exchanged client-api.arkoselabs.com. AAAA 2606:4700:4400::6812:2ae5
18 DEBUG [212655155] dns: exchange pin-river.data.ea.com A INET
18 DEBUG [212655155] dns: exchange pin-river.data.ea.com AAAA INET
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. CNAME lightning-river-prod-pin-1006527635.us-east-1.elb.amazonaws.com.
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 54.157.237.231
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 52.86.235.160
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 3.209.212.164
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 54.85.87.255
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 34.238.147.47
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 35.153.41.78
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 54.161.62.223
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. A 54.80.87.17
18 INFO [212655155] dns: exchanged pin-river.data.ea.com. CNAME lightning-river-prod-pin-1006527635.us-east-1.elb.amazonaws.com.
18 INFO [3856889254] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [3856889254] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [3856889254] dns: lookup domain eaassets-a.akamaihd.net
18 INFO [3856889254] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [3856889254] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [3856889254] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [3856889254] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [2169814669] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
18 DEBUG [2169814669] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
18 DEBUG [2169814669] dns: lookup domain eaassets-a.akamaihd.net
18 INFO [2169814669] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
18 DEBUG [2169814669] dns: resolved [119.110.115.73 119.110.115.74]
18 DEBUG [2169814669] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
18 INFO [2169814669] outbound/direct[direct]: outbound connection to 119.110.115.73:443
18 INFO [2530662272] inbound/trojan[trojan-ws]: [synricha] inbound connection to pin-river.data.ea.com:443
18 DEBUG [2530662272] router: sniffed protocol: tls, domain: pin-river.data.ea.com
18 DEBUG [2530662272] dns: lookup domain pin-river.data.ea.com
18 INFO [2530662272] dns: lookup succeed for pin-river.data.ea.com: 54.157.237.231 52.86.235.160 3.209.212.164 54.85.87.255 34.238.147.47 35.153.41.78 54.161.62.223 54.80.87.17
18 DEBUG [2530662272] dns: resolved [54.157.237.231 52.86.235.160 3.209.212.164 54.85.87.255 34.238.147.47 35.153.41.78 54.161.62.223 54.80.87.17]
18 DEBUG [2530662272] router: match[6] network=tcp => TrafficTCP
18 INFO [2530662272] outbound/wireguard[wireguard-out]: outbound connection to 54.157.237.231:443
18 INFO [159572720] inbound/trojan[trojan-ws]: [synricha] inbound connection to client-api.arkoselabs.com:443
18 DEBUG [159572720] router: sniffed protocol: tls, domain: client-api.arkoselabs.com
18 DEBUG [159572720] dns: lookup domain client-api.arkoselabs.com
18 INFO [159572720] dns: lookup succeed for client-api.arkoselabs.com: 2606:4700:4400::ac40:911b 2606:4700:4400::6812:2ae5 172.64.145.27 104.18.42.229
18 DEBUG [159572720] dns: resolved [2606:4700:4400::ac40:911b 2606:4700:4400::6812:2ae5 172.64.145.27 104.18.42.229]
18 DEBUG [159572720] router: match[6] network=tcp => TrafficTCP
18 INFO [159572720] outbound/wireguard[wireguard-out]: outbound connection to [2606:4700:4400::ac40:911b]:443
19 INFO [2497816576] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
19 DEBUG [2497816576] router: match[6] network=tcp => TrafficTCP
19 INFO [2497816576] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
21 INFO [512215960] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
21 DEBUG [512215960] router: sniffed packet protocol: dns
21 DEBUG [512215960] router: match[1] protocol=dns => dns-out
21 DEBUG [512215960] dns: exchange passwordsleakcheck-pa.googleapis.com A INET
21 DEBUG [512215960] dns: exchange passwordsleakcheck-pa.googleapis.com AAAA INET
21 INFO [512215960] dns: exchanged passwordsleakcheck-pa.googleapis.com. AAAA 2404:6800:4003:c04::5f
21 INFO [512215960] dns: exchanged passwordsleakcheck-pa.googleapis.com. A 74.125.24.95
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.66s)
0 INFO [3452006953] inbound/trojan[trojan-ws]: [synricha] inbound connection to passwordsleakcheck-pa.googleapis.com:443
0 DEBUG [3452006953] router: sniffed protocol: tls, domain: passwordsleakcheck-pa.googleapis.com
0 DEBUG [3452006953] dns: lookup domain passwordsleakcheck-pa.googleapis.com
0 INFO [3452006953] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3452006953] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3452006953] dns: lookup succeed for passwordsleakcheck-pa.googleapis.com: 2404:6800:4003:c03::5f 142.251.12.95
0 DEBUG [3452006953] dns: resolved [2404:6800:4003:c03::5f 142.251.12.95]
0 DEBUG [3452006953] router: match[6] network=tcp => TrafficTCP
0 INFO [3452006953] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c03::5f]:443
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [60107362] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [60107362] router: match[6] network=tcp => TrafficTCP
0 INFO [60107362] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1820074123] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.noteapi.micloud.xiaomi.net:443
0 DEBUG [1820074123] router: sniffed protocol: tls, domain: us.noteapi.micloud.xiaomi.net
0 DEBUG [1820074123] dns: lookup domain us.noteapi.micloud.xiaomi.net
0 INFO [3150207874] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [3150207874] router: match[6] network=tcp => TrafficTCP
0 INFO [3150207874] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [1820074123] dns: lookup succeed for us.noteapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
0 DEBUG [1820074123] dns: resolved [47.241.65.164 8.214.46.209]
0 DEBUG [1820074123] router: match[0] geosite=cn geoip=cn => block
0 INFO [1820074123] outbound/block[block]: blocked connection to us.noteapi.micloud.xiaomi.net:443
0 INFO [770533711] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [770533711] router: sniffed packet protocol: dns
0 DEBUG [770533711] router: match[1] protocol=dns => dns-out
0 DEBUG [770533711] dns: exchange lamssettings-pa.googleapis.com A INET
0 DEBUG [770533711] dns: exchange us.smsapi.micloud.xiaomi.net AAAA INET
0 DEBUG [770533711] dns: exchange us.smsapi.micloud.xiaomi.net A INET
0 DEBUG [770533711] dns: exchange lamssettings-pa.googleapis.com AAAA INET
0 DEBUG [770533711] dns: exchange lamssettings-pa.googleapis.com A INET
0 DEBUG [770533711] dns: exchange lamssettings-pa.googleapis.com AAAA INET
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [770533711] dns: exchanged lamssettings-pa.googleapis.com. A 74.125.68.95
0 INFO [770533711] dns: exchanged lamssettings-pa.googleapis.com. A 74.125.68.95
0 INFO [770533711] dns: exchanged lamssettings-pa.googleapis.com. AAAA 2404:6800:4003:c0f::5f
0 INFO [770533711] dns: exchanged lamssettings-pa.googleapis.com. AAAA 2404:6800:4003:c03::5f
0 INFO [770533711] dns: exchanged us.smsapi.micloud.xiaomi.net. A 47.241.65.164
0 INFO [770533711] dns: exchanged us.smsapi.micloud.xiaomi.net. A 8.214.46.209
0 INFO [2241395636] inbound/trojan[trojan-ws]: [synricha] inbound connection to 3.33.221.48:5222
0 DEBUG [2241395636] router: match[6] network=tcp => TrafficTCP
0 INFO [2241395636] outbound/wireguard[wireguard-out]: outbound connection to 3.33.221.48:5222
1 INFO [284665768] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.smsapi.micloud.xiaomi.net:443
1 DEBUG [284665768] router: sniffed protocol: tls, domain: us.smsapi.micloud.xiaomi.net
1 DEBUG [284665768] dns: lookup domain us.smsapi.micloud.xiaomi.net
1 INFO [284665768] dns: lookup succeed for us.smsapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
1 DEBUG [284665768] dns: resolved [47.241.65.164 8.214.46.209]
1 DEBUG [284665768] router: match[0] geosite=cn geoip=cn => block
1 INFO [284665768] outbound/block[block]: blocked connection to us.smsapi.micloud.xiaomi.net:443
1 INFO [2406380851] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
1 DEBUG [2406380851] router: match[6] network=tcp => TrafficTCP
1 INFO [2406380851] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
1 INFO [979362079] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.noteapi.micloud.xiaomi.net:443
1 DEBUG [979362079] router: sniffed protocol: tls, domain: us.noteapi.micloud.xiaomi.net
1 DEBUG [979362079] dns: lookup domain us.noteapi.micloud.xiaomi.net
1 INFO [979362079] dns: lookup succeed for us.noteapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
1 DEBUG [979362079] dns: resolved [47.241.65.164 8.214.46.209]
1 DEBUG [979362079] router: match[0] geosite=cn geoip=cn => block
1 INFO [979362079] outbound/block[block]: blocked connection to us.noteapi.micloud.xiaomi.net:443
1 INFO [1709635309] inbound/trojan[trojan-ws]: [synricha] inbound connection to lamssettings-pa.googleapis.com:443
1 DEBUG [1709635309] router: sniffed protocol: tls, domain: lamssettings-pa.googleapis.com
1 DEBUG [1709635309] dns: lookup domain lamssettings-pa.googleapis.com
1 INFO [1709635309] dns: lookup succeed for lamssettings-pa.googleapis.com: 2404:6800:4003:c03::5f 74.125.68.95
1 DEBUG [1709635309] dns: resolved [2404:6800:4003:c03::5f 74.125.68.95]
1 DEBUG [1709635309] router: match[6] network=tcp => TrafficTCP
1 INFO [1709635309] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c03::5f]:443
1 INFO [3821774260] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.smsapi.micloud.xiaomi.net:443
1 DEBUG [3821774260] router: sniffed protocol: tls, domain: us.smsapi.micloud.xiaomi.net
1 DEBUG [3821774260] dns: lookup domain us.smsapi.micloud.xiaomi.net
1 INFO [3821774260] dns: lookup succeed for us.smsapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
1 DEBUG [3821774260] dns: resolved [47.241.65.164 8.214.46.209]
1 DEBUG [3821774260] router: match[0] geosite=cn geoip=cn => block
1 INFO [3821774260] outbound/block[block]: blocked connection to us.smsapi.micloud.xiaomi.net:443
2 INFO [3073289024] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.smsapi.micloud.xiaomi.net:443
2 DEBUG [3073289024] router: sniffed protocol: tls, domain: us.smsapi.micloud.xiaomi.net
2 DEBUG [3073289024] dns: lookup domain us.smsapi.micloud.xiaomi.net
2 INFO [3073289024] dns: lookup succeed for us.smsapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
2 DEBUG [3073289024] dns: resolved [47.241.65.164 8.214.46.209]
2 DEBUG [3073289024] router: match[0] geosite=cn geoip=cn => block
2 INFO [3073289024] outbound/block[block]: blocked connection to us.smsapi.micloud.xiaomi.net:443
2 INFO [2394452518] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
2 DEBUG [2394452518] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
2 DEBUG [2394452518] dns: lookup domain mqtt-mini.facebook.com
2 INFO [2394452518] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.208.34
2 DEBUG [2394452518] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.208.34]
2 DEBUG [2394452518] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
2 INFO [2394452518] outbound/direct[direct]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
2 INFO [2394452518] outbound/direct[direct]: outbound connection to 157.240.208.34:443
2 INFO [2680759086] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
2 DEBUG [2680759086] router: match[6] network=tcp => TrafficTCP
2 INFO [2680759086] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
3 INFO [3988556975] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
3 DEBUG [3988556975] router: sniffed packet protocol: dns
3 DEBUG [3988556975] router: match[1] protocol=dns => dns-out
3 DEBUG [3988556975] dns: exchange api.browser.yandex.ru A INET
3 DEBUG [3988556975] dns: exchange api.browser.yandex.ru AAAA INET
3 INFO [3988556975] dns: exchanged api.browser.yandex.ru. A 213.180.193.234
4 INFO [3988556975] dns: exchanged api.browser.yandex.ru. AAAA 2a02:6b8::1d0
4 INFO [1769786576] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
4 DEBUG [1769786576] router: match[6] network=tcp => TrafficTCP
4 INFO [1769786576] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
4 INFO [2169231266] inbound/trojan[trojan-ws]: [synricha] inbound connection to api.browser.yandex.ru:443
4 DEBUG [2169231266] router: sniffed protocol: tls, domain: api.browser.yandex.ru
4 DEBUG [2169231266] dns: lookup domain api.browser.yandex.ru
4 INFO [2169231266] dns: lookup succeed for api.browser.yandex.ru: 2a02:6b8::1d0 213.180.193.234
4 DEBUG [2169231266] dns: resolved [2a02:6b8::1d0 213.180.193.234]
4 DEBUG [2169231266] router: match[6] network=tcp => TrafficTCP
4 INFO [2169231266] outbound/wireguard[wireguard-out]: outbound connection to [2a02:6b8::1d0]:443
6 INFO [298756308] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
6 DEBUG [298756308] router: match[6] network=tcp => TrafficTCP
6 INFO [298756308] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
8 INFO [1972335451] inbound/trojan[trojan-ws]: [synricha] inbound connection to mtalk.google.com:5228
8 DEBUG [1972335451] router: sniffed protocol: tls, domain: mtalk.google.com
8 DEBUG [1972335451] dns: lookup domain mtalk.google.com
8 INFO [1972335451] dns: lookup succeed for mtalk.google.com: 2404:6800:4003:c02::bc 142.251.10.188
8 DEBUG [1972335451] dns: resolved [2404:6800:4003:c02::bc 142.251.10.188]
8 DEBUG [1972335451] router: match[6] network=tcp => TrafficTCP
8 INFO [1972335451] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c02::bc]:5228
8 INFO [1560428015] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
8 DEBUG [1560428015] router: match[6] network=tcp => TrafficTCP
8 INFO [1560428015] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
10 INFO [936451] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
10 DEBUG [936451] router: match[6] network=tcp => TrafficTCP
10 INFO [936451] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
12 INFO [817739379] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
12 DEBUG [817739379] router: match[6] network=tcp => TrafficTCP
12 INFO [817739379] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
12 INFO [2398548740] inbound/trojan[trojan-ws]: [synricha] inbound connection to accounts.ea.com:443
12 DEBUG [2398548740] router: sniffed protocol: tls, domain: accounts.ea.com
12 DEBUG [2398548740] dns: lookup domain accounts.ea.com
12 INFO [2398548740] dns: lookup succeed for accounts.ea.com: 159.153.191.240
12 DEBUG [2398548740] dns: resolved [159.153.191.240]
12 DEBUG [2398548740] router: match[6] network=tcp => TrafficTCP
12 INFO [2398548740] outbound/wireguard[wireguard-out]: outbound connection to 159.153.191.240:443
14 INFO [2980492277] inbound/trojan[trojan-ws]: [synricha] inbound connection to signin.ea.com:443
14 DEBUG [2980492277] router: sniffed protocol: tls, domain: signin.ea.com
14 DEBUG [2980492277] dns: lookup domain signin.ea.com
14 INFO [2980492277] dns: lookup succeed for signin.ea.com: 159.153.191.239
14 DEBUG [2980492277] dns: resolved [159.153.191.239]
14 DEBUG [2980492277] router: match[6] network=tcp => TrafficTCP
14 INFO [2980492277] outbound/wireguard[wireguard-out]: outbound connection to 159.153.191.239:443
14 INFO [1616210876] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
14 DEBUG [1616210876] router: match[6] network=tcp => TrafficTCP
14 INFO [1616210876] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
15 INFO [2131416299] inbound/trojan[trojan-ws]: [synricha] inbound connection to dl.listdl.com:443
15 DEBUG [2131416299] router: sniffed protocol: tls, domain: dl.listdl.com
15 DEBUG [2131416299] dns: lookup domain dl.listdl.com
15 INFO [2131416299] dns: lookup succeed for dl.listdl.com: 119.110.115.186 119.110.115.168
15 DEBUG [2131416299] dns: resolved [119.110.115.186 119.110.115.168]
15 DEBUG [2131416299] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
15 INFO [2131416299] outbound/direct[direct]: outbound connection to 119.110.115.186:443
16 INFO [2588124576] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
16 DEBUG [2588124576] router: match[6] network=tcp => TrafficTCP
16 INFO [2588124576] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
16 INFO [3112781796] inbound/trojan[trojan-ws]: [synricha] inbound connection to dl.listdl.com:443
16 DEBUG [3112781796] router: sniffed protocol: tls, domain: dl.listdl.com
16 DEBUG [3112781796] dns: lookup domain dl.listdl.com
16 INFO [3112781796] dns: lookup succeed for dl.listdl.com: 119.110.115.186 119.110.115.168
16 DEBUG [3112781796] dns: resolved [119.110.115.186 119.110.115.168]
16 DEBUG [3112781796] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
16 INFO [3112781796] outbound/direct[direct]: outbound connection to 119.110.115.186:443
16 INFO [1250815691] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
16 DEBUG [1250815691] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
16 DEBUG [1250815691] dns: lookup domain eaassets-a.akamaihd.net
16 INFO [2429109688] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
16 DEBUG [2429109688] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
16 DEBUG [2429109688] dns: lookup domain eaassets-a.akamaihd.net
16 INFO [3005939480] inbound/trojan[trojan-ws]: [synricha] inbound connection to client-api.arkoselabs.com:443
16 DEBUG [3005939480] router: sniffed protocol: tls, domain: client-api.arkoselabs.com
16 DEBUG [3005939480] dns: lookup domain client-api.arkoselabs.com
16 INFO [1250815691] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.73 119.110.115.74
16 DEBUG [1250815691] dns: resolved [119.110.115.73 119.110.115.74]
16 DEBUG [1250815691] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
16 INFO [1250815691] outbound/direct[direct]: outbound connection to 119.110.115.73:443
16 INFO [2429109688] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.74 119.110.115.73
16 DEBUG [2429109688] dns: resolved [119.110.115.74 119.110.115.73]
16 DEBUG [2429109688] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
16 INFO [2429109688] outbound/direct[direct]: outbound connection to 119.110.115.74:443
16 INFO [3005939480] dns: lookup succeed for client-api.arkoselabs.com: 2606:4700:4400::6812:2ae5 2606:4700:4400::ac40:911b 104.18.42.229 172.64.145.27
16 DEBUG [3005939480] dns: resolved [2606:4700:4400::6812:2ae5 2606:4700:4400::ac40:911b 104.18.42.229 172.64.145.27]
16 DEBUG [3005939480] router: match[6] network=tcp => TrafficTCP
16 INFO [3005939480] outbound/wireguard[wireguard-out]: outbound connection to [2606:4700:4400::6812:2ae5]:443
16 INFO [3501710367] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
16 DEBUG [3501710367] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
16 DEBUG [3501710367] dns: lookup domain eaassets-a.akamaihd.net
16 INFO [3501710367] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.74 119.110.115.73
16 DEBUG [3501710367] dns: resolved [119.110.115.74 119.110.115.73]
16 DEBUG [3501710367] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
16 INFO [3501710367] outbound/direct[direct]: outbound connection to 119.110.115.74:443
16 INFO [1362146964] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
16 DEBUG [1362146964] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
16 DEBUG [1362146964] dns: lookup domain eaassets-a.akamaihd.net
16 INFO [1362146964] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.74 119.110.115.73
16 DEBUG [1362146964] dns: resolved [119.110.115.74 119.110.115.73]
16 DEBUG [1362146964] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
16 INFO [1362146964] outbound/direct[direct]: outbound connection to 119.110.115.74:443
18 INFO [1390131510] inbound/trojan[trojan-ws]: [synricha] inbound connection to pin-river.data.ea.com:443
18 DEBUG [1390131510] router: sniffed protocol: tls, domain: pin-river.data.ea.com
18 DEBUG [1390131510] dns: lookup domain pin-river.data.ea.com
18 INFO [1390131510] dns: lookup succeed for pin-river.data.ea.com: 35.153.41.78 54.157.237.231 54.236.65.205 18.204.130.194 52.86.235.160 54.88.117.60 34.197.166.226 3.229.229.69
18 DEBUG [1390131510] dns: resolved [35.153.41.78 54.157.237.231 54.236.65.205 18.204.130.194 52.86.235.160 54.88.117.60 34.197.166.226 3.229.229.69]
18 DEBUG [1390131510] router: match[6] network=tcp => TrafficTCP
18 INFO [1390131510] outbound/wireguard[wireguard-out]: outbound connection to 35.153.41.78:443
18 INFO [2337322303] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
18 DEBUG [2337322303] router: match[6] network=tcp => TrafficTCP
18 INFO [2337322303] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
20 INFO [316352524] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
20 DEBUG [316352524] router: match[6] network=tcp => TrafficTCP
20 INFO [316352524] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
22 INFO [3418792256] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
22 DEBUG [3418792256] router: match[6] network=tcp => TrafficTCP
22 INFO [3418792256] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
24 INFO [595665678] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
24 DEBUG [595665678] router: match[6] network=tcp => TrafficTCP
24 INFO [595665678] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
24 INFO [575231482] inbound/trojan[trojan-ws]: [synricha] inbound connection to eaassets-a.akamaihd.net:443
24 DEBUG [575231482] router: sniffed protocol: tls, domain: eaassets-a.akamaihd.net
24 DEBUG [575231482] dns: lookup domain eaassets-a.akamaihd.net
24 INFO [575231482] dns: lookup succeed for eaassets-a.akamaihd.net: 119.110.115.74 119.110.115.73
24 DEBUG [575231482] dns: resolved [119.110.115.74 119.110.115.73]
24 DEBUG [575231482] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
24 INFO [575231482] outbound/direct[direct]: outbound connection to 119.110.115.74:443
25 INFO [2429034238] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
25 DEBUG [2429034238] router: sniffed packet protocol: dns
25 DEBUG [2429034238] router: match[1] protocol=dns => dns-out
25 DEBUG [2429034238] dns: exchange eagw1.mgapex.com A INET
25 DEBUG [2429034238] dns: exchange eagw1.mgapex.com AAAA INET
25 INFO [2429034238] dns: exchanged eagw1.mgapex.com. A 54.77.133.229
25 INFO [2429034238] dns: exchanged eagw1.mgapex.com. A 34.251.160.225
25 INFO [3440861636] inbound/trojan[trojan-ws]: [synricha] inbound connection to eagw1.mgapex.com:443
25 DEBUG [3440861636] router: sniffed protocol: tls, domain: eagw1.mgapex.com
25 DEBUG [3440861636] dns: lookup domain eagw1.mgapex.com
25 INFO [3440861636] dns: lookup succeed for eagw1.mgapex.com: 54.77.133.229 34.251.160.225
25 DEBUG [3440861636] dns: resolved [54.77.133.229 34.251.160.225]
25 DEBUG [3440861636] router: match[6] network=tcp => TrafficTCP
25 INFO [3440861636] outbound/wireguard[wireguard-out]: outbound connection to 54.77.133.229:443
26 INFO [1022020928] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
26 DEBUG [1022020928] router: match[6] network=tcp => TrafficTCP
26 INFO [1022020928] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
27 INFO [242423786] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
27 DEBUG [242423786] router: sniffed protocol: tls, domain: itop.mgapex.com
27 DEBUG [242423786] dns: lookup domain itop.mgapex.com
27 INFO [242423786] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 52.212.43.30 54.74.13.13
27 DEBUG [242423786] dns: resolved [52.16.17.160 52.212.43.30 54.74.13.13]
27 DEBUG [242423786] router: match[6] network=tcp => TrafficTCP
27 INFO [242423786] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
28 INFO [2333736899] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
28 DEBUG [2333736899] router: match[6] network=tcp => TrafficTCP
28 INFO [2333736899] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
29 INFO [3142427103] inbound/trojan[trojan-ws]: [synricha] inbound connection to cloudctrl.mgapex.com:443
29 DEBUG [3142427103] router: sniffed protocol: tls, domain: cloudctrl.mgapex.com
29 DEBUG [3142427103] dns: lookup domain cloudctrl.mgapex.com
29 INFO [3142427103] dns: lookup succeed for cloudctrl.mgapex.com: 63.32.121.85 54.77.226.249
29 DEBUG [3142427103] dns: resolved [63.32.121.85 54.77.226.249]
29 DEBUG [3142427103] router: match[6] network=tcp => TrafficTCP
29 INFO [3142427103] outbound/wireguard[wireguard-out]: outbound connection to 63.32.121.85:443
29 INFO [1541488697] inbound/trojan[trojan-ws]: [synricha] inbound connection to itop.mgapex.com:443
29 DEBUG [1541488697] router: sniffed protocol: tls, domain: itop.mgapex.com
29 DEBUG [1541488697] dns: lookup domain itop.mgapex.com
29 INFO [1541488697] dns: lookup succeed for itop.mgapex.com: 52.16.17.160 52.212.43.30 54.74.13.13
29 DEBUG [1541488697] dns: resolved [52.16.17.160 52.212.43.30 54.74.13.13]
29 DEBUG [1541488697] router: match[6] network=tcp => TrafficTCP
29 INFO [1541488697] outbound/wireguard[wireguard-out]: outbound connection to 52.16.17.160:443
29 INFO [1633228399] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
29 DEBUG [1633228399] router: sniffed protocol: tls, domain: pay.mgapex.com
29 DEBUG [1633228399] dns: lookup domain pay.mgapex.com
29 INFO [2575202795] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
29 DEBUG [2575202795] router: sniffed protocol: tls, domain: pay.mgapex.com
29 DEBUG [2575202795] dns: lookup domain pay.mgapex.com
29 INFO [1633228399] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 34.240.0.44 52.215.4.132
29 DEBUG [1633228399] dns: resolved [54.229.254.151 34.240.0.44 52.215.4.132]
29 DEBUG [1633228399] router: match[6] network=tcp => TrafficTCP
29 INFO [1633228399] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
29 INFO [2575202795] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 52.215.4.132 34.240.0.44
29 DEBUG [2575202795] dns: resolved [54.229.254.151 52.215.4.132 34.240.0.44]
29 DEBUG [2575202795] router: match[6] network=tcp => TrafficTCP
29 INFO [2575202795] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
29 INFO [948481895] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
29 DEBUG [948481895] router: sniffed protocol: tls, domain: pay.mgapex.com
29 DEBUG [948481895] dns: lookup domain pay.mgapex.com
29 INFO [948481895] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 52.215.4.132 34.240.0.44
29 DEBUG [948481895] dns: resolved [54.229.254.151 52.215.4.132 34.240.0.44]
29 DEBUG [948481895] router: match[6] network=tcp => TrafficTCP
29 INFO [948481895] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
29 INFO [3069822481] inbound/trojan[trojan-ws]: [synricha] inbound connection to 18.202.102.112:10500
29 DEBUG [3069822481] router: match[6] network=tcp => TrafficTCP
29 INFO [3069822481] outbound/wireguard[wireguard-out]: outbound connection to 18.202.102.112:10500
29 INFO [3737278692] inbound/trojan[trojan-ws]: [synricha] inbound connection to pay.mgapex.com:443
29 DEBUG [3737278692] router: sniffed protocol: tls, domain: pay.mgapex.com
29 DEBUG [3737278692] dns: lookup domain pay.mgapex.com
29 INFO [3737278692] dns: lookup succeed for pay.mgapex.com: 54.229.254.151 52.215.4.132 34.240.0.44
29 DEBUG [3737278692] dns: resolved [54.229.254.151 52.215.4.132 34.240.0.44]
29 DEBUG [3737278692] router: match[6] network=tcp => TrafficTCP
29 INFO [3737278692] outbound/wireguard[wireguard-out]: outbound connection to 54.229.254.151:443
30 INFO [3904088746] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
30 DEBUG [3904088746] router: match[6] network=tcp => TrafficTCP
30 INFO [3904088746] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
32 INFO [836892769] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
32 DEBUG [836892769] router: sniffed protocol: tls, domain: tdm.mgapex.com
32 DEBUG [836892769] dns: lookup domain tdm.mgapex.com
32 INFO [836892769] dns: lookup succeed for tdm.mgapex.com: 52.214.175.246 34.248.0.30
32 DEBUG [836892769] dns: resolved [52.214.175.246 34.248.0.30]
32 DEBUG [836892769] router: match[6] network=tcp => TrafficTCP
32 INFO [836892769] outbound/wireguard[wireguard-out]: outbound connection to 52.214.175.246:8013
32 INFO [3086076536] inbound/trojan[trojan-ws]: [synricha] inbound connection to tab-mobile-cache-ireland.mgapex.com:443
32 DEBUG [3086076536] router: sniffed protocol: tls, domain: tab-mobile-cache-ireland.mgapex.com
32 DEBUG [3086076536] dns: lookup domain tab-mobile-cache-ireland.mgapex.com
32 INFO [3086076536] dns: lookup succeed for tab-mobile-cache-ireland.mgapex.com: 99.80.212.168 54.72.75.241 54.154.190.40
32 DEBUG [3086076536] dns: resolved [99.80.212.168 54.72.75.241 54.154.190.40]
32 DEBUG [3086076536] router: match[6] network=tcp => TrafficTCP
32 INFO [3086076536] outbound/wireguard[wireguard-out]: outbound connection to 99.80.212.168:443
32 INFO [4060212013] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
32 DEBUG [4060212013] router: match[6] network=tcp => TrafficTCP
32 INFO [4060212013] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
32 INFO [3913503749] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.195.50.52:8700
32 DEBUG [3913503749] router: match[6] network=tcp => TrafficTCP
32 INFO [3913503749] outbound/wireguard[wireguard-out]: outbound packet connection to 54.195.50.52:8700
33 INFO [3613577289] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 3.10.126.178:11001
33 DEBUG [3613577289] router: match[6] network=tcp => TrafficTCP
33 INFO [3613577289] outbound/wireguard[wireguard-out]: outbound packet connection to 3.10.126.178:11001
33 INFO [4089912889] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
33 DEBUG [4089912889] router: match[6] network=tcp => TrafficTCP
33 INFO [4089912889] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
33 INFO [3120815873] inbound/trojan[trojan-ws]: [synricha] inbound connection to play-fe.googleapis.com:443
33 DEBUG [3120815873] router: sniffed protocol: tls, domain: play-fe.googleapis.com
33 DEBUG [3120815873] dns: lookup domain play-fe.googleapis.com
33 INFO [193279946] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
33 DEBUG [193279946] router: match[6] network=tcp => TrafficTCP
33 INFO [193279946] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
33 INFO [3120815873] dns: lookup succeed for play-fe.googleapis.com: 2404:6800:4003:c11::65 2404:6800:4003:c11::8b 2404:6800:4003:c11::71 2404:6800:4003:c11::64 142.251.12.102 142.251.12.100 142.251.12.113 142.251.12.139 142.251.12.101 142.251.12.138
33 DEBUG [3120815873] dns: resolved [2404:6800:4003:c11::65 2404:6800:4003:c11::8b 2404:6800:4003:c11::71 2404:6800:4003:c11::64 142.251.12.102 142.251.12.100 142.251.12.113 142.251.12.139 142.251.12.101 142.251.12.138]
33 DEBUG [3120815873] router: match[6] network=tcp => TrafficTCP
33 INFO [3120815873] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::65]:443
33 INFO [1462297497] inbound/trojan[trojan-ws]: [synricha] inbound connection to play-fe.googleapis.com:443
33 DEBUG [1462297497] router: sniffed protocol: tls, domain: play-fe.googleapis.com
33 DEBUG [1462297497] dns: lookup domain play-fe.googleapis.com
33 INFO [1462297497] dns: lookup succeed for play-fe.googleapis.com: 2404:6800:4003:c11::65 2404:6800:4003:c11::8b 2404:6800:4003:c11::71 2404:6800:4003:c11::64 142.251.12.102 142.251.12.100 142.251.12.113 142.251.12.139 142.251.12.101 142.251.12.138
33 DEBUG [1462297497] dns: resolved [2404:6800:4003:c11::65 2404:6800:4003:c11::8b 2404:6800:4003:c11::71 2404:6800:4003:c11::64 142.251.12.102 142.251.12.100 142.251.12.113 142.251.12.139 142.251.12.101 142.251.12.138]
33 DEBUG [1462297497] router: match[6] network=tcp => TrafficTCP
33 INFO [1462297497] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::65]:443
34 INFO [2811916696] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
34 DEBUG [2811916696] router: sniffed protocol: tls, domain: tdm.mgapex.com
34 DEBUG [2811916696] dns: lookup domain tdm.mgapex.com
34 INFO [2811916696] dns: lookup succeed for tdm.mgapex.com: 52.214.175.246 34.248.0.30
34 DEBUG [2811916696] dns: resolved [52.214.175.246 34.248.0.30]
34 DEBUG [2811916696] router: match[6] network=tcp => TrafficTCP
34 INFO [2811916696] outbound/wireguard[wireguard-out]: outbound connection to 52.214.175.246:8013
34 INFO [3275070920] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
34 DEBUG [3275070920] router: match[6] network=tcp => TrafficTCP
34 INFO [3275070920] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
35 INFO [3851253168] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
35 DEBUG [3851253168] router: match[6] network=tcp => TrafficTCP
35 INFO [3851253168] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
35 INFO [948361721] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.195.50.52:8700
35 DEBUG [948361721] router: match[6] network=tcp => TrafficTCP
35 INFO [948361721] outbound/wireguard[wireguard-out]: outbound packet connection to 54.195.50.52:8700
35 INFO [891793410] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
35 DEBUG [891793410] router: sniffed protocol: tls, domain: tdm.mgapex.com
35 DEBUG [891793410] dns: lookup domain tdm.mgapex.com
35 INFO [891793410] dns: lookup succeed for tdm.mgapex.com: 52.214.175.246 34.248.0.30
35 DEBUG [891793410] dns: resolved [52.214.175.246 34.248.0.30]
35 DEBUG [891793410] router: match[6] network=tcp => TrafficTCP
35 INFO [891793410] outbound/wireguard[wireguard-out]: outbound connection to 52.214.175.246:8013
36 INFO [1657658288] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.228.152.110:443
36 DEBUG [1657658288] router: match[6] network=tcp => TrafficTCP
36 INFO [1657658288] outbound/wireguard[wireguard-out]: outbound connection to 54.228.152.110:443
37 INFO [2266782871] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
37 DEBUG [2266782871] router: match[6] network=tcp => TrafficTCP
37 INFO [2266782871] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
37 INFO [706433172] inbound/trojan[trojan-ws]: [synricha] inbound connection to tgpa.mgapex.com:443
37 DEBUG [706433172] router: sniffed protocol: tls, domain: tgpa.mgapex.com
37 DEBUG [706433172] dns: lookup domain tgpa.mgapex.com
37 INFO [706433172] dns: lookup succeed for tgpa.mgapex.com: 34.250.147.180 34.248.152.69 52.30.237.151
37 DEBUG [706433172] dns: resolved [34.250.147.180 34.248.152.69 52.30.237.151]
37 DEBUG [706433172] router: match[6] network=tcp => TrafficTCP
37 INFO [706433172] outbound/wireguard[wireguard-out]: outbound connection to 34.250.147.180:443
38 INFO [4010513417] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
38 DEBUG [4010513417] router: sniffed packet protocol: dns
38 DEBUG [4010513417] router: match[1] protocol=dns => dns-out
38 DEBUG [4010513417] dns: exchange acae76ff7b2d32e2e.awsglobalaccelerator.com A INET
38 DEBUG [4010513417] dns: exchange acae76ff7b2d32e2e.awsglobalaccelerator.com AAAA INET
38 INFO [4010513417] dns: exchanged acae76ff7b2d32e2e.awsglobalaccelerator.com. A 3.33.166.124
38 INFO [4010513417] dns: exchanged acae76ff7b2d32e2e.awsglobalaccelerator.com. A 15.197.167.98
38 DEBUG [4010513417] dns: exchange a5591e4ed33a1f3e5.awsglobalaccelerator.com A INET
38 DEBUG [4010513417] dns: exchange a5591e4ed33a1f3e5.awsglobalaccelerator.com AAAA INET
38 INFO [4010513417] dns: exchanged a5591e4ed33a1f3e5.awsglobalaccelerator.com. A 52.223.40.0
38 INFO [4010513417] dns: exchanged a5591e4ed33a1f3e5.awsglobalaccelerator.com. A 35.71.180.244
38 DEBUG [4010513417] dns: exchange a695d7af4d3b0b6c6.awsglobalaccelerator.com A INET
38 DEBUG [4010513417] dns: exchange a695d7af4d3b0b6c6.awsglobalaccelerator.com AAAA INET
38 INFO [4010513417] dns: exchanged a695d7af4d3b0b6c6.awsglobalaccelerator.com. A 15.197.198.236
38 INFO [4010513417] dns: exchanged a695d7af4d3b0b6c6.awsglobalaccelerator.com. A 3.33.242.235
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [2332055966] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
0 INFO [4118972698] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [4118972698] router: match[6] network=tcp => TrafficTCP
0 INFO [4118972698] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [3886877396] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.155.96.104:443
0 DEBUG [3886877396] router: match[6] network=tcp => TrafficTCP
0 INFO [3886877396] outbound/wireguard[wireguard-out]: outbound connection to 54.155.96.104:443
0 INFO [3424797449] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [3424797449] router: sniffed packet protocol: dns
0 DEBUG [3424797449] router: match[1] protocol=dns => dns-out
0 DEBUG [3424797449] dns: exchange e5.whatsapp.net A INET
0 INFO [3424797449] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 DEBUG [3424797449] dns: exchange a695d7af4d3b0b6c6.awsglobalaccelerator.com A INET
0 INFO [3424797449] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 DEBUG [3424797449] dns: exchange e5.whatsapp.net AAAA INET
0 INFO [3424797449] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3424797449] dns: exchanged a695d7af4d3b0b6c6.awsglobalaccelerator.com. A 3.33.242.235
0 INFO [3424797449] dns: exchanged a695d7af4d3b0b6c6.awsglobalaccelerator.com. A 15.197.198.236
0 INFO [3424797449] dns: exchanged e5.whatsapp.net. A 3.33.252.61
0 INFO [3424797449] dns: exchanged e5.whatsapp.net. A 3.33.221.48
0 INFO [3424797449] dns: exchanged e5.whatsapp.net. A 15.197.210.208
0 INFO [3424797449] dns: exchanged e5.whatsapp.net. A 15.197.206.217
0 DEBUG [2332055966] router: match[6] network=tcp => TrafficTCP
0 INFO [2332055966] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [30054487] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
0 INFO [3428244800] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [3428244800] router: match[6] network=tcp => TrafficTCP
0 INFO [3428244800] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 DEBUG [3424797449] dns: exchange a42a25c370cddfe4e.awsglobalaccelerator.com A INET
0 DEBUG [3424797449] dns: exchange a42a25c370cddfe4e.awsglobalaccelerator.com AAAA INET
0 INFO [3424797449] dns: exchanged a42a25c370cddfe4e.awsglobalaccelerator.com. A 99.83.251.111
0 INFO [3424797449] dns: exchanged a42a25c370cddfe4e.awsglobalaccelerator.com. A 75.2.60.19
0 DEBUG [30054487] router: match[6] network=tcp => TrafficTCP
0 INFO [30054487] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
0 INFO [1657907362] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:443
0 DEBUG [1657907362] router: match[6] network=tcp => TrafficTCP
0 INFO [1657907362] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:443
0 DEBUG [3424797449] dns: exchange a04eefef62389bb69.awsglobalaccelerator.com AAAA INET
0 DEBUG [3424797449] dns: exchange a04eefef62389bb69.awsglobalaccelerator.com A INET
0 INFO [3424797449] dns: exchanged a04eefef62389bb69.awsglobalaccelerator.com. A 75.2.51.164
0 INFO [3424797449] dns: exchanged a04eefef62389bb69.awsglobalaccelerator.com. A 99.83.167.145
0 DEBUG [3424797449] dns: exchange ac54193e127473002.awsglobalaccelerator.com A INET
0 DEBUG [3424797449] dns: exchange ac54193e127473002.awsglobalaccelerator.com AAAA INET
1 INFO [3424797449] dns: exchanged ac54193e127473002.awsglobalaccelerator.com. A 76.223.38.1
1 INFO [3424797449] dns: exchanged ac54193e127473002.awsglobalaccelerator.com. A 13.248.167.113
1 INFO [3167148100] inbound/trojan[trojan-ws]: [synricha] inbound connection to 3.33.221.48:5222
1 DEBUG [3167148100] router: match[6] network=tcp => TrafficTCP
1 INFO [3167148100] outbound/wireguard[wireguard-out]: outbound connection to 3.33.221.48:5222
1 DEBUG [3424797449] dns: exchange a721045cfb5ec9483.awsglobalaccelerator.com A INET
1 DEBUG [3424797449] dns: exchange a721045cfb5ec9483.awsglobalaccelerator.com AAAA INET
1 INFO [3424797449] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 35.71.183.20
1 INFO [3424797449] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 52.223.24.2
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [3059102641] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
0 DEBUG [3059102641] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
0 DEBUG [3059102641] dns: lookup domain mqtt-mini.facebook.com
0 INFO [3059102641] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3059102641] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [3059102641] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.13.32
0 DEBUG [3059102641] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.13.32]
0 DEBUG [3059102641] router: match[6] network=tcp => TrafficTCP
0 INFO [3059102641] outbound/wireguard[wireguard-out]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 INFO [3449536259] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [3449536259] router: match[6] network=tcp => TrafficTCP
0 INFO [3449536259] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 INFO [587260563] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [587260563] router: sniffed packet protocol: dns
0 DEBUG [587260563] router: match[1] protocol=dns => dns-out
0 DEBUG [587260563] dns: exchange e7.whatsapp.net A INET
0 DEBUG [587260563] dns: exchange alt7-mtalk.google.com AAAA INET
0 DEBUG [587260563] dns: exchange alt7-mtalk.google.com A INET
0 DEBUG [587260563] dns: exchange a721045cfb5ec9483.awsglobalaccelerator.com A INET
0 DEBUG [587260563] dns: exchange e7.whatsapp.net AAAA INET
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [587260563] dns: exchanged e7.whatsapp.net. A 3.33.252.61
0 INFO [587260563] dns: exchanged e7.whatsapp.net. A 15.197.210.208
0 INFO [587260563] dns: exchanged e7.whatsapp.net. A 3.33.221.48
0 INFO [587260563] dns: exchanged e7.whatsapp.net. A 15.197.206.217
0 INFO [587260563] dns: exchanged alt7-mtalk.google.com. CNAME alt7.mobile-gtalk.l.google.com.
0 INFO [587260563] dns: exchanged alt7-mtalk.google.com. AAAA 2607:f8b0:4023:401::bc
0 INFO [587260563] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 35.71.183.20
0 INFO [587260563] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 52.223.24.2
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO router: loaded geosite database: 1030 codes
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)
0 INFO [1202806164] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
0 DEBUG [1202806164] router: match[6] network=tcp => TrafficTCP
0 INFO [1202806164] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - sending handshake initiation
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - received handshake response
0 INFO [3360092151] inbound/trojan[trojan-ws]: [synricha] inbound connection to 54.170.154.227:443
0 DEBUG [3360092151] router: match[6] network=tcp => TrafficTCP
0 INFO [3360092151] outbound/wireguard[wireguard-out]: outbound connection to 54.170.154.227:443
0 INFO [3748387456] inbound/trojan[trojan-ws]: [synricha] inbound connection to [2a03:2880:f24d:c7:face:b00c:0:7260]:5222
0 DEBUG [3748387456] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
0 INFO [3748387456] outbound/direct[direct]: outbound connection to [2a03:2880:f24d:c7:face:b00c:0:7260]:5222
0 INFO [2128870864] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
0 INFO [2829040173] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
0 DEBUG [2829040173] router: sniffed packet protocol: dns
0 DEBUG [2829040173] router: match[1] protocol=dns => dns-out
0 DEBUG [2829040173] dns: exchange a721045cfb5ec9483.awsglobalaccelerator.com A INET
0 INFO [2829040173] outbound/direct[direct]: outbound connection to 8.8.8.8:443
0 INFO [2829040173] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 35.71.183.20
0 INFO [2829040173] dns: exchanged a721045cfb5ec9483.awsglobalaccelerator.com. A 52.223.24.2
0 DEBUG [2128870864] router: match[6] network=tcp => TrafficTCP
0 INFO [2128870864] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
0 DEBUG [2829040173] dns: exchange a257546f611fa5459.awsglobalaccelerator.com A INET
0 DEBUG [2829040173] dns: exchange a257546f611fa5459.awsglobalaccelerator.com AAAA INET
0 INFO [2829040173] dns: exchanged a257546f611fa5459.awsglobalaccelerator.com. A 76.223.36.220
0 INFO [2829040173] dns: exchanged a257546f611fa5459.awsglobalaccelerator.com. A 13.248.185.41
0 DEBUG [2829040173] dns: exchange adc86abb67dd88bb0.awsglobalaccelerator.com A INET
0 DEBUG [2829040173] dns: exchange adc86abb67dd88bb0.awsglobalaccelerator.com AAAA INET
0 INFO [2829040173] dns: exchanged adc86abb67dd88bb0.awsglobalaccelerator.com. A 99.83.146.4
0 INFO [2829040173] dns: exchanged adc86abb67dd88bb0.awsglobalaccelerator.com. A 75.2.99.17
1 INFO [615154939] inbound/trojan[trojan-ws]: [synricha] inbound connection to c.whatsapp.net:80
1 DEBUG [615154939] router: sniffed protocol: http, domain: c.whatsapp.net
1 DEBUG [615154939] dns: lookup domain c.whatsapp.net
1 INFO [615154939] dns: lookup succeed for c.whatsapp.net: 3.33.221.48 15.197.206.217 3.33.252.61 15.197.210.208
1 DEBUG [615154939] dns: resolved [3.33.221.48 15.197.206.217 3.33.252.61 15.197.210.208]
1 DEBUG [615154939] router: match[6] network=tcp => TrafficTCP
1 INFO [615154939] outbound/wireguard[wireguard-out]: outbound connection to 3.33.221.48:80
1 DEBUG [2829040173] dns: exchange af821b89db8480171.awsglobalaccelerator.com AAAA INET
1 DEBUG [2829040173] dns: exchange af821b89db8480171.awsglobalaccelerator.com A INET
1 INFO [2829040173] dns: exchanged af821b89db8480171.awsglobalaccelerator.com. A 35.71.133.55
1 INFO [2829040173] dns: exchanged af821b89db8480171.awsglobalaccelerator.com. A 52.223.19.54
1 DEBUG [2829040173] dns: exchange ab136bc0c052f002f.awsglobalaccelerator.com A INET
1 DEBUG [2829040173] dns: exchange ab136bc0c052f002f.awsglobalaccelerator.com AAAA INET
1 INFO [2829040173] dns: exchanged ab136bc0c052f002f.awsglobalaccelerator.com. A 35.71.139.64
1 INFO [2829040173] dns: exchanged ab136bc0c052f002f.awsglobalaccelerator.com. A 52.223.12.233
1 INFO [1762616414] inbound/trojan[trojan-ws]: [synricha] inbound connection to tdm.mgapex.com:8013
1 DEBUG [1762616414] router: sniffed protocol: tls, domain: tdm.mgapex.com
1 DEBUG [1762616414] dns: lookup domain tdm.mgapex.com
1 INFO [1762616414] dns: lookup succeed for tdm.mgapex.com: 52.214.175.246 34.248.0.30
1 DEBUG [1762616414] dns: resolved [52.214.175.246 34.248.0.30]
1 DEBUG [1762616414] router: match[6] network=tcp => TrafficTCP
1 INFO [1762616414] outbound/wireguard[wireguard-out]: outbound connection to 52.214.175.246:8013
1 INFO [241104065] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
1 DEBUG [241104065] router: match[6] network=tcp => TrafficTCP
1 INFO [241104065] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
1 INFO [3047208426] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 3.33.166.124:11001
1 DEBUG [3047208426] router: match[6] network=tcp => TrafficTCP
1 INFO [3047208426] outbound/wireguard[wireguard-out]: outbound packet connection to 3.33.166.124:11001
2 INFO [4122572886] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
2 DEBUG [4122572886] router: match[6] network=tcp => TrafficTCP
2 INFO [4122572886] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
2 INFO [4024362530] inbound/trojan[trojan-ws]: [synricha] inbound connection to mqtt-mini.facebook.com:443
2 DEBUG [4024362530] router: sniffed protocol: tls, domain: mqtt-mini.facebook.com
2 DEBUG [4024362530] dns: lookup domain mqtt-mini.facebook.com
2 INFO [4024362530] dns: lookup succeed for mqtt-mini.facebook.com: 2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.15.34
2 DEBUG [4024362530] dns: resolved [2a03:2880:f14d:83:face:b00c:0:1ea0 157.240.15.34]
2 DEBUG [4024362530] router: match[3] domain_keyword=[hbogoasia now hbo...] geoip=id => direct
2 INFO [4024362530] outbound/direct[direct]: outbound connection to [2a03:2880:f14d:83:face:b00c:0:1ea0]:443
2 INFO [4024362530] outbound/direct[direct]: outbound connection to 157.240.15.34:443
4 INFO [3135308781] inbound/trojan[trojan-ws]: [synricha] inbound connection to 91.108.56.130:5222
4 DEBUG [3135308781] router: match[6] network=tcp => TrafficTCP
4 INFO [3135308781] outbound/wireguard[wireguard-out]: outbound connection to 91.108.56.130:5222
5 INFO [1264934789] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
5 DEBUG [1264934789] router: match[6] network=tcp => TrafficTCP
5 INFO [1264934789] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
5 INFO [1635620204] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
6 DEBUG [1635620204] router: match[6] network=tcp => TrafficTCP
6 INFO [1635620204] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
6 INFO [2469127263] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
6 DEBUG [2469127263] router: match[6] network=tcp => TrafficTCP
6 INFO [2469127263] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
8 INFO [3703659135] inbound/trojan[trojan-ws]: [synricha] inbound connection to mtalk.google.com:5228
8 DEBUG [3703659135] router: sniffed protocol: tls, domain: mtalk.google.com
8 DEBUG [3703659135] dns: lookup domain mtalk.google.com
8 INFO [909368946] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
8 DEBUG [909368946] router: match[6] network=tcp => TrafficTCP
8 INFO [909368946] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
8 INFO [3703659135] dns: lookup succeed for mtalk.google.com: 2404:6800:4003:c04::bc 74.125.68.188
8 DEBUG [3703659135] dns: resolved [2404:6800:4003:c04::bc 74.125.68.188]
8 DEBUG [3703659135] router: match[6] network=tcp => TrafficTCP
8 INFO [3703659135] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c04::bc]:5228
9 INFO [416993440] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
9 DEBUG [416993440] router: match[6] network=tcp => TrafficTCP
9 INFO [416993440] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
9 INFO [1555780840] inbound/trojan[trojan-ws]: [synricha] inbound connection to 63.34.50.90:5692
10 DEBUG [1555780840] router: match[6] network=tcp => TrafficTCP
10 INFO [1555780840] outbound/wireguard[wireguard-out]: outbound connection to 63.34.50.90:5692
10 INFO [461212730] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 54.216.181.116:17000
10 DEBUG [461212730] router: match[6] network=tcp => TrafficTCP
10 INFO [461212730] outbound/wireguard[wireguard-out]: outbound packet connection to 54.216.181.116:17000
12 INFO [3642382683] inbound/trojan[trojan-ws]: [synricha] inbound packet connection to 1.1.1.1:53
12 DEBUG [3642382683] router: sniffed packet protocol: dns
12 DEBUG [3642382683] router: match[1] protocol=dns => dns-out
12 DEBUG [3642382683] dns: exchange apasih.id A INET
12 DEBUG [3642382683] dns: exchange android.clients.google.com AAAA INET
12 DEBUG [3642382683] dns: exchange litestatis.ekatox.com AAAA INET
12 DEBUG [3642382683] dns: exchange litestatis.ekatox.com A INET
12 DEBUG [3642382683] dns: exchange us.browserapi.micloud.xiaomi.net AAAA INET
12 DEBUG [3642382683] dns: exchange us.browserapi.micloud.xiaomi.net A INET
12 DEBUG [3642382683] dns: exchange apasih.id AAAA INET
12 INFO [3642382683] dns: exchanged litestatis.ekatox.com. A 65.0.241.118
12 INFO [3642382683] dns: exchanged litestatis.ekatox.com. A 65.0.235.66
12 INFO [3642382683] dns: exchanged litestatis.ekatox.com. A 65.0.228.74
12 INFO [3642382683] dns: exchanged android.clients.google.com. CNAME android.l.google.com.
12 INFO [3642382683] dns: exchanged us.browserapi.micloud.xiaomi.net. A 47.241.65.164
12 INFO [3642382683] dns: exchanged us.browserapi.micloud.xiaomi.net. A 8.214.46.209
12 INFO [110748339] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.noteapi.micloud.xiaomi.net:443
12 DEBUG [110748339] router: sniffed protocol: tls, domain: us.noteapi.micloud.xiaomi.net
12 DEBUG [110748339] dns: lookup domain us.noteapi.micloud.xiaomi.net
12 INFO [3609015377] inbound/trojan[trojan-ws]: [synricha] inbound connection to userlocation.googleapis.com:443
12 DEBUG [3609015377] router: sniffed protocol: tls, domain: userlocation.googleapis.com
12 DEBUG [3609015377] dns: lookup domain userlocation.googleapis.com
12 INFO [3504464089] inbound/trojan[trojan-ws]: [synricha] inbound connection to www.googleapis.com:443
12 DEBUG [3504464089] router: sniffed protocol: tls, domain: www.googleapis.com
12 DEBUG [3504464089] dns: lookup domain www.googleapis.com
12 INFO [14980806] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.pdc.micloud.xiaomi.net:443
12 DEBUG [14980806] router: sniffed protocol: tls, domain: us.pdc.micloud.xiaomi.net
12 DEBUG [14980806] dns: lookup domain us.pdc.micloud.xiaomi.net
12 INFO [2754598838] inbound/trojan[trojan-ws]: [synricha] inbound connection to us.smsapi.micloud.xiaomi.net:443
12 DEBUG [2754598838] router: sniffed protocol: tls, domain: us.smsapi.micloud.xiaomi.net
12 DEBUG [2754598838] dns: lookup domain us.smsapi.micloud.xiaomi.net
12 INFO [80780311] inbound/trojan[trojan-ws]: [synricha] inbound connection to people-pa.googleapis.com:443
12 DEBUG [80780311] router: sniffed protocol: tls, domain: people-pa.googleapis.com
12 DEBUG [80780311] dns: lookup domain people-pa.googleapis.com
12 INFO [3609015377] dns: lookup succeed for userlocation.googleapis.com: 2404:6800:4003:c11::5f 74.125.24.95
12 DEBUG [3609015377] dns: resolved [2404:6800:4003:c11::5f 74.125.24.95]
12 DEBUG [3609015377] router: match[6] network=tcp => TrafficTCP
12 INFO [3609015377] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::5f]:443
12 INFO [3504464089] dns: lookup succeed for www.googleapis.com: 2404:6800:4003:c11::5f 2404:6800:4003:c04::5f 2404:6800:4003:c06::5f 2404:6800:4003:c02::5f 74.125.200.95 74.125.68.95 74.125.24.95 142.251.10.95 142.251.12.95 172.217.194.95 142.250.4.95
12 DEBUG [3504464089] dns: resolved [2404:6800:4003:c11::5f 2404:6800:4003:c04::5f 2404:6800:4003:c06::5f 2404:6800:4003:c02::5f 74.125.200.95 74.125.68.95 74.125.24.95 142.251.10.95 142.251.12.95 172.217.194.95 142.250.4.95]
12 DEBUG [3504464089] router: match[6] network=tcp => TrafficTCP
12 INFO [3504464089] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c11::5f]:443
12 INFO [80780311] dns: lookup succeed for people-pa.googleapis.com: 2404:6800:4003:c03::5f 142.251.12.95
12 DEBUG [80780311] dns: resolved [2404:6800:4003:c03::5f 142.251.12.95]
12 DEBUG [80780311] router: match[6] network=tcp => TrafficTCP
12 INFO [80780311] outbound/wireguard[wireguard-out]: outbound connection to [2404:6800:4003:c03::5f]:443
12 INFO [2754598838] dns: lookup succeed for us.smsapi.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
12 DEBUG [2754598838] dns: resolved [47.241.65.164 8.214.46.209]
12 DEBUG [2754598838] router: match[0] geosite=cn geoip=cn => block
12 INFO [2754598838] outbound/block[block]: blocked connection to us.smsapi.micloud.xiaomi.net:443
12 INFO [14980806] dns: lookup succeed for us.pdc.micloud.xiaomi.net: 47.241.65.164 8.214.46.209
12 DEBUG [14980806] dns: resolved [47.241.65.164 8.214.46.209]
12 DEBUG [14980806] router: match[0] geosite=cn geoip=cn => block
12 INFO [14980806] outbound/block[block]: blocked connection to us.pdc.micloud.xiaomi.net:443
13 DEBUG [3642382683] dns: exchange inbox.google.com AAAA INET
13 DEBUG [3642382683] dns: exchange inbox.google.com A INET
13 DEBUG [3642382683] dns: exchange iptunnels.com A INET
13 DEBUG [3642382683] dns: exchange iptunnels.com AAAA INET
13 INFO [110748339] dns: lookup succeed for us.noteapi.micloud.xiaomi.net: 8.214.46.209 47.241.65.164
13 DEBUG [110748339] dns: resolved [8.214.46.209 47.241.65.164]
13 DEBUG [110748339] router: match[0] geosite=cn geoip=cn => block
13 INFO [110748339] outbound/block[block]: blocked connection to us.noteapi.micloud.xiaomi.net:443
13 INFO [3642382683] dns: exchanged inbox.google.com. AAAA 2404:6800:4003:c03::13
13 INFO [3642382683] dns: exchanged inbox.google.com. AAAA 2404:6800:4003:c03::53
13 INFO [3642382683] dns: exchanged inbox.google.com. AAAA 2404:6800:4003:c03::12
13 INFO [3642382683] dns: exchanged inbox.google.com. AAAA 2404:6800:4003:c03::11
13 INFO [3642382683] dns: exchanged inbox.google.com. A 74.125.24.18
13 INFO [3642382683] dns: exchanged inbox.google.com. A 74.125.24.17
13 INFO [3642382683] dns: exchanged inbox.google.com. A 74.125.24.83
13 INFO [3642382683] dns: exchanged inbox.google.com. A 74.125.24.19
13 INFO [3642382683] dns: exchanged iptunnels.com. A 172.104.190.111
0 DEBUG outbound/wireguard[wireguard-out]: uapi: updating private key
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: created
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: updating endpoint
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - uapi: adding allowedip
0 INFO router: loaded geoip database: 250 codes
0 INFO router: loaded geosite database: 1030 codes
0 DEBUG outbound/wireguard[wireguard-out]: routine: encryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: decryption worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: handshake worker 1 - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: tun reader - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: event worker - started
0 DEBUG outbound/wireguard[wireguard-out]: interface up requested
0 DEBUG outbound/wireguard[wireguard-out]: udp bind has been updated
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - starting
0 DEBUG outbound/wireguard[wireguard-out]: interface state was Down, requested Up, now Up
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential receiver - started
0 DEBUG outbound/wireguard[wireguard-out]: routine: receive incoming receive - started
0 DEBUG outbound/wireguard[wireguard-out]: peer(bmXO…fgyo) - routine: sequential sender - started
0 INFO inbound/trojan[trojan-ws]: tcp server started at 127.0.0.1:1080
0 INFO inbound/trojan[trojan-grpc]: tcp server started at 127.0.0.1:1081
0 INFO inbound/vmess[vmess-ws]: tcp server started at 127.0.0.1:2080
0 INFO inbound/vmess[vmess-gprc]: tcp server started at 127.0.0.1:2081
0 INFO clash-api: restful api listening at [::]:9090
0 INFO sing-box started (0.55s)

DNS protocol (or UDP?) does not transfer properly through Trojan protocol

Welcome

  • Yes, I'm using the latest major release. Only such installations are supported.
  • Yes, I'm using the latest Golang release. Only such installations are supported.
  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've included all information below (version, config, log, etc).

Description of the problem

DNS protocol (or UDP?) does not transfer properly through Trojan protocol

Version of sing-box

Client:

$ sing-box --version
Error: unknown flag: --version
$ sing-box version
sing-box 1.0-beta2.728722e (go1.19, linux/amd64, CGO enabled)

Server:

bash-5.1# sing-box --version
FATAL[0000] unknown flag: --version
bash-5.1# sing-box version
sing-box 1.0-beta2.c6ef27681189911b5ac124a68444aa8b11c0b4e0 (go1.19, linux/amd64, CGO disabled)

Server and client configuration file

Client:
{
  "log": {
    "level": "debug"
  },
  "dns": {
    "servers": [
      {
        "tag": "cloudflare",
        "address": "1.1.1.1",
        "detour": "trojan-out"
      }
    ],
    "rules": [
      {
        "geosite":[
          "geolocation-!cn"
        ],
        "server": "cloudflare"
      }
    ]
  },
  "inbounds": [
    {
      "type": "tun",
      "tag": "tun-in",
      "inet4_address": "172.19.0.1/30",
      "auto_route": true,
      "udp_timeout": 3000,
      "stack": "gvisor",
      "sniff": true,
      "sniff_override_destination": false,
      "domain_strategy": "prefer_ipv4"
    }
  ],
  "outbounds": [
    {
      "type": "direct",
      "tag": "direct"
    },
    {
      "type": "trojan",
      "tag": "trojan-out",
      "server": "HIDDEN",
      "server_port": 443,
      "password": "SING-BOX",
      "tls": {
        "enabled": true,
        "server_name": "HIDDEN"
      },
      "connect_timeout": "5s",
      "tcp_fast_open": true,
      "fallback_delay": "200ms"
    },
    {
      "type": "dns",
      "tag": "dns-out"
    }
  ],
  "route": {
    "auto_detect_interface": true,
    "geoip": {
      "download_detour": "trojan-out"
    },
    "geosite": {
      "download_detour": "trojan-out"
    },
    "rules": [
      {
        "protocol": "dns",
        "outbound": "dns-out"
      }
    ]
  }
}

Server:

{
  "log": {
    "disabled": false,
    "level": "debug",
    "timestamp": true
  },
  "inbounds": [
    {
      "type": "trojan",
      "tag": "trojan-in",
      "listen": "0.0.0.0",
      "listen_port": 443,
      "tcp_fast_open": true,
      "proxy_protocol": true,
      "domain_strategy": "prefer_ipv4",
      "sniff":false,
      "users": [
        {
          "name": "SING-BOX",
          "password": "SING-BOX"
        }
      ],
      "tls": {
        "enabled": true,
        "server_name": "HIDDEN",
        "alpn": [
          "h2",
          "http/1.1"
        ],
        "min_version": "1.2",
        "certificate_path": "HIDDEN",
        "key_path": "HIDDEN"
      }
    }
  ],
  "outbounds": [
    {
      "type": "direct",
      "tag": "direct-out"
    },
    {
      "type": "block",
      "tag": "block"
    }
  ]
}
Proxy protocol sent by Haproxy

Server and client log file

When trying to make a dns request

$ dig google.com @1.1.1.1
;; communications error to 1.1.1.1#53: timed out
;; communications error to 1.1.1.1#53: timed out

Server log:

ERROR [0] inbound/trojan[trojan-in]: process connection from HIDDEN: bad request size: fallback disabled

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.