Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

gnirehtet with apacheCommonsNet #84

Closed
usatek opened this issue Feb 15, 2018 · 19 comments
Closed

gnirehtet with apacheCommonsNet #84

usatek opened this issue Feb 15, 2018 · 19 comments
Assignees
Labels

Comments

@usatek
Copy link

usatek commented Feb 15, 2018

I am trying to use gnirehtet to copy images to FTP using apacheCommonsNet library ver 3.6. When I try to copy files I usually get one uncompleted file. Log from bash shows a lot of "Ignoring packet". I dont have this problem with apacheCommonsNet when I use WiFi. Can it be problem with gnirehtet?

2018-02-15 21:34:16.120 INFO Main: Checking gnirehtet client...
2018-02-15 21:34:20.355 INFO Main: Starting relay server...
2018-02-15 21:34:20.355 INFO Main: Starting client...
2018-02-15 21:34:20.357 INFO Relay: Relay server started
Broadcasting: Intent { act=com.genymobile.gnirehtet.START cmp=com.genymobile.gnirehtet/.GnirehtetControlReceiver }
Broadcast completed: result=0
2018-02-15 21:34:21.923 INFO TunnelServer: Client #0 connected
2018-02-15 21:34:22.435 INFO UdpConnection: 10.0.0.2:15870 -> 8.8.8.8:53 Open
2018-02-15 21:34:22.464 INFO UdpConnection: 10.0.0.2:35546 -> 172.217.22.4:443 Open
2018-02-15 21:34:22.469 INFO TcpConnection: 10.0.0.2:49290 -> 172.217.22.4:443 Open
2018-02-15 21:34:22.503 INFO UdpConnection: 10.0.0.2:18407 -> 8.8.8.8:53 Open
2018-02-15 21:34:22.614 INFO TcpConnection: 10.0.0.2:49629 -> 40.112.64.30:443 Open
2018-02-15 21:34:22.741 INFO UdpConnection: 10.0.0.2:11656 -> 8.8.8.8:53 Open
2018-02-15 21:34:22.819 INFO UdpConnection: 10.0.0.2:43598 -> 64.233.166.139:443 Open
2018-02-15 21:34:22.897 INFO TcpConnection: 10.0.0.2:60183 -> 64.233.166.139:443 Open
2018-02-15 21:34:22.954 INFO UdpConnection: 10.0.0.2:16655 -> 8.8.8.8:53 Open
2018-02-15 21:34:22.998 INFO TcpConnection: 10.0.0.2:49394 -> 172.217.22.99:443 Open
2018-02-15 21:34:23.009 INFO TcpConnection: 10.0.0.2:35065 -> 172.217.22.99:80 Open
2018-02-15 21:34:23.283 INFO TcpConnection: 10.0.0.2:49629 -> 40.112.64.30:443 Close
2018-02-15 21:34:23.479 INFO UdpConnection: 10.0.0.2:18709 -> 8.8.8.8:53 Open
2018-02-15 21:34:23.530 INFO TcpConnection: 10.0.0.2:36791 -> 172.217.16.10:443 Open
2018-02-15 21:34:23.671 INFO TcpConnection: 10.0.0.2:49634 -> 40.112.64.30:443 Open
2018-02-15 21:34:23.900 INFO TcpConnection: 10.0.0.2:40829 -> 172.217.20.202:443 Open
2018-02-15 21:34:24.286 INFO TcpConnection: 10.0.0.2:49634 -> 40.112.64.30:443 Close
2018-02-15 21:34:26.650 INFO UdpConnection: 10.0.0.2:3300 -> 8.8.8.8:53 Open
2018-02-15 21:34:26.681 INFO UdpConnection: 10.0.0.2:32081 -> 8.8.8.8:53 Open
2018-02-15 21:34:26.698 INFO UdpConnection: 10.0.0.2:21708 -> 8.8.8.8:53 Open
2018-02-15 21:34:26.764 INFO UdpConnection: 10.0.0.2:58924 -> 172.217.20.170:443 Open
2018-02-15 21:34:26.801 INFO UdpConnection: 10.0.0.2:41930 -> 172.217.23.174:443 Open
2018-02-15 21:34:26.801 INFO UdpConnection: 10.0.0.2:38533 -> 172.217.22.110:443 Open
2018-02-15 21:34:26.805 INFO TcpConnection: 10.0.0.2:33304 -> 172.217.20.170:443 Open
2018-02-15 21:34:26.869 INFO TcpConnection: 10.0.0.2:39916 -> 172.217.22.110:443 Open
2018-02-15 21:34:27.016 INFO TcpConnection: 10.0.0.2:46668 -> 172.217.23.174:443 Open
2018-02-15 21:34:27.106 INFO TcpConnection: 10.0.0.2:33304 -> 172.217.20.170:443 Close
2018-02-15 21:34:27.144 INFO TcpConnection: 10.0.0.2:39916 -> 172.217.22.110:443 Close
2018-02-15 21:37:20.391 INFO UdpConnection: 10.0.0.2:38533 -> 172.217.22.110:443 Close
2018-02-15 21:37:20.391 INFO UdpConnection: 10.0.0.2:41930 -> 172.217.23.174:443 Close
2018-02-15 21:37:20.391 INFO UdpConnection: 10.0.0.2:58924 -> 172.217.20.170:443 Close
2018-02-15 21:37:20.391 INFO UdpConnection: 10.0.0.2:21708 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.392 INFO UdpConnection: 10.0.0.2:32081 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.392 INFO UdpConnection: 10.0.0.2:3300 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.392 INFO UdpConnection: 10.0.0.2:18709 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.393 INFO UdpConnection: 10.0.0.2:16655 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.393 INFO UdpConnection: 10.0.0.2:43598 -> 64.233.166.139:443 Close
2018-02-15 21:37:20.394 INFO UdpConnection: 10.0.0.2:11656 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.394 INFO UdpConnection: 10.0.0.2:18407 -> 8.8.8.8:53 Close
2018-02-15 21:37:20.394 INFO UdpConnection: 10.0.0.2:35546 -> 172.217.22.4:443 Close
2018-02-15 21:37:20.394 INFO UdpConnection: 10.0.0.2:15870 -> 8.8.8.8:53 Close
2018-02-15 21:38:27.133 INFO TcpConnection: 10.0.0.2:40829 -> 172.217.20.202:443 Close
2018-02-15 21:39:23.967 INFO TcpConnection: 10.0.0.2:36791 -> 172.217.16.10:443 Close
2018-02-15 21:41:23.505 INFO UdpConnection: 10.0.0.2:55124 -> 8.8.8.8:53 Open
2018-02-15 21:41:23.537 INFO TcpConnection: 10.0.0.2:50210 -> 13.107.5.88:443 Open
2018-02-15 21:42:29.786 ERROR TcpConnection: 10.0.0.2:50210 -> 13.107.5.88:443 Cannot read: [ConnectionReset] Istniejące połączenie zostało gwałtownie zamknięte przez zdalnego hosta. (os error 10054)
2018-02-15 21:42:29.786 INFO TcpConnection: 10.0.0.2:50210 -> 13.107.5.88:443 Close
2018-02-15 21:44:20.787 INFO UdpConnection: 10.0.0.2:55124 -> 8.8.8.8:53 Close
2018-02-15 21:51:04.922 INFO UdpConnection: 10.0.0.2:20451 -> 8.8.8.8:53 Open
2018-02-15 21:51:04.958 INFO TcpConnection: 10.0.0.2:45619 -> 13.74.34.99:443 Open
2018-02-15 21:51:05.439 INFO TcpConnection: 10.0.0.2:45619 -> 13.74.34.99:443 Close
2018-02-15 21:51:05.448 INFO TcpConnection: 10.0.0.2:45619 -> 13.74.34.99:443 Open
2018-02-15 21:51:05.449 WARN TcpConnection: 10.0.0.2:45619 -> 13.74.34.99:443 Unexpected first packet 3250436237; acking 0; flags=4
2018-02-15 21:51:05.449 INFO TcpConnection: 10.0.0.2:45619 -> 13.74.34.99:443 Close
2018-02-15 21:53:20.454 INFO UdpConnection: 10.0.0.2:20451 -> 8.8.8.8:53 Close
2018-02-15 22:01:57.504 INFO UdpConnection: 10.0.0.2:45571 -> 8.8.8.8:53 Open
2018-02-15 22:01:57.594 INFO TcpConnection: 10.0.0.2:45972 -> 40.112.64.28:443 Open
2018-02-15 22:01:58.171 INFO TcpConnection: 10.0.0.2:45972 -> 40.112.64.28:443 Close
2018-02-15 22:01:58.293 INFO TcpConnection: 10.0.0.2:45973 -> 40.112.64.28:443 Open
2018-02-15 22:01:58.859 INFO TcpConnection: 10.0.0.2:45973 -> 40.112.64.28:443 Close
2018-02-15 22:04:20.860 INFO UdpConnection: 10.0.0.2:45571 -> 8.8.8.8:53 Close
2018-02-15 22:11:23.750 INFO UdpConnection: 10.0.0.2:30864 -> 8.8.8.8:53 Open
2018-02-15 22:11:23.796 INFO TcpConnection: 10.0.0.2:50214 -> 13.107.5.88:443 Open
2018-02-15 22:12:29.251 ERROR TcpConnection: 10.0.0.2:50214 -> 13.107.5.88:443 Cannot read: [ConnectionReset] Istniejące połączenie zostało gwałtownie zamknięte przez zdalnego hosta. (os error 10054)
2018-02-15 22:12:29.252 INFO TcpConnection: 10.0.0.2:50214 -> 13.107.5.88:443 Close
2018-02-15 22:14:20.253 INFO UdpConnection: 10.0.0.2:30864 -> 8.8.8.8:53 Close
2018-02-15 22:16:00.928 INFO TcpConnection: 10.0.0.2:46668 -> 172.217.23.174:443 Close
2018-02-15 22:16:08.810 INFO TcpConnection: 10.0.0.2:55283 -> 192.168.29.19:21 Open
2018-02-15 22:19:05.618 INFO TcpConnection: 10.0.0.2:55284 -> 192.168.29.19:21 Open
2018-02-15 22:19:23.731 INFO TcpConnection: 10.0.0.2:55285 -> 192.168.29.19:21 Open
2018-02-15 22:19:24.250 INFO TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Open
2018-02-15 22:19:24.546 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Not enough space, dropping packet
2018-02-15 22:19:24.546 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014378773; expecting 3014378237; flags=16
2018-02-15 22:19:24.547 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014379309; expecting 3014378237; flags=16
2018-02-15 22:19:24.547 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014379845; expecting 3014378237; flags=16
2018-02-15 22:19:24.547 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014380381; expecting 3014378237; flags=16
2018-02-15 22:19:24.549 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014380917; expecting 3014378237; flags=16
2018-02-15 22:19:24.549 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014381453; expecting 3014378237; flags=16
2018-02-15 22:19:24.549 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014381989; expecting 3014378237; flags=16
2018-02-15 22:19:24.549 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014382525; expecting 3014378237; flags=16
2018-02-15 22:19:24.549 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014383061; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014383597; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014384133; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014384669; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014385205; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014385741; expecting 3014378237; flags=16
2018-02-15 22:19:24.550 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014386277; expecting 3014378237; flags=16
2018-02-15 22:19:24.551 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014386813; expecting 3014378237; flags=16
2018-02-15 22:19:24.551 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014387349; expecting 3014378237; flags=16
2018-02-15 22:19:24.552 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014387885; expecting 3014378237; flags=16
2018-02-15 22:19:24.553 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014388421; expecting 3014378237; flags=16
2018-02-15 22:19:24.553 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014388957; expecting 3014378237; flags=16
2018-02-15 22:19:24.554 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014389493; expecting 3014378237; flags=16
2018-02-15 22:19:24.554 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014390029; expecting 3014378237; flags=16
2018-02-15 22:19:24.555 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014390565; expecting 3014378237; flags=16
2018-02-15 22:19:24.560 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014391101; expecting 3014378237; flags=16
2018-02-15 22:19:24.561 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014391637; expecting 3014378237; flags=16
2018-02-15 22:19:24.562 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014392173; expecting 3014378237; flags=16
2018-02-15 22:19:24.562 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014392709; expecting 3014378237; flags=16
2018-02-15 22:19:24.563 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014393245; expecting 3014378237; flags=16
2018-02-15 22:19:24.563 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014393781; expecting 3014378237; flags=16
2018-02-15 22:19:24.564 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014394317; expecting 3014378237; flags=16
2018-02-15 22:19:24.564 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014394853; expecting 3014378237; flags=16
2018-02-15 22:19:24.564 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014395389; expecting 3014378237; flags=16
2018-02-15 22:19:24.565 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014395925; expecting 3014378237; flags=16
2018-02-15 22:19:24.565 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014396461; expecting 3014378237; flags=16
2018-02-15 22:19:24.565 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014396997; expecting 3014378237; flags=16
2018-02-15 22:19:24.566 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014397533; expecting 3014378237; flags=16
2018-02-15 22:19:24.568 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014398069; expecting 3014378237; flags=16
2018-02-15 22:19:24.570 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014398605; expecting 3014378237; flags=16
2018-02-15 22:19:24.571 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014399141; expecting 3014378237; flags=16
2018-02-15 22:19:24.571 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014399677; expecting 3014378237; flags=16
2018-02-15 22:19:24.572 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014400213; expecting 3014378237; flags=16
2018-02-15 22:19:24.572 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014400749; expecting 3014378237; flags=16
2018-02-15 22:19:24.573 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014401285; expecting 3014378237; flags=16
2018-02-15 22:19:24.574 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014401821; expecting 3014378237; flags=16
2018-02-15 22:19:24.574 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014402357; expecting 3014378237; flags=16
2018-02-15 22:19:24.575 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014402893; expecting 3014378237; flags=16
2018-02-15 22:19:24.579 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014403429; expecting 3014378237; flags=16
2018-02-15 22:19:24.581 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014403965; expecting 3014378237; flags=16
2018-02-15 22:19:24.582 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014404501; expecting 3014378237; flags=16
2018-02-15 22:19:24.582 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014405037; expecting 3014378237; flags=16
2018-02-15 22:19:24.582 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014405573; expecting 3014378237; flags=16
2018-02-15 22:19:24.583 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014406109; expecting 3014378237; flags=16
2018-02-15 22:19:24.583 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014406645; expecting 3014378237; flags=16
2018-02-15 22:19:24.584 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014407181; expecting 3014378237; flags=16
2018-02-15 22:19:24.584 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014407717; expecting 3014378237; flags=16
2018-02-15 22:19:24.584 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014408253; expecting 3014378237; flags=16
2018-02-15 22:19:24.585 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014408789; expecting 3014378237; flags=16
2018-02-15 22:19:24.585 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014409325; expecting 3014378237; flags=16
2018-02-15 22:19:24.585 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014409861; expecting 3014378237; flags=16
2018-02-15 22:19:24.586 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014410397; expecting 3014378237; flags=16
2018-02-15 22:19:24.586 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014410933; expecting 3014378237; flags=16
2018-02-15 22:19:24.586 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014411469; expecting 3014378237; flags=16
2018-02-15 22:19:24.587 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014412005; expecting 3014378237; flags=16
2018-02-15 22:19:24.590 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014412541; expecting 3014378237; flags=16
2018-02-15 22:19:24.592 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014413077; expecting 3014378237; flags=16
2018-02-15 22:19:24.593 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014413613; expecting 3014378237; flags=16
2018-02-15 22:19:24.593 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014414149; expecting 3014378237; flags=16
2018-02-15 22:19:24.594 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014414685; expecting 3014378237; flags=16
2018-02-15 22:19:24.594 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014415221; expecting 3014378237; flags=16
2018-02-15 22:19:24.595 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014415757; expecting 3014378237; flags=16
2018-02-15 22:19:24.595 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014416293; expecting 3014378237; flags=16
2018-02-15 22:19:24.596 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014416829; expecting 3014378237; flags=16
2018-02-15 22:19:24.596 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014417365; expecting 3014378237; flags=16
2018-02-15 22:19:24.597 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014417901; expecting 3014378237; flags=16
2018-02-15 22:19:24.597 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014418437; expecting 3014378237; flags=16
2018-02-15 22:19:24.598 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014418973; expecting 3014378237; flags=16
2018-02-15 22:19:24.598 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014419509; expecting 3014378237; flags=16
2018-02-15 22:19:24.598 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014420045; expecting 3014378237; flags=16
2018-02-15 22:19:24.601 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014420581; expecting 3014378237; flags=16
2018-02-15 22:19:24.603 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014421117; expecting 3014378237; flags=16
2018-02-15 22:19:24.603 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014421653; expecting 3014378237; flags=16
2018-02-15 22:19:24.603 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014422189; expecting 3014378237; flags=16
2018-02-15 22:19:24.604 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014422725; expecting 3014378237; flags=16
2018-02-15 22:19:24.604 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014423261; expecting 3014378237; flags=16
2018-02-15 22:19:24.605 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014423797; expecting 3014378237; flags=16
2018-02-15 22:19:24.607 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014424333; expecting 3014378237; flags=16
2018-02-15 22:19:24.607 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014424869; expecting 3014378237; flags=16
2018-02-15 22:19:24.607 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014425405; expecting 3014378237; flags=16
2018-02-15 22:19:24.607 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014425941; expecting 3014378237; flags=16
2018-02-15 22:19:24.608 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014426477; expecting 3014378237; flags=16
2018-02-15 22:19:24.608 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014427013; expecting 3014378237; flags=16
2018-02-15 22:19:24.609 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014427549; expecting 3014378237; flags=16
2018-02-15 22:19:24.609 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014428085; expecting 3014378237; flags=16
2018-02-15 22:19:24.609 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014428621; expecting 3014378237; flags=16
2018-02-15 22:19:24.612 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014429157; expecting 3014378237; flags=16
2018-02-15 22:19:24.614 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014429693; expecting 3014378237; flags=16
2018-02-15 22:19:24.614 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014430229; expecting 3014378237; flags=16
2018-02-15 22:19:24.615 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014430765; expecting 3014378237; flags=16
2018-02-15 22:19:24.615 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014431301; expecting 3014378237; flags=16
2018-02-15 22:19:24.616 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014431837; expecting 3014378237; flags=16
2018-02-15 22:19:24.616 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014432373; expecting 3014378237; flags=16
2018-02-15 22:19:24.617 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014432909; expecting 3014378237; flags=16
2018-02-15 22:19:24.617 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014433445; expecting 3014378237; flags=16
2018-02-15 22:19:24.617 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014433981; expecting 3014378237; flags=16
2018-02-15 22:19:24.618 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014434517; expecting 3014378237; flags=16
2018-02-15 22:19:24.618 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014435053; expecting 3014378237; flags=16
2018-02-15 22:19:24.618 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014435589; expecting 3014378237; flags=16
2018-02-15 22:19:24.619 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014436125; expecting 3014378237; flags=16
2018-02-15 22:19:24.619 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014436661; expecting 3014378237; flags=16
2018-02-15 22:19:24.619 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014437197; expecting 3014378237; flags=16
2018-02-15 22:19:24.620 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014437733; expecting 3014378237; flags=16
2018-02-15 22:19:24.620 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014438269; expecting 3014378237; flags=16
2018-02-15 22:19:24.625 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014438805; expecting 3014378237; flags=16
2018-02-15 22:19:24.626 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014439341; expecting 3014378237; flags=16
2018-02-15 22:19:24.626 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014439877; expecting 3014378237; flags=16
2018-02-15 22:19:24.627 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014440413; expecting 3014378237; flags=16
2018-02-15 22:19:24.627 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014440949; expecting 3014378237; flags=16
2018-02-15 22:19:24.628 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014441485; expecting 3014378237; flags=16
2018-02-15 22:19:24.629 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014442021; expecting 3014378237; flags=16
2018-02-15 22:19:24.629 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014442557; expecting 3014378237; flags=16
2018-02-15 22:19:24.630 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014443093; expecting 3014378237; flags=16
2018-02-15 22:19:24.630 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014443629; expecting 3014378237; flags=16
2018-02-15 22:19:24.630 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Not enough space, dropping packet
2018-02-15 22:19:24.762 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Not enough space, dropping packet
2018-02-15 22:19:25.193 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014443772; expecting 3014378773; flags=16
2018-02-15 22:19:25.262 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014444308; expecting 3014443772; flags=16
2018-02-15 22:19:25.263 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014444844; expecting 3014443772; flags=16
2018-02-15 22:19:25.264 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014445380; expecting 3014443772; flags=16
2018-02-15 22:19:25.266 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014445916; expecting 3014443772; flags=16
2018-02-15 22:19:25.267 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014446452; expecting 3014443772; flags=16
2018-02-15 22:19:25.268 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014446988; expecting 3014443772; flags=16
2018-02-15 22:19:25.268 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014447524; expecting 3014443772; flags=16
2018-02-15 22:19:25.269 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014447917; expecting 3014443772; flags=16
2018-02-15 22:19:25.269 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014448453; expecting 3014443772; flags=16
2018-02-15 22:19:25.270 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014448989; expecting 3014443772; flags=16
2018-02-15 22:19:25.270 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014449525; expecting 3014443772; flags=16
2018-02-15 22:19:25.271 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014450061; expecting 3014443772; flags=16
2018-02-15 22:19:25.275 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014450597; expecting 3014443772; flags=16
2018-02-15 22:19:25.277 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014451133; expecting 3014443772; flags=16
2018-02-15 22:19:25.277 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014451669; expecting 3014443772; flags=16
2018-02-15 22:19:25.278 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014452205; expecting 3014443772; flags=16
2018-02-15 22:19:25.278 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014452741; expecting 3014443772; flags=16
2018-02-15 22:19:25.279 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014453277; expecting 3014443772; flags=16
2018-02-15 22:19:25.280 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014453813; expecting 3014443772; flags=16
2018-02-15 22:19:25.280 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014454349; expecting 3014443772; flags=16
2018-02-15 22:19:25.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014454885; expecting 3014443772; flags=16
2018-02-15 22:19:25.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014455421; expecting 3014443772; flags=16
2018-02-15 22:19:25.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014455957; expecting 3014443772; flags=16
2018-02-15 22:19:25.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014456493; expecting 3014443772; flags=16
2018-02-15 22:19:25.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014457029; expecting 3014443772; flags=16
2018-02-15 22:19:25.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014457565; expecting 3014443772; flags=16
2018-02-15 22:19:25.283 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014458101; expecting 3014443772; flags=16
2018-02-15 22:19:25.283 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014458637; expecting 3014443772; flags=16
2018-02-15 22:19:25.286 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014459173; expecting 3014443772; flags=16
2018-02-15 22:19:25.287 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014459709; expecting 3014443772; flags=16
2018-02-15 22:19:25.287 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014460245; expecting 3014443772; flags=16
2018-02-15 22:19:25.289 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014460781; expecting 3014443772; flags=16
2018-02-15 22:19:25.290 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014461317; expecting 3014443772; flags=16
2018-02-15 22:19:25.290 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014461853; expecting 3014443772; flags=16
2018-02-15 22:19:25.291 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014462389; expecting 3014443772; flags=16
2018-02-15 22:19:25.291 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014462925; expecting 3014443772; flags=16
2018-02-15 22:19:25.292 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014463461; expecting 3014443772; flags=16
2018-02-15 22:19:25.292 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014463997; expecting 3014443772; flags=16
2018-02-15 22:19:25.292 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014464533; expecting 3014443772; flags=16
2018-02-15 22:19:25.293 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014465069; expecting 3014443772; flags=16
2018-02-15 22:19:25.293 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014465605; expecting 3014443772; flags=16
2018-02-15 22:19:25.294 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014466141; expecting 3014443772; flags=16
2018-02-15 22:19:25.294 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014466677; expecting 3014443772; flags=16
2018-02-15 22:19:25.298 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014467213; expecting 3014443772; flags=16
2018-02-15 22:19:25.299 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014467749; expecting 3014443772; flags=16
2018-02-15 22:19:25.299 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014468285; expecting 3014443772; flags=16
2018-02-15 22:19:25.300 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014468821; expecting 3014443772; flags=16
2018-02-15 22:19:25.301 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014469357; expecting 3014443772; flags=16
2018-02-15 22:19:25.301 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014469893; expecting 3014443772; flags=16
2018-02-15 22:19:25.302 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014470429; expecting 3014443772; flags=16
2018-02-15 22:19:25.302 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014470965; expecting 3014443772; flags=16
2018-02-15 22:19:25.303 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014471501; expecting 3014443772; flags=16
2018-02-15 22:19:25.303 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014472037; expecting 3014443772; flags=16
2018-02-15 22:19:25.303 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014472573; expecting 3014443772; flags=16
2018-02-15 22:19:25.304 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014473109; expecting 3014443772; flags=16
2018-02-15 22:19:25.304 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014473645; expecting 3014443772; flags=16
2018-02-15 22:19:25.306 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014474181; expecting 3014443772; flags=16
2018-02-15 22:19:25.311 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014474717; expecting 3014443772; flags=16
2018-02-15 22:19:25.311 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014475253; expecting 3014443772; flags=16
2018-02-15 22:19:25.311 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014475789; expecting 3014443772; flags=16
2018-02-15 22:19:25.312 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014476325; expecting 3014443772; flags=16
2018-02-15 22:19:25.312 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014476861; expecting 3014443772; flags=16
2018-02-15 22:19:25.313 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014477397; expecting 3014443772; flags=16
2018-02-15 22:19:25.313 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014477933; expecting 3014443772; flags=16
2018-02-15 22:19:25.314 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014478469; expecting 3014443772; flags=16
2018-02-15 22:19:25.314 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014479005; expecting 3014443772; flags=16
2018-02-15 22:19:25.314 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014479541; expecting 3014443772; flags=16
2018-02-15 22:19:25.315 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014480077; expecting 3014443772; flags=16
2018-02-15 22:19:25.315 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014480613; expecting 3014443772; flags=16
2018-02-15 22:19:25.315 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014481149; expecting 3014443772; flags=16
2018-02-15 22:19:25.316 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014481685; expecting 3014443772; flags=16
2018-02-15 22:19:25.316 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014482221; expecting 3014443772; flags=16
2018-02-15 22:19:25.317 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014482757; expecting 3014443772; flags=16
2018-02-15 22:19:25.321 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014483293; expecting 3014443772; flags=16
2018-02-15 22:19:25.321 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014483829; expecting 3014443772; flags=16
2018-02-15 22:19:25.323 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014484365; expecting 3014443772; flags=16
2018-02-15 22:19:25.323 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014484901; expecting 3014443772; flags=16
2018-02-15 22:19:25.323 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014485437; expecting 3014443772; flags=16
2018-02-15 22:19:25.324 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014485973; expecting 3014443772; flags=16
2018-02-15 22:19:25.324 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014486509; expecting 3014443772; flags=16
2018-02-15 22:19:25.325 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014487045; expecting 3014443772; flags=16
2018-02-15 22:19:25.325 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014487581; expecting 3014443772; flags=16
2018-02-15 22:19:25.325 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014488117; expecting 3014443772; flags=16
2018-02-15 22:19:25.326 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014488653; expecting 3014443772; flags=16
2018-02-15 22:19:25.326 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014489189; expecting 3014443772; flags=16
2018-02-15 22:19:25.327 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014489725; expecting 3014443772; flags=16
2018-02-15 22:19:25.327 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014490261; expecting 3014443772; flags=16
2018-02-15 22:19:25.331 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014490797; expecting 3014443772; flags=16
2018-02-15 22:19:25.331 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014491333; expecting 3014443772; flags=16
2018-02-15 22:19:25.332 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014491869; expecting 3014443772; flags=16
2018-02-15 22:19:25.333 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014492405; expecting 3014443772; flags=16
2018-02-15 22:19:25.333 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014492941; expecting 3014443772; flags=16
2018-02-15 22:19:25.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014493477; expecting 3014443772; flags=16
2018-02-15 22:19:25.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014494013; expecting 3014443772; flags=16
2018-02-15 22:19:25.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014494549; expecting 3014443772; flags=16
2018-02-15 22:19:25.335 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014495085; expecting 3014443772; flags=16
2018-02-15 22:19:25.335 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014495621; expecting 3014443772; flags=16
2018-02-15 22:19:25.335 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014496157; expecting 3014443772; flags=16
2018-02-15 22:19:25.336 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014496693; expecting 3014443772; flags=16
2018-02-15 22:19:25.336 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014497229; expecting 3014443772; flags=16
2018-02-15 22:19:25.337 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014497765; expecting 3014443772; flags=16
2018-02-15 22:19:25.337 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014498301; expecting 3014443772; flags=16
2018-02-15 22:19:25.341 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014498837; expecting 3014443772; flags=16
2018-02-15 22:19:25.343 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014499373; expecting 3014443772; flags=16
2018-02-15 22:19:25.344 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014499909; expecting 3014443772; flags=16
2018-02-15 22:19:25.344 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014500445; expecting 3014443772; flags=16
2018-02-15 22:19:25.345 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014500981; expecting 3014443772; flags=16
2018-02-15 22:19:25.345 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014501517; expecting 3014443772; flags=16
2018-02-15 22:19:25.346 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014502053; expecting 3014443772; flags=16
2018-02-15 22:19:25.346 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014502589; expecting 3014443772; flags=16
2018-02-15 22:19:25.347 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014503125; expecting 3014443772; flags=16
2018-02-15 22:19:25.347 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014503661; expecting 3014443772; flags=16
2018-02-15 22:19:25.347 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014504197; expecting 3014443772; flags=16
2018-02-15 22:19:25.348 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014504733; expecting 3014443772; flags=16
2018-02-15 22:19:25.348 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014505269; expecting 3014443772; flags=16
2018-02-15 22:19:25.348 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014505805; expecting 3014443772; flags=16
2018-02-15 22:19:25.349 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014506341; expecting 3014443772; flags=16
2018-02-15 22:19:25.349 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014506877; expecting 3014443772; flags=16
2018-02-15 22:19:25.349 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014507413; expecting 3014443772; flags=16
2018-02-15 22:19:25.352 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014507949; expecting 3014443772; flags=16
2018-02-15 22:19:25.354 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014508485; expecting 3014443772; flags=16
2018-02-15 22:19:26.129 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014509021; expecting 3014444308; flags=16
2018-02-15 22:19:26.134 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014509557; expecting 3014444308; flags=16
2018-02-15 22:19:26.210 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014509843; expecting 3014509021; flags=16
2018-02-15 22:19:26.213 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014510379; expecting 3014509021; flags=16
2018-02-15 22:19:26.213 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014510915; expecting 3014509021; flags=16
2018-02-15 22:19:26.214 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014511451; expecting 3014509021; flags=16
2018-02-15 22:19:26.215 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014511987; expecting 3014509021; flags=16
2018-02-15 22:19:26.216 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014512523; expecting 3014509021; flags=16
2018-02-15 22:19:26.217 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014513059; expecting 3014509021; flags=16
2018-02-15 22:19:26.219 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014513595; expecting 3014509021; flags=16
2018-02-15 22:19:26.219 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014514131; expecting 3014509021; flags=16
2018-02-15 22:19:26.220 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014514667; expecting 3014509021; flags=16
2018-02-15 22:19:26.228 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014515203; expecting 3014509021; flags=16
2018-02-15 22:19:26.228 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014515739; expecting 3014509021; flags=16
2018-02-15 22:19:26.229 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014516275; expecting 3014509021; flags=16
2018-02-15 22:19:26.230 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014516811; expecting 3014509021; flags=16
2018-02-15 22:19:26.230 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014517347; expecting 3014509021; flags=16
2018-02-15 22:19:26.231 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014517883; expecting 3014509021; flags=16
2018-02-15 22:19:26.234 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014518419; expecting 3014509021; flags=16
2018-02-15 22:19:26.234 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014518955; expecting 3014509021; flags=16
2018-02-15 22:19:26.234 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014519205; expecting 3014509021; flags=16
2018-02-15 22:19:26.235 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014519741; expecting 3014509021; flags=16
2018-02-15 22:19:26.235 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014520277; expecting 3014509021; flags=16
2018-02-15 22:19:26.236 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014520813; expecting 3014509021; flags=16
2018-02-15 22:19:26.236 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014521349; expecting 3014509021; flags=16
2018-02-15 22:19:26.237 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014521885; expecting 3014509021; flags=16
2018-02-15 22:19:26.239 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014522421; expecting 3014509021; flags=16
2018-02-15 22:19:26.239 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014522957; expecting 3014509021; flags=16
2018-02-15 22:19:26.239 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014523493; expecting 3014509021; flags=16
2018-02-15 22:19:26.240 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014524029; expecting 3014509021; flags=16
2018-02-15 22:19:26.240 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014524565; expecting 3014509021; flags=16
2018-02-15 22:19:26.240 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014525101; expecting 3014509021; flags=16
2018-02-15 22:19:26.243 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014525637; expecting 3014509021; flags=16
2018-02-15 22:19:26.244 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014526173; expecting 3014509021; flags=16
2018-02-15 22:19:26.245 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014526709; expecting 3014509021; flags=16
2018-02-15 22:19:26.245 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014527245; expecting 3014509021; flags=16
2018-02-15 22:19:26.245 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014527781; expecting 3014509021; flags=16
2018-02-15 22:19:26.246 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014528317; expecting 3014509021; flags=16
2018-02-15 22:19:26.246 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014528853; expecting 3014509021; flags=16
2018-02-15 22:19:26.246 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014529389; expecting 3014509021; flags=16
2018-02-15 22:19:26.247 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014529925; expecting 3014509021; flags=16
2018-02-15 22:19:26.247 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014530461; expecting 3014509021; flags=16
2018-02-15 22:19:26.247 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014530997; expecting 3014509021; flags=16
2018-02-15 22:19:26.248 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014531533; expecting 3014509021; flags=16
2018-02-15 22:19:26.248 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014532069; expecting 3014509021; flags=16
2018-02-15 22:19:26.248 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014532605; expecting 3014509021; flags=16
2018-02-15 22:19:26.249 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014533141; expecting 3014509021; flags=16
2018-02-15 22:19:26.249 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014533677; expecting 3014509021; flags=16
2018-02-15 22:19:26.250 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014534213; expecting 3014509021; flags=16
2018-02-15 22:19:26.250 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014534749; expecting 3014509021; flags=16
2018-02-15 22:19:26.250 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014535285; expecting 3014509021; flags=16
2018-02-15 22:19:26.251 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014535821; expecting 3014509021; flags=16
2018-02-15 22:19:26.251 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014536357; expecting 3014509021; flags=16
2018-02-15 22:19:26.254 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014536893; expecting 3014509021; flags=16
2018-02-15 22:19:26.257 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014537429; expecting 3014509021; flags=16
2018-02-15 22:19:26.258 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014537965; expecting 3014509021; flags=16
2018-02-15 22:19:26.259 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014538501; expecting 3014509021; flags=16
2018-02-15 22:19:26.259 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014539037; expecting 3014509021; flags=16
2018-02-15 22:19:26.260 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014539573; expecting 3014509021; flags=16
2018-02-15 22:19:26.261 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014540109; expecting 3014509021; flags=16
2018-02-15 22:19:26.262 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014540645; expecting 3014509021; flags=16
2018-02-15 22:19:26.264 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014541181; expecting 3014509021; flags=16
2018-02-15 22:19:26.265 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014541717; expecting 3014509021; flags=16
2018-02-15 22:19:26.265 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014542253; expecting 3014509021; flags=16
2018-02-15 22:19:26.266 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014542789; expecting 3014509021; flags=16
2018-02-15 22:19:26.266 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014543325; expecting 3014509021; flags=16
2018-02-15 22:19:26.267 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014543861; expecting 3014509021; flags=16
2018-02-15 22:19:26.267 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014544397; expecting 3014509021; flags=16
2018-02-15 22:19:26.268 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014544933; expecting 3014509021; flags=16
2018-02-15 22:19:26.268 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014545469; expecting 3014509021; flags=16
2018-02-15 22:19:26.269 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014546005; expecting 3014509021; flags=16
2018-02-15 22:19:26.269 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014546541; expecting 3014509021; flags=16
2018-02-15 22:19:26.270 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014547077; expecting 3014509021; flags=16
2018-02-15 22:19:26.270 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014547613; expecting 3014509021; flags=16
2018-02-15 22:19:26.272 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014548149; expecting 3014509021; flags=16
2018-02-15 22:19:26.272 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014548685; expecting 3014509021; flags=16
2018-02-15 22:19:26.275 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014549221; expecting 3014509021; flags=16
2018-02-15 22:19:26.277 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014549757; expecting 3014509021; flags=16
2018-02-15 22:19:26.277 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014550293; expecting 3014509021; flags=16
2018-02-15 22:19:26.278 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014550829; expecting 3014509021; flags=16
2018-02-15 22:19:26.278 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014551365; expecting 3014509021; flags=16
2018-02-15 22:19:26.278 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014551901; expecting 3014509021; flags=16
2018-02-15 22:19:26.279 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014552437; expecting 3014509021; flags=16
2018-02-15 22:19:26.279 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014552973; expecting 3014509021; flags=16
2018-02-15 22:19:26.280 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014553509; expecting 3014509021; flags=16
2018-02-15 22:19:26.280 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014554045; expecting 3014509021; flags=16
2018-02-15 22:19:26.280 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014554581; expecting 3014509021; flags=16
2018-02-15 22:19:26.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014555117; expecting 3014509021; flags=16
2018-02-15 22:19:26.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014555653; expecting 3014509021; flags=16
2018-02-15 22:19:26.281 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014556189; expecting 3014509021; flags=16
2018-02-15 22:19:26.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014556725; expecting 3014509021; flags=16
2018-02-15 22:19:26.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014557261; expecting 3014509021; flags=16
2018-02-15 22:19:26.282 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014557797; expecting 3014509021; flags=16
2018-02-15 22:19:26.283 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014558333; expecting 3014509021; flags=16
2018-02-15 22:19:27.911 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014558869; expecting 3014509557; flags=16
2018-02-15 22:19:27.918 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014559405; expecting 3014509557; flags=16
2018-02-15 22:19:27.976 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014559941; expecting 3014558869; flags=16
2018-02-15 22:19:27.976 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014560477; expecting 3014558869; flags=16
2018-02-15 22:19:27.978 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014561013; expecting 3014558869; flags=16
2018-02-15 22:19:27.980 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014561549; expecting 3014558869; flags=16
2018-02-15 22:19:27.981 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014562085; expecting 3014558869; flags=16
2018-02-15 22:19:27.981 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014562621; expecting 3014558869; flags=16
2018-02-15 22:19:27.982 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014563157; expecting 3014558869; flags=16
2018-02-15 22:19:27.982 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014563693; expecting 3014558869; flags=16
2018-02-15 22:19:27.983 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014564229; expecting 3014558869; flags=16
2018-02-15 22:19:27.983 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014564765; expecting 3014558869; flags=16
2018-02-15 22:19:27.984 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014565301; expecting 3014558869; flags=16
2018-02-15 22:19:27.984 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014565837; expecting 3014558869; flags=16
2018-02-15 22:19:27.985 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014566373; expecting 3014558869; flags=16
2018-02-15 22:19:27.985 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014566909; expecting 3014558869; flags=16
2018-02-15 22:19:27.988 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014567445; expecting 3014558869; flags=16
2018-02-15 22:19:27.989 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014567981; expecting 3014558869; flags=16
2018-02-15 22:19:27.990 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014568517; expecting 3014558869; flags=16
2018-02-15 22:19:27.990 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014569053; expecting 3014558869; flags=16
2018-02-15 22:19:27.991 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014569589; expecting 3014558869; flags=16
2018-02-15 22:19:27.991 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014570125; expecting 3014558869; flags=16
2018-02-15 22:19:27.992 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014570661; expecting 3014558869; flags=16
2018-02-15 22:19:27.992 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014571197; expecting 3014558869; flags=16
2018-02-15 22:19:27.992 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014571733; expecting 3014558869; flags=16
2018-02-15 22:19:27.993 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014572269; expecting 3014558869; flags=16
2018-02-15 22:19:27.993 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014572805; expecting 3014558869; flags=16
2018-02-15 22:19:27.993 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014573341; expecting 3014558869; flags=16
2018-02-15 22:19:27.994 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014573877; expecting 3014558869; flags=16
2018-02-15 22:19:27.994 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014574413; expecting 3014558869; flags=16
2018-02-15 22:19:27.994 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014574949; expecting 3014558869; flags=16
2018-02-15 22:19:27.994 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014575485; expecting 3014558869; flags=16
2018-02-15 22:19:27.995 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014576021; expecting 3014558869; flags=16
2018-02-15 22:19:27.995 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014576557; expecting 3014558869; flags=16
2018-02-15 22:19:27.995 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014577093; expecting 3014558869; flags=16
2018-02-15 22:19:27.998 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014577629; expecting 3014558869; flags=16
2018-02-15 22:19:28.000 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014578165; expecting 3014558869; flags=16
2018-02-15 22:19:28.001 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014578701; expecting 3014558869; flags=16
2018-02-15 22:19:28.001 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014579237; expecting 3014558869; flags=16
2018-02-15 22:19:28.002 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014579773; expecting 3014558869; flags=16
2018-02-15 22:19:28.002 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014580309; expecting 3014558869; flags=16
2018-02-15 22:19:28.003 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014580845; expecting 3014558869; flags=16
2018-02-15 22:19:28.005 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014581381; expecting 3014558869; flags=16
2018-02-15 22:19:28.006 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014581917; expecting 3014558869; flags=16
2018-02-15 22:19:28.006 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014582453; expecting 3014558869; flags=16
2018-02-15 22:19:28.007 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014582989; expecting 3014558869; flags=16
2018-02-15 22:19:28.011 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014583525; expecting 3014558869; flags=16
2018-02-15 22:19:28.011 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014584061; expecting 3014558869; flags=16
2018-02-15 22:19:28.011 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014584597; expecting 3014558869; flags=16
2018-02-15 22:19:28.012 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014585133; expecting 3014558869; flags=16
2018-02-15 22:19:28.013 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014585669; expecting 3014558869; flags=16
2018-02-15 22:19:28.013 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014586205; expecting 3014558869; flags=16
2018-02-15 22:19:28.014 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014586741; expecting 3014558869; flags=16
2018-02-15 22:19:28.014 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014587277; expecting 3014558869; flags=16
2018-02-15 22:19:28.014 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014587813; expecting 3014558869; flags=16
2018-02-15 22:19:28.015 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014588349; expecting 3014558869; flags=16
2018-02-15 22:19:28.015 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014588885; expecting 3014558869; flags=16
2018-02-15 22:19:28.015 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014589421; expecting 3014558869; flags=16
2018-02-15 22:19:28.018 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014589957; expecting 3014558869; flags=16
2018-02-15 22:19:28.019 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014590493; expecting 3014558869; flags=16
2018-02-15 22:19:28.023 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014591029; expecting 3014558869; flags=16
2018-02-15 22:19:28.024 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014591565; expecting 3014558869; flags=16
2018-02-15 22:19:28.024 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014592101; expecting 3014558869; flags=16
2018-02-15 22:19:28.025 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014592637; expecting 3014558869; flags=16
2018-02-15 22:19:28.025 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014593173; expecting 3014558869; flags=16
2018-02-15 22:19:28.026 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014593709; expecting 3014558869; flags=16
2018-02-15 22:19:28.026 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014594245; expecting 3014558869; flags=16
2018-02-15 22:19:28.026 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014594781; expecting 3014558869; flags=16
2018-02-15 22:19:28.027 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014595317; expecting 3014558869; flags=16
2018-02-15 22:19:28.027 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014595853; expecting 3014558869; flags=16
2018-02-15 22:19:28.027 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014596389; expecting 3014558869; flags=16
2018-02-15 22:19:31.391 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014596925; expecting 3014559405; flags=16
2018-02-15 22:19:31.399 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014597461; expecting 3014559405; flags=16
2018-02-15 22:19:31.466 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014597997; expecting 3014596925; flags=16
2018-02-15 22:19:31.467 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014598533; expecting 3014596925; flags=16
2018-02-15 22:19:31.468 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014599069; expecting 3014596925; flags=16
2018-02-15 22:19:31.470 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014599605; expecting 3014596925; flags=16
2018-02-15 22:19:31.471 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014600141; expecting 3014596925; flags=16
2018-02-15 22:19:31.472 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014600677; expecting 3014596925; flags=16
2018-02-15 22:19:31.472 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014601213; expecting 3014596925; flags=16
2018-02-15 22:19:31.473 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014601749; expecting 3014596925; flags=16
2018-02-15 22:19:31.473 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014602285; expecting 3014596925; flags=16
2018-02-15 22:19:31.474 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014602821; expecting 3014596925; flags=16
2018-02-15 22:19:31.474 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014603357; expecting 3014596925; flags=16
2018-02-15 22:19:31.475 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014603893; expecting 3014596925; flags=16
2018-02-15 22:19:31.475 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014604429; expecting 3014596925; flags=16
2018-02-15 22:19:31.478 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014604965; expecting 3014596925; flags=16
2018-02-15 22:19:31.485 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014605501; expecting 3014596925; flags=16
2018-02-15 22:19:31.485 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014606037; expecting 3014596925; flags=16
2018-02-15 22:19:31.486 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014606573; expecting 3014596925; flags=16
2018-02-15 22:19:31.488 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014607109; expecting 3014596925; flags=16
2018-02-15 22:19:31.489 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014607645; expecting 3014596925; flags=16
2018-02-15 22:19:31.490 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014608181; expecting 3014596925; flags=16
2018-02-15 22:19:31.490 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014608717; expecting 3014596925; flags=16
2018-02-15 22:19:31.491 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014609253; expecting 3014596925; flags=16
2018-02-15 22:19:31.492 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014609789; expecting 3014596925; flags=16
2018-02-15 22:19:31.492 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014610325; expecting 3014596925; flags=16
2018-02-15 22:19:31.493 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014610861; expecting 3014596925; flags=16
2018-02-15 22:19:31.493 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014611397; expecting 3014596925; flags=16
2018-02-15 22:19:31.493 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014611933; expecting 3014596925; flags=16
2018-02-15 22:19:31.494 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014612469; expecting 3014596925; flags=16
2018-02-15 22:19:31.494 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014613005; expecting 3014596925; flags=16
2018-02-15 22:19:31.494 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014613541; expecting 3014596925; flags=16
2018-02-15 22:19:31.495 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014614077; expecting 3014596925; flags=16
2018-02-15 22:19:31.495 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014614613; expecting 3014596925; flags=16
2018-02-15 22:19:31.495 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014615149; expecting 3014596925; flags=16
2018-02-15 22:19:31.496 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014615685; expecting 3014596925; flags=16
2018-02-15 22:19:31.499 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014616221; expecting 3014596925; flags=16
2018-02-15 22:19:31.500 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014616757; expecting 3014596925; flags=16
2018-02-15 22:19:31.501 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014617293; expecting 3014596925; flags=16
2018-02-15 22:19:31.501 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014617829; expecting 3014596925; flags=16
2018-02-15 22:19:31.503 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014618365; expecting 3014596925; flags=16
2018-02-15 22:19:31.504 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014618901; expecting 3014596925; flags=16
2018-02-15 22:19:31.504 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014619437; expecting 3014596925; flags=16
2018-02-15 22:19:31.505 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014619973; expecting 3014596925; flags=16
2018-02-15 22:19:31.505 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014620509; expecting 3014596925; flags=16
2018-02-15 22:19:31.505 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014621045; expecting 3014596925; flags=16
2018-02-15 22:19:31.506 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014621581; expecting 3014596925; flags=16
2018-02-15 22:19:31.506 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014622117; expecting 3014596925; flags=16
2018-02-15 22:19:31.507 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014622653; expecting 3014596925; flags=16
2018-02-15 22:19:31.511 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014623189; expecting 3014596925; flags=16
2018-02-15 22:19:31.512 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014623725; expecting 3014596925; flags=16
2018-02-15 22:19:31.512 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014624261; expecting 3014596925; flags=16
2018-02-15 22:19:31.512 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014624797; expecting 3014596925; flags=16
2018-02-15 22:19:31.513 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014625333; expecting 3014596925; flags=16
2018-02-15 22:19:31.514 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014625869; expecting 3014596925; flags=16
2018-02-15 22:19:38.230 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014626405; expecting 3014597461; flags=16
2018-02-15 22:19:38.239 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014626941; expecting 3014597461; flags=16
2018-02-15 22:19:38.305 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014627477; expecting 3014626405; flags=16
2018-02-15 22:19:38.305 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014628013; expecting 3014626405; flags=16
2018-02-15 22:19:38.307 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014628549; expecting 3014626405; flags=16
2018-02-15 22:19:38.309 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014629085; expecting 3014626405; flags=16
2018-02-15 22:19:38.317 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014629621; expecting 3014626405; flags=16
2018-02-15 22:19:38.317 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014630157; expecting 3014626405; flags=16
2018-02-15 22:19:38.318 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014630693; expecting 3014626405; flags=16
2018-02-15 22:19:38.320 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014631229; expecting 3014626405; flags=16
2018-02-15 22:19:38.321 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014631765; expecting 3014626405; flags=16
2018-02-15 22:19:38.322 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014632301; expecting 3014626405; flags=16
2018-02-15 22:19:38.323 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014632837; expecting 3014626405; flags=16
2018-02-15 22:19:38.324 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014633373; expecting 3014626405; flags=16
2018-02-15 22:19:38.324 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014633909; expecting 3014626405; flags=16
2018-02-15 22:19:38.324 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014634445; expecting 3014626405; flags=16
2018-02-15 22:19:38.325 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014634981; expecting 3014626405; flags=16
2018-02-15 22:19:38.327 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014635517; expecting 3014626405; flags=16
2018-02-15 22:19:38.328 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014636053; expecting 3014626405; flags=16
2018-02-15 22:19:38.329 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014636589; expecting 3014626405; flags=16
2018-02-15 22:19:38.329 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014637125; expecting 3014626405; flags=16
2018-02-15 22:19:38.330 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014637661; expecting 3014626405; flags=16
2018-02-15 22:19:38.330 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014638197; expecting 3014626405; flags=16
2018-02-15 22:19:38.331 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014638733; expecting 3014626405; flags=16
2018-02-15 22:19:38.331 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014639269; expecting 3014626405; flags=16
2018-02-15 22:19:38.331 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014639805; expecting 3014626405; flags=16
2018-02-15 22:19:38.333 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014640341; expecting 3014626405; flags=16
2018-02-15 22:19:38.333 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014640877; expecting 3014626405; flags=16
2018-02-15 22:19:38.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014641413; expecting 3014626405; flags=16
2018-02-15 22:19:38.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014641949; expecting 3014626405; flags=16
2018-02-15 22:19:38.334 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014642485; expecting 3014626405; flags=16
2018-02-15 22:19:38.337 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014643021; expecting 3014626405; flags=16
2018-02-15 22:19:38.338 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014643557; expecting 3014626405; flags=16
2018-02-15 22:19:38.339 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014644093; expecting 3014626405; flags=16
2018-02-15 22:19:38.353 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014644629; expecting 3014626405; flags=16
2018-02-15 22:19:38.354 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014645165; expecting 3014626405; flags=16
2018-02-15 22:19:38.358 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014645701; expecting 3014626405; flags=16
2018-02-15 22:19:38.359 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014646237; expecting 3014626405; flags=16
2018-02-15 22:19:38.360 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014646773; expecting 3014626405; flags=16
2018-02-15 22:19:38.361 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014647309; expecting 3014626405; flags=16
2018-02-15 22:19:38.361 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014647845; expecting 3014626405; flags=16
2018-02-15 22:19:38.362 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014648381; expecting 3014626405; flags=16
2018-02-15 22:19:38.363 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014648917; expecting 3014626405; flags=16
2018-02-15 22:19:51.812 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014649453; expecting 3014626941; flags=16
2018-02-15 22:19:51.821 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014649989; expecting 3014626941; flags=16
2018-02-15 22:19:51.871 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014650525; expecting 3014649453; flags=16
2018-02-15 22:19:51.872 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014651061; expecting 3014649453; flags=16
2018-02-15 22:19:51.873 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014651597; expecting 3014649453; flags=16
2018-02-15 22:19:51.875 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014652133; expecting 3014649453; flags=16
2018-02-15 22:19:51.876 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014652669; expecting 3014649453; flags=16
2018-02-15 22:19:51.877 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014653205; expecting 3014649453; flags=16
2018-02-15 22:19:51.878 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014653741; expecting 3014649453; flags=16
2018-02-15 22:19:51.879 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014654277; expecting 3014649453; flags=16
2018-02-15 22:19:51.879 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014654813; expecting 3014649453; flags=16
2018-02-15 22:19:51.880 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014655349; expecting 3014649453; flags=16
2018-02-15 22:19:51.880 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014655885; expecting 3014649453; flags=16
2018-02-15 22:19:51.884 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014656421; expecting 3014649453; flags=16
2018-02-15 22:19:51.884 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014656957; expecting 3014649453; flags=16
2018-02-15 22:19:51.885 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014657493; expecting 3014649453; flags=16
2018-02-15 22:19:51.886 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014658029; expecting 3014649453; flags=16
2018-02-15 22:19:51.886 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014658565; expecting 3014649453; flags=16
2018-02-15 22:19:51.886 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014659101; expecting 3014649453; flags=16
2018-02-15 22:19:51.887 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014659637; expecting 3014649453; flags=16
2018-02-15 22:19:51.887 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014660173; expecting 3014649453; flags=16
2018-02-15 22:19:51.887 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014660709; expecting 3014649453; flags=16
2018-02-15 22:19:51.888 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014661245; expecting 3014649453; flags=16
2018-02-15 22:19:51.888 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014661781; expecting 3014649453; flags=16
2018-02-15 22:19:51.888 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014662317; expecting 3014649453; flags=16
2018-02-15 22:19:51.889 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014662853; expecting 3014649453; flags=16
2018-02-15 22:19:51.889 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014663389; expecting 3014649453; flags=16
2018-02-15 22:19:51.889 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014663925; expecting 3014649453; flags=16
2018-02-15 22:19:51.890 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014664461; expecting 3014649453; flags=16
2018-02-15 22:19:51.890 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014664997; expecting 3014649453; flags=16
2018-02-15 22:19:51.897 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014665533; expecting 3014649453; flags=16
2018-02-15 22:19:51.897 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014666069; expecting 3014649453; flags=16
2018-02-15 22:19:51.897 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014666605; expecting 3014649453; flags=16
2018-02-15 22:19:51.899 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014667141; expecting 3014649453; flags=16
2018-02-15 22:19:51.899 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014667677; expecting 3014649453; flags=16
2018-02-15 22:20:18.852 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014668213; expecting 3014649989; flags=16
2018-02-15 22:20:18.860 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014668749; expecting 3014649989; flags=16
2018-02-15 22:20:18.915 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014669285; expecting 3014668213; flags=16
2018-02-15 22:20:18.916 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014669821; expecting 3014668213; flags=16
2018-02-15 22:20:18.918 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014670357; expecting 3014668213; flags=16
2018-02-15 22:20:18.920 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014670893; expecting 3014668213; flags=16
2018-02-15 22:20:18.923 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014671429; expecting 3014668213; flags=16
2018-02-15 22:20:18.924 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014671965; expecting 3014668213; flags=16
2018-02-15 22:20:18.925 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014672501; expecting 3014668213; flags=16
2018-02-15 22:20:18.925 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014673037; expecting 3014668213; flags=16
2018-02-15 22:20:18.927 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014673573; expecting 3014668213; flags=16
2018-02-15 22:20:18.929 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014674109; expecting 3014668213; flags=16
2018-02-15 22:20:18.930 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014674645; expecting 3014668213; flags=16
2018-02-15 22:20:18.932 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014675181; expecting 3014668213; flags=16
2018-02-15 22:20:18.932 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014675717; expecting 3014668213; flags=16
2018-02-15 22:20:18.933 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014676253; expecting 3014668213; flags=16
2018-02-15 22:20:18.934 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014676789; expecting 3014668213; flags=16
2018-02-15 22:20:18.934 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014677325; expecting 3014668213; flags=16
2018-02-15 22:20:18.935 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014677861; expecting 3014668213; flags=16
2018-02-15 22:20:18.935 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014678397; expecting 3014668213; flags=16
2018-02-15 22:20:18.937 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014678933; expecting 3014668213; flags=16
2018-02-15 22:20:18.941 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014679469; expecting 3014668213; flags=16
2018-02-15 22:20:18.941 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014680005; expecting 3014668213; flags=16
2018-02-15 22:20:18.942 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014680541; expecting 3014668213; flags=16
2018-02-15 22:20:18.942 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014681077; expecting 3014668213; flags=16
2018-02-15 22:20:18.942 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014681613; expecting 3014668213; flags=16
2018-02-15 22:20:18.943 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014682149; expecting 3014668213; flags=16
2018-02-15 22:20:18.943 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014682685; expecting 3014668213; flags=16
2018-02-15 22:20:18.944 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014683221; expecting 3014668213; flags=16
2018-02-15 22:20:55.921 INFO UdpConnection: 10.0.0.2:40882 -> 8.8.8.8:53 Open
2018-02-15 22:20:55.960 INFO UdpConnection: 10.0.0.2:55140 -> 8.8.8.8:53 Open
2018-02-15 22:20:55.961 INFO UdpConnection: 10.0.0.2:52714 -> 8.8.8.8:53 Open
2018-02-15 22:20:56.010 INFO UdpConnection: 10.0.0.2:50422 -> 172.217.16.46:443 Open
2018-02-15 22:20:56.025 INFO UdpConnection: 10.0.0.2:45363 -> 172.217.16.14:443 Open
2018-02-15 22:20:56.060 INFO UdpConnection: 10.0.0.2:54015 -> 172.217.20.170:443 Open
2018-02-15 22:20:56.138 INFO TcpConnection: 10.0.0.2:33316 -> 172.217.20.170:443 Open
2018-02-15 22:20:56.247 INFO TcpConnection: 10.0.0.2:49662 -> 172.217.16.46:443 Open
2018-02-15 22:20:56.278 INFO TcpConnection: 10.0.0.2:59570 -> 172.217.16.14:443 Open
2018-02-15 22:21:05.532 INFO UdpConnection: 10.0.0.2:35657 -> 8.8.8.8:53 Open
2018-02-15 22:21:05.685 INFO TcpConnection: 10.0.0.2:45630 -> 13.74.34.99:443 Open
2018-02-15 22:21:12.774 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014683757; expecting 3014668749; flags=16
2018-02-15 22:21:12.782 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014684293; expecting 3014668749; flags=16
2018-02-15 22:21:12.824 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014684829; expecting 3014683757; flags=16
2018-02-15 22:21:12.824 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014685365; expecting 3014683757; flags=16
2018-02-15 22:21:12.824 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014685901; expecting 3014683757; flags=16
2018-02-15 22:21:12.824 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014686437; expecting 3014683757; flags=16
2018-02-15 22:21:12.828 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014686973; expecting 3014683757; flags=16
2018-02-15 22:21:12.829 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014687509; expecting 3014683757; flags=16
2018-02-15 22:21:12.829 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014688045; expecting 3014683757; flags=16
2018-02-15 22:21:12.829 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014688581; expecting 3014683757; flags=16
2018-02-15 22:21:12.830 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014689117; expecting 3014683757; flags=16
2018-02-15 22:21:12.830 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014689653; expecting 3014683757; flags=16
2018-02-15 22:21:12.831 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014690189; expecting 3014683757; flags=16
2018-02-15 22:21:12.831 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014690725; expecting 3014683757; flags=16
2018-02-15 22:21:12.831 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014691261; expecting 3014683757; flags=16
2018-02-15 22:21:12.832 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014691797; expecting 3014683757; flags=16
2018-02-15 22:21:12.832 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014692333; expecting 3014683757; flags=16
2018-02-15 22:21:12.835 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014692869; expecting 3014683757; flags=16
2018-02-15 22:21:12.837 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014693405; expecting 3014683757; flags=16
2018-02-15 22:21:12.837 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014693941; expecting 3014683757; flags=16
2018-02-15 22:21:12.838 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014694477; expecting 3014683757; flags=16
2018-02-15 22:21:12.838 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014695013; expecting 3014683757; flags=16
2018-02-15 22:21:12.839 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014695549; expecting 3014683757; flags=16
2018-02-15 22:21:12.839 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014696085; expecting 3014683757; flags=16
2018-02-15 22:23:00.775 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014696621; expecting 3014684293; flags=16
2018-02-15 22:23:00.784 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014697157; expecting 3014684293; flags=16
2018-02-15 22:23:00.914 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014697693; expecting 3014696621; flags=16
2018-02-15 22:23:00.914 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014698229; expecting 3014696621; flags=16
2018-02-15 22:23:00.915 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014698765; expecting 3014696621; flags=16
2018-02-15 22:23:00.915 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014699301; expecting 3014696621; flags=16
2018-02-15 22:23:00.915 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014699837; expecting 3014696621; flags=16
2018-02-15 22:23:00.915 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014700373; expecting 3014696621; flags=16
2018-02-15 22:23:00.916 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014700909; expecting 3014696621; flags=16
2018-02-15 22:23:00.916 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014701445; expecting 3014696621; flags=16
2018-02-15 22:23:00.916 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014701981; expecting 3014696621; flags=16
2018-02-15 22:23:00.919 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014702517; expecting 3014696621; flags=16
2018-02-15 22:23:00.919 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014703053; expecting 3014696621; flags=16
2018-02-15 22:23:00.920 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014703589; expecting 3014696621; flags=16
2018-02-15 22:23:00.920 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014704125; expecting 3014696621; flags=16
2018-02-15 22:23:00.921 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014704661; expecting 3014696621; flags=16
2018-02-15 22:23:00.921 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014705197; expecting 3014696621; flags=16
2018-02-15 22:23:00.924 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014705733; expecting 3014696621; flags=16
2018-02-15 22:23:00.925 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014706269; expecting 3014696621; flags=16
2018-02-15 22:23:00.925 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014706805; expecting 3014696621; flags=16
2018-02-15 22:23:20.925 INFO UdpConnection: 10.0.0.2:35657 -> 8.8.8.8:53 Close
2018-02-15 22:23:20.926 INFO UdpConnection: 10.0.0.2:54015 -> 172.217.20.170:443 Close
2018-02-15 22:23:20.926 INFO UdpConnection: 10.0.0.2:45363 -> 172.217.16.14:443 Close
2018-02-15 22:23:20.927 INFO UdpConnection: 10.0.0.2:50422 -> 172.217.16.46:443 Close
2018-02-15 22:23:20.928 INFO UdpConnection: 10.0.0.2:52714 -> 8.8.8.8:53 Close
2018-02-15 22:23:20.929 INFO UdpConnection: 10.0.0.2:55140 -> 8.8.8.8:53 Close
2018-02-15 22:23:20.929 INFO UdpConnection: 10.0.0.2:40882 -> 8.8.8.8:53 Close
2018-02-15 22:25:01.094 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014707341; expecting 3014697157; flags=16
2018-02-15 22:25:01.100 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014707877; expecting 3014697157; flags=16
2018-02-15 22:25:01.152 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014708413; expecting 3014707341; flags=16
2018-02-15 22:25:01.158 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014708949; expecting 3014707341; flags=16
2018-02-15 22:25:01.158 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014709485; expecting 3014707341; flags=16
2018-02-15 22:25:01.159 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014710021; expecting 3014707341; flags=16
2018-02-15 22:25:01.159 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014710557; expecting 3014707341; flags=16
2018-02-15 22:25:01.160 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014711093; expecting 3014707341; flags=16
2018-02-15 22:25:01.160 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014711629; expecting 3014707341; flags=16
2018-02-15 22:25:01.161 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014712165; expecting 3014707341; flags=16
2018-02-15 22:25:01.162 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014712701; expecting 3014707341; flags=16
2018-02-15 22:25:01.162 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014713237; expecting 3014707341; flags=16
2018-02-15 22:25:01.171 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014713773; expecting 3014707341; flags=16
2018-02-15 22:25:01.171 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014714309; expecting 3014707341; flags=16
2018-02-15 22:25:01.171 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014714845; expecting 3014707341; flags=16
2018-02-15 22:25:01.172 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014715381; expecting 3014707341; flags=16
2018-02-15 22:25:01.173 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014715917; expecting 3014707341; flags=16
2018-02-15 22:25:01.175 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014716453; expecting 3014707341; flags=16
2018-02-15 22:26:11.076 INFO TcpConnection: 10.0.0.2:55283 -> 192.168.29.19:21 Close
2018-02-15 22:26:11.115 INFO TcpConnection: 10.0.0.2:55283 -> 192.168.29.19:21 Open
2018-02-15 22:26:11.116 WARN TcpConnection: 10.0.0.2:55283 -> 192.168.29.19:21 Unexpected first packet 0; acking 2337741866; flags=20
2018-02-15 22:26:11.117 INFO TcpConnection: 10.0.0.2:55283 -> 192.168.29.19:21 Close
2018-02-15 22:27:01.415 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014716989; expecting 3014707877; flags=16
2018-02-15 22:27:01.421 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014717525; expecting 3014707877; flags=16
2018-02-15 22:27:01.473 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014718061; expecting 3014716989; flags=16
2018-02-15 22:27:01.473 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014718597; expecting 3014716989; flags=16
2018-02-15 22:27:01.474 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014719133; expecting 3014716989; flags=16
2018-02-15 22:27:01.476 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014719669; expecting 3014716989; flags=16
2018-02-15 22:27:01.477 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014720205; expecting 3014716989; flags=16
2018-02-15 22:27:01.478 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014720741; expecting 3014716989; flags=16
2018-02-15 22:27:01.484 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014721277; expecting 3014716989; flags=16
2018-02-15 22:27:01.484 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014721813; expecting 3014716989; flags=16
2018-02-15 22:27:01.486 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014722349; expecting 3014716989; flags=16
2018-02-15 22:27:01.486 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014722885; expecting 3014716989; flags=16
2018-02-15 22:27:01.491 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014723421; expecting 3014716989; flags=16
2018-02-15 22:27:01.491 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014723957; expecting 3014716989; flags=16
2018-02-15 22:27:01.491 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014724493; expecting 3014716989; flags=16
2018-02-15 22:27:01.492 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014725029; expecting 3014716989; flags=16
2018-02-15 22:29:01.735 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014725565; expecting 3014717525; flags=16
2018-02-15 22:29:01.741 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014726101; expecting 3014717525; flags=16
2018-02-15 22:29:01.801 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014726637; expecting 3014725565; flags=16
2018-02-15 22:29:01.808 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014727173; expecting 3014725565; flags=16
2018-02-15 22:29:01.808 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014727709; expecting 3014725565; flags=16
2018-02-15 22:29:01.808 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014728245; expecting 3014725565; flags=16
2018-02-15 22:29:01.809 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014728781; expecting 3014725565; flags=16
2018-02-15 22:29:01.818 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014729317; expecting 3014725565; flags=16
2018-02-15 22:29:01.818 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014729853; expecting 3014725565; flags=16
2018-02-15 22:29:01.818 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014730389; expecting 3014725565; flags=16
2018-02-15 22:29:01.819 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014730925; expecting 3014725565; flags=16
2018-02-15 22:29:01.819 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014731461; expecting 3014725565; flags=16
2018-02-15 22:29:01.819 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014731997; expecting 3014725565; flags=16
2018-02-15 22:29:01.819 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014732533; expecting 3014725565; flags=16
2018-02-15 22:29:01.820 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014733069; expecting 3014725565; flags=16
2018-02-15 22:29:06.188 INFO TcpConnection: 10.0.0.2:55284 -> 192.168.29.19:21 Close
2018-02-15 22:29:06.226 INFO TcpConnection: 10.0.0.2:55284 -> 192.168.29.19:21 Open
2018-02-15 22:29:06.227 WARN TcpConnection: 10.0.0.2:55284 -> 192.168.29.19:21 Unexpected first packet 0; acking 3867145358; flags=20
2018-02-15 22:29:06.228 INFO TcpConnection: 10.0.0.2:55284 -> 192.168.29.19:21 Close
2018-02-15 22:31:02.056 WARN TcpConnection: 10.0.0.2:60068 -> 192.168.29.19:55591 Ignoring packet 3014733605; expecting 3014726101; flags=16
@rom1v
Copy link
Collaborator

rom1v commented Feb 15, 2018

Thank you for the report.

This is the same problem as #79.

What is your device?

@usatek
Copy link
Author

usatek commented Feb 15, 2018

I am using Lg G6, do you thing that it is device related issue? I will check it tomorrow on other devices. Thanks for issue link, I will check it.

@rom1v
Copy link
Collaborator

rom1v commented Feb 16, 2018

I think I understand the problem.

TCP connections ack packets received from the client immediately, and store them into its buffers.

This makes the client think that the connection is super-fast, while it may be actually slower (the data is typically written slower to the network socket). As a consequence, the TCP connection buffers fill up until saturation, so packets are dropped, slowing down uploads dramatically.

To (probably) fix the problem, data should be acked only once written to the network socket.

I quickly tried a fix, but details are a bit more complicated than I thought. I'll will work on it when I have some time.

@usatek
Copy link
Author

usatek commented Feb 16, 2018

We managed to copy images. We made workaround for now. But it is not good way. We copy only one file during FTP connection. Ater copy we disconnect FTP client and connect it again to copy another file. This slow as a lot but at least we are able to copy files. Of course we have to do this only in USB connection, in WiFi, we dont have to do this.

@usatek
Copy link
Author

usatek commented Feb 16, 2018

Problem still exists, our workaround is no good option. Your cfix would be very helpful.

@rom1v
Copy link
Collaborator

rom1v commented Feb 16, 2018

@usatek I implemented (quick&dirty) in the Rust version what I had in mind to fix the issue.

Could you test this version, please, to (in)validate that it works as expected?

gnirehtet-rust-linux64-issue84.zip
(sha256: 375d3be0b67322f0781ffe51942cc932ec2f8f568dd4fac7407bf8930392be9b)
gnirehtet-rust-win64-issue84.zip
(sha256: 08c99484dd636d09e10e265b1b00a54dce632ac66dfdbf04ff406795afa4ff3a)

@usatek
Copy link
Author

usatek commented Feb 16, 2018

It still not working, but thanks for quick try. Only one photo has been copied, and during this copy comunication hangs. The rest is skipped because of the suspension of FTP communication.

@rom1v
Copy link
Collaborator

rom1v commented Feb 16, 2018

Ok, could you post the logs, please, to see if the behavior is the same?

@usatek
Copy link
Author

usatek commented Feb 16, 2018

logFile.txt
I added log file from last attempt. I tried to copy three files. First file hangs communication. I have enough for today. I will come back to this tomorrow. Have a nice weekend.

@rom1v
Copy link
Collaborator

rom1v commented Feb 16, 2018

OK thank you. The file is 19 lines long, is it complete?

Ignoring packet 1462048573; expecting 1462048573

Ahah, I didn't update the log for message numbers :)

There is no "Not enough space, dropping packet", so it's not the same problem. Probably my changes introduced a bug somewhere.

@usatek
Copy link
Author

usatek commented Feb 16, 2018

Yes log was a lot shorter. I tried other FTP apps today and effect was the same. They copy one or two files from all list an they hang. We found one app in google play which offers reverse tethering communication over USB. It copy all files But it is paid app. There is free demo "Reverse tethering NoRoot Free". I wonder how they do it. I will try to check communication between my app and FTP through gnirehtet on Wireshark app tomorrow, maybe there I will see something what will be helpful for you.

@rom1v
Copy link
Collaborator

rom1v commented Feb 24, 2018

I'm back from my holidays.

I reproduce the problem using netcat as follow on a Nexus 5X.
On the host computer, I listen on port 1234, and use pv to limit the bandwidth:

nc -l -p 1234 | pv -L 500k > /tmp/myfile

On the device (with gnirehtet enabled), I connect to the host TCP socket:

adb shell '/data/local/tmp/nc 192.168.0.2 1234 < /sdcard/myfile'

With the current dev version of gnirehtet, after ~9M, the connection hangs. But with the version provided here, I can't make the connection hang.

@rom1v
Copy link
Collaborator

rom1v commented Feb 25, 2018

@usatek I attempted to upload a file over http (using http://dl.free.fr), this version works, while connection hangs on the current dev branch. So at least, it fixes something.

However, it seems it have problems specifically with FTP. I tested the open anonymous-writable speedtest.tele2.net from here), but I can't even start uploading the file (while it – sometimes – works when connected via wifi). It blocks even before uploading, so it may be a problem different from yours.

What FTP client do you use? What FTP server?

@usatek
Copy link
Author

usatek commented Feb 25, 2018 via email

@rom1v
Copy link
Collaborator

rom1v commented Feb 26, 2018

Thank you for the details.

So I wrote a test application using Apache-Common-Net, it helped a lot to reproduce and investigate the problem. I now understand why my quick&dirty patch (this version) breaks the connection (at the very end): as soon as FIN is received, all pending data are ignored.

I will think how to solve it properly.

@rom1v
Copy link
Collaborator

rom1v commented Feb 27, 2018

@usatek I am working on a proper fix.

Could you confirm that this binary fixes the problem for you, please?

gnirehtet-rust-linux64-issue84-v2.zip
(sha256: 33d34d6c88e11b6eee1e3785bd395574ae88ca13c1eff003bb1db04ed4d464e1)
gnirehtet-rust-win64-issue84-v2.zip
(sha256: 2d0ace3ce7b722ac5cf24f7a8db4f003cee6218fae3cc8a1d8df183354736f87)

rom1v added a commit that referenced this issue Mar 1, 2018
The TCP connection acked packets received from the device immediately
after it stored them into its buffers, but before they were written to
the network socket.

This made the client wrongly assume that the connection was super-fast,
so the upload bandwidth was totally uncorrelated to the network socket
bandwidth.

As a consequence, the client filled the buffers up to saturation,
leading to packet drops, that slowed down uploads dramatically.

To make the client adapt the bittrate according to the associated
network socket, do not ack the data immediately, but only once it is
actually written to the network socket.

See issues:
 - <#84>
 - <#79>
@rom1v
Copy link
Collaborator

rom1v commented Mar 1, 2018

I commited the fix on dev. It works for me, so I'm closing.

Feel free to reopen if you still encounter problems.

@rom1v rom1v closed this as completed Mar 1, 2018
@usatek
Copy link
Author

usatek commented Mar 1, 2018

I have made a test, all files are copied now on net drive or FTP server very fast. Excelent job, thanks for quick response and for this fix:)

@rom1v rom1v added the bug label Mar 1, 2018
@rom1v rom1v self-assigned this Mar 1, 2018
@rom1v
Copy link
Collaborator

rom1v commented Mar 2, 2018

It's in the v2.2 release: https://github.com/Genymobile/gnirehtet/releases/tag/v2.2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants