Why is the device trying to get the time from different servers multiple times per second even if it successfully got the time after booting?
FW 2.01.86
This is a bug which hasn’t gotten any attention for four years now!
Jan 18 10:00:03 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=54536 DPT=123 LEN=56
Jan 18 10:00:04 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=54536 DPT=123 LEN=56
Jan 18 10:00:04 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=54536 DPT=123 LEN=56
Jan 18 10:00:04 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=54536 DPT=123 LEN=56
Jan 18 10:00:05 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=45013 DPT=123 LEN=56
Jan 18 10:00:06 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=45013 DPT=123 LEN=56
Jan 18 10:00:07 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=45013 DPT=123 LEN=56
Jan 18 10:00:08 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=45013 DPT=123 LEN=56
Jan 18 10:00:14 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58497 DPT=123 LEN=56
Jan 18 10:00:14 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58497 DPT=123 LEN=56
Jan 18 10:00:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58497 DPT=123 LEN=56
Jan 18 10:00:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58497 DPT=123 LEN=56
Jan 18 10:00:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=46953 DPT=123 LEN=56
Jan 18 10:00:16 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=46953 DPT=123 LEN=56
Jan 18 10:00:17 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=46953 DPT=123 LEN=56
Jan 18 10:00:18 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=46953 DPT=123 LEN=56
Jan 18 10:00:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35430 DPT=123 LEN=56
Jan 18 10:00:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35430 DPT=123 LEN=56
Jan 18 10:00:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35430 DPT=123 LEN=56
Jan 18 10:00:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35430 DPT=123 LEN=56
Jan 18 10:00:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=33160 DPT=123 LEN=56
Jan 18 10:00:26 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=33160 DPT=123 LEN=56
Jan 18 10:00:27 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=33160 DPT=123 LEN=56
Jan 18 10:00:28 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=33160 DPT=123 LEN=56
Jan 18 10:00:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=37601 DPT=123 LEN=56
Jan 18 10:00:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=37601 DPT=123 LEN=56
Jan 18 10:00:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=37601 DPT=123 LEN=56
Jan 18 10:00:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=37601 DPT=123 LEN=56
Jan 18 10:00:36 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50305 DPT=123 LEN=56
Jan 18 10:00:37 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50305 DPT=123 LEN=56
Jan 18 10:00:38 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50305 DPT=123 LEN=56
Jan 18 10:00:39 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50305 DPT=123 LEN=56
Jan 18 10:00:45 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=85.125.61.2 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=40028 DPT=123 LEN=56
Jan 18 10:00:45 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=40028 DPT=123 LEN=56
Jan 18 10:00:45 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=40028 DPT=123 LEN=56
Jan 18 10:00:45 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=40028 DPT=123 LEN=56
Jan 18 10:00:46 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39188 DPT=123 LEN=56
Jan 18 10:00:47 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39188 DPT=123 LEN=56
Jan 18 10:00:48 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39188 DPT=123 LEN=56
Jan 18 10:00:49 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39188 DPT=123 LEN=56
Jan 18 10:00:55 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=146.255.58.33 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36005 DPT=123 LEN=56
Jan 18 10:00:55 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36005 DPT=123 LEN=56
Jan 18 10:00:55 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36005 DPT=123 LEN=56
Jan 18 10:00:55 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=37.235.63.106 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36005 DPT=123 LEN=56
Jan 18 10:00:56 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=41036 DPT=123 LEN=56
Jan 18 10:00:57 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=41036 DPT=123 LEN=56
Jan 18 10:00:58 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=41036 DPT=123 LEN=56
Jan 18 10:00:59 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=41036 DPT=123 LEN=56
Jan 18 10:01:05 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=146.255.58.33 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=44828 DPT=123 LEN=56
Jan 18 10:01:05 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=44828 DPT=123 LEN=56
Jan 18 10:01:05 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=44828 DPT=123 LEN=56
Jan 18 10:01:05 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=44828 DPT=123 LEN=56
Jan 18 10:01:06 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58935 DPT=123 LEN=56
Jan 18 10:01:07 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58935 DPT=123 LEN=56
Jan 18 10:01:08 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58935 DPT=123 LEN=56
Jan 18 10:01:09 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=58935 DPT=123 LEN=56
Jan 18 10:01:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39930 DPT=123 LEN=56
Jan 18 10:01:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39930 DPT=123 LEN=56
Jan 18 10:01:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39930 DPT=123 LEN=56
Jan 18 10:01:15 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=146.255.58.33 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=39930 DPT=123 LEN=56
Jan 18 10:01:16 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50937 DPT=123 LEN=56
Jan 18 10:01:17 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50937 DPT=123 LEN=56
Jan 18 10:01:18 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50937 DPT=123 LEN=56
Jan 18 10:01:19 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=50937 DPT=123 LEN=56
Jan 18 10:01:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=146.255.58.33 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35848 DPT=123 LEN=56
Jan 18 10:01:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35848 DPT=123 LEN=56
Jan 18 10:01:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35848 DPT=123 LEN=56
Jan 18 10:01:25 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=35848 DPT=123 LEN=56
Jan 18 10:01:26 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36282 DPT=123 LEN=56
Jan 18 10:01:27 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36282 DPT=123 LEN=56
Jan 18 10:01:28 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36282 DPT=123 LEN=56
Jan 18 10:01:29 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=36282 DPT=123 LEN=56
Jan 18 10:01:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=91.206.8.70 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47038 DPT=123 LEN=56
Jan 18 10:01:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=146.255.58.33 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47038 DPT=123 LEN=56
Jan 18 10:01:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=193.170.62.252 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47038 DPT=123 LEN=56
Jan 18 10:01:35 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=194.112.182.172 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47038 DPT=123 LEN=56
Jan 18 10:01:36 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47888 DPT=123 LEN=56
Jan 18 10:01:37 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47888 DPT=123 LEN=56
Jan 18 10:01:38 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47888 DPT=123 LEN=56
Jan 18 10:01:39 router user.warn kernel: ACCEPT IN=br0 OUT=vlan2 src=192.168.1.8 DST=172.19.10.99 LEN=76 TOS=0x00 PREC=0x00 TTL=63 ID=0 DF PROTO=UDP SPT=47888 DPT=123 LEN=56
192.168.1.8 is the IP-address of the SMP, and DPT=123 is the assigned destination port for accessing NTP-servers (network time protocol).
The bug has been reported for the SMP 19 months ago: http://community.wd.com/t5/WD-TV-Live-Streaming-Issues/Remove-Developer-Code-Pt-II-NTP-Server-spam/idi-p/423630
Please stop this! I cannot allow the device to access the LAN when it’s behaving like a little DDoS-device.
EDIT: I know that 172.19.10.99 is a private non-routable IP, which doesn’t make things any better. Debug-routines shouldn’t be active in shipped firmware-releases…