[Bug]版本更新界面 所有版本都显示:正在收集数据...
Verify Steps
- [x] Tracker 我已经在 Issue Tracker 中找过我要提出的问题
- [x] Branch 我知道 OpenClash 的 Dev 分支切换开关位于插件设置-版本更新中,或者我会手动下载并安装 Dev 分支的 OpenClash
- [x] Latest 我已经使用最新 Dev 版本测试过,问题依旧存在
- [x] Relevant 我知道 OpenClash 与 内核(Core)、控制面板(Dashboard)、在线订阅转换(Subconverter)等项目之间无直接关系,仅相互调用
- [x] Definite 这确实是 OpenClash 出现的问题
- [x] Contributors 我有能力协助 OpenClash 开发并解决此问题
- [ ] Meaningless 我提交的是无意义的催促更新或修复请求
OpenClash Version
v0.46.080
Bug on Environment
Immortalwrt
OpenWrt Version
ImmortalWrt 24.10.0 r32824-6a73dae98c9c / LuCI openwrt-24.10 branch 25.017.24510~d42ec55
Bug on Platform
Linux-armv7, Linux-arm64
Describe the Bug
版本更新界面所有版本都显示:正在收集数据... 如下图所示
查看web报文发现http://192.168.2.1/cgi-bin/luci/admin/services/openclash/update?1743174267326接口一直无响应。
To Reproduce
每次打开版本更新都会显示正在收集数据...
OpenClash Log
OpenClash 调试日志
生成时间: 2025-03-28 23:06:53
插件版本: 0.46.080
隐私提示: 上传此日志前请注意检查、屏蔽公网IP、节点、密码等相关敏感信息
#===================== 系统信息 =====================#
主机型号: FriendlyElec NanoPi R5S
固件版本: ImmortalWrt 24.10.0 r32824-6a73dae98c9c
LuCI版本: 25.051.33724~da6871e
内核版本: 6.6.73
处理器架构: aarch64_generic
#此项有值时,如不使用IPv6,建议到网络-接口-lan的设置中禁用IPV6的DHCP
IPV6-DHCP:
DNS劫持: Dnsmasq 转发
#DNS劫持为Dnsmasq时,此项结果应仅有配置文件的DNS监听地址
Dnsmasq转发设置: 127.0.*.*#7874
#===================== 依赖检查 =====================#
dnsmasq-full: 已安装
dnsmasq-full(ipset): 未安装
dnsmasq-full(nftset): 已安装
bash: 已安装
curl: 已安装
ca-bundle: 已安装
ipset: 未安装
ip-full: 已安装
ruby: 已安装
ruby-yaml: 已安装
ruby-psych: 已安装
ruby-pstore: 已安装
kmod-tun(TUN模式): 已安装
luci-compat(Luci >= 19.07): 已安装
kmod-inet-diag(PROCESS-NAME): 已安装
unzip: 已安装
kmod-nft-tproxy: 已安装
#===================== 内核检查 =====================#
运行状态: 运行中
运行内核:Meta
进程pid: 5578
运行用户: root
已选择的架构: linux-arm64
#下方无法显示内核版本号时请确认您的内核版本是否正确或者有无权限
Meta内核版本: alpha-g7b38261
Meta内核文件: 存在
Meta内核运行权限: 正常
#===================== 插件设置 =====================#
当前配置文件: /etc/openclash/config/YUN.yaml
启动配置文件: /etc/openclash/YUN.yaml
运行模式: fake-ip
默认代理模式: rule
UDP流量转发(tproxy): 启用
自定义DNS: 启用
IPV6代理: 停用
IPV6-DNS解析: 停用
禁用Dnsmasq缓存: 启用
自定义规则: 启用
仅允许内网: 启用
仅代理命中规则流量: 停用
仅允许常用端口流量: 停用
绕过中国大陆IP: 启用
路由本机代理: 启用
#启动异常时建议关闭此项后重试
混合节点: 停用
保留配置: 停用
#启动异常时建议关闭此项后重试
第三方规则: 停用
#===================== 自定义规则 一 =====================#
rules:
##- PROCESS-NAME,curl,DIRECT #匹配路由自身进程(curl直连)
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.*.*/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)
##- GEOSITE,category-public-tracker,DIRECT #匹配GEOSITE数据库规则(直连)
##- DOMAIN-REGEX,^abc.*com,PROXY #正则匹配域名
##- RULE-SET,providername,PROXY #匹配规则集
##- IP-CIDR6,2620:*:*:*::7/32,PROXY
##- IP-SUFFIX,8.8.*.*/24,PROXY
##- IP-ASN,13335,DIRECT
##- SRC-GEOIP,cn,DIRECT
##- SRC-IP-ASN,9808,DIRECT
##- SRC-IP-SUFFIX,192.168.*.*/8,DIRECT
##- IN-PORT,7890,PROXY
##- IN-TYPE,SOCKS/HTTP,PROXY
##- IN-USER,mihomo,PROXY
##- IN-NAME,ss,PROXY
##- PROCESS-NAME-REGEX,curl$,PROXY
##- PROCESS-NAME-REGEX,(?i)Telegram,PROXY
##- PROCESS-NAME-REGEX,.*telegram.*,PROXY
##- NETWORK,udp,DIRECT
##- DSCP,4,DIRECT
##- AND,((DOMAIN,baidu.com),(NETWORK,UDP)),DIRECT
##- OR,((NETWORK,UDP),(DOMAIN,baidu.com)),REJECT
##- NOT,((DOMAIN,baidu.com)),PROXY
##- SUB-RULE,(NETWORK,tcp),sub-rule
##排序在上的规则优先生效,如添加(去除规则前的#号):
##IP段:192.168.*.*-192.168.*.* 直连
##- SRC-IP-CIDR,192.168.*.*/31,DIRECT
##- SRC-IP-CIDR,192.168.*.*/30,DIRECT
##- SRC-IP-CIDR,192.168.*.*/29,DIRECT
##- SRC-IP-CIDR,192.168.*.*/28,DIRECT
##- SRC-IP-CIDR,192.168.*.*/27,DIRECT
##- SRC-IP-CIDR,192.168.*.*/26,DIRECT
##- SRC-IP-CIDR,192.168.*.*/26,DIRECT
##- SRC-IP-CIDR,192.168.*.*/29,DIRECT
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT
##IP段:192.168.*.*-192.168.*.* 直连
##- SRC-IP-CIDR,192.168.*.*/31,DIRECT
##- SRC-IP-CIDR,192.168.*.*/30,DIRECT
##- SRC-IP-CIDR,192.168.*.*/28,DIRECT
##- SRC-IP-CIDR,192.168.*.*/27,DIRECT
##此时IP为192.168.*.*和192.168.*.*的客户端流量走代理(策略),其余客户端不走代理
##因为Fake-IP模式下,IP地址为192.168.*.*的路由器自身流量可走代理(策略),所以需要排除
##仅设置路由器自身直连:
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT
##- SRC-IP-CIDR,198.18.*.*/32,DIRECT
##DDNS
##- DOMAIN-KEYWORD,synology,DIRECT
##- DOMAIN-KEYWORD,quickconnect,DIRECT
##- DOMAIN-SUFFIX,checkip.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkipv6.dyndns.org,DIRECT
##- DOMAIN-SUFFIX,checkip.synology.com,DIRECT
##- DOMAIN-SUFFIX,ifconfig.co,DIRECT
##- DOMAIN-SUFFIX,api.myip.com,DIRECT
##- DOMAIN-SUFFIX,ip-api.com,DIRECT
##- DOMAIN-SUFFIX,ipapi.co,DIRECT
##- DOMAIN-SUFFIX,ip6.seeip.org,DIRECT
##- DOMAIN-SUFFIX,members.3322.org,DIRECT
##在线IP段转CIDR地址:http://ip2cidr.com
#===================== 自定义规则 二 =====================#
rules:
##- DOMAIN-SUFFIX,google.com,Proxy #匹配域名后缀(交由Proxy代理服务器组)
##- DOMAIN-KEYWORD,google,Proxy #匹配域名关键字(交由Proxy代理服务器组)
##- DOMAIN,google.com,Proxy #匹配域名(交由Proxy代理服务器组)
##- DOMAIN-SUFFIX,ad.com,REJECT #匹配域名后缀(拒绝)
##- IP-CIDR,127.0.*.*/8,DIRECT #匹配数据目标IP(直连)
##- SRC-IP-CIDR,192.168.*.*/32,DIRECT #匹配数据发起IP(直连)
##- DST-PORT,80,DIRECT #匹配数据目标端口(直连)
##- SRC-PORT,7777,DIRECT #匹配数据源端口(直连)
#===================== 配置文件 =====================#
mixed-port: 7893
allow-lan: true
mode: rule
log-level: info
external-controller: 0.0.*.*:9090
proxy-groups:
- name: "\U0001F680 手动选择"
type: select
proxies:
- "♻️ 自动选择"
- "\U0001F1ED\U0001F1F0 香港节点"
- "\U0001F1FA\U0001F1F8 美国节点"
- "\U0001F1EF\U0001F1F5 日本节点"
- "\U0001F1F8\U0001F1EC 新加坡节点"
- "\U0001F1FC\U0001F1F8 台湾节点"
- "\U0001F1F0\U0001F1F7 韩国节点"
- "\U0001F1E8\U0001F1E6 加拿大节点"
- "\U0001F1EC\U0001F1E7 英国节点"
- "\U0001F1EB\U0001F1F7 法国节点"
- "\U0001F1E9\U0001F1EA 德国节点"
- "\U0001F1F3\U0001F1F1 荷兰节点"
- "\U0001F1F9\U0001F1F7 土耳其节点"
- "\U0001F1FB\U0001F1F3 越南节点"
-
# Value['mixed-port']=7893;
# }.join;
# rescue Exception => e
# puts '${LOGTIME} Error: Set General Failed,【' + e.message + '】';
# ensure
# File.open('$CONFIG_FILE','w') {|f| YAML.dump(Value, f)};
# end" 2>/dev/null >> $LOG_FILE
exit 0
#===================== 自定义防火墙设置 =====================#
#!/bin/sh
. /usr/share/openclash/log.sh
. /lib/functions.sh
# This script is called by /etc/init.d/openclash
# Add your custom firewall rules here, they will be added after the end of the OpenClash iptables rules
LOG_OUT "Tip: Start Add Custom Firewall Rules..."
exit 0
#===================== IPTABLES 防火墙设置 =====================#
#IPv4 NAT chain
#IPv4 Mangle chain
#IPv4 Filter chain
#IPv6 NAT chain
#IPv6 Mangle chain
#IPv6 Filter chain
#===================== NFTABLES 防火墙设置 =====================#
table inet fw4 {
chain input {
type filter hook input priority filter; policy accept;
udp dport 443 ip daddr != @china_ip_route counter packets 129 bytes 165912 reject with icmp port-unreachable comment "OpenClash QUIC REJECT"
iifname "pppoe-wan" ip saddr != @localnetwork counter packets 22431 bytes 10220195 jump openclash_wan_input
iif "lo" accept comment "!fw4: Accept traffic from loopback"
ct state vmap { established : accept, related : accept } comment "!fw4: Handle inbound flows"
tcp flags & (fin | syn | rst | ack) == syn jump syn_flood comment "!fw4: Rate limit TCP syn packets"
iifname "br-lan" jump input_lan comment "!fw4: Handle lan IPv4/IPv6 input traffic"
iifname "pppoe-wan" jump input_wan comment "!fw4: Handle wan IPv4/IPv6 input traffic"
}
}
table inet fw4 {
chain forward {
type filter hook forward priority filter; policy accept;
meta l4proto { tcp, udp } flow add @ft
ct state vmap { established : accept, related : accept } comment "!fw4: Handle forwarded flows"
iifname "br-lan" jump forward_lan comment "!fw4: Handle lan IPv4/IPv6 forward traffic"
iifname "pppoe-wan" jump forward_wan comment "!fw4: Handle wan IPv4/IPv6 forward traffic"
}
}
table inet fw4 {
chain dstnat {
type nat hook prerouting priority dstnat; policy accept;
meta l4proto { tcp, udp } th dport 53 counter packets 2773 bytes 212019 redirect to :53 comment "OpenClash DNS Hijack"
iifname "br-lan" jump dstnat_lan comment "!fw4: Handle lan IPv4/IPv6 dstnat traffic"
iifname "pppoe-wan" jump dstnat_wan comment "!fw4: Handle wan IPv4/IPv6 dstnat traffic"
ip protocol tcp counter packets 1596 bytes 93488 jump openclash
}
}
table inet fw4 {
chain srcnat {
type nat hook postrouting priority srcnat; policy accept;
oifname "br-lan" jump srcnat_lan comment "!fw4: Handle lan IPv4/IPv6 srcnat traffic"
oifname "pppoe-wan" jump srcnat_wan comment "!fw4: Handle wan IPv4/IPv6 srcnat traffic"
}
}
table inet fw4 {
chain nat_output {
type nat hook output priority filter - 1; policy accept;
meta skgid != 65534 meta l4proto { tcp, udp } th dport 53 ip daddr 127.0.*.* counter packets 14 bytes 1198 redirect to :53 comment "OpenClash DNS Hijack"
ip protocol tcp counter packets 2230 bytes 133800 jump openclash_output
}
}
table inet fw4 {
chain mangle_prerouting {
type filter hook prerouting priority mangle; policy accept;
ip protocol udp counter packets 24799 bytes 4305341 jump openclash_mangle
}
}
table inet fw4 {
chain mangle_output {
type route hook output priority mangle; policy accept;
ip protocol udp counter packets 28214 bytes 2796865 jump openclash_mangle_output
}
}
table inet fw4 {
chain openclash {
ip daddr @localnetwork counter packets 641 bytes 34992 return
ct direction reply counter packets 0 bytes 0 return
ip protocol tcp ip daddr 198.18.*.*/16 counter packets 323 bytes 19476 redirect to :7892
ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 445 bytes 27792 return
ip protocol tcp counter packets 187 bytes 11228 redirect to :7892
}
}
table inet fw4 {
chain openclash_mangle {
meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return
meta nfproto ipv4 udp sport 68 counter packets 1 bytes 336 return
ip saddr 192.168.*.* udp sport 16666 counter packets 0 bytes 0 return
ip daddr @localnetwork counter packets 22399 bytes 3490300 return
ct direction reply counter packets 1151 bytes 351878 return
meta l4proto udp ip daddr 198.18.*.*/16 meta mark set 0x00000162 tproxy ip to 127.0.*.*:7895 counter packets 126 bytes 158472 accept
ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 389 bytes 58040 return
ip protocol udp counter packets 733 bytes 246315 jump openclash_upnp
meta l4proto udp meta mark set 0x00000162 tproxy ip to 127.0.*.*:7895 counter packets 728 bytes 245871 accept
}
}
table inet fw4 {
chain openclash_mangle_output {
meta nfproto ipv4 udp sport 500 counter packets 0 bytes 0 return
meta nfproto ipv4 udp sport 68 counter packets 0 bytes 0 return
ip saddr 192.168.*.* udp sport 16666 counter packets 0 bytes 0 return
meta skgid 65534 counter packets 10546 bytes 1294809 return
ip daddr @localnetwork counter packets 17668 bytes 1502056 return
ct direction reply counter packets 0 bytes 0 return
meta l4proto udp ip daddr 198.18.*.*/16 meta mark set 0x00000162 counter packets 0 bytes 0 accept
ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
meta mark set 0x00000162 counter packets 0 bytes 0 accept
}
}
table inet fw4 {
chain openclash_output {
ip saddr 192.168.*.* tcp sport 16666 counter packets 0 bytes 0 return
meta skgid 65534 counter packets 1853 bytes 111180 return
ip daddr @localnetwork counter packets 373 bytes 22380 return
ct direction reply counter packets 0 bytes 0 return
ip protocol tcp ip daddr 198.18.*.*/16 counter packets 4 bytes 240 redirect to :7892
ip daddr @china_ip_route ip daddr != @china_ip_route_pass counter packets 0 bytes 0 return
ip protocol tcp counter packets 0 bytes 0 redirect to :7892
}
}
table inet fw4 {
chain openclash_wan_input {
th dport { 7874, 7890, 7891, 7892, 7893, 7895, 9090 } counter packets 0 bytes 0 reject
}
}
#===================== IPSET状态 =====================#
#===================== 路由表状态 =====================#
#IPv4
#route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.*.* 39.78.*.* 0.0.*.* UG 0 0 0 pppoe-wan
39.78.*.* 0.0.*.* 255.255.*.* UH 0 0 0 pppoe-wan
192.168.*.* 0.0.*.* 255.255.*.* U 0 0 0 br-lan
#ip route list
default via 39.78.*.* dev pppoe-wan proto static
39.78.*.* dev pppoe-wan proto kernel scope link src 39.78.*.*
192.168.*.*/24 dev br-lan proto kernel scope link src 192.168.*.*
#ip rule show
0: from all lookup local
32765: from all fwmark 0x162 lookup 354
32766: from all lookup main
32767: from all lookup default
#IPv6
#route -A inet6
Kernel IPv6 routing table
Destination Next Hop Flags Metric Ref Use Iface
::/0 fe80::*:*:*:5a3f UG 512 5 0 pppoe-wan
::/0 fe80::*:*:*:5a3f UG 512 6 0 pppoe-wan
2408:*:*:*::/64 :: !n 2147483647 2 0 lo
2408:*:*:*::/64 :: U 1024 4 0 br-lan
2408:*:*:*::/60 :: !n 2147483647 2 0 lo
fde4:7203:faa8::/64 :: U 1024 3 0 br-lan
fde4:7203:faa8::/48 :: !n 2147483647 2 0 lo
fe80::*:*:*:ecd7/128 :: U 256 1 0 pppoe-wan
fe80::*:*:*:5a3f/128 :: U 256 1 0 pppoe-wan
fe80::/64 :: U 256 5 0 br-lan
fe80::/64 :: U 256 1 0 eth0
::/0 :: !n -1 2 0 lo
::1/128 :: Un 0 7 0 lo
2408:*:*:*::/128 :: Un 0 3 0 pppoe-wan
2408:*:*:*:2119:b922:3fea:ecd7/128 :: Un 0 4 0 pppoe-wan
2408:*:*:*::/128 :: Un 0 3 0 br-lan
2408:*:*:*:9cb2:2dff:fe88:827d/128 :: Un 0 7 0 br-lan
fde4:7203:faa8::/128 :: Un 0 3 0 br-lan
fde4:*:*:*:9cb2:2dff:fe88:827d/128 :: Un 0 5 0 br-lan
fe80::/128 :: Un 0 4 0 br-lan
fe80::/128 :: Un 0 3 0 eth0
fe80::*:*:*:ecd7/128 :: Un 0 3 0 pppoe-wan
fe80::*:*:*:827c/128 :: Un 0 2 0 eth0
fe80::*:*:*:827d/128 :: Un 0 6 0 br-lan
ff00::/8 :: U 256 7 0 br-lan
ff00::/8 :: U 256 2 0 eth0
ff00::/8 :: U 256 5 0 pppoe-wan
::/0 :: !n -1 2 0 lo
#ip -6 route list
default from 2408:*:*:*::/64 via fe80::cab6:d3ff:fe04:5a3f dev pppoe-wan proto static metric 512 pref medium
default from 2408:*:*:*::/60 via fe80::cab6:d3ff:fe04:5a3f dev pppoe-wan proto static metric 512 pref medium
unreachable 2408:*:*:*::/64 dev lo proto static metric 2147483647 pref medium
2408:*:*:*::/64 dev br-lan proto static metric 1024 pref medium
unreachable 2408:*:*:*::/60 dev lo proto static metric 2147483647 pref medium
fde4:7203:faa8::/64 dev br-lan proto static metric 1024 pref medium
unreachable fde4:7203:faa8::/48 dev lo proto static metric 2147483647 pref medium
fe80::*:*:*:ecd7 dev pppoe-wan proto kernel metric 256 pref medium
fe80::*:*:*:5a3f dev pppoe-wan proto kernel metric 256 pref medium
fe80::/64 dev br-lan proto kernel metric 256 pref medium
fe80::/64 dev eth0 proto kernel metric 256 pref medium
#ip -6 rule show
0: from all lookup local
32766: from all lookup main
4200000000: from 2408:*:*:*:9cb2:2dff:fe88:827d/64 iif br-lan unreachable
#===================== 端口占用状态 =====================#
tcp 0 0 :::9090 :::* LISTEN 5578/clash
tcp 0 0 :::7891 :::* LISTEN 5578/clash
tcp 0 0 :::7890 :::* LISTEN 5578/clash
tcp 0 0 :::7895 :::* LISTEN 5578/clash
tcp 0 0 :::7893 :::* LISTEN 5578/clash
tcp 0 0 :::7892 :::* LISTEN 5578/clash
tcp 0 0 :::7874 :::* LISTEN 5578/clash
udp 0 0 :::49682 :::* 5578/clash
udp 0 0 :::7874 :::* 5578/clash
udp 0 0 :::7891 :::* 5578/clash
udp 0 0 :::7892 :::* 5578/clash
udp 0 0 :::7893 :::* 5578/clash
udp 0 0 :::7895 :::* 5578/clash
#===================== 测试本机DNS查询(www.baidu.com) =====================#
Server: 127.0.*.*
Address: 127.0.*.*:53
www.baidu.com canonical name = www.a.shifen.com
Name: www.a.shifen.com
Address: 110.242.*.*
Name: www.a.shifen.com
Address: 110.242.*.*
#===================== 测试内核DNS查询(www.instagram.com) =====================#
Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false
Question:
Name: www.instagram.com.
Qtype: 1
Qclass: 1
Answer:
TTL: 30
data: 157.240.*.*
name: www.instagram.com.
type: 1
Status: 0
TC: false
RD: true
RA: true
AD: false
CD: false
Question:
Name: www.instagram.com.
Qtype: 28
Qclass: 1
Answer:
TTL: 219
data: 2a03:*:*:*:face:b00c:0:25de
name: www.instagram.com.
type: 28
Dnsmasq 当前默认 resolv 文件:/tmp/resolv.conf.d/resolv.conf.auto
#===================== /tmp/resolv.conf.auto =====================#
# Interface wan
nameserver 202.102.*.*
nameserver 202.102.*.*
# Interface wan_6
#===================== /tmp/resolv.conf.d/resolv.conf.auto =====================#
# Interface wan
nameserver 202.102.*.*
nameserver 202.102.*.*
# Interface wan_6
#===================== 测试本机网络连接(www.baidu.com) =====================#
HTTP/1.1 200 OK
Accept-Ranges: bytes
Cache-Control: private, no-cache, no-store, proxy-revalidate, no-transform
Connection: keep-alive
Content-Length: 277
Content-Type: text/html
Date: Fri, 28 Mar 2025 15:06:56 GMT
Etag: "575e1f59-115"
Last-Modified: Mon, 13 Jun 2016 02:50:01 GMT
Pragma: no-cache
Server: bfe/1.0.*.*
#===================== 测试本机网络下载(raw.githubusercontent.com) =====================#
HTTP/2 200
cache-control: max-age=300
content-security-policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
content-type: text/plain; charset=utf-8
etag: "f6037a93c68519d7041a3b4df325b61c424ec255b45dfeb063371319e39b0d96"
strict-transport-security: max-age=31536000
x-content-type-options: nosniff
x-frame-options: deny
x-xss-protection: 1; mode=block
x-github-request-id: 579A:261005:1C101DA:1FDB8BF:67E6B8AA
accept-ranges: bytes
date: Fri, 28 Mar 2025 15:06:57 GMT
via: 1.1 varnish
x-served-by: cache-sin-wsss1830028-SIN
x-cache: HIT
x-cache-hits: 0
x-timer: S1743174417.365213,VS0,VE321
vary: Authorization,Accept-Encoding,Origin
access-control-allow-origin: *
cross-origin-resource-policy: cross-origin
x-fastly-request-id: 1de90fd29d9043832bf367db84ea3e1a2ef262bb
expires: Fri, 28 Mar 2025 15:11:57 GMT
source-age: 0
content-length: 1071
#===================== 最近运行日志(自动切换为Debug模式) =====================#
time="2025-03-28T15:03:10.092537503Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:50803 --> :8123 error: dial tcp 104.21.*.*:8123: i/o timeout\ndial tcp 172.67.*.*:8123: i/o timeout"
time="2025-03-28T15:03:10.713637996Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:10992 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:03:18.076143982Z" level=info msg="[TCP] 192.168.*.*:10998 --> activity.windows.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:03:24.069473509Z" level=info msg="[TCP] 192.168.*.*:60626 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:03:50.370655728Z" level=info msg="[TCP] 192.168.*.*:44596 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:03:53.844990624Z" level=info msg="[TCP] 192.168.*.*:11018 --> api.github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:00.507042354Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.541133358Z" level=info msg="[TCP] 192.168.*.*:11027 --> d.skk.moe:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:00.550045330Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.608497259Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.680815593Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.697623100Z" level=info msg="[TCP] 192.168.*.*:11025 --> api.ttt.sh:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:00.749357510Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.783978169Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.834770225Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.835389419Z" level=info msg="[TCP] 192.168.*.*:11035 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:00.898564495Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.932616709Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:00.948597651Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.001977024Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.084588925Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.150592814Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.469018472Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.502373909Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:01.682825294Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:02.064482901Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:02.173207439Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:03.105848657Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11034 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:03.216797979Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11028 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.043151773Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.094450443Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.149176412Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.154087971Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.202786489Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.212114951Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.257656246Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.304132605Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.333874954Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.413223176Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.427317951Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.464798922Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.631546649Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.792982950Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:04.907674857Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:05.459820442Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:05.821677525Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:06.278226785Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:06.860462671Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11040 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.318851141Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11042 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.912695689Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:07.961833447Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.020746491Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.091274615Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.148733149Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.289804854Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.367277701Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.418388832Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.472882348Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.481738321Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.531472233Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.584708110Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.705668088Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.845081121Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:08.912510062Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.261058977Z" level=info msg="[TCP] 192.168.*.*:53672 --> tvsilo.vip:443 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:04:09.512380312Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.931288187Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:09.950259814Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:10.408047756Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11045 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:10.429640242Z" level=warning msg="[TCP] dial 🐟 漏网之鱼 (match Match/) 192.168.*.*:11046 --> api.ipify.org:443 error: dial tcp 104.26.*.*:443: connect: connection refused\ndial tcp 172.67.*.*:443: connect: connection refused\ndial tcp 104.26.*.*:443: connect: connection refused"
time="2025-03-28T15:04:17.798635379Z" level=info msg="[TCP] 192.168.*.*:11058 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:25.230280021Z" level=info msg="[TCP] 192.168.*.*:56258 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:04:50.376902262Z" level=info msg="[TCP] 192.168.*.*:60070 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:02.233389547Z" level=info msg="[TCP] 192.168.*.*:50452 --> devicelibrary.cn2.luto.cc:35848 match GeoIP(cn) using 🎯 全球直连[DIRECT]"
time="2025-03-28T15:05:03.502287366Z" level=info msg="[TCP] 192.168.*.*:49711 --> lcdn-locator.apple.com:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:03.553021964Z" level=info msg="[TCP] 192.168.*.*:49712 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:03.793027755Z" level=info msg="[TCP] 192.168.*.*:49713 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:04.023837205Z" level=info msg="[TCP] 192.168.*.*:49715 --> ocsp.digicert.com:80 match Match using 🐟 漏网之鱼[DIRECT]"
time="2025-03-28T15:05:04.051506724Z" level=info msg="[TCP] 192.168.*.*:49717 --> gateway.fe2.apple-dns.net:443 match GeoSite(apple) using 🍎 苹果服务[DIRECT]"
time="2025-03-28T15:05:09.604094982Z" level=info msg="[TCP] 192.168.*.*:49721 --> weatherkit.apple.com.akadns.net:443 match GeoIP(cn) using 🎯 全球直连[DIRECT]"
time="2025-03-28T15:05:26.339414269Z" level=info msg="[TCP] 192.168.*.*:38222 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:29.757272070Z" level=info msg="[TCP] 192.168.*.*:11138 --> activity.windows.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:05:33.081997783Z" level=info msg="[TCP] 192.168.*.*:11143 --> api.github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:37.594107516Z" level=info msg="[TCP] 192.168.*.*:11149 --> github.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:05:50.377476316Z" level=info msg="[TCP] 192.168.*.*:45654 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:02.878873494Z" level=info msg="[TCP] 192.168.*.*:11179 --> github-production-user-asset-6210df.s3.amazonaws.com:443 match RuleSet(GlobalMedia) using 🌎 国外媒体[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:27.516334181Z" level=info msg="[TCP] 192.168.*.*:42950 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:39.974432643Z" level=info msg="[TCP] 192.168.*.*:50804 --> m.hotmail.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:06:48.543787190Z" level=info msg="[TCP] 192.168.*.*:57784 --> graph.microsoft.com:443 match GeoSite(microsoft) using Ⓜ️ 微软服务[DIRECT]"
time="2025-03-28T15:06:50.360958515Z" level=info msg="[TCP] 192.168.*.*:34162 --> o1098464.ingest.sentry.io:443 match RuleSet(Copilot) using 🤖 Copilot[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:06:56.768956352Z" level=info msg="[TCP] 39.78.*.*:52606 --> raw.githubusercontent.com:443 match GeoSite(github) using 🚀 GitHub[🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07]"
time="2025-03-28T15:07:01.306430616Z" level=debug msg="[DNS] cache hit baidu.com --> [39.156.*.* 110.242.*.*] A, expire at 2025-03-28 15:13:55"
time="2025-03-28T15:07:01.470908642Z" level=debug msg="[DNS] cache hit api.miwifi.com --> [123.125.*.* 210.12.*.* 123.125.*.* 114.247.*.*] A, expire at 2025-03-28 15:06:57"
time="2025-03-28T15:07:01.471398340Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://202.102.*.*:53"
time="2025-03-28T15:07:01.471751540Z" level=debug msg="[DNS] cache hit api.miwifi.com --> [123.125.*.* 210.12.*.* 123.125.*.* 114.247.*.*] A, expire at 2025-03-28 15:06:57"
time="2025-03-28T15:07:01.472029784Z" level=debug msg="[DNS] resolve api.miwifi.com A from "
time="2025-03-28T15:07:01.472054867Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://202.102.*.*:53"
time="2025-03-28T15:07:01.472107657Z" level=debug msg="[DNS] resolve api.miwifi.com A from udp://39.78.*.*:53"
time="2025-03-28T15:07:01.475505791Z" level=debug msg="[DNS] api.miwifi.com --> [210.12.*.* 123.125.*.* 114.247.*.* 123.125.*.*] A from udp://202.102.*.*:53"
time="2025-03-28T15:07:04.605097359Z" level=debug msg="[DNS] cache hit www.qq.com --> [221.198.*.*] A, expire at 2025-03-28 15:07:10"
#===================== 最近运行日志获取完成(自动切换为silent模式) =====================#
#===================== 活动连接信息 =====================#
1. SourceIP:【192.168.*.*】 - Host:【avatars2.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
2. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
3. SourceIP:【192.168.*.*】 - Host:【avatars.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
4. SourceIP:【192.168.*.*】 - Host:【private-user-images.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
5. SourceIP:【192.168.*.*】 - Host:【go.microsoft.com】 - DestinationIP:【2.19.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
6. SourceIP:【192.168.*.*】 - Host:【optimizationguide-pa.googleapis.com】 - DestinationIP:【142.251.*.*】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
7. SourceIP:【192.168.*.*】 - Host:【www.google.com】 - DestinationIP:【31.13.*.*】 - Network:【tcp】 - RulePayload:【facebook】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
8. SourceIP:【192.168.*.*】 - Host:【avatars3.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
9. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
10. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
11. SourceIP:【192.168.*.*】 - Host:【alive.github.com】 - DestinationIP:【140.82.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
12. SourceIP:【192.168.*.*】 - Host:【avatars.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
13. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
14. SourceIP:【192.168.*.*】 - Host:【substrate.office.com】 - DestinationIP:【52.98.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
15. SourceIP:【192.168.*.*】 - Host:【api-ipv4.ip.sb】 - DestinationIP:【104.26.*.*】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
16. SourceIP:【192.168.*.*】 - Host:【graph.microsoft.com】 - DestinationIP:【20.190.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
17. SourceIP:【192.168.*.*】 - Host:【www.youtube.com】 - DestinationIP:【31.13.*.*】 - Network:【tcp】 - RulePayload:【facebook】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
18. SourceIP:【192.168.*.*】 - Host:【edge.microsoft.com】 - DestinationIP:【150.171.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
19. SourceIP:【192.168.*.*】 - Host:【activity.windows.com】 - DestinationIP:【20.44.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
20. SourceIP:【192.168.*.*】 - Host:【collector.github.com】 - DestinationIP:【140.82.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
21. SourceIP:【192.168.*.*】 - Host:【tvsilo.vip】 - DestinationIP:【172.67.*.*】 - Network:【tcp】 - RulePayload:【】 - Lastchain:【DIRECT】
22. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【91.108.*.*】 - Network:【tcp】 - RulePayload:【telegram】 - Lastchain:【🇭🇰 Hong Kong Chai Wan MEGA-i 10GE0/0/23 DELLR6515 F39】
23. SourceIP:【192.168.*.*】 - Host:【accounts.google.com】 - DestinationIP:【46.82.*.*】 - Network:【tcp】 - RulePayload:【google】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
24. SourceIP:【192.168.*.*】 - Host:【avatars1.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
25. SourceIP:【192.168.*.*】 - Host:【client.wns.windows.com】 - DestinationIP:【20.197.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
26. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【5.35.*.*】 - Network:【udp】 - RulePayload:【】 - Lastchain:【DIRECT】
27. SourceIP:【192.168.*.*】 - Host:【sb.scorecardresearch.com】 - DestinationIP:【3.168.*.*】 - Network:【tcp】 - RulePayload:【AmazonIP】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
28. SourceIP:【192.168.*.*】 - Host:【img-s.msn.cn】 - DestinationIP:【2.16.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
29. SourceIP:【192.168.*.*】 - Host:【Empty】 - DestinationIP:【91.108.*.*】 - Network:【tcp】 - RulePayload:【telegram】 - Lastchain:【🇭🇰 Hong Kong Chai Wan MEGA-i 10GE0/0/23 DELLR6515 F39】
30. SourceIP:【192.168.*.*】 - Host:【raw.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
31. SourceIP:【192.168.*.*】 - Host:【m.hotmail.com】 - DestinationIP:【40.99.*.*】 - Network:【tcp】 - RulePayload:【microsoft】 - Lastchain:【DIRECT】
32. SourceIP:【192.168.*.*】 - Host:【cdn.jsdelivr.net】 - DestinationIP:【8.7.*.*】 - Network:【tcp】 - RulePayload:【Custom_Direct】 - Lastchain:【DIRECT】
33. SourceIP:【192.168.*.*】 - Host:【avatars0.githubusercontent.com】 - DestinationIP:【185.199.*.*】 - Network:【tcp】 - RulePayload:【github】 - Lastchain:【🇭🇰 Hong Kong Sha Tin EQHK4 40GE0/0/2 DELLR650 F07】
OpenClash Config
Expected Behavior
希望能展示出版本号
Additional Context
No response
下载版本文件超时了,你看下本机跟github的连接情况
网络是通的
同有这个问题
重启openwrt试试。
重启后能好一会,然后过段时间再去查看还不行。 但是这个不影响我去更新版本
+1也是有这个问题,单独拿接口出来可以获取到版本数据 { "opcv": "v0.46.079", "coremodel": "aarch64_generic", "coremetacv": "alpha-g8bc6f77\n", "oplv": "v0.46.079\n,0", "corelv": "alpha-g8bc6f77\n", "upchecktime": "2025-05-09 17:00:37" }
找到问题了,是luci 的xhr 的timeout问题默认的是3000-5=2995毫秒,但是插件里面取update数据平均5-10s,脸好能刷出来,超时了 把请求时间都加大点
vim /usr/lib/lua/luci/view/openclash/update.htm
XHR.poll(10, '<%=luci.dispatcher.build_url("admin", "services", "openclash", "update")%>', null....
#4468 修改获取openclash最新版本信息接口超时时间:从3s改为10s
给作者大大一个👍
是我提的合并请求,作者大大还没同意呢😂
催催,哈哈哈给你也赞
This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 5 days