Yes confirmed it is on the correct interface eth1 and not eth0.
And I took the initiative earlier today and did switch to address 127.0.0.1:53
However after updating Adguard and changing the address I am still seeing this in the log.
Wed Oct 22 22:40:59 2025 user.notice AdGuardHome[20787]: 2025/10/23 03:40:59.867950 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:60807->127.0.0.1:53: i/o timeout"
Wed Oct 22 22:41:06 2025 kern.err kernel: [ 652.334988] WiFi@C15L1,RTMPDeletePMKIDCache() 1311: IF(0), del PMKID CacheIdx=0
Wed Oct 22 22:41:20 2025 kern.err kernel: [ 666.906907] WiFi@C15L1,RTMPDeletePMKIDCache() 1311: IF(0), del PMKID CacheIdx=1
Wed Oct 22 22:42:27 2025 kern.err kernel: [ 733.592116] 7986@C15L1,PMF_PerformRxFrameAction() 1492: [PMF] : NOT_ROBUST_UNICAST_FRAME, FC->SubType=12 (wcid=2)
Wed Oct 22 22:42:27 2025 kern.err kernel: [ 733.934115] 7986@C15L1,PMF_MlmeSAQueryReq() 140: [PMF] -- SAQueryTimer
Wed Oct 22 22:42:28 2025 kern.warn kernel: [ 734.946286] 7986@C01L2,wifi_sys_disconn_act() 1002: wdev_idx=0
Wed Oct 22 22:42:28 2025 kern.notice kernel: [ 734.952462] 7986@C08L3,hw_ctrl_flow_v2_disconnt_act() 172: wdev_idx=0
Wed Oct 22 22:42:28 2025 kern.warn kernel: [ 734.959812] 7986@C13L2,MacTableDeleteEntry() 1938: Del Sta:a4:97:b1:79:da:67
Wed Oct 22 22:42:30 2025 kern.debug kernel: [ 737.158759] entrytb_aid_aquire(): found non-occupied aid:5, allocated from:4
Wed Oct 22 22:42:30 2025 kern.warn kernel: [ 737.165821] 7986@C13L2,MacTableInsertEntry() 1577: New Sta:a4:97:b1:79:da:67
Wed Oct 22 22:42:30 2025 kern.notice kernel: [ 737.271992] 7986@C08L3,ap_cmm_peer_assoc_req_action() 1714: Recv Assoc from STA - a4:97:b1:79:da:67
Wed Oct 22 22:42:30 2025 kern.err kernel: [ 737.281163] 7986@C08L1,APBuildAssociation() 745: invalid status code(53) !!!
Wed Oct 22 22:42:30 2025 kern.notice kernel: [ 737.288206] 7986@C08L3,ap_cmm_peer_assoc_req_action() 2241: ReASSOC Send ReASSOC response (Status=53)...
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.673097] 7986@C08L3,ap_cmm_peer_assoc_req_action() 1714: Recv Assoc from STA - a4:97:b1:79:da:67
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.682342] 7986@C08L3,ap_cmm_peer_assoc_req_action() 2241: ASSOC Send ASSOC response (Status=0)...
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.691416] 7986@C01L3,wifi_sys_conn_act() 1115: wdev idx = 0
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.697409] 7986@C08L3,hw_ctrl_flow_v2_connt_act() 215: wdev_idx=0
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.826654] 7986@C15L3,WPABuildPairMsg1() 5310: <=== send Msg1 of 4-way
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.833266] 7986@C15L3,PeerPairMsg2Action() 6303: ===>Receive msg 2
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.840052] 7986@C15L3,WPABuildPairMsg3() 5595: <=== send Msg3 of 4-way
Wed Oct 22 22:42:31 2025 kern.notice kernel: [ 737.846661] 7986@C15L3,PeerPairMsg4Action() 6734: ===>Receive msg 4
Wed Oct 22 22:42:31 2025 daemon.info dnsmasq-dhcp[20044]: DHCPREQUEST(br-lan) 192.168.8.130 a4:97:b1:79:da:67
Wed Oct 22 22:42:31 2025 daemon.info dnsmasq-dhcp[20044]: DHCPACK(br-lan) 192.168.8.130 a4:97:b1:79:da:67
Wed Oct 22 22:42:31 2025 kern.warn kernel: [ 737.858149] 7986@C15L2,PeerPairMsg4Action() 7098: AP SETKEYS DONE(ra0) - AKMMap=WPA3PSK, PairwiseCipher=AES, GroupCipher=AES, wcid=2 from a4:97:b1:79:da:67
Wed Oct 22 22:42:31 2025 kern.warn kernel: [ 737.858149]
Wed Oct 22 22:42:49 2025 kern.err kernel: [ 755.338426] WiFi@C15L1,RTMPDeletePMKIDCache() 1311: IF(2), del PMKID CacheIdx=2
Wed Oct 22 22:42:51 2025 kern.err kernel: [ 757.422372] WiFi@C15L1,RTMPDeletePMKIDCache() 1311: IF(2), del PMKID CacheIdx=3
Wed Oct 22 22:45:55 2025 daemon.notice netifd: wan (11616): udhcpc: sending renew to 71.36.253.2
Wed Oct 22 22:45:55 2025 daemon.notice netifd: wan (11616): udhcpc: lease of 70.57.91.44 obtained, lease time 1800
Wed Oct 22 22:45:55 2025 user.notice kmwan: config json str={ "op": 6, "data": { } }
Wed Oct 22 22:52:09 2025 kern.info kernel: [ 1315.946120] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead.
Thu Oct 23 02:11:47 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:11:47.876896 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:50210->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:13:48 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:13:48.992333 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:43538->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:13:48 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:13:48.992341 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:44583->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:13:48 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:13:48.994022 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:36615->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:13:48 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:13:48.994026 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:40095->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:15:49 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:15:49.971522 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:59816->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:15:49 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:15:49.971522 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:55575->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:15:49 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:15:49.973166 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:36132->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:15:49 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:15:49.973166 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:44700->127.0.0.1:53: i/o timeout"
Thu Oct 23 02:16:01 2025 daemon.notice netifd: wan (11616): udhcpc: sending renew to 71.36.253.2
Thu Oct 23 02:16:01 2025 daemon.notice netifd: wan (11616): udhcpc: lease of 70.57.91.44 obtained, lease time 1800
Thu Oct 23 02:16:01 2025 user.notice kmwan: config json str={ "op": 6, "data": { } }
Thu Oct 23 02:18:19 2025 user.notice AdGuardHome[20787]: 2025/10/23 07:18:19.448188 [error] dnsproxy: response received upstream_type=local addr=127.0.0.1:53 proto=udp status="exchanging with 127.0.0.1:53 over udp: read udp 127.0.0.1:35327->127.0.0.1:53: i/o timeout"
It is almost flooding the log unfortunately now.. and that's odd as it is late at night and not much traffic. My neighbor next door I share my connection / wifi with and he just uses it for basic stuff like email, online browsing, youtube, etc. Only device active right now is my main PC I built which I am typing to you on, and my smartphone.
I would like it to work correctly, this router enjoys making me stress lol. When it works though it does a good job, but these errors / abundance of log entries is troubling. I sent you a message with the router debug / logs current.