diff --git a/modules/consensus/esbocs/dap_chain_cs_esbocs.c b/modules/consensus/esbocs/dap_chain_cs_esbocs.c
index 6e3fd2fb1d7481b1d0558b9823ea309e101faa63..fa0f643fe09a33ed1acadf0469cf6e23ccc00dbc 100644
--- a/modules/consensus/esbocs/dap_chain_cs_esbocs.c
+++ b/modules/consensus/esbocs/dap_chain_cs_esbocs.c
@@ -2819,14 +2819,14 @@ static int s_callback_block_verify(dap_chain_cs_blocks_t *a_blocks, dap_chain_bl
         if (!l_esbocs_pvt->poa_mode) {
              // Compare signature with delegated keys
             if (!dap_chain_net_srv_stake_key_delegated(&l_signing_addr)) {
-                log_it(L_ATT, "Unknown PoS signer %s",
+                debug_if(l_esbocs_pvt->debug, L_ATT, "Unknown PoS signer %s",
                     dap_chain_hash_fast_to_str_static(&l_signing_addr.data.hash_fast));
                 continue;
             }
         } else {
             // Compare signature with auth_certs
             if (!s_validator_check(&l_signing_addr, l_esbocs_pvt->poa_validators)) {
-                log_it(L_ATT, "Unknown PoA signer %s",
+                debug_if(l_esbocs_pvt->debug, L_ATT, "Unknown PoA signer %s",
                     dap_chain_hash_fast_to_str_static(&l_signing_addr.data.hash_fast));
                 continue;
             }
@@ -2872,7 +2872,7 @@ static int s_callback_block_verify(dap_chain_cs_blocks_t *a_blocks, dap_chain_bl
         dap_hash_fast(a_block, a_block_size, &l_block_hash);
         char l_block_hash_str[DAP_CHAIN_HASH_FAST_STR_SIZE];
         dap_hash_fast_to_str(&l_block_hash, l_block_hash_str, DAP_CHAIN_HASH_FAST_STR_SIZE);
-        log_it(L_ERROR, "Corrupted block %s: not enough authorized signs: %u of %u",
+        debug_if(l_esbocs_pvt->debug, L_ERROR, "Corrupted block %s: not enough authorized signs: %u of %u",
                     l_block_hash_str, l_signs_verified_count, l_esbocs_pvt->min_validators_count);
         return l_ret ? l_ret : -4;
     }
diff --git a/modules/net/dap_chain_net_decree.c b/modules/net/dap_chain_net_decree.c
index 4cc2826b8218f4d4f3a634c6f227c04629aaa62b..616e9558aadd0334dd93347c079ea3752bd3c8c8 100644
--- a/modules/net/dap_chain_net_decree.c
+++ b/modules/net/dap_chain_net_decree.c
@@ -265,7 +265,7 @@ int dap_chain_net_decree_apply(dap_hash_fast_t *a_decree_hash, dap_chain_datum_d
             return -110;
         }
         if (l_new_decree->is_applied) {
-            log_it(L_WARNING, "Decree already applied");
+            debug_if(s_debug_more, L_WARNING, "Decree already applied");
             return -111;
         }
     } else {            // Process decree itself
diff --git a/modules/type/blocks/dap_chain_block.c b/modules/type/blocks/dap_chain_block.c
index 2f64b416a6c5dd7bcdedabc3704b8c77a2623e13..f1c6c7e8dc191cba147f4a8941bbf184e2125020 100644
--- a/modules/type/blocks/dap_chain_block.c
+++ b/modules/type/blocks/dap_chain_block.c
@@ -325,7 +325,7 @@ dap_sign_t *dap_chain_block_sign_get(const dap_chain_block_t *a_block, size_t a_
     while (l_sign_cur < a_sign_num) {
         size_t l_sign_size = dap_sign_get_size(l_sign);
         if (!l_sign_size){
-            log_it(L_ERROR, "Empty sign #%u",  l_sign_cur );
+             debug_if(s_dap_block_debug_more, L_ERROR, "Empty sign #%u",  l_sign_cur );
             return NULL;
         }
         if (l_sign_size >  a_block_size- l_offset - sizeof (a_block->hdr) ){
@@ -349,7 +349,7 @@ size_t dap_chain_block_get_signs_count(const dap_chain_block_t * a_block, size_t
         dap_sign_t *l_sign = (dap_sign_t *)(a_block->meta_n_datum_n_sign + l_offset);
         size_t l_sign_size = dap_sign_get_size(l_sign);
         if (!l_sign_size){
-            log_it(L_WARNING, "Empty sign #%hu", l_sign_count);
+            debug_if(s_dap_block_debug_more, L_WARNING, "Empty sign #%hu", l_sign_count);
             return l_sign_count;
         }
         if (l_sign_size > a_block_size - l_offset - sizeof(a_block->hdr)) {
diff --git a/modules/type/blocks/dap_chain_cs_blocks.c b/modules/type/blocks/dap_chain_cs_blocks.c
index a1724ab32dd66191eff196ad072763c2895d864d..3acac0e63e5478d71c843492e56b9df01bfd9965 100644
--- a/modules/type/blocks/dap_chain_cs_blocks.c
+++ b/modules/type/blocks/dap_chain_cs_blocks.c
@@ -1822,7 +1822,7 @@ static dap_chain_atom_verify_res_t s_callback_atom_verify(dap_chain_t * a_chain,
     // 2nd level consensus
     if(l_blocks->callback_block_verify)
         if (l_blocks->callback_block_verify(l_blocks, l_block, a_atom_size)){
-            log_it(L_WARNING, "Block rejected by block verificator.");
+             debug_if(s_debug_more, L_WARNING, "Block rejected by block verificator.");
             return ATOM_REJECT;
         }