Eddie System/Environment Report - 10.02.2020 - 12:33 UTC Eddie version: 2.18.7 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.18363.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: TAP-Windows Adapter V9, version 9.23.2 OpenVPN: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) curl: 7.68.0 (C:\Program Files\AirVPN\curl.exe) Profile path: C:\Users\*****\AppData\Local\Eddie\default.profile Data path: C:\Users\*****\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Firewall Connected to VPN: Yes, Hamal Detected DNS: 10.18.106.1 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 31 ms Test Ping IPv6: -1 ms Test HTTP IPv4: Ok Test HTTP IPv6: Error:curl: (7) Failed to connect to 2a03:b0c0:2:d0::11b4:6001 port 80: Network unreachable Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) connect: True netlock: True servers.blacklist: 21ec07747b840a44028ad0668aa412ddd9e972a653cea9911b053026090dfe96,18779a8cb8b16f965f3ff883ba0a270ab35a8f6728e88d4834a243a56fab1bff servers.scoretype: Latency areas.whitelist: ch netlock.mode: windows_firewall network.entry.iplayer: ipv4-only network.ipv6.mode: block network.ipv4.autoswitch: True openvpn.sndbuf: 262144 openvpn.rcvbuf: 262144 advanced.expert: True advanced.skip_alreadyrun: True windows.disable_driver_upgrade: True windows.dns.force_all_interfaces: True windows.ipv6.bypass_dns: True ui.skip.provider.manifest.failed: True ui.skip.promotional: True gui.start_minimized: True ---------------------------- Logs: . 2020.02.10 11:59:37 - Eddie version: 2.18.7 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.18363.0, Mono/.Net: v4.0.30319 . 2020.02.10 11:59:37 - Command line arguments (0): . 2020.02.10 11:59:37 - Profile path: C:\Users\*****\AppData\Local\Eddie\default.profile . 2020.02.10 11:59:38 - Reading options from C:\Users\*****\AppData\Local\Eddie\default.profile . 2020.02.10 11:59:38 - Tun Driver - TAP-Windows Adapter V9, version 9.23.2 . 2020.02.10 11:59:38 - OpenVPN - Version: 2.4.8 - OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2020.02.10 11:59:38 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe) . 2020.02.10 11:59:38 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe) . 2020.02.10 11:59:38 - curl - Version: 7.68.0 (C:\Program Files\AirVPN\curl.exe) . 2020.02.10 11:59:38 - Recovery. Unexpected crash? . 2020.02.10 11:59:38 - Routes, remove 185.156.175.35 for gateway 10.4.138.1 failed: L�schen der Route fehlgeschlagen: Element nicht gefunden . 2020.02.10 12:00:09 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2020.02.10 12:00:26 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) ! 2020.02.10 12:00:26 - Deactivation of Network Lock ! 2020.02.10 12:00:27 - Activation of Network Lock - Windows Firewall I 2020.02.10 12:00:29 - Ready I 2020.02.10 12:00:29 - Session starting. . 2020.02.10 12:00:29 - Collect information about providers ... . 2020.02.10 12:00:29 - Collect information about AirVPN completed I 2020.02.10 12:00:30 - Checking authorization ... . 2020.02.10 12:00:30 - IPv6 disabled with packet filtering. ! 2020.02.10 12:00:30 - Connecting to Hamal (Switzerland, Zurich) . 2020.02.10 12:00:30 - OpenVPN > OpenVPN 2.4.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019 . 2020.02.10 12:00:30 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2020.02.10 12:00:30 - OpenVPN > library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10 . 2020.02.10 12:00:30 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.02.10 12:00:30 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.02.10 12:00:30 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2020.02.10 12:00:30 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2020.02.10 12:00:30 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.156.175.45:443 . 2020.02.10 12:00:30 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2020.02.10 12:00:30 - OpenVPN > UDP link local: (not bound) . 2020.02.10 12:00:30 - OpenVPN > UDP link remote: [AF_INET]185.156.175.45:443 . 2020.02.10 12:00:30 - OpenVPN > TLS: Initial packet from [AF_INET]185.156.175.45:443, sid=5ad73fa4 77542cbe . 2020.02.10 12:00:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.02.10 12:00:30 - OpenVPN > VERIFY KU OK . 2020.02.10 12:00:30 - OpenVPN > Validating certificate extended key usage . 2020.02.10 12:00:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.02.10 12:00:30 - OpenVPN > VERIFY EKU OK . 2020.02.10 12:00:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2020.02.10 12:00:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.02.10 12:00:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]185.156.175.45:443 . 2020.02.10 12:00:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2020.02.10 12:00:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.106.1,dhcp-option DNS6 fde6:7a:7d20:e6a::1,tun-ipv6,route-gateway 10.18.106.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:e6a::10cc/64 fde6:7a:7d20:e6a::1,ifconfig 10.18.106.206 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2020.02.10 12:00:32 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2020.02.10 12:00:32 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:e6a::1' . 2020.02.10 12:00:32 - OpenVPN > Pushed option removed by filter: 'tun-ipv6' . 2020.02.10 12:00:32 - OpenVPN > Pushed option removed by filter: 'ifconfig-ipv6 fde6:7a:7d20:e6a::10cc/64 fde6:7a:7d20:e6a::1' . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: peer-id set . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2020.02.10 12:00:32 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2020.02.10 12:00:32 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2020.02.10 12:00:32 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.02.10 12:00:32 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.02.10 12:00:32 - OpenVPN > interactive service msg_channel=0 . 2020.02.10 12:00:32 - OpenVPN > ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=18 HWADDR=00:d8:61:56:0b:74 . 2020.02.10 12:00:32 - OpenVPN > open_tun . 2020.02.10 12:00:32 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED0122D-90FD-4844-8193-50EE152085DE}.tap . 2020.02.10 12:00:32 - OpenVPN > TAP-Windows Driver Version 9.23 . 2020.02.10 12:00:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.106.0/10.18.106.206/255.255.255.0 [SUCCEEDED] . 2020.02.10 12:00:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.106.206/255.255.255.0 on interface {2ED0122D-90FD-4844-8193-50EE152085DE} [DHCP-serv: 10.18.106.254, lease-time: 31536000] . 2020.02.10 12:00:32 - OpenVPN > Successful ARP Flush on interface [5] {2ED0122D-90FD-4844-8193-50EE152085DE} . 2020.02.10 12:00:37 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:37 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:37 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:41 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:41 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:41 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:42 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:42 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:42 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:43 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:43 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:43 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:44 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:44 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:44 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:45 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:45 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:45 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:47 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:47 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:47 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:48 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:48 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:48 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:49 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:49 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:49 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:51 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:51 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:51 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:52 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:52 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:52 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:53 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:53 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:53 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:54 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:54 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:54 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:55 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:55 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:55 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:57 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:57 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:57 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:58 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:58 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:58 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:00:59 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:00:59 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:00:59 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:01:00 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:01:00 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:01:00 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:01:01 - OpenVPN > TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down . 2020.02.10 12:01:01 - OpenVPN > Route: Waiting for TUN/TAP interface to come up... . 2020.02.10 12:01:01 - Eddie Windows Interface Hack executed (Ethernet 2) . 2020.02.10 12:01:02 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2020.02.10 12:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 185.156.175.45 MASK 255.255.255.255 192.168.178.1 . 2020.02.10 12:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.02.10 12:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.02.10 12:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.106.1 . 2020.02.10 12:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.02.10 12:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.02.10 12:01:02 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.106.1 . 2020.02.10 12:01:02 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2020.02.10 12:01:02 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2020.02.10 12:01:02 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2020.02.10 12:01:02 - DNS leak protection with packet filtering enabled. . 2020.02.10 12:02:01 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.18.106.1) . 2020.02.10 12:02:30 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.18.106.1) . 2020.02.10 12:02:30 - Routes, added a new route, 185.156.175.43 for gateway 10.18.106.1 . 2020.02.10 12:02:30 - Unable to compute route for 2001:ac8:28:4:5cf4:b40d:cd32:5bdf: IPv6 VPN gateway not available. . 2020.02.10 12:02:30 - Flushing DNS I 2020.02.10 12:03:29 - Checking route IPv4 I 2020.02.10 12:03:29 - Checking DNS ! 2020.02.10 12:04:31 - Connected. . 2020.02.10 12:04:31 - OpenVPN > Initialization Sequence Completed . 2020.02.10 12:30:32 - Collect information about AirVPN completed . 2020.02.10 13:00:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2020.02.10 13:00:30 - OpenVPN > VERIFY KU OK . 2020.02.10 13:00:30 - OpenVPN > Validating certificate extended key usage . 2020.02.10 13:00:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2020.02.10 13:00:30 - OpenVPN > VERIFY EKU OK . 2020.02.10 13:00:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2020.02.10 13:00:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.02.10 13:00:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2020.02.10 13:00:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2020.02.10 13:00:34 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{DE40AF3C-B3CF-47CA-BD24-B27873198043}", "gateway": "192.168.178.1", "metric": "25" }, { "address": "0.0.0.0\/1", "interface": "{2ED0122D-90FD-4844-8193-50EE152085DE}", "gateway": "10.18.106.1", "metric": "3" }, { "address": "128.0.0.0\/1", "interface": "{2ED0122D-90FD-4844-8193-50EE152085DE}", "gateway": "10.18.106.1", "metric": "3" }, { "address": "185.156.175.43", "interface": "{2ED0122D-90FD-4844-8193-50EE152085DE}", "gateway": "10.18.106.1", "metric": "4" }, { "address": "185.156.175.45", "interface": "{DE40AF3C-B3CF-47CA-BD24-B27873198043}", "gateway": "192.168.178.1", "metric": "25" } ], "interfaces": [ { "friendly": "Ethernet 2", "id": "{2ED0122D-90FD-4844-8193-50EE152085DE}", "name": "Ethernet 2", "description": "TAP-Windows Adapter V9", "type": "Ethernet", "status": "Up", "bytes_received": "3058008632", "bytes_sent": "179097379", "support_ipv4": true, "support_ipv6": false, "ips": [ "10.18.106.206" ], "gateways": [ "10.18.106.1" ], "bind": true, "dns4": "10.18.106.1", "dns6": null }, { "friendly": "Ethernet", "id": "{DE40AF3C-B3CF-47CA-BD24-B27873198043}", "name": "Ethernet", "description": "Intel(R) Ethernet Connection (7) I219-V", "type": "Ethernet", "status": "Up", "bytes_received": "3183968967", "bytes_sent": "295352701", "support_ipv4": true, "support_ipv6": false, "ips": [ "192.168.178.20" ], "gateways": [ "192.168.178.1" ], "bind": true, "dns4": "10.18.106.1", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{ABB94056-3774-11EA-BEB6-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "10.18.106.1", "ipv4-default-interface": "{2ED0122D-90FD-4844-8193-50EE152085DE}" } ---------------------------- ipconfig /all: Windows-IP-Konfiguration Hostname . . . . . . . . . . . . : DESKTOP-11DB5J5 Prim„res DNS-Suffix . . . . . . . : Knotentyp . . . . . . . . . . . . : Hybrid IP-Routing aktiviert . . . . . . : Nein WINS-Proxy aktiviert . . . . . . : Nein DNS-Suffixsuchliste . . . . . . . : fritz.box Ethernet-Adapter Ethernet 2: Verbindungsspezifisches DNS-Suffix: Beschreibung. . . . . . . . . . . : TAP-Windows Adapter V9 Physische Adresse . . . . . . . . : 00-FF-2E-D0-12-2D DHCP aktiviert. . . . . . . . . . : Ja Autokonfiguration aktiviert . . . : Ja IPv4-Adresse . . . . . . . . . . : 10.18.106.206(Bevorzugt) Subnetzmaske . . . . . . . . . . : 255.255.255.0 Lease erhalten. . . . . . . . . . : Montag, 10. Februar 2020 12:01:01 Lease l„uft ab. . . . . . . . . . : Dienstag, 9. Februar 2021 12:01:02 Standardgateway . . . . . . . . . : DHCP-Server . . . . . . . . . . . : 10.18.106.254 DNS-Server . . . . . . . . . . . : 10.18.106.1 NetBIOS ber TCP/IP . . . . . . . : Aktiviert Ethernet-Adapter Ethernet: Verbindungsspezifisches DNS-Suffix: fritz.box Beschreibung. . . . . . . . . . . : Intel(R) Ethernet Connection (7) I219-V Physische Adresse . . . . . . . . : 00-D8-61-56-0B-74 DHCP aktiviert. . . . . . . . . . : Ja Autokonfiguration aktiviert . . . : Ja IPv4-Adresse . . . . . . . . . . : 192.168.178.20(Bevorzugt) Subnetzmaske . . . . . . . . . . : 255.255.255.0 Lease erhalten. . . . . . . . . . : Montag, 10. Februar 2020 11:59:24 Lease l„uft ab. . . . . . . . . . : Donnerstag, 20. Februar 2020 11:59:24 Standardgateway . . . . . . . . . : 192.168.178.1 DHCP-Server . . . . . . . . . . . : 192.168.178.1 DNS-Server . . . . . . . . . . . : 10.18.106.1 NetBIOS ber TCP/IP . . . . . . . : Aktiviert