Eddie System/Environment Report - 2/21/2021 - 8:07 PM UTC Eddie version: 2.19.7 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19042.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: 9.24.2; wintun: Not found OpenVPN: 2.5.0 - OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\paqpa\AppData\Local\Eddie\default.profile Data path: C:\Users\paqpa\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No Detected DNS: 192.168.2.1, 207.164.234.129 Test DNS IPv4: Ok Test DNS IPv6: Failed Test Ping IPv4: 108 ms Test Ping IPv6: Failed Test HTTP IPv4: Ok Test HTTP IPv6: Error: Fetch url error:Couldn't connect to server Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True connect: True netlock: True log.file.enabled: True log.level.debug: True network.ipv6.mode: block ---------------------------- Logs: . 2021.02.21 15:03:30 - Eddie version: 2.19.7 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.19042.0, Mono/.Net: v4.0.30319 . 2021.02.21 15:03:30 - Command line arguments (0): . 2021.02.21 15:03:37 - Profile path: C:\Users\paqpa\AppData\Local\Eddie\default.profile . 2021.02.21 15:03:38 - Reading options from C:\Users\paqpa\AppData\Local\Eddie\default.profile . 2021.02.21 15:03:44 - Tun Driver - 0901: 9.24.2; wintun: Not found . 2021.02.21 15:03:44 - OpenVPN - Version: 2.5.0 - OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2021.02.21 15:03:44 - SSH - Version: plink 0.73 . 2021.02.21 15:03:44 - Build platform: 64-bit x86 Windows . 2021.02.21 15:03:44 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2021.02.21 15:03:44 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2021.02.21 15:03:44 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2021.02.21 15:03:45 - Recovery. Unexpected crash? . 2021.02.21 15:03:46 - Routes, removed an existing route, 184.75.221.211 for gateway 10.9.254.1 . 2021.02.21 15:03:46 - Routes, removed an existing route, 184.75.221.59 for gateway 10.31.254.1 . 2021.02.21 15:03:46 - Routes, removed an existing route, 184.75.214.163 for gateway 10.13.126.1 . 2021.02.21 15:03:46 - Routes, removed an existing route, 184.75.221.171 for gateway 10.8.190.1 ! 2021.02.21 15:03:46 - Activation of Network Lock - Windows Filtering Platform I 2021.02.21 15:03:47 - Ready . 2021.02.21 15:03:48 - Collect information about AirVPN completed I 2021.02.21 15:03:49 - Session starting. . 2021.02.21 15:03:50 - Waiting for latency tests (217 to go) . 2021.02.21 15:03:50 - Collect information about AirVPN completed . 2021.02.21 15:03:51 - Waiting for latency tests (192 to go) . 2021.02.21 15:03:52 - Waiting for latency tests (147 to go) . 2021.02.21 15:03:53 - Waiting for latency tests (143 to go) . 2021.02.21 15:03:55 - Waiting for latency tests (142 to go) . 2021.02.21 15:03:56 - Waiting for latency tests (119 to go) . 2021.02.21 15:03:57 - Waiting for latency tests (92 to go) . 2021.02.21 15:03:58 - Waiting for latency tests (58 to go) . 2021.02.21 15:03:59 - Waiting for latency tests (29 to go) . 2021.02.21 15:04:00 - Waiting for latency tests (3 to go) I 2021.02.21 15:04:04 - Checking authorization ... . 2021.02.21 15:04:05 - IPv6 disabled with packet filtering. ! 2021.02.21 15:04:05 - Connecting to Cephei (Canada, Toronto, Ontario) . 2021.02.21 15:04:05 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2021.02.21 15:04:05 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.02.21 15:04:05 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2021.02.21 15:04:05 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:05 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:05 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:05 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:05 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:05 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.02.21 15:04:05 - OpenVPN > UDP link local: (not bound) . 2021.02.21 15:04:05 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:05 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=cc0c23c2 83deff89 . 2021.02.21 15:04:05 - OpenVPN > VERIFY KU OK . 2021.02.21 15:04:05 - OpenVPN > Validating certificate extended key usage . 2021.02.21 15:04:05 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.02.21 15:04:05 - OpenVPN > VERIFY EKU OK . 2021.02.21 15:04:05 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2021.02.21 15:04:05 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.02.21 15:04:05 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:06 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) W 2021.02.21 15:04:06 - Authorization failed. Look at the client area to discover the reason. . 2021.02.21 15:04:06 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.02.21 15:04:06 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2021.02.21 15:04:06 - Disconnecting . 2021.02.21 15:04:06 - Sending soft termination signal . 2021.02.21 15:04:09 - Connection terminated. . 2021.02.21 15:04:09 - IPv6 restored with packet filtering. . 2021.02.21 15:04:09 - OpenVPN > SIGTERM[hard,] received, process exiting I 2021.02.21 15:04:12 - Checking authorization ... . 2021.02.21 15:04:13 - IPv6 disabled with packet filtering. ! 2021.02.21 15:04:13 - Connecting to Cephei (Canada, Toronto, Ontario) . 2021.02.21 15:04:13 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2021.02.21 15:04:13 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.02.21 15:04:13 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2021.02.21 15:04:13 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:13 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:13 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:13 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:13 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:13 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.02.21 15:04:13 - OpenVPN > UDP link local: (not bound) . 2021.02.21 15:04:13 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:13 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=54787b64 d5102f58 . 2021.02.21 15:04:13 - OpenVPN > VERIFY KU OK . 2021.02.21 15:04:13 - OpenVPN > Validating certificate extended key usage . 2021.02.21 15:04:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.02.21 15:04:13 - OpenVPN > VERIFY EKU OK . 2021.02.21 15:04:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2021.02.21 15:04:15 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.02.21 15:04:15 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 ! 2021.02.21 15:04:15 - Disconnecting . 2021.02.21 15:04:15 - Sending soft termination signal . 2021.02.21 15:04:18 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.02.21 15:04:18 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) . 2021.02.21 15:04:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.02.21 15:04:20 - Connection terminated. . 2021.02.21 15:04:20 - IPv6 restored with packet filtering. I 2021.02.21 15:04:20 - Cancel requested. ! 2021.02.21 15:04:20 - Session terminated. I 2021.02.21 15:04:26 - Session starting. I 2021.02.21 15:04:27 - Checking authorization ... . 2021.02.21 15:04:28 - IPv6 disabled with packet filtering. ! 2021.02.21 15:04:28 - Connecting to Scutum (United States of America, Dallas, Texas) . 2021.02.21 15:04:28 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2021.02.21 15:04:28 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.02.21 15:04:28 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2021.02.21 15:04:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.14:443 . 2021.02.21 15:04:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.02.21 15:04:28 - OpenVPN > UDP link local: (not bound) . 2021.02.21 15:04:28 - OpenVPN > UDP link remote: [AF_INET]199.249.230.14:443 . 2021.02.21 15:04:28 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.14:443, sid=d62c79d7 ca81b68c . 2021.02.21 15:04:28 - OpenVPN > VERIFY KU OK . 2021.02.21 15:04:28 - OpenVPN > Validating certificate extended key usage . 2021.02.21 15:04:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.02.21 15:04:28 - OpenVPN > VERIFY EKU OK . 2021.02.21 15:04:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Scutum, emailAddress=info@airvpn.org . 2021.02.21 15:04:28 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.02.21 15:04:28 - OpenVPN > [Scutum] Peer Connection Initiated with [AF_INET]199.249.230.14:443 . 2021.02.21 15:04:29 - OpenVPN > SENT CONTROL [Scutum]: 'PUSH_REQUEST' (status=1) W 2021.02.21 15:04:29 - Authorization failed. Look at the client area to discover the reason. . 2021.02.21 15:04:29 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.02.21 15:04:29 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2021.02.21 15:04:29 - Disconnecting . 2021.02.21 15:04:29 - Sending soft termination signal . 2021.02.21 15:04:32 - Connection terminated. . 2021.02.21 15:04:32 - IPv6 restored with packet filtering. . 2021.02.21 15:04:32 - OpenVPN > SIGTERM[hard,] received, process exiting I 2021.02.21 15:04:36 - Checking authorization ... . 2021.02.21 15:04:36 - IPv6 disabled with packet filtering. ! 2021.02.21 15:04:36 - Connecting to Cephei (Canada, Toronto, Ontario) . 2021.02.21 15:04:36 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2021.02.21 15:04:36 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.02.21 15:04:36 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2021.02.21 15:04:36 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:36 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:36 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:04:36 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:04:36 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:36 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.02.21 15:04:36 - OpenVPN > UDP link local: (not bound) . 2021.02.21 15:04:36 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:36 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=415e1092 c2e201af . 2021.02.21 15:04:36 - OpenVPN > VERIFY KU OK . 2021.02.21 15:04:36 - OpenVPN > Validating certificate extended key usage . 2021.02.21 15:04:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.02.21 15:04:36 - OpenVPN > VERIFY EKU OK . 2021.02.21 15:04:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2021.02.21 15:04:37 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.02.21 15:04:37 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 . 2021.02.21 15:04:38 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) W 2021.02.21 15:04:38 - Authorization failed. Look at the client area to discover the reason. . 2021.02.21 15:04:38 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.02.21 15:04:38 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2021.02.21 15:04:38 - Disconnecting . 2021.02.21 15:04:38 - Sending soft termination signal . 2021.02.21 15:04:41 - Connection terminated. . 2021.02.21 15:04:41 - IPv6 restored with packet filtering. . 2021.02.21 15:04:41 - OpenVPN > SIGTERM[hard,] received, process exiting I 2021.02.21 15:04:44 - Cancel requested. ! 2021.02.21 15:04:44 - Session terminated. I 2021.02.21 15:05:45 - Session starting. I 2021.02.21 15:05:46 - Checking authorization ... . 2021.02.21 15:05:47 - Elevated: Command:wfp . 2021.02.21 15:05:47 - Above log line repeated 4 times more . 2021.02.21 15:05:47 - IPv6 disabled with packet filtering. ! 2021.02.21 15:05:47 - Connecting to Cephei (Canada, Toronto, Ontario) . 2021.02.21 15:05:47 - Elevated: Command:wfp . 2021.02.21 15:05:47 - Above log line repeated 5 times more . 2021.02.21 15:05:47 - Elevated: Command:process_openvpn . 2021.02.21 15:05:47 - OpenVPN > OpenVPN 2.5.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 28 2020 . 2021.02.21 15:05:47 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2021.02.21 15:05:47 - OpenVPN > library versions: OpenSSL 1.1.1h 22 Sep 2020, LZO 2.10 . 2021.02.21 15:05:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:05:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:05:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2021.02.21 15:05:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2021.02.21 15:05:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.165:443 . 2021.02.21 15:05:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2021.02.21 15:05:47 - OpenVPN > UDP link local: (not bound) . 2021.02.21 15:05:47 - OpenVPN > UDP link remote: [AF_INET]184.75.214.165:443 . 2021.02.21 15:05:47 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.214.165:443, sid=7dee50d2 dfe13a40 . 2021.02.21 15:05:47 - OpenVPN > VERIFY KU OK . 2021.02.21 15:05:47 - OpenVPN > Validating certificate extended key usage . 2021.02.21 15:05:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2021.02.21 15:05:47 - OpenVPN > VERIFY EKU OK . 2021.02.21 15:05:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Cephei, emailAddress=info@airvpn.org . 2021.02.21 15:05:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2021.02.21 15:05:47 - OpenVPN > [Cephei] Peer Connection Initiated with [AF_INET]184.75.214.165:443 . 2021.02.21 15:05:48 - OpenVPN > SENT CONTROL [Cephei]: 'PUSH_REQUEST' (status=1) W 2021.02.21 15:05:48 - Authorization failed. Look at the client area to discover the reason. . 2021.02.21 15:05:48 - OpenVPN > AUTH: Received control message: AUTH_FAILED . 2021.02.21 15:05:48 - OpenVPN > SIGTERM received, sending exit notification to peer ! 2021.02.21 15:05:48 - Disconnecting . 2021.02.21 15:05:48 - Sending soft termination signal . 2021.02.21 15:05:48 - Elevated: Command:kill . 2021.02.21 15:05:51 - Connection terminated. . 2021.02.21 15:05:51 - Elevated: Command:wfp . 2021.02.21 15:05:51 - Above log line repeated 5 times more . 2021.02.21 15:05:51 - IPv6 restored with packet filtering. . 2021.02.21 15:05:51 - OpenVPN > SIGTERM[hard,] received, process exiting . 2021.02.21 15:05:51 - Elevated: Command:wfp . 2021.02.21 15:05:53 - Above log line repeated 5 times more I 2021.02.21 15:05:53 - Cancel requested. ! 2021.02.21 15:05:53 - Session terminated. ! 2021.02.21 15:06:41 - Deactivation of Network Lock . 2021.02.21 15:06:41 - Elevated: Command:wfp . 2021.02.21 15:07:23 - Above log line repeated 45 times more . 2021.02.21 15:07:23 - ping 1 . 2021.02.21 15:07:23 - ping 2 W . 2021.02.21 15:07:23 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "192.168.2.1", "metric": "35" }, { "address": "127.0.0.0\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "192.168.2.0\/24", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "192.168.2.197", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "192.168.2.255", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "224.0.0.0\/4", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "255.255.255.255", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "::1", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "fe80::\/64", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "fe80::31c8:4f00:c84e:bb5", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" }, { "address": "ff00::\/8", "interface": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "gateway": "link", "metric": "291" } ], "interfaces": [ { "friendly": "Local Area Connection", "id": "{B8F620EE-E059-48FE-A7C3-F64A5273F3AA}", "name": "Local Area Connection", "description": "TAP-Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8851:690:7540:451f", "169.254.69.31" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Ethernet", "id": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}", "name": "Ethernet", "description": "Realtek PCIe FE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "6358707", "bytes_sent": "7054817", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::31c8:4f00:c84e:bb5", "192.168.2.197" ], "gateways": [ "192.168.2.1" ], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Bluetooth Network Connection", "id": "{700552CE-2C77-4D67-94C4-02ECF61EE067}", "name": "Bluetooth Network Connection", "description": "Bluetooth Device (Personal Area Network)", "type": "Ethernet", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::b008:3972:5dea:7cd5", "169.254.124.213" ], "gateways": [], "bind": true, "dns4": "", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{E0EC89D8-2A3A-11EB-BA6E-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "", "dns6": null } ], "ipv4-default-gateway": "192.168.2.1", "ipv4-default-interface": "{8F4A727F-39DC-4BAB-81C8-4352AADAE073}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : HPG6 Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No DNS Suffix Search List. . . . . . : home Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-B8-F6-20-EE DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter Ethernet: Connection-specific DNS Suffix . : home Description . . . . . . . . . . . : Realtek PCIe FE Family Controller Physical Address. . . . . . . . . : 78-E3-B5-54-7B-20 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::31c8:4f00:c84e:bb5%8(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.2.197(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Lease Obtained. . . . . . . . . . : Sunday, February 21, 2021 2:56:54 PM Lease Expires . . . . . . . . . . : Wednesday, February 24, 2021 2:56:54 PM Default Gateway . . . . . . . . . : 192.168.2.1 DHCP Server . . . . . . . . . . . : 192.168.2.1 DHCPv6 IAID . . . . . . . . . . . : 142140341 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-27-7A-0C-D3-78-E3-B5-54-7B-20 DNS Servers . . . . . . . . . . . : 192.168.2.1 207.164.234.129 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Bluetooth Network Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network) Physical Address. . . . . . . . . : C0-18-85-FA-F5-30 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes