Eddie System/Environment Report - 2021-12-05 - 11:51 UTC Eddie version: 2.21.2beta Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.19044.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN drivers: 0901: Not found OpenVPN: 2.5.3 - OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: Not available WireGuard: 0.3.11 SSH: plink 0.73 (C:\Program Files\AirVPN\plink.exe) SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\nikol\AppData\Local\Eddie\default.profile Data path: C:\Users\nikol\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: Yes, Windows Filtering Platform Connected to VPN: Yes, Fleed Detected DNS: fd7d:76ee:e68f:a993::1, 10.128.0.1 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 270 ms Test Ping IPv6: 264 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True key: (omissis) connect: True netlock: True servers.allowlist: 0b4bb507e27e816b3c512a7460710cb9c375138ddb2452ea966d266d73d6e180,b65a6613df6d2e52e5808a3812a3a3fd5071486a0cfc456dd7b3addfef00d43d,c432bbea2ba76829e428453cd8c78594f1f40c1462d00f17be1faedcc7d45097,0e106721da83105c6a90cd8e9d7769c1424d5cf98238b1d60d851de136b75d17,6833c08795a1ecc816f7f2f4879ff0e27809fbb40e43dbea5c2b4cc1fea66ddc servers.scoretype: Latency log.file.enabled: True log.level.debug: True mode.type: wireguard mode.protocol: UDP mode.port: 1637 routes.custom: 192.168.219.1,out,Modem network.iface.name: AirVPN gui.start_minimized: True gui.notifications: False gui.font.normal.name: D2Coding gui.font.normal.size: 9.75 ---------------------------- Logs: . 2021.12.05 17:28:09 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2021.12.05 17:28:09 - OpenVPN > OPTIONS IMPORT: peer-id set . 2021.12.05 17:28:09 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2021.12.05 17:28:09 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2021.12.05 17:28:09 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2021.12.05 17:28:09 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.12.05 17:28:09 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2021.12.05 17:28:09 - OpenVPN > interactive service msg_channel=0 . 2021.12.05 17:28:09 - OpenVPN > open_tun . 2021.12.05 17:28:09 - OpenVPN > wintun device [AirVPN] opened . 2021.12.05 17:28:10 - Elevated: Command:wfp . 2021.12.05 17:28:10 - Elevated: Command:wfp . 2021.12.05 17:28:10 - Elevated: Command:wfp . 2021.12.05 17:28:10 - Above log line repeated 3 times more . 2021.12.05 17:28:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip set address 35 static 10.13.22.98 255.255.255.0 . 2021.12.05 17:28:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete dns 35 all . 2021.12.05 17:28:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ip delete wins 35 all . 2021.12.05 17:28:10 - OpenVPN > IPv4 MTU set to 1500 on interface 35 using SetIpInterfaceEntry() . 2021.12.05 17:28:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 set address 35 fde6:7a:7d20:916::1060/128 store=active . 2021.12.05 17:28:10 - OpenVPN > add_route_ipv6(fde6:7a:7d20:916::/64 -> fde6:7a:7d20:916::1060 metric 0) dev AirVPN . 2021.12.05 17:28:10 - Exec(14) of 'C:\Windows\system32\route.exe', 2 args: '-6';'PRINT'; . 2021.12.05 17:28:10 - Exec(14) done in 62 ms, exit: 0, out: '=========================================================================== . 2021.12.05 17:28:10 - 인터페이스 목록 . 2021.12.05 17:28:10 - 35...........................Eddie Tunnel . 2021.12.05 17:28:10 - 14...d8 cb 8a 5e 8d 23 ......Killer E2200 Gigabit Ethernet Controller . 2021.12.05 17:28:10 - 17...0a 00 27 00 00 11 ......VirtualBox Host-Only Ethernet Adapter . 2021.12.05 17:28:10 - 18...00 50 56 c0 00 01 ......VMware Virtual Ethernet Adapter for VMnet1 . 2021.12.05 17:28:10 - 7...00 50 56 c0 00 08 ......VMware Virtual Ethernet Adapter for VMnet8 . 2021.12.05 17:28:10 - 1...........................Software Loopback Interface 1 . 2021.12.05 17:28:10 - =========================================================================== . 2021.12.05 17:28:10 - IPv6 경로 테이블 . 2021.12.05 17:28:10 - =========================================================================== . 2021.12.05 17:28:10 - 활성 경로: . 2021.12.05 17:28:10 - IF 메트릭 네트워크 대상 게이트웨이 . 2021.12.05 17:28:10 - 1 331 ::1/128 연결됨 . 2021.12.05 17:28:10 - 18 291 fe80::/64 연결됨 . 2021.12.05 17:28:10 - 17 281 fe80::/64 연결됨 . 2021.12.05 17:28:10 - 7 291 fe80::/64 연결됨 . 2021.12.05 17:28:10 - 14 281 fe80::/64 연결됨 . 2021.12.05 17:28:10 - 35 261 fe80::/64 연결됨 . 2021.12.05 17:28:10 - 18 291 fe80::1456:e117:632:7523/128 . 2021.12.05 17:28:10 - 연결됨 . 2021.12.05 17:28:10 - 7 291 fe80::18a8:e895:e1b7:4195/128 . 2021.12.05 17:28:10 - 연결됨 . 2021.12.05 17:28:10 - 14 281 fe80::650d:6f7c:9b0f:6442/128 . 2021.12.05 17:28:10 - 연결됨 . 2021.12.05 17:28:10 - 17 281 fe80::74ac:5ac6:2ab8:4ce3/128 . 2021.12.05 17:28:10 - 연결됨 . 2021.12.05 17:28:10 - 35 261 fe80::9d69:4f09:c285:d07b/128 . 2021.12.05 17:28:10 - 연결됨 . 2021.12.05 17:28:10 - 1 331 ff00::/8 연결됨 . 2021.12.05 17:28:10 - 18 291 ff00::/8 연결됨 . 2021.12.05 17:28:10 - 17 281 ff00::/8 연결됨 . 2021.12.05 17:28:10 - 7 291 ff00::/8 연결됨 . 2021.12.05 17:28:10 - 14 281 ff00::/8 연결됨 . 2021.12.05 17:28:10 - 35 261 ff00::/8 연결됨 . 2021.12.05 17:28:10 - =========================================================================== . 2021.12.05 17:28:10 - 영구 경로: . 2021.12.05 17:28:10 - 없음' . 2021.12.05 17:28:10 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:916::/64 35 fe80::8 store=active . 2021.12.05 17:28:10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem . 2021.12.05 17:28:10 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete dns 35 all . 2021.12.05 17:28:10 - OpenVPN > IPv6 MTU set to 1500 on interface 35 using SetIpInterfaceEntry() . 2021.12.05 17:28:10 - OpenVPN > Initialization Sequence Completed . 2021.12.05 17:28:11 - Interface AirVPN metric changed from Automatic to 3, layer IPv4 . 2021.12.05 17:28:11 - Elevated: Command:set-interface-metric . 2021.12.05 17:28:11 - Interface AirVPN metric changed from Automatic to 3, layer IPv6 . 2021.12.05 17:28:11 - Elevated: Command:set-interface-metric . 2021.12.05 17:28:11 - Elevated: Command:wfp . 2021.12.05 17:28:11 - Elevated: Command:wfp . 2021.12.05 17:28:11 - Elevated: Command:wfp . 2021.12.05 17:28:11 - Above log line repeated 3 times more . 2021.12.05 17:28:11 - DNS leak protection with packet filtering enabled. . 2021.12.05 17:28:11 - Elevated: Command:route-list . 2021.12.05 17:28:11 - Elevated: Command:windows-dns . 2021.12.05 17:28:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=static address=10.13.22.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:11 - DNS IPv4 of a network adapter forced (AirVPN, from automatic to 10.13.22.1) . 2021.12.05 17:28:11 - Elevated: Command:windows-dns . 2021.12.05 17:28:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=static address=fde6:7a:7d20:916::1 register=primary validate=no', exit:0 . 2021.12.05 17:28:11 - DNS IPv6 of a network adapter forced (AirVPN, from automatic to fde6:7a:7d20:916::1) . 2021.12.05 17:28:11 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=static address=10.13.22.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:12 - DNS IPv4 of a network adapter forced (Killer LAN, from automatic to 10.13.22.1) . 2021.12.05 17:28:12 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=static address=fde6:7a:7d20:916::1 register=primary validate=no', exit:0 . 2021.12.05 17:28:12 - DNS IPv6 of a network adapter forced (Killer LAN, from automatic to fde6:7a:7d20:916::1) . 2021.12.05 17:28:12 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VirtualBox Host-Only Network" source=static address=10.13.22.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:12 - DNS IPv4 of a network adapter forced (VirtualBox Host-Only Network, from manual (10.128.0.1) to 10.13.22.1) . 2021.12.05 17:28:12 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=static address=fde6:7a:7d20:916::1 register=primary validate=no', exit:0 . 2021.12.05 17:28:12 - DNS IPv6 of a network adapter forced (VirtualBox Host-Only Network, from automatic to fde6:7a:7d20:916::1) . 2021.12.05 17:28:12 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VMware Network Adapter VMnet1" source=static address=10.13.22.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:12 - DNS IPv4 of a network adapter forced (VMware Network Adapter VMnet1, from manual (10.128.0.1) to 10.13.22.1) . 2021.12.05 17:28:12 - Elevated: Command:windows-dns . 2021.12.05 17:28:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=static address=fde6:7a:7d20:916::1 register=primary validate=no', exit:0 . 2021.12.05 17:28:13 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet1, from automatic to fde6:7a:7d20:916::1) . 2021.12.05 17:28:13 - Elevated: Command:windows-dns . 2021.12.05 17:28:13 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VMware Network Adapter VMnet8" source=static address=10.13.22.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:13 - DNS IPv4 of a network adapter forced (VMware Network Adapter VMnet8, from manual (10.128.0.1) to 10.13.22.1) . 2021.12.05 17:28:13 - Elevated: Command:windows-dns . 2021.12.05 17:28:13 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=static address=fde6:7a:7d20:916::1 register=primary validate=no', exit:0 . 2021.12.05 17:28:13 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet8, from automatic to fde6:7a:7d20:916::1) . 2021.12.05 17:28:13 - Elevated: Command:route-list . 2021.12.05 17:28:13 - Elevated: Command:route . 2021.12.05 17:28:13 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="0.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:13 - Routes, add 0.0.0.0/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:14 - Elevated: Command:route-list . 2021.12.05 17:28:14 - Elevated: Command:route . 2021.12.05 17:28:14 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="128.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:14 - Routes, add 128.0.0.0/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:14 - Elevated: Command:route-list . 2021.12.05 17:28:14 - Elevated: Command:route . 2021.12.05 17:28:14 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:14 - Routes, add ::/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:15 - Elevated: Command:route-list . 2021.12.05 17:28:15 - Elevated: Command:route . 2021.12.05 17:28:15 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="8000::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:15 - Routes, add 8000::/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:15 - Elevated: Command:route-list . 2021.12.05 17:28:15 - Elevated: Command:route . 2021.12.05 17:28:15 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="217.138.252.123/32" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:15 - Routes, add 217.138.252.123/32 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:16 - Elevated: Command:route-list . 2021.12.05 17:28:16 - Elevated: Command:route . 2021.12.05 17:28:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="2001:ac8:40:2:f7b7:764c:ab04:b49e/128" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:16 - Routes, add 2001:ac8:40:2:f7b7:764c:ab04:b49e/128 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:16 - Flushing DNS . 2021.12.05 17:28:16 - Elevated: Command:dns-flush . 2021.12.05 17:28:16 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 17:28:16 - NET . 2021.12.05 17:28:16 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 17:28:16 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 17:28:16 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 17:28:16 - Exec(15) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 17:28:16 - Exec(15) done in 47 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 17:28:16 - DNS 확인자 캐시를 플러시했습니다.' I 2021.12.05 17:28:16 - Checking route IPv4 I 2021.12.05 17:28:16 - Checking route IPv6 I 2021.12.05 17:28:17 - Checking DNS ! 2021.12.05 17:28:17 - Connected. . 2021.12.05 17:28:43 - Elevated: Command:service-conn-mode ! 2021.12.05 17:28:45 - Disconnecting . 2021.12.05 17:28:45 - Sending soft termination signal . 2021.12.05 17:28:45 - Elevated: Command:openvpn . 2021.12.05 17:28:48 - OpenVPN > SIGTERM received, sending exit notification to peer . 2021.12.05 17:28:50 - OpenVPN > Closing TUN/TAP interface . 2021.12.05 17:28:50 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:916::/64) . 2021.12.05 17:28:50 - OpenVPN > C:\Windows\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:916::/64 35 fe80::8 store=active . 2021.12.05 17:28:50 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv6 delete address 35 fde6:7a:7d20:916::1060 store=active . 2021.12.05 17:28:50 - OpenVPN > NETSH: C:\Windows\system32\netsh.exe interface ipv4 delete address 35 10.13.22.98 store=active . 2021.12.05 17:28:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2021.12.05 17:28:50 - Elevated: Command:route-list . 2021.12.05 17:28:50 - Elevated: Command:route . 2021.12.05 17:28:51 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="0.0.0.0/1" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:51 - Routes, delete 0.0.0.0/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:51 - Elevated: Command:route-list . 2021.12.05 17:28:51 - Elevated: Command:route . 2021.12.05 17:28:51 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="128.0.0.0/1" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:51 - Routes, delete 128.0.0.0/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:51 - Elevated: Command:route-list . 2021.12.05 17:28:51 - Elevated: Command:route . 2021.12.05 17:28:51 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 del route prefix="::/1" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:51 - Routes, delete ::/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:52 - Elevated: Command:route-list . 2021.12.05 17:28:52 - Elevated: Command:route . 2021.12.05 17:28:52 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 del route prefix="8000::/1" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:52 - Routes, delete 8000::/1 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:52 - Elevated: Command:route-list . 2021.12.05 17:28:52 - Elevated: Command:route . 2021.12.05 17:28:52 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="217.138.252.125/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:52 - Routes, delete 217.138.252.125/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 17:28:52 - Elevated: Command:route-list . 2021.12.05 17:28:52 - Elevated: Command:route . 2021.12.05 17:28:52 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="217.138.252.123/32" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:52 - Routes, delete 217.138.252.123/32 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:53 - Elevated: Command:route-list . 2021.12.05 17:28:53 - Elevated: Command:route . 2021.12.05 17:28:53 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 del route prefix="2001:ac8:40:2:f7b7:764c:ab04:b49e/128" interface="35" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:53 - Routes, delete 2001:ac8:40:2:f7b7:764c:ab04:b49e/128 for interface "AirVPN (Eddie Tunnel)". . 2021.12.05 17:28:53 - Elevated: Command:route-list . 2021.12.05 17:28:53 - Routes, delete 217.138.252.125/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", not exists. . 2021.12.05 17:28:53 - Elevated: Command:route-list . 2021.12.05 17:28:53 - Elevated: Command:route . 2021.12.05 17:28:53 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:28:53 - Routes, delete 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 17:28:53 - Elevated: Command:windows-dns . 2021.12.05 17:28:53 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:53 - DNS IPv4 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 17:28:53 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv6 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv4 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv6 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VirtualBox Host-Only Network" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv4 of a network adapter restored to original settings (VirtualBox Host-Only Network, to 10.128.0.1) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv6 of a network adapter restored to original settings (VirtualBox Host-Only Network, to automatic) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:54 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VMware Network Adapter VMnet1" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:54 - DNS IPv4 of a network adapter restored to original settings (VMware Network Adapter VMnet1, to 10.128.0.1) . 2021.12.05 17:28:54 - Elevated: Command:windows-dns . 2021.12.05 17:28:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:56 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet1, to automatic) . 2021.12.05 17:28:56 - Elevated: Command:windows-dns . 2021.12.05 17:28:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="VMware Network Adapter VMnet8" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 17:28:56 - DNS IPv4 of a network adapter restored to original settings (VMware Network Adapter VMnet8, to 10.128.0.1) . 2021.12.05 17:28:56 - Elevated: Command:windows-dns . 2021.12.05 17:28:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 17:28:56 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet8, to automatic) . 2021.12.05 17:28:56 - Elevated: Command:wfp . 2021.12.05 17:28:56 - Elevated: Command:wfp . 2021.12.05 17:28:56 - Elevated: Command:wfp . 2021.12.05 17:28:56 - Above log line repeated 3 times more . 2021.12.05 17:28:56 - DNS leak protection with packet filtering disabled. . 2021.12.05 17:28:57 - Interface AirVPN metric restored from 3 to Automatic, layer IPv4 . 2021.12.05 17:28:57 - Elevated: Command:set-interface-metric . 2021.12.05 17:28:57 - Interface AirVPN metric restored from 3 to Automatic, layer IPv6 . 2021.12.05 17:28:57 - Elevated: Command:set-interface-metric . 2021.12.05 17:28:57 - Elevated: Command:wfp . 2021.12.05 17:28:57 - Elevated: Command:wfp . 2021.12.05 17:28:57 - Elevated: Command:wfp . 2021.12.05 17:28:57 - Above log line repeated 9 times more . 2021.12.05 17:28:57 - Connection terminated. . 2021.12.05 17:28:57 - Flushing DNS . 2021.12.05 17:28:57 - Elevated: Command:dns-flush . 2021.12.05 17:28:57 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 17:28:57 - NET . 2021.12.05 17:28:57 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 17:28:57 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 17:28:57 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 17:28:57 - Exec(16) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 17:28:57 - Exec(16) done in 31 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 17:28:57 - DNS 확인자 캐시를 플러시했습니다.' . 2021.12.05 17:28:57 - Elevated: Command:wintun-adapter-removepool ! 2021.12.05 17:28:57 - Session terminated. I 2021.12.05 17:28:59 - Session starting. I 2021.12.05 17:28:59 - Checking authorization ... ! 2021.12.05 17:29:00 - Connecting to Fleed (Japan, Tokyo) . 2021.12.05 17:29:01 - Elevated: Command:route-list . 2021.12.05 17:29:01 - Elevated: Command:route . 2021.12.05 17:29:01 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="217.138.252.122/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:01 - Routes, add 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 17:29:01 - Elevated: Command:route-list . 2021.12.05 17:29:01 - Routes, add 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", already exists. . 2021.12.05 17:29:01 - Elevated: Command:route-list . 2021.12.05 17:29:01 - Elevated: Command:route . 2021.12.05 17:29:01 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:01 - Routes, add 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 17:29:01 - Elevated: Command:wireguard . 2021.12.05 17:29:02 - WireGuard > Setup start . 2021.12.05 17:29:04 - WireGuard > Setup complete . 2021.12.05 17:29:04 - WireGuard > Starting WireGuard/0.3.11 (Windows 10.0.19044; amd64) . 2021.12.05 17:29:05 - WireGuard > Watching network interfaces . 2021.12.05 17:29:05 - WireGuard > Resolving DNS names . 2021.12.05 17:29:05 - WireGuard > Creating Wintun interface . 2021.12.05 17:29:05 - WireGuard > [Wintun] CreateAdapter: Creating adapter . 2021.12.05 17:29:05 - WireGuard > [Wintun] SelectDriver: Using existing driver 0.12 . 2021.12.05 17:29:05 - WireGuard > Using Wintun/0.12 . 2021.12.05 17:29:05 - WireGuard > Dropping privileges . 2021.12.05 17:29:05 - WireGuard > Creating interface instance . 2021.12.05 17:29:05 - WireGuard > Setting interface configuration . 2021.12.05 17:29:05 - WireGuard > UAPI: Updating private key . 2021.12.05 17:29:05 - WireGuard > UAPI: Removing all peers . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Created . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating preshared key . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating endpoint . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating persistent keepalive interval . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Removing all allowedips . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 17:29:05 - WireGuard > Setup interface . 2021.12.05 17:29:05 - Elevated: Command:wfp . 2021.12.05 17:29:05 - Elevated: Command:wfp . 2021.12.05 17:29:05 - Elevated: Command:wfp . 2021.12.05 17:29:05 - Above log line repeated 3 times more . 2021.12.05 17:29:05 - WireGuard > Bringing peers up . 2021.12.05 17:29:05 - WireGuard > UDP bind has been updated . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - Starting... . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:29:05 - WireGuard > Interface state was Down, requested Up, now Up . 2021.12.05 17:29:05 - WireGuard > Monitoring default v6 routes . 2021.12.05 17:29:05 - WireGuard > Binding v6 socket to interface 0 (blackhole=true) . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - Routine: sequential receiver - started . 2021.12.05 17:29:05 - WireGuard > Setting device v6 addresses . 2021.12.05 17:29:05 - WireGuard > peer(PyLC…g+hk) - Routine: sequential sender - started . 2021.12.05 17:29:05 - WireGuard > Monitoring default v4 routes . 2021.12.05 17:29:05 - WireGuard > Binding v4 socket to interface 14 (blackhole=false) . 2021.12.05 17:29:05 - WireGuard > Setting device v4 addresses . 2021.12.05 17:29:05 - WireGuard > Listening for UAPI requests . 2021.12.05 17:29:05 - WireGuard > Startup complete . 2021.12.05 17:29:09 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:29:10 - WireGuard > Received first handshake . 2021.12.05 17:29:10 - Interface AirVPN metric changed from Automatic to 3, layer IPv4 . 2021.12.05 17:29:10 - Elevated: Command:set-interface-metric . 2021.12.05 17:29:10 - Interface AirVPN metric changed from Automatic to 3, layer IPv6 . 2021.12.05 17:29:10 - Elevated: Command:set-interface-metric . 2021.12.05 17:29:10 - Elevated: Command:wfp . 2021.12.05 17:29:10 - Elevated: Command:wfp . 2021.12.05 17:29:10 - Elevated: Command:wfp . 2021.12.05 17:29:10 - Above log line repeated 3 times more . 2021.12.05 17:29:10 - DNS leak protection with packet filtering enabled. . 2021.12.05 17:29:10 - Elevated: Command:route-list . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:10 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 17:29:10 - DNS IPv4 of a network adapter forced (AirVPN, from automatic to 10.128.0.1) . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:10 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 17:29:10 - DNS IPv6 of a network adapter forced (AirVPN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:10 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 17:29:10 - DNS IPv4 of a network adapter forced (Killer LAN, from automatic to 10.128.0.1) . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:10 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 17:29:10 - DNS IPv6 of a network adapter forced (Killer LAN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:10 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 17:29:10 - DNS IPv6 of a network adapter forced (VirtualBox Host-Only Network, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 17:29:10 - Elevated: Command:windows-dns . 2021.12.05 17:29:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 17:29:11 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet1, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 17:29:11 - Elevated: Command:windows-dns . 2021.12.05 17:29:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 17:29:11 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet8, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 17:29:11 - Elevated: Command:route-list . 2021.12.05 17:29:11 - Elevated: Command:route . 2021.12.05 17:29:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="0.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:11 - Routes, add 0.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:11 - Elevated: Command:route-list . 2021.12.05 17:29:11 - Elevated: Command:route . 2021.12.05 17:29:11 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="128.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:11 - Routes, add 128.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:12 - Elevated: Command:route-list . 2021.12.05 17:29:12 - Elevated: Command:route . 2021.12.05 17:29:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:12 - Routes, add ::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:12 - Elevated: Command:route-list . 2021.12.05 17:29:12 - Elevated: Command:route . 2021.12.05 17:29:12 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="8000::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:12 - Routes, add 8000::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:13 - Elevated: Command:route-list . 2021.12.05 17:29:13 - Elevated: Command:route . 2021.12.05 17:29:13 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="217.138.252.123/32" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:13 - Routes, add 217.138.252.123/32 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:13 - Elevated: Command:route-list . 2021.12.05 17:29:13 - Elevated: Command:route . 2021.12.05 17:29:13 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="2001:ac8:40:2:f7b7:764c:ab04:b49e/128" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 17:29:13 - Routes, add 2001:ac8:40:2:f7b7:764c:ab04:b49e/128 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 17:29:13 - Flushing DNS . 2021.12.05 17:29:13 - Elevated: Command:dns-flush . 2021.12.05 17:29:13 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 17:29:13 - NET . 2021.12.05 17:29:13 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 17:29:13 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 17:29:13 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 17:29:13 - Exec(17) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 17:29:13 - Exec(17) done in 32 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 17:29:13 - DNS 확인자 캐시를 플러시했습니다.' I 2021.12.05 17:29:13 - Checking route IPv4 I 2021.12.05 17:29:14 - Checking route IPv6 I 2021.12.05 17:29:14 - Checking DNS ! 2021.12.05 17:29:14 - Connected. . 2021.12.05 17:29:14 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:31:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:31:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:31:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:33:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:33:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:33:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:35:14 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:35:14 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:35:14 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:37:14 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:37:14 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:37:14 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:39:16 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:39:16 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:39:16 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:41:16 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:41:16 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:41:16 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:41:59 - Collect information about AirVPN completed . 2021.12.05 17:43:18 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:43:18 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:43:18 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:45:18 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:45:18 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:45:18 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:47:19 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:47:19 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:47:19 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:49:20 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:49:20 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:49:20 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:51:20 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:51:20 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:51:20 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:53:20 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:53:20 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:53:20 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:55:21 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:55:21 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:55:21 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:57:21 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:57:21 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:57:21 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 17:59:21 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 17:59:21 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 17:59:21 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:01:21 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:01:21 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:01:21 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:03:21 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:03:21 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:03:21 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:05:22 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:05:22 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:05:22 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:07:22 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:07:27 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:07:27 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:07:27 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:09:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:09:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:09:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:11:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:11:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:11:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:11:57 - Collect information about AirVPN completed . 2021.12.05 18:13:33 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:13:33 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:13:33 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:15:33 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:15:33 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:15:33 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:17:33 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:17:33 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:17:33 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:19:33 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:19:33 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:19:33 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:21:33 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:21:33 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:21:33 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:23:34 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:23:34 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:23:34 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:25:34 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:25:34 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:25:34 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:27:37 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:27:37 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:27:37 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:29:37 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:29:37 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:29:37 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:31:38 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:31:38 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:31:38 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:33:40 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:33:40 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:33:40 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet ! 2021.12.05 18:33:53 - Disconnecting . 2021.12.05 18:33:53 - Elevated: Command:wireguard . 2021.12.05 18:33:54 - WireGuard > Stop request received . 2021.12.05 18:33:54 - WireGuard > Stopping . 2021.12.05 18:33:54 - WireGuard > Completed . 2021.12.05 18:33:55 - Elevated: Command:route-list . 2021.12.05 18:33:55 - Routes, delete 0.0.0.0/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:55 - Elevated: Command:route-list . 2021.12.05 18:33:55 - Routes, delete 128.0.0.0/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:55 - Elevated: Command:route-list . 2021.12.05 18:33:55 - Routes, delete ::/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:55 - Elevated: Command:route-list . 2021.12.05 18:33:55 - Routes, delete 8000::/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:55 - Elevated: Command:route-list . 2021.12.05 18:33:55 - Elevated: Command:route . 2021.12.05 18:33:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="217.138.252.122/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:33:56 - Routes, delete 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:33:56 - Elevated: Command:route-list . 2021.12.05 18:33:56 - Routes, delete 217.138.252.123/32 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:56 - Elevated: Command:route-list . 2021.12.05 18:33:56 - Routes, delete 2001:ac8:40:2:f7b7:764c:ab04:b49e/128 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:33:56 - Elevated: Command:route-list . 2021.12.05 18:33:56 - Routes, delete 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", not exists. . 2021.12.05 18:33:56 - Elevated: Command:route-list . 2021.12.05 18:33:56 - Elevated: Command:route . 2021.12.05 18:33:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:33:56 - Routes, delete 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:33:56 - Elevated: Command:windows-dns . 2021.12.05 18:33:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:56 - DNS IPv4 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 18:33:56 - Elevated: Command:windows-dns . 2021.12.05 18:33:56 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:56 - DNS IPv6 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 18:33:56 - Elevated: Command:windows-dns . 2021.12.05 18:33:57 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:57 - DNS IPv4 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 18:33:57 - Elevated: Command:windows-dns . 2021.12.05 18:33:57 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:57 - DNS IPv6 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 18:33:57 - Elevated: Command:windows-dns . 2021.12.05 18:33:57 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:57 - DNS IPv6 of a network adapter restored to original settings (VirtualBox Host-Only Network, to automatic) . 2021.12.05 18:33:57 - Elevated: Command:windows-dns . 2021.12.05 18:33:57 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:57 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet1, to automatic) . 2021.12.05 18:33:57 - Elevated: Command:windows-dns . 2021.12.05 18:33:57 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:33:57 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet8, to automatic) . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Above log line repeated 3 times more . 2021.12.05 18:33:57 - DNS leak protection with packet filtering disabled. . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Elevated: Command:wfp . 2021.12.05 18:33:57 - Above log line repeated 3 times more . 2021.12.05 18:33:57 - Connection terminated. I 2021.12.05 18:33:57 - Checking authorization ... ! 2021.12.05 18:33:58 - Connecting to Telescopium (Canada, Vancouver) . 2021.12.05 18:33:58 - Elevated: Command:route-list . 2021.12.05 18:33:58 - Elevated: Command:route . 2021.12.05 18:33:58 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.30.89.50/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:33:58 - Routes, add 192.30.89.50/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:33:59 - Elevated: Command:route-list . 2021.12.05 18:33:59 - Routes, add 192.30.89.50/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", already exists. . 2021.12.05 18:33:59 - Elevated: Command:route-list . 2021.12.05 18:33:59 - Elevated: Command:route . 2021.12.05 18:33:59 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:33:59 - Routes, add 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:33:59 - Elevated: Command:wireguard . 2021.12.05 18:33:59 - WireGuard > Setup start . 2021.12.05 18:34:02 - WireGuard > Setup complete . 2021.12.05 18:34:02 - WireGuard > Starting WireGuard/0.3.11 (Windows 10.0.19044; amd64) . 2021.12.05 18:34:02 - WireGuard > Watching network interfaces . 2021.12.05 18:34:02 - WireGuard > Resolving DNS names . 2021.12.05 18:34:02 - WireGuard > Creating Wintun interface . 2021.12.05 18:34:02 - WireGuard > [Wintun] CreateAdapter: Creating adapter . 2021.12.05 18:34:02 - WireGuard > [Wintun] SelectDriver: Using existing driver 0.12 . 2021.12.05 18:34:02 - WireGuard > Using Wintun/0.12 . 2021.12.05 18:34:02 - WireGuard > Dropping privileges . 2021.12.05 18:34:02 - WireGuard > Creating interface instance . 2021.12.05 18:34:02 - WireGuard > Setting interface configuration . 2021.12.05 18:34:02 - WireGuard > UAPI: Updating private key . 2021.12.05 18:34:02 - WireGuard > UAPI: Removing all peers . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Created . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating preshared key . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating endpoint . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating persistent keepalive interval . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Removing all allowedips . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 18:34:02 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 18:34:02 - WireGuard > Setup interface . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Above log line repeated 3 times more . 2021.12.05 18:34:03 - WireGuard > Bringing peers up . 2021.12.05 18:34:03 - WireGuard > UDP bind has been updated . 2021.12.05 18:34:03 - WireGuard > peer(PyLC…g+hk) - Starting... . 2021.12.05 18:34:03 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:34:03 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:34:03 - WireGuard > Interface state was Down, requested Up, now Up . 2021.12.05 18:34:03 - WireGuard > Monitoring default v6 routes . 2021.12.05 18:34:03 - WireGuard > Binding v6 socket to interface 0 (blackhole=true) . 2021.12.05 18:34:03 - WireGuard > Setting device v6 addresses . 2021.12.05 18:34:03 - WireGuard > peer(PyLC…g+hk) - Routine: sequential receiver - started . 2021.12.05 18:34:03 - WireGuard > peer(PyLC…g+hk) - Routine: sequential sender - started . 2021.12.05 18:34:03 - WireGuard > Monitoring default v4 routes . 2021.12.05 18:34:03 - WireGuard > Binding v4 socket to interface 14 (blackhole=false) . 2021.12.05 18:34:03 - WireGuard > Setting device v4 addresses . 2021.12.05 18:34:03 - WireGuard > Listening for UAPI requests . 2021.12.05 18:34:03 - WireGuard > Startup complete . 2021.12.05 18:34:03 - WireGuard > Received first handshake . 2021.12.05 18:34:03 - Interface AirVPN metric changed from Automatic to 3, layer IPv4 . 2021.12.05 18:34:03 - Elevated: Command:set-interface-metric . 2021.12.05 18:34:03 - Interface AirVPN metric changed from Automatic to 3, layer IPv6 . 2021.12.05 18:34:03 - Elevated: Command:set-interface-metric . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Elevated: Command:wfp . 2021.12.05 18:34:03 - Above log line repeated 3 times more . 2021.12.05 18:34:03 - DNS leak protection with packet filtering enabled. . 2021.12.05 18:34:03 - Elevated: Command:route-list . 2021.12.05 18:34:03 - Elevated: Command:windows-dns . 2021.12.05 18:34:05 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 18:34:05 - DNS IPv4 of a network adapter forced (AirVPN, from automatic to 10.128.0.1) . 2021.12.05 18:34:05 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv6 of a network adapter forced (AirVPN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:34:06 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv4 of a network adapter forced (Killer LAN, from automatic to 10.128.0.1) . 2021.12.05 18:34:06 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv6 of a network adapter forced (Killer LAN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:34:06 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv6 of a network adapter forced (VirtualBox Host-Only Network, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:34:06 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet1, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:34:06 - Elevated: Command:windows-dns . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:34:06 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet8, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:34:06 - Elevated: Command:route-list . 2021.12.05 18:34:06 - Elevated: Command:route . 2021.12.05 18:34:06 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="0.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:06 - Routes, add 0.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:07 - Elevated: Command:route-list . 2021.12.05 18:34:07 - Elevated: Command:route . 2021.12.05 18:34:07 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="128.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:07 - Routes, add 128.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:07 - Elevated: Command:route-list . 2021.12.05 18:34:07 - Elevated: Command:route . 2021.12.05 18:34:07 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:07 - Routes, add ::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:08 - Elevated: Command:route-list . 2021.12.05 18:34:08 - Elevated: Command:route . 2021.12.05 18:34:08 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="8000::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:08 - Routes, add 8000::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:08 - Elevated: Command:route-list . 2021.12.05 18:34:08 - Elevated: Command:route . 2021.12.05 18:34:08 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.30.89.51/32" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:08 - Routes, add 192.30.89.51/32 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:08 - Elevated: Command:route-list . 2021.12.05 18:34:08 - Elevated: Command:route . 2021.12.05 18:34:09 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="2606:9580:100:c:8757:8ee:ec9c:991c/128" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:34:09 - Routes, add 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:34:09 - Flushing DNS . 2021.12.05 18:34:09 - Elevated: Command:dns-flush . 2021.12.05 18:34:09 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 18:34:09 - NET . 2021.12.05 18:34:09 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 18:34:09 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 18:34:09 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 18:34:09 - Exec(18) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 18:34:09 - Exec(18) done in 47 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 18:34:09 - DNS 확인자 캐시를 플러시했습니다.' I 2021.12.05 18:34:09 - Checking route IPv4 I 2021.12.05 18:34:09 - Checking route IPv6 I 2021.12.05 18:34:11 - Checking DNS ! 2021.12.05 18:34:20 - Connected. . 2021.12.05 18:34:20 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:36:03 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:36:03 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:36:03 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet ! 2021.12.05 18:36:13 - Disconnecting . 2021.12.05 18:36:13 - Elevated: Command:wireguard . 2021.12.05 18:36:13 - WireGuard > Stop request received . 2021.12.05 18:36:13 - WireGuard > Stopping . 2021.12.05 18:36:14 - WireGuard > Completed . 2021.12.05 18:36:14 - Elevated: Command:route-list . 2021.12.05 18:36:14 - Routes, delete 0.0.0.0/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:14 - Elevated: Command:route-list . 2021.12.05 18:36:14 - Routes, delete 128.0.0.0/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:14 - Elevated: Command:route-list . 2021.12.05 18:36:14 - Routes, delete ::/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:14 - Elevated: Command:route-list . 2021.12.05 18:36:14 - Routes, delete 8000::/1 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:15 - Elevated: Command:route-list . 2021.12.05 18:36:15 - Elevated: Command:route . 2021.12.05 18:36:15 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.30.89.50/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:15 - Routes, delete 192.30.89.50/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:36:15 - Elevated: Command:route-list . 2021.12.05 18:36:15 - Routes, delete 192.30.89.51/32 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:15 - Elevated: Command:route-list . 2021.12.05 18:36:15 - Routes, delete 2606:9580:100:c:8757:8ee:ec9c:991c/128 for interface "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", not exists. . 2021.12.05 18:36:15 - Elevated: Command:route-list . 2021.12.05 18:36:15 - Routes, delete 192.30.89.50/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", not exists. . 2021.12.05 18:36:15 - Elevated: Command:route-list . 2021.12.05 18:36:16 - Elevated: Command:route . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 del route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:16 - Routes, delete 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv4 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv6 of a network adapter restored to original settings (AirVPN, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv4 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv6 of a network adapter restored to original settings (Killer LAN, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv6 of a network adapter restored to original settings (VirtualBox Host-Only Network, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet1, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:windows-dns . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=dhcp register=primary validate=no', exit:0 . 2021.12.05 18:36:16 - DNS IPv6 of a network adapter restored to original settings (VMware Network Adapter VMnet8, to automatic) . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Above log line repeated 3 times more . 2021.12.05 18:36:16 - DNS leak protection with packet filtering disabled. . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Elevated: Command:wfp . 2021.12.05 18:36:16 - Above log line repeated 3 times more . 2021.12.05 18:36:16 - Connection terminated. . 2021.12.05 18:36:16 - Flushing DNS . 2021.12.05 18:36:16 - Elevated: Command:dns-flush . 2021.12.05 18:36:16 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 18:36:16 - NET . 2021.12.05 18:36:16 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 18:36:16 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 18:36:16 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 18:36:16 - Exec(19) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 18:36:16 - Exec(19) done in 31 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 18:36:16 - DNS 확인자 캐시를 플러시했습니다.' . 2021.12.05 18:36:16 - Elevated: Command:wintun-adapter-removepool ! 2021.12.05 18:36:16 - Session terminated. I 2021.12.05 18:36:17 - Session starting. I 2021.12.05 18:36:18 - Checking authorization ... ! 2021.12.05 18:36:19 - Connecting to Fleed (Japan, Tokyo) . 2021.12.05 18:36:20 - Elevated: Command:route-list . 2021.12.05 18:36:20 - Elevated: Command:route . 2021.12.05 18:36:20 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="217.138.252.122/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:20 - Routes, add 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:36:20 - Elevated: Command:route-list . 2021.12.05 18:36:20 - Routes, add 217.138.252.122/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)", already exists. . 2021.12.05 18:36:20 - Elevated: Command:route-list . 2021.12.05 18:36:20 - Elevated: Command:route . 2021.12.05 18:36:20 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="192.168.219.1/32" interface="14" nexthop="10.10.10.1" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:20 - Routes, add 192.168.219.1/32 for interface "Killer LAN (Killer E2200 Gigabit Ethernet Controller)". . 2021.12.05 18:36:20 - Elevated: Command:wireguard . 2021.12.05 18:36:20 - WireGuard > Setup start . 2021.12.05 18:36:24 - WireGuard > Setup complete . 2021.12.05 18:36:24 - WireGuard > Starting WireGuard/0.3.11 (Windows 10.0.19044; amd64) . 2021.12.05 18:36:24 - WireGuard > Watching network interfaces . 2021.12.05 18:36:24 - WireGuard > Resolving DNS names . 2021.12.05 18:36:24 - WireGuard > Creating Wintun interface . 2021.12.05 18:36:24 - WireGuard > [Wintun] CreateAdapter: Creating adapter . 2021.12.05 18:36:24 - WireGuard > [Wintun] SelectDriver: Using existing driver 0.12 . 2021.12.05 18:36:24 - WireGuard > Using Wintun/0.12 . 2021.12.05 18:36:24 - WireGuard > Dropping privileges . 2021.12.05 18:36:24 - WireGuard > Creating interface instance . 2021.12.05 18:36:24 - WireGuard > Setting interface configuration . 2021.12.05 18:36:24 - WireGuard > UAPI: Updating private key . 2021.12.05 18:36:24 - WireGuard > UAPI: Removing all peers . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Created . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating preshared key . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating endpoint . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Updating persistent keepalive interval . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Removing all allowedips . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - UAPI: Adding allowedip . 2021.12.05 18:36:24 - WireGuard > Setup interface . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Above log line repeated 3 times more . 2021.12.05 18:36:24 - WireGuard > Bringing peers up . 2021.12.05 18:36:24 - WireGuard > UDP bind has been updated . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - Starting... . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:36:24 - WireGuard > Interface state was Down, requested Up, now Up . 2021.12.05 18:36:24 - WireGuard > Monitoring default v4 routes . 2021.12.05 18:36:24 - WireGuard > Binding v4 socket to interface 14 (blackhole=false) . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - Routine: sequential receiver - started . 2021.12.05 18:36:24 - WireGuard > Setting device v4 addresses . 2021.12.05 18:36:24 - WireGuard > peer(PyLC…g+hk) - Routine: sequential sender - started . 2021.12.05 18:36:24 - WireGuard > Received first handshake . 2021.12.05 18:36:24 - Interface AirVPN metric changed from Automatic to 3, layer IPv4 . 2021.12.05 18:36:24 - Elevated: Command:set-interface-metric . 2021.12.05 18:36:24 - Interface AirVPN metric changed from Automatic to 3, layer IPv6 . 2021.12.05 18:36:24 - Elevated: Command:set-interface-metric . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Elevated: Command:wfp . 2021.12.05 18:36:24 - Above log line repeated 3 times more . 2021.12.05 18:36:24 - DNS leak protection with packet filtering enabled. . 2021.12.05 18:36:24 - Elevated: Command:route-list . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="AirVPN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv4 of a network adapter forced (AirVPN, from automatic to 10.128.0.1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="AirVPN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv6 of a network adapter forced (AirVPN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 set dns name="Killer LAN" source=static address=10.128.0.1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv4 of a network adapter forced (Killer LAN, from automatic to 10.128.0.1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="Killer LAN" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv6 of a network adapter forced (Killer LAN, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VirtualBox Host-Only Network" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv6 of a network adapter forced (VirtualBox Host-Only Network, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet1" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet1, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:36:25 - Elevated: Command:windows-dns . 2021.12.05 18:36:25 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 set dns name="VMware Network Adapter VMnet8" source=static address=fd7d:76ee:e68f:a993::1 register=primary validate=no', exit:0 . 2021.12.05 18:36:25 - DNS IPv6 of a network adapter forced (VMware Network Adapter VMnet8, from automatic to fd7d:76ee:e68f:a993::1) . 2021.12.05 18:36:26 - Elevated: Command:route-list . 2021.12.05 18:36:26 - Elevated: Command:route . 2021.12.05 18:36:26 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="0.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:26 - Routes, add 0.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:26 - Elevated: Command:route-list . 2021.12.05 18:36:26 - Elevated: Command:route . 2021.12.05 18:36:26 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="128.0.0.0/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:26 - Routes, add 128.0.0.0/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:27 - Elevated: Command:route-list . 2021.12.05 18:36:27 - Elevated: Command:route . 2021.12.05 18:36:27 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:27 - Routes, add ::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:27 - Elevated: Command:route-list . 2021.12.05 18:36:27 - Elevated: Command:route . 2021.12.05 18:36:27 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="8000::/1" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:27 - Routes, add 8000::/1 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:28 - Elevated: Command:route-list . 2021.12.05 18:36:28 - Elevated: Command:route . 2021.12.05 18:36:28 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv4 add route prefix="217.138.252.123/32" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:28 - Routes, add 217.138.252.123/32 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:28 - Elevated: Command:route-list . 2021.12.05 18:36:28 - Elevated: Command:route . 2021.12.05 18:36:28 - Elevated: Exec, path:'C:\Windows\system32\netsh.exe', arg:'interface ipv6 add route prefix="2001:ac8:40:2:f7b7:764c:ab04:b49e/128" interface="35" metric=0 store=active', exit:0, out:'Ȯ�ε�' . 2021.12.05 18:36:28 - Routes, add 2001:ac8:40:2:f7b7:764c:ab04:b49e/128 for interface "AirVPN (WireGuard Tunnel)". . 2021.12.05 18:36:28 - Flushing DNS . 2021.12.05 18:36:28 - Elevated: Command:dns-flush . 2021.12.05 18:36:28 - Elevated: Exec, path:'C:\Windows\system32\net.exe', arg:'/flushdns', exit:1, err:'�� ��ɿ� ���� ����: . 2021.12.05 18:36:28 - NET . 2021.12.05 18:36:28 - [ ACCOUNTS | COMPUTER | CONFIG | CONTINUE | FILE | GROUP | HELP | . 2021.12.05 18:36:28 - HELPMSG | LOCALGROUP | PAUSE | SESSION | SHARE | START | . 2021.12.05 18:36:28 - STATISTICS | STOP | TIME | USE | USER | VIEW ]' . 2021.12.05 18:36:28 - Exec(20) of 'C:\Windows\system32\ipconfig.exe', 1 args: '/flushdns'; . 2021.12.05 18:36:28 - Exec(20) done in 46 ms, exit: 0, out: 'Windows IP 구성 . 2021.12.05 18:36:28 - DNS 확인자 캐시를 플러시했습니다.' I 2021.12.05 18:36:28 - Checking route IPv4 I 2021.12.05 18:36:29 - Checking route IPv6 I 2021.12.05 18:36:31 - Checking DNS ! 2021.12.05 18:36:31 - Connected. . 2021.12.05 18:36:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:36:31 - WireGuard > Monitoring default v6 routes . 2021.12.05 18:36:31 - WireGuard > Binding v6 socket to interface 0 (blackhole=true) . 2021.12.05 18:36:31 - WireGuard > Setting device v6 addresses . 2021.12.05 18:36:31 - WireGuard > Listening for UAPI requests . 2021.12.05 18:36:31 - WireGuard > Startup complete . 2021.12.05 18:38:25 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:38:25 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:38:25 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:40:26 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:40:26 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:40:26 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:41:57 - Collect information about AirVPN completed . 2021.12.05 18:42:28 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:42:28 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:42:28 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:44:28 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:44:28 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:44:28 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:46:29 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:46:29 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:46:29 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:48:30 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:48:30 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:48:30 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:50:30 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:50:30 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:50:30 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:52:30 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:52:30 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:52:30 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:54:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:54:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:54:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:56:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:56:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:56:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 18:58:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 18:58:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 18:58:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:00:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:00:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:00:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:02:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:02:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:02:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:04:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:04:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:04:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:06:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:06:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:06:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:08:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:08:31 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:08:31 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:10:31 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:10:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:10:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:12:00 - Collect information about AirVPN completed . 2021.12.05 19:12:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:12:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:12:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:14:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:14:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:14:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:16:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:16:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:16:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:18:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:18:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:18:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:20:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:20:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:20:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:22:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:22:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:22:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:24:32 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:24:32 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:24:32 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:26:35 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:26:35 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:26:35 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:28:36 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:28:36 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:28:36 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:30:37 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:30:37 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:30:37 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:32:37 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:32:37 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:32:37 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:34:37 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:34:42 - WireGuard > peer(PyLC…g+hk) - Handshake did not complete after 5 seconds, retrying (try 2) . 2021.12.05 19:34:42 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:34:42 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:34:42 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:36:47 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:36:52 - WireGuard > peer(PyLC…g+hk) - Handshake did not complete after 5 seconds, retrying (try 2) . 2021.12.05 19:36:52 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:36:52 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:36:52 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:38:52 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:38:52 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:38:52 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:40:52 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:40:52 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:40:52 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:42:01 - Collect information about AirVPN completed . 2021.12.05 19:42:53 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:42:53 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:42:53 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:44:53 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:44:58 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:44:58 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:44:58 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:46:58 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:46:58 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:46:58 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:48:58 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:49:03 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:49:04 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:49:04 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:51:04 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:51:04 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:51:04 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:53:04 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:53:04 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:53:04 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:55:04 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:55:04 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:55:04 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:57:05 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:57:05 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:57:05 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 19:59:05 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 19:59:05 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 19:59:05 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:01:05 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:01:05 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:01:05 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:03:05 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:03:05 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:03:05 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:05:08 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:05:08 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:05:08 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:07:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:07:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:07:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:09:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:09:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:09:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:11:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:11:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:11:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:12:02 - Collect information about AirVPN completed . 2021.12.05 20:13:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:13:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:13:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:15:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:15:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:15:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:17:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:17:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:17:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:19:10 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:19:10 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:19:10 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:21:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:21:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:21:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:23:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:23:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:23:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:25:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:25:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:25:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:27:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:27:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:27:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:29:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:29:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:29:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:31:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:31:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:31:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:33:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:33:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:33:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:35:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:35:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:35:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:37:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:37:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:37:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:39:11 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:39:11 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:39:11 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:41:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:41:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:41:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:42:09 - Collect information about AirVPN completed . 2021.12.05 20:43:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:43:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:43:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:45:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:45:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:45:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:47:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:47:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:47:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:49:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:49:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:49:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet . 2021.12.05 20:51:12 - WireGuard > peer(PyLC…g+hk) - Sending handshake initiation . 2021.12.05 20:51:12 - WireGuard > peer(PyLC…g+hk) - Received handshake response . 2021.12.05 20:51:12 - WireGuard > peer(PyLC…g+hk) - Sending keepalive packet ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "destination": "0.0.0.0\/0", "gateway": "10.10.10.1", "interface_index": 14, "metric": 0, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "0.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "10.10.10.0\/24", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "10.10.10.110\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "10.10.10.255\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "10.128.0.0\/10", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "10.157.159.51\/32", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "10.191.255.255\/32", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "127.0.0.0\/8", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "127.0.0.1\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "127.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "128.0.0.0\/1", "gateway": "0.0.0.0", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "192.168.56.0\/24", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "192.168.56.1\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "192.168.56.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "192.168.59.0\/24", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "192.168.59.1\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "192.168.59.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "192.168.206.0\/24", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "192.168.206.1\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "192.168.206.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "192.168.219.1\/32", "gateway": "10.10.10.1", "interface_index": 14, "metric": 0, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "217.138.252.122\/32", "gateway": "10.10.10.1", "interface_index": 14, "metric": 0, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "217.138.252.123\/32", "gateway": "0.0.0.0", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "224.0.0.0\/4", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "255.255.255.255\/32", "gateway": "0.0.0.0", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "::\/1", "gateway": "::", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "::1\/128", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "2001:ac8:40:2:f7b7:764c:ab04:b49e\/128", "gateway": "::", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "8000::\/1", "gateway": "::", "interface_index": 35, "metric": 0, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "fd7d:76ee:e68f::\/48", "gateway": "::", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "fd7d:76ee:e68f:a993:7011:b9d5:7204:3dd6\/128", "gateway": "::", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "fe80::\/64", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "fe80::1456:e117:632:7523\/128", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "fe80::18a8:e895:e1b7:4195\/128", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "fe80::650d:6f7c:9b0f:6442\/128", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "fe80::74ac:5ac6:2ab8:4ce3\/128", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 1, "metric": 256, "interface": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 18, "metric": 256, "interface": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 17, "metric": 256, "interface": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 7, "metric": 256, "interface": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 14, "metric": 256, "interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}" }, { "destination": "ff00::\/8", "gateway": "::", "interface_index": 35, "metric": 256, "interface": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}" } ], "ipv4-default-gateway": "10.10.10.1", "ipv4-default-interface": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}", "interfaces": [ { "friendly": "AirVPN", "id": "{8EC4BEBF-E871-442E-B791-784DE3B3707B}", "name": "AirVPN", "description": "WireGuard Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "13200612841", "bytes_sent": "607191746", "support_ipv4": true, "support_ipv6": true, "ips": [ "fd7d:76ee:e68f:a993:7011:b9d5:7204:3dd6", "10.157.159.51" ], "bind": true, "dns4": "10.128.0.1", "dns6": null }, { "friendly": "Killer LAN", "id": "{D49C552E-5EAE-4ADD-B43C-EF0DA7384482}", "name": "Killer LAN", "description": "Killer E2200 Gigabit Ethernet Controller", "type": "Ethernet", "status": "Up", "bytes_received": "14737261084", "bytes_sent": "1277802028", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::650d:6f7c:9b0f:6442", "10.10.10.110" ], "bind": true, "dns4": "10.128.0.1", "dns6": null }, { "friendly": "VirtualBox Host-Only Network", "id": "{EF27D1EE-7F94-4966-92A7-3A991F4ED94E}", "name": "VirtualBox Host-Only Network", "description": "VirtualBox Host-Only Ethernet Adapter", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::74ac:5ac6:2ab8:4ce3", "192.168.56.1" ], "bind": true, "dns4": "10.128.0.1", "dns6": null }, { "friendly": "VMware Network Adapter VMnet1", "id": "{FDD95C5F-33AA-4BF7-A818-288F53E5C86E}", "name": "VMware Network Adapter VMnet1", "description": "VMware Virtual Ethernet Adapter for VMnet1", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "14766", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::1456:e117:632:7523", "192.168.59.1" ], "bind": true, "dns4": "10.128.0.1", "dns6": null }, { "friendly": "VMware Network Adapter VMnet8", "id": "{3B4A55D7-7322-400A-98DA-AD56280F07FD}", "name": "VMware Network Adapter VMnet8", "description": "VMware Virtual Ethernet Adapter for VMnet8", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "14776", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::18a8:e895:e1b7:4195", "192.168.206.1" ], "bind": true, "dns4": "10.128.0.1", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{EAC7BB70-29AC-11EB-9733-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "bind": true, "dns4": "", "dns6": null } ] } ---------------------------- ipconfig /all: Windows IP 구성 호스트 이름 . . . . . . . . : PFRK-PC-10 주 DNS 접미사 . . . . . . . : 노드 유형 . . . . . . . . . : 혼성 IP 라우팅 사용. . . . . . . : 아니요 WINS 프록시 사용. . . . . . : 아니요 알 수 없는 어댑터 AirVPN: 연결별 DNS 접미사. . . . : 설명. . . . . . . . . . . . : WireGuard Tunnel 물리적 주소 . . . . . . . . : DHCP 사용 . . . . . . . . . : 아니요 자동 구성 사용. . . . . . . : 예 IPv6 주소 . . . . . . . . . : fd7d:76ee:e68f:a993:7011:b9d5:7204:3dd6(기본 설정) IPv4 주소 . . . . . . . . . : 10.157.159.51(기본 설정) 서브넷 마스크 . . . . . . . : 255.192.0.0 기본 게이트웨이 . . . . . . : DNS 서버. . . . . . . . . . : fd7d:76ee:e68f:a993::1 10.128.0.1 Tcpip를 통한 NetBIOS. . . . : 사용 이더넷 어댑터 Killer LAN: 연결별 DNS 접미사. . . . : 설명. . . . . . . . . . . . : Killer E2200 Gigabit Ethernet Controller 물리적 주소 . . . . . . . . : D8-CB-8A-5E-8D-23 DHCP 사용 . . . . . . . . . : 예 자동 구성 사용. . . . . . . : 예 링크-로컬 IPv6 주소 . . . . : fe80::650d:6f7c:9b0f:6442%14(기본 설정) IPv4 주소 . . . . . . . . . : 10.10.10.110(기본 설정) 서브넷 마스크 . . . . . . . : 255.255.255.0 임대 시작 날짜. . . . . . . : 2021년 12월 5일 일요일 16:10:23 임대 만료 날짜. . . . . . . : 2021년 12월 5일 일요일 20:52:42 기본 게이트웨이 . . . . . . : 10.10.10.1 DHCP 서버 . . . . . . . . . : 10.10.10.1 DHCPv6 IAID . . . . . . . . : 114871178 DHCPv6 클라이언트 DUID. . . : 00-01-00-01-27-61-EC-0E-D8-CB-8A-5E-8D-23 DNS 서버. . . . . . . . . . : fd7d:76ee:e68f:a993::1 10.128.0.1 Tcpip를 통한 NetBIOS. . . . : 사용 이더넷 어댑터 VirtualBox Host-Only Network: 연결별 DNS 접미사. . . . : 설명. . . . . . . . . . . . : VirtualBox Host-Only Ethernet Adapter 물리적 주소 . . . . . . . . : 0A-00-27-00-00-11 DHCP 사용 . . . . . . . . . : 아니요 자동 구성 사용. . . . . . . : 예 링크-로컬 IPv6 주소 . . . . : fe80::74ac:5ac6:2ab8:4ce3%17(기본 설정) IPv4 주소 . . . . . . . . . : 192.168.56.1(기본 설정) 서브넷 마스크 . . . . . . . : 255.255.255.0 기본 게이트웨이 . . . . . . : DHCPv6 IAID . . . . . . . . : 520749095 DHCPv6 클라이언트 DUID. . . : 00-01-00-01-27-61-EC-0E-D8-CB-8A-5E-8D-23 DNS 서버. . . . . . . . . . : fd7d:76ee:e68f:a993::1 10.128.0.1 Tcpip를 통한 NetBIOS. . . . : 사용 이더넷 어댑터 VMware Network Adapter VMnet1: 연결별 DNS 접미사. . . . : 설명. . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1 물리적 주소 . . . . . . . . : 00-50-56-C0-00-01 DHCP 사용 . . . . . . . . . : 아니요 자동 구성 사용. . . . . . . : 예 링크-로컬 IPv6 주소 . . . . : fe80::1456:e117:632:7523%18(기본 설정) IPv4 주소 . . . . . . . . . : 192.168.59.1(기본 설정) 서브넷 마스크 . . . . . . . : 255.255.255.0 기본 게이트웨이 . . . . . . : DHCPv6 IAID . . . . . . . . : 184569942 DHCPv6 클라이언트 DUID. . . : 00-01-00-01-27-61-EC-0E-D8-CB-8A-5E-8D-23 DNS 서버. . . . . . . . . . : fd7d:76ee:e68f:a993::1 10.128.0.1 Tcpip를 통한 NetBIOS. . . . : 사용 이더넷 어댑터 VMware Network Adapter VMnet8: 연결별 DNS 접미사. . . . : 설명. . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8 물리적 주소 . . . . . . . . : 00-50-56-C0-00-08 DHCP 사용 . . . . . . . . . : 아니요 자동 구성 사용. . . . . . . : 예 링크-로컬 IPv6 주소 . . . . : fe80::18a8:e895:e1b7:4195%7(기본 설정) IPv4 주소 . . . . . . . . . : 192.168.206.1(기본 설정) 서브넷 마스크 . . . . . . . : 255.255.255.0 기본 게이트웨이 . . . . . . : DHCPv6 IAID . . . . . . . . : 335564886 DHCPv6 클라이언트 DUID. . . : 00-01-00-01-27-61-EC-0E-D8-CB-8A-5E-8D-23 DNS 서버. . . . . . . . . . : fd7d:76ee:e68f:a993::1 10.128.0.1 Tcpip를 통한 NetBIOS. . . . : 사용