Eddie System/Environment Report - 2022-02-04 - 9:46 PM UTC Eddie version: 2.20.0 Eddie OS build: windows_x64 Eddie architecture: x64 OS type: Windows OS name: Windows 10 Pro OS version: Microsoft Windows NT 10.0.22000.0 OS architecture: x64 Mono /.Net Framework: v4.0.30319 TUN driver: 0901: Not found; wintun: 0.8 OpenVPN: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) Hummingbird: () ---------------------------- SSH: plink 0.73 Build platform: 64-bit x86 Windows Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) ---------------------------- SSL: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) Profile path: C:\Users\Javin\AppData\Local\Eddie\default.profile Data path: C:\Users\Javin\AppData\Local\Eddie Application path: C:\Program Files\AirVPN Executable path: C:\Program Files\AirVPN\Eddie-UI.exe Command line arguments: (0 args) Network Lock Active: No Connected to VPN: No Detected DNS: fde6:7a:7d20:17c6::1, 9.9.9.9 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: 124 ms Test Ping IPv6: 125 ms Test HTTP IPv4: Ok Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True servers.blacklist: dec6969cb7e9ee63c7320e9b97eea6956e2ad3a4dfda5454ee4c62415baa708a,754018c7e9fcbff567b14fed7d61181b355ff87abd849f2c540d1b62a44b57fe,3b1730f6ce5e57fba3f83c064992bacd521e409a3d4bf84de3b2e1becf0c953e,c8c33af760615530e91f4f99860018006e7ae1366b75027fca631335507cdb01,f29a23178a16991787f8818e18c197ec08f511857809385b906d4c3df8c461b4,59829ae6f303179a30579864405b55a70853fd7c2345cc39e0b5e45f430762a0 servers.startlast: True servers.scoretype: Latency areas.whitelist: us,ca proxy.login: (omissis) proxy.password: (omissis) dns.servers: 9.9.9.9 dns.check: False network.ipv6.mode: in network.ipv6.autoswitch: False openvpn.sndbuf: -1 openvpn.rcvbuf: -1 openvpn.directives: client dev tun auth-nocache resolv-retry infinite nobind persist-key persist-tun verb 3 connect-retry-max 1 ping 10 ping-exit 32 explicit-exit-notify 5 rcvbuf 8097152 sndbuf 8097152 advanced.expert: True advanced.providers: True windows.tap_up: False windows.dns.force_all_interfaces: True windows.wintun: True ui.unit: bytes ---------------------------- Logs: . 2022.02.03 17:21:04 - Eddie version: 2.20.0 / windows_x64, System: Windows, Name: Windows 10 Pro, Version: Microsoft Windows NT 10.0.22000.0, Mono/.Net: v4.0.30319 . 2022.02.03 17:21:04 - Command line arguments (0): . 2022.02.03 17:21:07 - Profile path: C:\Users\Javin\AppData\Local\Eddie\default.profile . 2022.02.03 17:21:07 - Reading options from C:\Users\Javin\AppData\Local\Eddie\default.profile . 2022.02.03 17:21:11 - Tun Driver - 0901: Not found; wintun: 0.8 . 2022.02.03 17:21:11 - OpenVPN - Version: 2.5.1 - OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe) . 2022.02.03 17:21:11 - SSH - Version: plink 0.73 . 2022.02.03 17:21:11 - Build platform: 64-bit x86 Windows . 2022.02.03 17:21:11 - Compiler: clang 7.0.0 (tags/RELEASE_700/final), emulating Visual Studio 2013 (12.0), _MSC_VER=1800 . 2022.02.03 17:21:11 - Source commit: 745ed3ad3beaf52fc623827e770b3a068b238dd5 (C:\Program Files\AirVPN\plink.exe) . 2022.02.03 17:21:11 - SSL - Version: stunnel 5.56 (C:\Program Files\AirVPN\stunnel.exe) . 2022.02.03 17:21:12 - Recovery. Unexpected crash? . 2022.02.03 17:21:12 - Routes, removed an existing route, 68.235.35.124 for gateway 10.20.134.1 . 2022.02.03 17:21:12 - DNS IPv4 of a network adapter restored to original settings (Local Area Connection 2, to 10.20.134.1) . 2022.02.03 17:21:13 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to 9.9.9.9, 192.168.1.1) . 2022.02.03 17:21:13 - DNS IPv4 of a network adapter restored to original settings (Loopback Pseudo-Interface 1, to 10.8.70.1) I 2022.02.03 17:21:14 - Ready . 2022.02.03 17:21:15 - Collect information about AirVPN completed . 2022.02.03 18:22:12 - Above log line repeated 3 times more I 2022.02.03 18:22:12 - Session starting. I 2022.02.03 18:22:16 - Checking authorization ... ! 2022.02.03 18:22:17 - Connecting to Fang (United States of America, Chicago, Illinois) . 2022.02.03 18:22:17 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.03 18:22:17 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.03 18:22:17 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.03 18:22:17 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.03 18:22:17 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.03 18:22:17 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.03 18:22:17 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.03 18:22:17 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET6]2607:9000:0:14:d85a:dd68:fe7a:5969:443 . 2022.02.03 18:22:17 - OpenVPN > Socket Buffers: R=[65536->8097152] S=[65536->8097152] . 2022.02.03 18:22:17 - OpenVPN > UDPv6 link local: (not bound) . 2022.02.03 18:22:17 - OpenVPN > UDPv6 link remote: [AF_INET6]2607:9000:0:14:d85a:dd68:fe7a:5969:443 . 2022.02.03 18:22:19 - OpenVPN > write UDPv6: Unknown error (code=10051) . 2022.02.03 18:22:49 - Above log line repeated 3 times more . 2022.02.03 18:22:49 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2022.02.03 18:22:49 - OpenVPN > SIGTERM received, sending exit notification to peer . 2022.02.03 18:22:54 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2022.02.03 18:22:54 - Disconnecting . 2022.02.03 18:22:54 - Connection terminated. I 2022.02.03 18:22:57 - Checking authorization ... ! 2022.02.03 18:22:58 - Connecting to Fang (United States of America, Chicago, Illinois) . 2022.02.03 18:22:58 - OpenVPN > OpenVPN 2.5.1 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 24 2021 . 2022.02.03 18:22:58 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2022.02.03 18:22:58 - OpenVPN > library versions: OpenSSL 1.1.1j 16 Feb 2021, LZO 2.10 . 2022.02.03 18:22:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.03 18:22:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.03 18:22:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2022.02.03 18:22:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2022.02.03 18:22:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]68.235.48.110:443 . 2022.02.03 18:22:58 - OpenVPN > Socket Buffers: R=[65536->8097152] S=[65536->8097152] . 2022.02.03 18:22:58 - OpenVPN > UDP link local: (not bound) . 2022.02.03 18:22:58 - OpenVPN > UDP link remote: [AF_INET]68.235.48.110:443 . 2022.02.03 18:22:58 - OpenVPN > TLS: Initial packet from [AF_INET]68.235.48.110:443, sid=0459128c e8e5dcf8 . 2022.02.03 18:22:58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 18:22:58 - OpenVPN > VERIFY KU OK . 2022.02.03 18:22:58 - OpenVPN > Validating certificate extended key usage . 2022.02.03 18:22:58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 18:22:58 - OpenVPN > VERIFY EKU OK . 2022.02.03 18:22:58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 18:22:58 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 18:22:58 - OpenVPN > [Fang] Peer Connection Initiated with [AF_INET]68.235.48.110:443 . 2022.02.03 18:22:58 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.198.1,dhcp-option DNS6 fde6:7a:7d20:17c6::1,tun-ipv6,route-gateway 10.27.198.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:17c6::10d7/64 fde6:7a:7d20:17c6::1,ifconfig 10.27.198.217 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2022.02.03 18:22:58 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: peer-id set . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2022.02.03 18:22:58 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2022.02.03 18:22:58 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2022.02.03 18:22:58 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 18:22:58 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 18:22:58 - OpenVPN > interactive service msg_channel=0 . 2022.02.03 18:22:58 - OpenVPN > ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=19 HWADDR=02:ff:ff:ff:ff:ff . 2022.02.03 18:22:58 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2022.02.03 18:22:58 - OpenVPN > NOTE: GetBestInterfaceEx returned error: Element not found. (code=1168) . 2022.02.03 18:22:58 - OpenVPN > ROUTE6: default_gateway=UNDEF . 2022.02.03 18:22:58 - OpenVPN > open_tun . 2022.02.03 18:22:59 - OpenVPN > wintun device [Local Area Connection 2] opened . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 2 static 10.27.198.217 255.255.255.0 . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 2 all . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set dns 2 static 10.27.198.1 validate=no . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 2 all . 2022.02.03 18:22:59 - OpenVPN > IPv4 MTU set to 1500 on interface 2 using SetIpInterfaceEntry() . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 2 fde6:7a:7d20:17c6::10d7/128 store=active . 2022.02.03 18:22:59 - OpenVPN > add_route_ipv6(fde6:7a:7d20:17c6::/64 -> fde6:7a:7d20:17c6::10d7 metric 0) dev Local Area Connection 2 . 2022.02.03 18:22:59 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:17c6::/64 2 fe80::8 store=active . 2022.02.03 18:22:59 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.03 18:22:59 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 2 all . 2022.02.03 18:23:00 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns 2 static fde6:7a:7d20:17c6::1 validate=no . 2022.02.03 18:23:00 - OpenVPN > IPv6 MTU set to 1500 on interface 2 using SetIpInterfaceEntry() . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 68.235.48.110 MASK 255.255.255.255 192.168.1.1 . 2022.02.03 18:23:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2022.02.03 18:23:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.198.1 . 2022.02.03 18:23:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4 . 2022.02.03 18:23:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.198.1 . 2022.02.03 18:23:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=5 and dwForwardType=4 . 2022.02.03 18:23:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2022.02.03 18:23:00 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:17c6::1 metric -1) dev Local Area Connection 2 . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 2 fe80::8 store=active . 2022.02.03 18:23:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.03 18:23:00 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:17c6::1 metric -1) dev Local Area Connection 2 . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 2 fe80::8 store=active . 2022.02.03 18:23:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.03 18:23:00 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:17c6::1 metric -1) dev Local Area Connection 2 . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 2 fe80::8 store=active . 2022.02.03 18:23:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.03 18:23:00 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:17c6::1 metric -1) dev Local Area Connection 2 . 2022.02.03 18:23:00 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 2 fe80::8 store=active . 2022.02.03 18:23:00 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2022.02.03 18:23:00 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv4 . 2022.02.03 18:23:00 - Interface Local Area Connection 2 metric changed from Automatic to 3, layer IPv6 . 2022.02.03 18:23:01 - DNS leak protection with packet filtering enabled. . 2022.02.03 18:23:01 - DNS IPv4 of a network adapter forced (Local Area Connection 2, from manual (10.27.198.1) to 9.9.9.9) . 2022.02.03 18:23:01 - DNS IPv4 of a network adapter forced (Ethernet, from manual (9.9.9.9, 192.168.1.1) to 9.9.9.9) . 2022.02.03 18:23:01 - DNS IPv4 of a network adapter forced (Loopback Pseudo-Interface 1, from manual (10.8.70.1) to 9.9.9.9) . 2022.02.03 18:23:02 - Routes, added a new route, 68.235.48.108 for gateway 10.27.198.1 . 2022.02.03 18:23:02 - Routes, added a new route, 2607:9000:0:14:fc73:48:1c68:8815 for gateway fde6:7a:7d20:17c6::1 . 2022.02.03 18:23:02 - Flushing DNS I 2022.02.03 18:23:02 - Checking route IPv4 I 2022.02.03 18:23:02 - Checking route IPv6 ! 2022.02.03 18:23:03 - Connected. . 2022.02.03 18:23:03 - OpenVPN > Initialization Sequence Completed . 2022.02.03 18:52:11 - Collect information about AirVPN completed . 2022.02.03 19:22:47 - Above log line repeated 1 times more . 2022.02.03 19:22:47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 19:22:47 - OpenVPN > VERIFY KU OK . 2022.02.03 19:22:47 - OpenVPN > Validating certificate extended key usage . 2022.02.03 19:22:47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 19:22:47 - OpenVPN > VERIFY EKU OK . 2022.02.03 19:22:47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 19:22:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 19:22:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 19:22:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 19:52:13 - Collect information about AirVPN completed . 2022.02.03 20:22:36 - Above log line repeated 1 times more . 2022.02.03 20:22:36 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 20:22:36 - OpenVPN > VERIFY KU OK . 2022.02.03 20:22:36 - OpenVPN > Validating certificate extended key usage . 2022.02.03 20:22:36 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 20:22:36 - OpenVPN > VERIFY EKU OK . 2022.02.03 20:22:36 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 20:22:36 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 20:22:36 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 20:22:36 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 20:52:15 - Collect information about AirVPN completed . 2022.02.03 21:22:25 - Above log line repeated 1 times more . 2022.02.03 21:22:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 21:22:25 - OpenVPN > VERIFY KU OK . 2022.02.03 21:22:25 - OpenVPN > Validating certificate extended key usage . 2022.02.03 21:22:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 21:22:25 - OpenVPN > VERIFY EKU OK . 2022.02.03 21:22:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 21:22:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 21:22:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 21:22:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 21:52:32 - Collect information about AirVPN completed . 2022.02.03 22:22:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 22:22:14 - OpenVPN > VERIFY KU OK . 2022.02.03 22:22:14 - OpenVPN > Validating certificate extended key usage . 2022.02.03 22:22:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 22:22:14 - OpenVPN > VERIFY EKU OK . 2022.02.03 22:22:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 22:22:14 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 22:22:14 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 22:22:14 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 22:22:34 - Collect information about AirVPN completed . 2022.02.03 23:22:03 - Above log line repeated 1 times more . 2022.02.03 23:22:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.03 23:22:03 - OpenVPN > VERIFY KU OK . 2022.02.03 23:22:03 - OpenVPN > Validating certificate extended key usage . 2022.02.03 23:22:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.03 23:22:03 - OpenVPN > VERIFY EKU OK . 2022.02.03 23:22:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.03 23:22:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 23:22:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.03 23:22:03 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.03 23:22:43 - Collect information about AirVPN completed . 2022.02.04 00:21:52 - Above log line repeated 1 times more . 2022.02.04 00:21:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 00:21:52 - OpenVPN > VERIFY KU OK . 2022.02.04 00:21:52 - OpenVPN > Validating certificate extended key usage . 2022.02.04 00:21:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 00:21:52 - OpenVPN > VERIFY EKU OK . 2022.02.04 00:21:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 00:21:52 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 00:21:52 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 00:21:52 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 00:22:45 - Collect information about AirVPN completed . 2022.02.04 01:21:41 - Above log line repeated 1 times more . 2022.02.04 01:21:41 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 01:21:41 - OpenVPN > VERIFY KU OK . 2022.02.04 01:21:41 - OpenVPN > Validating certificate extended key usage . 2022.02.04 01:21:41 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 01:21:41 - OpenVPN > VERIFY EKU OK . 2022.02.04 01:21:41 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 01:21:41 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 01:21:41 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 01:21:41 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 01:22:46 - Collect information about AirVPN completed . 2022.02.04 02:21:30 - Above log line repeated 1 times more . 2022.02.04 02:21:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 02:21:30 - OpenVPN > VERIFY KU OK . 2022.02.04 02:21:30 - OpenVPN > Validating certificate extended key usage . 2022.02.04 02:21:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 02:21:30 - OpenVPN > VERIFY EKU OK . 2022.02.04 02:21:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 02:21:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 02:21:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 02:21:30 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 02:23:04 - Collect information about AirVPN completed . 2022.02.04 03:21:19 - Above log line repeated 1 times more . 2022.02.04 03:21:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 03:21:19 - OpenVPN > VERIFY KU OK . 2022.02.04 03:21:19 - OpenVPN > Validating certificate extended key usage . 2022.02.04 03:21:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 03:21:19 - OpenVPN > VERIFY EKU OK . 2022.02.04 03:21:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 03:21:20 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 03:21:20 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 03:21:20 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 03:23:22 - Collect information about AirVPN completed . 2022.02.04 04:21:08 - Above log line repeated 1 times more . 2022.02.04 04:21:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 04:21:08 - OpenVPN > VERIFY KU OK . 2022.02.04 04:21:08 - OpenVPN > Validating certificate extended key usage . 2022.02.04 04:21:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 04:21:08 - OpenVPN > VERIFY EKU OK . 2022.02.04 04:21:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 04:21:08 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 04:21:08 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 04:21:08 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 04:23:40 - Collect information about AirVPN completed . 2022.02.04 05:20:57 - Above log line repeated 1 times more . 2022.02.04 05:20:57 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 05:20:57 - OpenVPN > VERIFY KU OK . 2022.02.04 05:20:57 - OpenVPN > Validating certificate extended key usage . 2022.02.04 05:20:57 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 05:20:57 - OpenVPN > VERIFY EKU OK . 2022.02.04 05:20:57 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 05:20:57 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 05:20:57 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 05:20:57 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 05:23:58 - Collect information about AirVPN completed . 2022.02.04 06:20:46 - Above log line repeated 1 times more . 2022.02.04 06:20:46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 06:20:46 - OpenVPN > VERIFY KU OK . 2022.02.04 06:20:46 - OpenVPN > Validating certificate extended key usage . 2022.02.04 06:20:46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 06:20:46 - OpenVPN > VERIFY EKU OK . 2022.02.04 06:20:46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 06:20:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 06:20:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 06:20:47 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 06:24:07 - Collect information about AirVPN completed . 2022.02.04 07:20:35 - Above log line repeated 1 times more . 2022.02.04 07:20:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 07:20:35 - OpenVPN > VERIFY KU OK . 2022.02.04 07:20:35 - OpenVPN > Validating certificate extended key usage . 2022.02.04 07:20:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 07:20:35 - OpenVPN > VERIFY EKU OK . 2022.02.04 07:20:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 07:20:35 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 07:20:35 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 07:20:35 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 07:24:17 - Collect information about AirVPN completed . 2022.02.04 08:20:24 - Above log line repeated 1 times more . 2022.02.04 08:20:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 08:20:24 - OpenVPN > VERIFY KU OK . 2022.02.04 08:20:24 - OpenVPN > Validating certificate extended key usage . 2022.02.04 08:20:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 08:20:24 - OpenVPN > VERIFY EKU OK . 2022.02.04 08:20:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 08:20:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 08:20:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 08:20:24 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 08:24:17 - Collect information about AirVPN completed . 2022.02.04 09:20:13 - Above log line repeated 1 times more . 2022.02.04 09:20:13 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 09:20:13 - OpenVPN > VERIFY KU OK . 2022.02.04 09:20:13 - OpenVPN > Validating certificate extended key usage . 2022.02.04 09:20:13 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 09:20:13 - OpenVPN > VERIFY EKU OK . 2022.02.04 09:20:13 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 09:20:13 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 09:20:13 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 09:20:13 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 09:24:18 - Collect information about AirVPN completed . 2022.02.04 10:20:04 - Above log line repeated 1 times more . 2022.02.04 10:20:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 10:20:04 - OpenVPN > VERIFY KU OK . 2022.02.04 10:20:04 - OpenVPN > Validating certificate extended key usage . 2022.02.04 10:20:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 10:20:04 - OpenVPN > VERIFY EKU OK . 2022.02.04 10:20:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 10:20:04 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 10:20:04 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 10:20:04 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 10:24:20 - Collect information about AirVPN completed . 2022.02.04 11:19:53 - Above log line repeated 1 times more . 2022.02.04 11:19:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 11:19:53 - OpenVPN > VERIFY KU OK . 2022.02.04 11:19:53 - OpenVPN > Validating certificate extended key usage . 2022.02.04 11:19:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 11:19:53 - OpenVPN > VERIFY EKU OK . 2022.02.04 11:19:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 11:19:53 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 11:19:53 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 11:19:53 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 11:24:23 - Collect information about AirVPN completed . 2022.02.04 12:19:42 - Above log line repeated 1 times more . 2022.02.04 12:19:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 12:19:42 - OpenVPN > VERIFY KU OK . 2022.02.04 12:19:42 - OpenVPN > Validating certificate extended key usage . 2022.02.04 12:19:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 12:19:42 - OpenVPN > VERIFY EKU OK . 2022.02.04 12:19:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 12:19:42 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 12:19:42 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 12:19:42 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 12:24:29 - Collect information about AirVPN completed . 2022.02.04 13:19:31 - Above log line repeated 1 times more . 2022.02.04 13:19:31 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2022.02.04 13:19:31 - OpenVPN > VERIFY KU OK . 2022.02.04 13:19:31 - OpenVPN > Validating certificate extended key usage . 2022.02.04 13:19:31 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2022.02.04 13:19:31 - OpenVPN > VERIFY EKU OK . 2022.02.04 13:19:31 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Fang, emailAddress=info@airvpn.org . 2022.02.04 13:19:31 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 13:19:31 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2022.02.04 13:19:31 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA . 2022.02.04 13:24:35 - Collect information about AirVPN completed F 2022.02.04 13:41:12 - Unexpected crash of elevated helper:An established connection was aborted by the software in your host machine ! 2022.02.04 13:41:12 - Disconnecting . 2022.02.04 13:41:12 - Routes, remove 68.235.48.108 for gateway 10.27.198.1 failed: An established connection was aborted by the software in your host machine . 2022.02.04 13:41:12 - Routes, remove 2607:9000:0:14:fc73:48:1c68:8815 for gateway fde6:7a:7d20:17c6::1 failed: An established connection was aborted by the software in your host machine . 2022.02.04 13:41:12 - Connection terminated. E 2022.02.04 13:41:12 - An established connection was aborted by the software in your host machine E 2022.02.04 13:41:12 - Fatal error occured, please contact Eddie support: An established connection was aborted by the software in your host machine - at Eddie.Core.Elevated.EleBase.DoCommandSync(Command c) E 2022.02.04 13:41:12 - at Eddie.Platform.Windows.Wfp.RemoveItemId(UInt64 id) E 2022.02.04 13:41:12 - at Eddie.Platform.Windows.Wfp.RemoveItem(WfpItem item) E 2022.02.04 13:41:12 - at Eddie.Platform.Windows.Platform.OnDnsSwitchRestore() E 2022.02.04 13:41:12 - at Eddie.Core.Threads.Session.OnRun() I 2022.02.04 13:41:15 - Checking authorization ... ! 2022.02.04 13:41:16 - Connecting to Fang (United States of America, Chicago, Illinois) . 2022.02.04 13:54:37 - Collect information about AirVPN completed . 2022.02.04 15:46:48 - Above log line repeated 3 times more . 2022.02.04 15:46:48 - ping 1 . 2022.02.04 15:46:48 - ping 2 W . 2022.02.04 15:46:49 - ping 2 WE ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "192.168.1.1", "metric": "281" }, { "address": "0.0.0.0\/1", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "10.27.198.1", "metric": "3" }, { "address": "10.27.198.0\/24", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "10.27.198.217", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "10.27.198.255", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "68.235.48.108", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "10.27.198.1", "metric": "4" }, { "address": "68.235.48.110", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "192.168.1.1", "metric": "25" }, { "address": "127.0.0.0\/8", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.0.0.1", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "127.255.255.255", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "128.0.0.0\/1", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "10.27.198.1", "metric": "3" }, { "address": "192.168.1.0\/24", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "192.168.1.25", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "192.168.1.255", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "192.168.139.0\/24", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "192.168.139.1", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "192.168.139.255", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "192.168.217.0\/24", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "192.168.217.1", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "192.168.217.255", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "224.0.0.0\/4", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "224.0.0.0\/4", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "224.0.0.0\/4", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "224.0.0.0\/4", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "224.0.0.0\/4", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "255.255.255.255", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "255.255.255.255", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "255.255.255.255", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "255.255.255.255", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "255.255.255.255", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "::\/3", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fe80::8", "metric": "259" }, { "address": "::1", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "2000::\/4", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fe80::8", "metric": "259" }, { "address": "2607:9000:0:14:fc73:48:1c68:8815", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fde6:7a:7d20:17c6::1", "metric": "259" }, { "address": "3000::\/4", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fe80::8", "metric": "259" }, { "address": "fc00::\/7", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:17c6::\/64", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "fe80::8", "metric": "259" }, { "address": "fde6:7a:7d20:17c6::10d7", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "fe80::\/64", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "fe80::\/64", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "fe80::\/64", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "fe80::4e9:d79:3e7:da9f", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "fe80::981d:4097:79d9:104", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "fe80::dc47:8cc4:b40:4f67", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "fe80::f461:6e04:7d7d:5d32", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "ff00::\/8", "interface": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "gateway": "link", "metric": "331" }, { "address": "ff00::\/8", "interface": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "gateway": "link", "metric": "291" }, { "address": "ff00::\/8", "interface": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "gateway": "link", "metric": "291" }, { "address": "ff00::\/8", "interface": "{05A6F604-8047-4A81-B288-795955E10185}", "gateway": "link", "metric": "259" }, { "address": "ff00::\/8", "interface": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "gateway": "link", "metric": "281" }, { "address": "2607:9000:0:14:fc73:48:1c68:8815", "gateway": "fde6:7a:7d20:17c6::1", "metric": "4294967295" } ], "interfaces": [ { "friendly": "VPN - VPN Client", "id": "{0D711D10-7C18-439C-8092-C8683FF65A62}", "name": "VPN - VPN Client", "description": "VPN Client Adapter - VPN", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::18a9:3612:74d3:c822", "169.254.200.34" ], "gateways": [], "bind": true, "dns4": "9.9.9.9,9.9.9.9", "dns6": null }, { "friendly": "Local Area Connection 2", "id": "{05A6F604-8047-4A81-B288-795955E10185}", "name": "Local Area Connection 2", "description": "Wintun Userspace Tunnel", "type": "Virtual", "status": "Up", "bytes_received": "4115314199", "bytes_sent": "631533361", "support_ipv4": true, "support_ipv6": true, "ips": [ "fde6:7a:7d20:17c6::10d7", "fe80::4e9:d79:3e7:da9f", "10.27.198.217" ], "gateways": [ "10.27.198.1", "fe80::8", "fde6:7a:7d20:17c6::1" ], "bind": true, "dns4": "9.9.9.9", "dns6": null }, { "friendly": "Ethernet", "id": "{95F67D92-8F77-411E-AF2B-84B69167ABCB}", "name": "Ethernet", "description": "Realtek PCIe GbE Family Controller", "type": "Ethernet", "status": "Up", "bytes_received": "5553622732", "bytes_sent": "894389505", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::f461:6e04:7d7d:5d32", "192.168.1.25" ], "gateways": [ "192.168.1.1" ], "bind": true, "dns4": "9.9.9.9", "dns6": null }, { "friendly": "Local Area Connection", "id": "{64712776-5A1D-473D-9FA3-51E1C4658A6D}", "name": "Local Area Connection", "description": "TAP-ProtonVPN Windows Adapter V9", "type": "Virtual", "status": "Down", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::8005:2a77:1e5e:cb67", "169.254.203.103" ], "gateways": [], "bind": true, "dns4": "9.9.9.9,9.9.9.9", "dns6": null }, { "friendly": "VMware Network Adapter VMnet1", "id": "{0A97EAA4-4A6A-422D-BD54-CC1983F9B50E}", "name": "VMware Network Adapter VMnet1", "description": "VMware Virtual Ethernet Adapter for VMnet1 #2", "type": "Ethernet", "status": "Up", "bytes_received": "0", "bytes_sent": "80925", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::dc47:8cc4:b40:4f67", "192.168.139.1" ], "gateways": [], "bind": true, "dns4": "9.9.9.9,9.9.9.9", "dns6": null }, { "friendly": "VMware Network Adapter VMnet8", "id": "{8720C60E-22A7-400B-8566-684C0E954CD9}", "name": "VMware Network Adapter VMnet8", "description": "VMware Virtual Ethernet Adapter for VMnet8 #2", "type": "Ethernet", "status": "Up", "bytes_received": "1226", "bytes_sent": "80925", "support_ipv4": true, "support_ipv6": true, "ips": [ "fe80::981d:4097:79d9:104", "192.168.217.1" ], "gateways": [], "bind": true, "dns4": "9.9.9.9,9.9.9.9", "dns6": null }, { "friendly": "Loopback Pseudo-Interface 1", "id": "{D2D35A58-00D6-11EB-923F-806E6F6E6963}", "name": "Loopback Pseudo-Interface 1", "description": "Software Loopback Interface 1", "type": "Loopback", "status": "Up", "bytes_received": "0", "bytes_sent": "0", "support_ipv4": true, "support_ipv6": true, "ips": [ "::1", "127.0.0.1" ], "gateways": [], "bind": true, "dns4": "9.9.9.9", "dns6": null } ], "ipv4-default-gateway": "10.27.198.1", "ipv4-default-interface": "{05A6F604-8047-4A81-B288-795955E10185}", "ipv6-default-gateway": "fe80::8", "ipv6-default-interface": "{05A6F604-8047-4A81-B288-795955E10185}" } ---------------------------- ipconfig /all: Windows IP Configuration Host Name . . . . . . . . . . . . : DESKTOP-KBAPNKL Primary Dns Suffix . . . . . . . : Node Type . . . . . . . . . . . . : Hybrid IP Routing Enabled. . . . . . . . : No WINS Proxy Enabled. . . . . . . . : No Unknown adapter VPN - VPN Client: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VPN Client Adapter - VPN Physical Address. . . . . . . . . : 5E-63-20-2D-80-0A DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Unknown adapter Local Area Connection 2: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Wintun Userspace Tunnel Physical Address. . . . . . . . . : DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes IPv6 Address. . . . . . . . . . . : fde6:7a:7d20:17c6::10d7(Preferred) Link-local IPv6 Address . . . . . : fe80::4e9:d79:3e7:da9f%2(Preferred) IPv4 Address. . . . . . . . . . . : 10.27.198.217(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DNS Servers . . . . . . . . . . . : fde6:7a:7d20:17c6::1 9.9.9.9 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter Ethernet: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : Realtek PCIe GbE Family Controller Physical Address. . . . . . . . . : 02-FF-FF-FF-FF-FF DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::f461:6e04:7d7d:5d32%19(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.1.25(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : 192.168.1.1 DHCPv6 IAID . . . . . . . . . . . : 100718689 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-44-8B-71-02-FF-FF-FF-FF-FF DNS Servers . . . . . . . . . . . : 9.9.9.9 NetBIOS over Tcpip. . . . . . . . : Enabled Unknown adapter Local Area Connection: Media State . . . . . . . . . . . : Media disconnected Connection-specific DNS Suffix . : Description . . . . . . . . . . . : TAP-ProtonVPN Windows Adapter V9 Physical Address. . . . . . . . . : 00-FF-64-71-27-76 DHCP Enabled. . . . . . . . . . . : Yes Autoconfiguration Enabled . . . . : Yes Ethernet adapter VMware Network Adapter VMnet1: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet1 #2 Physical Address. . . . . . . . . : 00-50-56-C0-00-01 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::dc47:8cc4:b40:4f67%5(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.139.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 67129430 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-44-8B-71-02-FF-FF-FF-FF-FF DNS Servers . . . . . . . . . . . : 9.9.9.9 9.9.9.9 NetBIOS over Tcpip. . . . . . . . : Enabled Ethernet adapter VMware Network Adapter VMnet8: Connection-specific DNS Suffix . : Description . . . . . . . . . . . : VMware Virtual Ethernet Adapter for VMnet8 #2 Physical Address. . . . . . . . . : 00-50-56-C0-00-08 DHCP Enabled. . . . . . . . . . . : No Autoconfiguration Enabled . . . . : Yes Link-local IPv6 Address . . . . . : fe80::981d:4097:79d9:104%13(Preferred) IPv4 Address. . . . . . . . . . . : 192.168.217.1(Preferred) Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : DHCPv6 IAID . . . . . . . . . . . : 570445910 DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-29-44-8B-71-02-FF-FF-FF-FF-FF DNS Servers . . . . . . . . . . . : 9.9.9.9 9.9.9.9 NetBIOS over Tcpip. . . . . . . . : Enabled