Jump to content
Not connected, Your IP: 216.73.216.27

All Activity

This stream auto-updates     

  1. Past hour
  2. Today
  3. I'd like to upvote this but also expand upon, a little bit: Rerouting only servers for geolocation workaround sound like a very good compromise vs full-blown servers. So it would be nice to see rerouting servers in "popular" locations that a full server deployment is not justified. Usecases have already been mentioned (IPTV, government sites, banking etc). Another option might be that geoblocking could be worked around via DNS? I have seen some DNS-only services accomplishing the above. Just not sure how
  4. With 300+ users you would need some beefy CPUs in the server. I would guess that is the bottleneck, not the actual connection. VPNs are encrypted and require the processing power to handle the number of users connected. Not sure what their server specs actually are, but would be curious to know.
  5. Yesterday
  6. Alruba is usually a fast server for me, but recently something has changed. I still get fast download speeds but the upload is barely 10Mbps in speedtest.net and this is noticeable elsewhere too. Alruba's load has often been almost 100% but now it is only 15-25% at the time of writing, so maybe I'm not the only one having issues.
  7. Hello! The "range" is specified by mask /32, so it's this single unique address. Yes, it's plausible that some past event flagged the IP address. We don't know the internals of Tailscale but definitely this behavior should be investigated. Why an attempted connection to this specific IP address and why this port? Kind regards
  8. According to the link in my first post, the entire range is flagged at Malwarebytes due to some adresses has been related to troians at one point. But nice to know nothing listens on that port, makes little sense to me
  9. Hello! There's nothing listening to port 54037 on any AirVPN server. We can't see why Tailscale seeks a connection to it, anyway we are sure now that there's no malware there as there's nothing. Probably Malwarebytes behavior comes from some past event or it's yet another over-blocking case. Kind regards
  10. Hello Staff, thank you for heads up! I will revert to MTU 1420. Regards
  11. the effective MTU of the tunnel is limited by the smallest MTU anywhere along the path Hello! On our servers the MTU limit is 1420 bytes on a standard Ethernet frame because of IPv6 over IPv4. For PPPoE see also https://www.hitoha.moe/wireguard-mtu-over-pppoe/ So, if you set 1432 bytes MTU for your WireGuard interface, the fragmentation will occur on our servers, not on your side. The upper, actual limit is the lowest MTU in the path, in other words the smallest MTU on the path silently limits the tunnel. The 12 bytes difference may be negligible and most packets will not be fragmented, and you will not see fragmentation on your side, but you could notice a performance hit on upload (upload from you to the server we mean). Kind regards
  12. The program is tailscale and the port is 54037 in this case 🙂 I do have an Netherlands AirVpn server setup as an tailscale exit node, but this pc does not use any exit nodes.
  13. Choose a different server? Not the answer. Using the Atlanta Georgia Wireguard config, I'm blocked on https://rachelbythebay.com/w/2026/02/03/badnas/ https://forums.spacerex.co/top Moving to the Miami Wireguard config, I'm blocked on https://rachelbythebay.com/w/2026/02/03/badnas/ DNS Leak test IP: 193.37.252.99 looks fine. FWIW, I'm using a web FoxyProxy on Firefox for these connections. There must be a better way than whac-a-mole. Advice?
  14. The download links are all there now, problem solved!
  15. Hello, just to share my experience, I am on PPPoE, MTU 1492 since my ISP doesn't support baby jumbo frames. I have 4 WG tunnels managed by my pfSense appliance. WG interfaces have MTU 1432 (only ipv4 traffic) and I don't see any fragmentation when I ping test from those WG interface. I had in the past MTU 1412 but recently I wanted to test exactly the MTU before fragmatation accurs and that value is 1432.
  16. Hello! Problem solved, can you please try again now? Kind regards
  17. @Zack Hello! The IP address you mention is assigned to AirVPN server Asellus in the Netherlands. Please mention explicitly port Y, we want and must verify what your app (mention the app too if possible) will find on that port, it's important. Kind regards
  18. Hello and thank you for having reported the problem! We are working on it. We will update this thread when the issue is solved. Kind regards
  19. I'm seeing the same issue. For now you can still download from Eddie's own website. I know it looks kind of sketchy but this is a real website by AirVPN and is linked to in the FAQ. https://eddie.website/
  20. Hi all. I'm setting up my computer with linux mint and trying to get the Eddie GUI but there's no download link on the website. And before you think this is just a linux issue I tested the page on my phone and on a windows and got the same result. Here's a screenshot of what the page looks like, it's actually doing this for the windows and mac options as well. I tested this with all my extensions disabled as well as trying the page on my phone using the Duckduckgo browser and on a windows laptop using Opera, same result. Anyone know why this is happening?
  21. Last week
  22. Hello Sometimes I get message from malwarebytes that app X has tried to connect to ip 213.152.187.210 on port Y The only info I can find about about this IP is that it seems to be on the same range as the AirVPN servers in Netherlands uses and that this IP is blocked due to its related to an trojan: https://www.malwarebytes.com/blog/detections/213-152-187-210 Anyone here has more info about this?
  23. Hello, very late to the party but I'm trying to get Eddie downloaded onto my mac running MacOS Mojavey. When I go to the link https://airvpn.org/macos/eddie/ I don't see any versions listed. I've tried on multiple computers and i just see this. When I tried downloading through the eddie website, I got the same error as the original poster.
  24. Thanks a lot for the quick fix and the clear instructions! I removed my temporary Sequoia policy workaround, re-imported the updated maintainer key as posted, and apt update is working again on Debian Trixie. Much appreciated.
  25. Thanks a lot for the quick fix and the clear instructions! I removed my temporary Sequoia policy workaround, re-imported the updated maintainer key as posted, and apt update is working again on Debian Trixie. Much appreciated.
  26. Hello! Please see here: https://airvpn.org/forums/topic/79065-eddie-desktop-apt-repository-signing-key-update/ Kind regards
  1. Load more activity
×
×
  • Create New...