Jump to content
Not connected, Your IP: 3.145.10.80

Leaderboard


Popular Content

Showing content with the highest reputation on 10/31/23 in all areas

  1. 1 point
    loopy123

    Sucuri blocking many websites

    I have run the test and found others likely have the same problem due to Sucuri's "BLACK02" blacklisting. See route report here https://airvpn.org/routes/?q=https%3A%2F%2Flabs.sucuri.net%2Fsignatures%2Fwaf%2Fblack02-blacklisted-ip-address%2F and browser from denied sites: Access Denied - Sucuri Website Firewall If you are the site owner (or you manage this site), please whitelist your IP or if you think this block is an error please open a support ticket and make sure to include the block details (displayed in the box below), so we can assist you in troubleshooting the issue. Block details: Your IP: 199.249.230.2 URL: www.fortbendcountytx.gov/ Your Browser: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0 Block ID: BLACK02 Block reason: Your IP address is listed in our blacklist and blocked from completing this request. Time: 2022-08-24 07:58:33 Server ID: 12004 ------------ Access Denied - Sucuri Website Firewall If you are the site owner (or you manage this site), please whitelist your IP or if you think this block is an error please open a support ticket and make sure to include the block details (displayed in the box below), so we can assist you in troubleshooting the issue. Block details: Your IP: 199.249.230.2 URL: labs.sucuri.net/signatures/waf/black02-blacklisted-ip-address/ Your Browser: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:94.0) Gecko/20100101 Firefox/94.0 Block ID: BLACK02 Block reason: Your IP address is listed in our blacklist and blocked from completing this request. Time: 2022-08-24 07:57:07 Server ID: 12016
  2. 1 point
    GraveBride

    ANSWERED Checking route IPv4...

    I just paid for this VPN on a recommendation after some issues with the last one I was using, but I'm unable to connect to any server because I always get stuck on Checking route IPv4 for a while before it fails and tries to connect to a new server before inevitably running into the same issue. I've seen from searching that I've far from the only person to encounter this problem, but even after reading several threads I've failed to really find a solution to this problem that actually works for me. I've never had a problem like this with any other VPN I've tried so I'm at a bit of a loss right now. I 2023.10.28 03:47:23 - Session starting. I 2023.10.28 03:47:23 - Checking authorization ... . 2023.10.28 03:47:24 - Added new network interface "Eddie", Wintun version 0.12 . 2023.10.28 03:47:24 - Using WinTun network interface "Eddie (Wintun Userspace Tunnel)" ! 2023.10.28 03:47:24 - Connecting to Kang (United States of America, Miami) . 2023.10.28 03:47:24 - Routes, add 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)". . 2023.10.28 03:47:24 - Routes, add 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)", already exists. . 2023.10.28 03:47:25 - OpenVPN > OpenVPN 2.5.5 Windows-MSVC [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Dec 15 2021 . 2023.10.28 03:47:25 - OpenVPN > Windows version 10.0 (Windows 10 or greater) 64bit . 2023.10.28 03:47:25 - OpenVPN > library versions: OpenSSL 1.1.1l 24 Aug 2021, LZO 2.10 . 2023.10.28 03:47:25 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 03:47:25 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2023.10.28 03:47:25 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2023.10.28 03:47:25 - OpenVPN > UDP link local: (not bound) . 2023.10.28 03:47:25 - OpenVPN > UDP link remote: [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > TLS: Initial packet from [AF_INET]104.129.48.69:443, sid=3ff692df 9427b1af . 2023.10.28 03:47:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2023.10.28 03:47:25 - OpenVPN > VERIFY KU OK . 2023.10.28 03:47:25 - OpenVPN > Validating certificate extended key usage . 2023.10.28 03:47:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2023.10.28 03:47:25 - OpenVPN > VERIFY EKU OK . 2023.10.28 03:47:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Kang, emailAddress=info@airvpn.org . 2023.10.28 03:47:25 - OpenVPN > Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, peer certificate: 4096 bit RSA, signature: RSA-SHA512 . 2023.10.28 03:47:25 - OpenVPN > [Kang] Peer Connection Initiated with [AF_INET]104.129.48.69:443 . 2023.10.28 03:47:25 - OpenVPN > SENT CONTROL [Kang]: 'PUSH_REQUEST' (status=1) . 2023.10.28 03:47:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.32.138.1,dhcp-option DNS6 fde6:7a:7d20:1c8a::1,tun-ipv6,route-gateway 10.32.138.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1c8a::107c/64 fde6:7a:7d20:1c8a::1,ifconfig 10.32.138.126 255.255.255.0,peer-id 2,cipher AES-256-GCM' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS 10.32.138.1' . 2023.10.28 03:47:25 - OpenVPN > Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:1c8a::1' . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2023.10.28 03:47:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2023.10.28 03:47:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2023.10.28 03:47:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2023.10.28 03:47:25 - OpenVPN > interactive service msg_channel=0 . 2023.10.28 03:47:25 - OpenVPN > open_tun . 2023.10.28 03:47:25 - OpenVPN > wintun device [Eddie] opened . 2023.10.28 03:47:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip set address 42 static 10.32.138.126 255.255.255.0 . 2023.10.28 03:47:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete dns 42 all . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ip delete wins 42 all . 2023.10.28 03:47:26 - OpenVPN > IPv4 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address 42 fde6:7a:7d20:1c8a::107c/128 store=active . 2023.10.28 03:47:26 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1c8a::/64 -> fde6:7a:7d20:1c8a::107c metric 0) dev Eddie . 2023.10.28 03:47:26 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1c8a::/64 42 fe80::8 store=active . 2023.10.28 03:47:26 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2023.10.28 03:47:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns 42 all . 2023.10.28 03:47:26 - OpenVPN > IPv6 MTU set to 1500 on interface 42 using SetIpInterfaceEntry() . 2023.10.28 03:47:26 - OpenVPN > Initialization Sequence Completed . 2023.10.28 03:47:26 - Interface Eddie metric changed from Automatic to 3, layer IPv4 . 2023.10.28 03:47:26 - Interface Eddie metric changed from Automatic to 3, layer IPv6 . 2023.10.28 03:47:26 - DNS IPv4 of a network adapter forced (Eddie, from automatic to 10.32.138.1) . 2023.10.28 03:47:26 - DNS IPv6 of a network adapter forced (Eddie, from automatic to fde6:7a:7d20:1c8a::1) . 2023.10.28 03:47:26 - DNS IPv4 of a network adapter forced (Ethernet, from automatic to 10.32.138.1) . 2023.10.28 03:47:26 - DNS IPv6 of a network adapter forced (Ethernet, from automatic to fde6:7a:7d20:1c8a::1) . 2023.10.28 03:47:26 - Routes, add 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:26 - Routes, add 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Routes, add 104.129.48.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Routes, add 2607:ff48:aa81:202:5b4:b37f:fc76:1b1f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:47:27 - Flushing DNS I 2023.10.28 03:47:27 - Checking route IPv4 . 2023.10.28 03:47:54 - Checking route (4° try) . 2023.10.28 03:48:19 - Checking route (5° try) E 2023.10.28 03:48:40 - Checking route IPv4 failed, last reason: Fetch url error:Timeout was reached . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - OpenVPN > write UDP: Unknown error (code=10065) . 2023.10.28 03:48:40 - Above log line repeated 77 times more ! 2023.10.28 03:48:40 - Disconnecting . 2023.10.28 03:48:40 - Sending soft termination signal . 2023.10.28 03:48:43 - OpenVPN > SIGTERM received, sending exit notification to peer . 2023.10.28 03:48:45 - OpenVPN > Closing TUN/TAP interface . 2023.10.28 03:48:45 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1c8a::/64) . 2023.10.28 03:48:45 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1c8a::/64 42 fe80::8 store=active . 2023.10.28 03:48:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address 42 fde6:7a:7d20:1c8a::107c store=active . 2023.10.28 03:48:45 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv4 delete address 42 10.32.138.126 store=active . 2023.10.28 03:48:45 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2023.10.28 03:48:45 - Routes, delete 0.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:45 - Routes, delete 128.0.0.0/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete ::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 8000::/1 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.67/32 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 2607:ff48:aa81:202:5b4:b37f:fc76:1b1f/128 for interface "Eddie (Wintun Userspace Tunnel)". . 2023.10.28 03:48:46 - Routes, delete 104.129.48.69/32 for interface "Wi-Fi (Realtek RTL8852BE WiFi 6 802.11ax PCIe Adapter)", not exists. . 2023.10.28 03:48:46 - DNS IPv4 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.28 03:48:46 - DNS IPv6 of a network adapter restored to original settings (Eddie, to automatic) . 2023.10.28 03:48:46 - DNS IPv4 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.10.28 03:48:46 - DNS IPv6 of a network adapter restored to original settings (Ethernet, to automatic) . 2023.10.28 03:48:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv4 . 2023.10.28 03:48:46 - Interface Eddie metric restored from 3 to Automatic, layer IPv6 . 2023.10.28 03:48:46 - Connection terminated. I 2023.10.28 03:48:47 - Cancel requested. ! 2023.10.28 03:48:48 - Session terminated.
  3. 1 point
    Staff

    ANSWERED WireGuard W/Multiple Clients

    Hello! You can consider to generate different keys for your account in your AirVPN account "Client Area" > "Devices" panel, so you will get different VPN IP addresses for different profiles based on different keys. Please see here: Kind regards
×
×
  • Create New...