While running Wireshark on my wireless card and not the tunnel interface I have found that I am almost flooding a network with arp request to WAN IP address that appears not to be owned by airvpn when running them against whois and http://ipleak.net. I am wondering, is this a security risk that should be noted?
I am running Sparky Linux 4.8.0-2-amd64 x86_64, with the eddie-cli_2.12.4_linux_x64_mono edition through Tor.
If futher info is needed I can post samples of Wireshark output and any other further info.
Thank you for your time.