Jump to content


Photo

No Internet Access

support eddie

  • Please log in to reply
No replies to this topic

#1 g154880

g154880

    Newbie

  • Members
  • Pip
  • 1 posts

Posted 10 June 2018 - 08:13 PM

Hello:

 

eddie connects but then i have no internet access. have tried multiple canadian servers. logs below. any support would be appreciated, thank you.

 

 

Eddie System/Environment Report - 6/10/2018 8:08 PM UTC
 
Eddie version: 2.14.5
Eddie OS build: windows_x64
Eddie architecture: x64
OS type: Windows
OS name: Windows 10 Home
OS version: Microsoft Windows NT 10.0.17134.0
OS architecture: x64
Mono /.Net Framework: v4.0.30319
OpenVPN driver: 
OpenVPN: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
SSH: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
SSL: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
curl: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
Profile path: C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml
Data path: C:\Users\j&a\AppData\Local\AirVPN
Application path: C:\Program Files\AirVPN
Executable path: C:\Program Files\AirVPN\Eddie-UI.exe
Command line arguments: (1 args) path="home"
Network Lock Active: Yes, Windows Filtering Platform
Connected to VPN: Yes, Lesath
Detected DNS: 10.0.0.1, 10.4.0.1, 2001:4e8:0:4007::15, 2001:4e8:0:4009::11
Test DNS IPv4: Ok
Test DNS IPv6: Failed
Test Ping IPv4: 80 ms
Test Ping IPv6: -1 ms
Test HTTP IPv4: Ok
Test HTTP IPv6: Error:curl: (6) Could not resolve host: ipv6.eddie.website
Test HTTPS: Ok
----------------------------
Important options not at defaults:
 
login: (omissis)
password: (omissis)
remember: True
 
----------------------------
Logs:
 
. 2018.06.10 12:45:17 - Eddie version: 2.14.5 / windows_x64, System: Windows, Name: Windows 10 Home, Version: Microsoft Windows NT 10.0.17134.0, Mono/.Net: v4.0.30319
. 2018.06.10 12:45:17 - Reading options from C:\Users\j&a\AppData\Local\AirVPN\AirVPN.xml
. 2018.06.10 12:45:17 - Profile options not found, using defaults.
. 2018.06.10 12:45:17 - Command line arguments (1): path="home"
. 2018.06.10 12:45:18 - Cannot find tunnel adapter.
E 2018.06.10 12:45:19 - OpenVPN Driver - Not available - Will be installed at next connection.
. 2018.06.10 12:45:19 - OpenVPN - Version: 2.4.6 - OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10 (C:\Program Files\AirVPN\openvpn.exe)
. 2018.06.10 12:45:19 - SSH - Version: plink 0.67 (C:\Program Files\AirVPN\plink.exe)
. 2018.06.10 12:45:19 - SSL - Version: stunnel 5.40 (C:\Program Files\AirVPN\stunnel.exe)
. 2018.06.10 12:45:19 - curl - Version: 7.54.1 (C:\Program Files\AirVPN\curl.exe)
. 2018.06.10 12:45:19 - Certification Authorities: C:\Program Files\AirVPN\res\cacert.pem
. 2018.06.10 12:45:20 - Updating systems & servers data ...
I 2018.06.10 12:45:20 - Ready
. 2018.06.10 12:45:21 - Systems & servers data update completed
I 2018.06.10 12:46:04 - Checking login ...
! 2018.06.10 12:46:05 - Logged in.
! 2018.06.10 12:46:14 - Activation of Network Lock - Windows Filtering Platform
I 2018.06.10 12:46:18 - Session starting.
. 2018.06.10 12:46:18 - Cannot find tunnel adapter.
! 2018.06.10 12:46:18 - Installing tunnel driver
I 2018.06.10 12:46:22 - Checking authorization ...
. 2018.06.10 12:46:22 - IPv6 disabled with packet filtering.
! 2018.06.10 12:46:22 - Connecting to Gorgonea (Canada, Toronto, Ontario)
. 2018.06.10 12:46:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 12:46:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 12:46:23 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 12:46:23 - Connection to OpenVPN Management Interface
. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 12:46:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:46:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:46:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 12:46:23 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 12:46:23 - OpenVPN > UDP link remote: [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:23 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.250:443, sid=01bc53b3 755548eb
. 2018.06.10 12:46:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 12:46:23 - OpenVPN > VERIFY KU OK
. 2018.06.10 12:46:23 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 12:46:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 12:46:23 - OpenVPN > VERIFY EKU OK
. 2018.06.10 12:46:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 12:46:23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 12:46:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.250:443
. 2018.06.10 12:46:24 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 12:46:24 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.115 255.255.0.0,peer-id 26,cipher AES-256-GCM'
. 2018.06.10 12:46:24 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.06.10 12:46:24 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.06.10 12:46:24 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.06.10 12:46:24 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 12:46:24 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 12:46:24 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 12:46:24 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 12:46:24 - OpenVPN > open_tun
. 2018.06.10 12:46:24 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 12:46:24 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 12:46:24 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.115/255.255.0.0 [SUCCEEDED]
. 2018.06.10 12:46:24 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.115/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 12:46:24 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 12:46:24 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 12:46:29 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.250 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:46:29 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:46:29 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 12:46:29 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 12:46:29 - DNS leak protection with packet filtering enabled.
. 2018.06.10 12:46:29 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 12:46:29 - Routes, added a new route, 104.254.90.251 for gateway 10.4.0.1
. 2018.06.10 12:46:29 - Flushing DNS
I 2018.06.10 12:46:32 - Checking route IPv4
I 2018.06.10 12:46:33 - Checking DNS
! 2018.06.10 12:46:45 - Connected.
. 2018.06.10 12:46:45 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 12:46:45 - OpenVpn Management > ENTER PASSWORD:
! 2018.06.10 12:47:31 - Disconnecting
. 2018.06.10 12:47:31 - Routes, removed a route previously added, 104.254.90.251 for gateway 10.4.0.1
. 2018.06.10 12:47:31 - Sending management termination signal
. 2018.06.10 12:47:31 - Management - Send 'signal SIGTERM'
. 2018.06.10 12:47:32 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 12:47:32 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.250 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:47:36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 12:47:36 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 12:47:36 - OpenVPN > TAP: DHCP address released
. 2018.06.10 12:47:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 12:47:36 - Connection terminated.
. 2018.06.10 12:47:36 - IPv6 restored with packet filtering.
. 2018.06.10 12:47:36 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 12:47:36 - DNS leak protection with packet filtering disabled.
. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 12:47:36 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.06.10 12:47:36 - Flushing DNS
! 2018.06.10 12:47:39 - Session terminated.
! 2018.06.10 12:47:40 - Deactivation of Network Lock
I 2018.06.10 12:49:02 - Session starting.
I 2018.06.10 12:49:02 - Checking authorization ...
. 2018.06.10 12:49:02 - IPv6 disabled with packet filtering.
! 2018.06.10 12:49:02 - Connecting to Alwaid (Canada, Toronto, Ontario)
. 2018.06.10 12:49:03 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 12:49:03 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 12:49:03 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 12:49:03 - Connection to OpenVPN Management Interface
. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 12:49:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:03 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:03 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 12:49:03 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 12:49:03 - OpenVPN > UDP link remote: [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:03 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.114:443, sid=820316e9 17d858a1
. 2018.06.10 12:49:03 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 12:49:03 - OpenVPN > VERIFY KU OK
. 2018.06.10 12:49:03 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 12:49:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 12:49:03 - OpenVPN > VERIFY EKU OK
. 2018.06.10 12:49:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 12:49:06 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 12:49:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.114:443
. 2018.06.10 12:49:07 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 12:49:07 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.174 255.255.0.0'
. 2018.06.10 12:49:07 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 12:49:07 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 12:49:07 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 12:49:07 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 12:49:07 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 12:49:07 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 12:49:07 - OpenVPN > open_tun
. 2018.06.10 12:49:07 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 12:49:07 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 12:49:07 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.174/255.255.0.0 [SUCCEEDED]
. 2018.06.10 12:49:07 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.174/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 12:49:07 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 12:49:07 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 12:49:12 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.114 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 12:49:12 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 12:49:12 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 12:49:12 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 12:49:12 - DNS leak protection with packet filtering enabled.
. 2018.06.10 12:49:12 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 12:49:12 - Routes, added a new route, 184.75.221.115 for gateway 10.4.0.1
. 2018.06.10 12:49:12 - Flushing DNS
I 2018.06.10 12:49:16 - Checking route IPv4
I 2018.06.10 12:49:16 - Checking DNS
! 2018.06.10 12:49:29 - Connected.
. 2018.06.10 12:49:29 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 12:49:29 - OpenVpn Management > ENTER PASSWORD:
. 2018.06.10 12:56:00 - Updating systems & servers data ...
. 2018.06.10 12:56:01 - Systems & servers data update completed
. 2018.06.10 12:57:58 - OpenVPN > Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #68630 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
. 2018.06.10 13:00:59 - Above log line repeated 19 times more
! 2018.06.10 13:00:59 - Disconnecting
. 2018.06.10 13:00:59 - Routes, removed a route previously added, 184.75.221.115 for gateway 10.4.0.1
. 2018.06.10 13:00:59 - Sending management termination signal
. 2018.06.10 13:00:59 - Management - Send 'signal SIGTERM'
. 2018.06.10 13:00:59 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 13:00:59 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 184.75.221.114 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:04 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:04 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 13:01:04 - OpenVPN > TAP: DHCP address released
. 2018.06.10 13:01:04 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 13:01:04 - Connection terminated.
. 2018.06.10 13:01:04 - IPv6 restored with packet filtering.
. 2018.06.10 13:01:04 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 13:01:04 - DNS leak protection with packet filtering disabled.
. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 13:01:04 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
. 2018.06.10 13:01:04 - Flushing DNS
! 2018.06.10 13:01:07 - Session terminated.
! 2018.06.10 13:01:09 - Activation of Network Lock - Windows Filtering Platform
I 2018.06.10 13:01:18 - Session starting.
I 2018.06.10 13:01:18 - Checking authorization ...
. 2018.06.10 13:01:18 - IPv6 disabled with packet filtering.
! 2018.06.10 13:01:18 - Connecting to Rotanev (Canada, Toronto, Ontario)
. 2018.06.10 13:01:19 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 13:01:19 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 13:01:19 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 13:01:19 - Connection to OpenVPN Management Interface
. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 13:01:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:19 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:19 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 13:01:19 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 13:01:19 - OpenVPN > UDP link remote: [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:19 - OpenVPN > TLS: Initial packet from [AF_INET]104.254.90.186:443, sid=047e9ced e53fae6b
. 2018.06.10 13:01:19 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 13:01:19 - OpenVPN > VERIFY KU OK
. 2018.06.10 13:01:19 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 13:01:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 13:01:19 - OpenVPN > VERIFY EKU OK
. 2018.06.10 13:01:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 13:01:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 13:01:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]104.254.90.186:443
. 2018.06.10 13:01:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 13:01:25 - Above log line repeated 1 times more
. 2018.06.10 13:01:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.11.48 255.255.0.0'
. 2018.06.10 13:01:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 13:01:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 13:01:25 - OpenVPN > Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2018.06.10 13:01:25 - OpenVPN > Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:01:25 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 13:01:25 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 13:01:25 - OpenVPN > open_tun
. 2018.06.10 13:01:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 13:01:25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 13:01:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.11.48/255.255.0.0 [SUCCEEDED]
. 2018.06.10 13:01:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.11.48/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 13:01:25 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 13:01:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 13:01:31 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 104.254.90.186 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:01:31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:01:31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 13:01:31 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 13:01:31 - DNS leak protection with packet filtering enabled.
. 2018.06.10 13:01:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 13:01:31 - Routes, added a new route, 104.254.90.187 for gateway 10.4.0.1
. 2018.06.10 13:01:31 - Flushing DNS
I 2018.06.10 13:01:34 - Checking route IPv4
I 2018.06.10 13:01:35 - Checking DNS
! 2018.06.10 13:01:47 - Connected.
. 2018.06.10 13:01:47 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 13:01:47 - OpenVpn Management > ENTER PASSWORD:
. 2018.06.10 13:06:36 - Updating systems & servers data ...
. 2018.06.10 13:06:38 - Systems & servers data update completed
! 2018.06.10 13:06:56 - Disconnecting
. 2018.06.10 13:06:56 - Routes, removed a route previously added, 104.254.90.187 for gateway 10.4.0.1
. 2018.06.10 13:06:56 - Sending management termination signal
. 2018.06.10 13:06:56 - Management - Send 'signal SIGTERM'
. 2018.06.10 13:06:56 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2018.06.10 13:06:56 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 104.254.90.186 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:01 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:01 - OpenVPN > Closing TUN/TAP interface
. 2018.06.10 13:07:01 - OpenVPN > TAP: DHCP address released
. 2018.06.10 13:07:01 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2018.06.10 13:07:01 - Connection terminated.
. 2018.06.10 13:07:01 - IPv6 restored with packet filtering.
. 2018.06.10 13:07:01 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic)
. 2018.06.10 13:07:01 - DNS leak protection with packet filtering disabled.
. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4
. 2018.06.10 13:07:01 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6
I 2018.06.10 13:07:01 - Checking authorization ...
. 2018.06.10 13:07:02 - IPv6 disabled with packet filtering.
! 2018.06.10 13:07:02 - Connecting to Lesath (Canada, Toronto, Ontario)
. 2018.06.10 13:07:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018
. 2018.06.10 13:07:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit
. 2018.06.10 13:07:02 - OpenVPN > library versions: OpenSSL 1.1.0h  27 Mar 2018, LZO 2.10
. 2018.06.10 13:07:02 - Connection to OpenVPN Management Interface
. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2018.06.10 13:07:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:07:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2018.06.10 13:07:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144]
. 2018.06.10 13:07:02 - OpenVPN > UDP link local: (not bound)
. 2018.06.10 13:07:02 - OpenVPN > UDP link remote: [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:02 - OpenVPN > TLS: Initial packet from [AF_INET]184.75.221.2:443, sid=3f473ba1 678b1534
. 2018.06.10 13:07:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2018.06.10 13:07:02 - OpenVPN > VERIFY KU OK
. 2018.06.10 13:07:02 - OpenVPN > Validating certificate extended key usage
. 2018.06.10 13:07:02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2018.06.10 13:07:02 - OpenVPN > VERIFY EKU OK
. 2018.06.10 13:07:02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2018.06.10 13:07:02 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2018.06.10 13:07:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]184.75.221.2:443
. 2018.06.10 13:07:03 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2018.06.10 13:07:03 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.12.129 255.255.0.0,peer-id 35,cipher AES-256-GCM'
. 2018.06.10 13:07:03 - OpenVPN > Pushed option removed by filter: 'redirect-gateway def1 bypass-dhcp'
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: compression parms modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: peer-id set
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625
. 2018.06.10 13:07:03 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified
. 2018.06.10 13:07:03 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM'
. 2018.06.10 13:07:03 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 13:07:03 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
. 2018.06.10 13:07:03 - OpenVPN > interactive service msg_channel=0
. 2018.06.10 13:07:03 - OpenVPN > ROUTE_GATEWAY 10.0.0.1/255.255.255.0 I=17 HWADDR=78:32:1b:a9:f1:6b
. 2018.06.10 13:07:03 - OpenVPN > open_tun
. 2018.06.10 13:07:03 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}.tap
. 2018.06.10 13:07:03 - OpenVPN > TAP-Windows Driver Version 9.21
. 2018.06.10 13:07:03 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.12.129/255.255.0.0 [SUCCEEDED]
. 2018.06.10 13:07:03 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.12.129/255.255.0.0 on interface {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2018.06.10 13:07:03 - OpenVPN > Successful ARP Flush on interface [40] {F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}
. 2018.06.10 13:07:03 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=0
. 2018.06.10 13:07:09 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 184.75.221.2 MASK 255.255.255.255 10.0.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2018.06.10 13:07:09 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
. 2018.06.10 13:07:09 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4
. 2018.06.10 13:07:09 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6
. 2018.06.10 13:07:09 - DNS leak protection with packet filtering enabled.
. 2018.06.10 13:07:09 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 10.4.0.1)
. 2018.06.10 13:07:09 - Routes, added a new route, 184.75.221.3 for gateway 10.4.0.1
. 2018.06.10 13:07:09 - Flushing DNS
I 2018.06.10 13:07:12 - Checking route IPv4
I 2018.06.10 13:07:13 - Checking DNS
! 2018.06.10 13:07:25 - Connected.
. 2018.06.10 13:07:25 - OpenVPN > Initialization Sequence Completed
. 2018.06.10 13:07:25 - OpenVpn Management > ENTER PASSWORD:
 
----------------------------
Network Interfaces and Routes:
 
{
"support_ipv4": true,
"support_ipv6": true,
"routes": [
{
"address": "0.0.0.0\/0",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "10.0.0.1",
"metric": "35"
},
{
"address": "0.0.0.0\/1",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "3"
},
{
"address": "10.0.0.0\/24",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.0.0.28",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.0.0.255",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "10.4.0.0\/16",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "10.4.12.129",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "10.4.255.255",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "127.0.0.0\/8",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "127.0.0.1",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "127.255.255.255",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "128.0.0.0\/1",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "3"
},
{
"address": "184.75.221.2",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "10.0.0.1",
"metric": "35"
},
{
"address": "184.75.221.3",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "10.4.0.1",
"metric": "4"
},
{
"address": "224.0.0.0\/4",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "224.0.0.0\/4",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "224.0.0.0\/4",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "255.255.255.255",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "255.255.255.255",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "255.255.255.255",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "::1",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "2604:3d08:807f:fff2::\/64",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2::4b9b",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2:d9a:651b:8f8c:3d75",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "2604:3d08:807f:fff2:6068:eaf3:7657:beff",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::\/64",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::\/64",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "fe80::d9a:651b:8f8c:3d75",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "fe80::1923:642e:f94e:9d84",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
},
{
"address": "ff00::\/8",
"interface": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"gateway": "link",
"metric": "331"
},
{
"address": "ff00::\/8",
"interface": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"gateway": "link",
"metric": "291"
},
{
"address": "ff00::\/8",
"interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"gateway": "link",
"metric": "259"
}
],
"interfaces": [
{
"friendly": "Ethernet 2",
"id": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}",
"name": "Ethernet 2",
"description": "TAP-Windows Adapter V9",
"type": "Ethernet",
"status": "Up",
"bytes_received": "187651520",
"bytes_sent": "8967995",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::1923:642e:f94e:9d84",
"10.4.12.129"
],
"gateways": [
"10.4.0.1"
],
"bind": true,
"dns4": "10.4.0.1",
"dns6": ""
},
{
"friendly": "Ethernet",
"id": "{3734B147-25DA-4BF8-A5D2-DC0198F2AEDE}",
"name": "Ethernet",
"description": "Intel® Ethernet Connection (2) I219-V",
"type": "Ethernet",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::9af:cbb8:5bf6:daf5",
"169.254.218.245"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Local Area Connection* 1",
"id": "{CDE07587-CBC4-4511-98F0-1DE08E03741B}",
"name": "Local Area Connection* 1",
"description": "Microsoft Wi-Fi Direct Virtual Adapter",
"type": "Wireless80211",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::1826:7eb5:c160:2961",
"169.254.41.97"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Local Area Connection* 2",
"id": "{5D425C74-E6CB-4C46-B97E-37E055CB402F}",
"name": "Local Area Connection* 2",
"description": "Microsoft Wi-Fi Direct Virtual Adapter #2",
"type": "Wireless80211",
"status": "Down",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"fe80::6cce:906e:581f:8776",
"169.254.135.118"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Wi-Fi",
"id": "{E99CF2F9-2D6F-4C40-B8D2-AAD0BF5F300E}",
"name": "Wi-Fi",
"description": "D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter",
"type": "Wireless80211",
"status": "Up",
"bytes_received": "1266311438",
"bytes_sent": "38479803",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"2604:3d08:807f:fff2::4b9b",
"2604:3d08:807f:fff2:d9a:651b:8f8c:3d75",
"2604:3d08:807f:fff2:6068:eaf3:7657:beff",
"fe80::d9a:651b:8f8c:3d75",
"10.0.0.28"
],
"gateways": [
"10.0.0.1"
],
"bind": true,
"dns4": "",
"dns6": ""
},
{
"friendly": "Loopback Pseudo-Interface 1",
"id": "{9EF4A15B-6C84-11E8-96F7-806E6F6E6963}",
"name": "Loopback Pseudo-Interface 1",
"description": "Software Loopback Interface 1",
"type": "Loopback",
"status": "Up",
"bytes_received": "0",
"bytes_sent": "0",
"support_ipv4": true,
"support_ipv6": true,
"ips": [
"::1",
"127.0.0.1"
],
"gateways": [],
"bind": true,
"dns4": "",
"dns6": null
}
],
"ipv4-default-gateway": "10.4.0.1",
"ipv4-default-interface": "{F8AAB30B-2E4C-4ADC-870A-812F3B560D3C}"
}
----------------------------
ipconfig /all:
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : DESKTOP-UP0BGVO
   Primary Dns Suffix  . . . . . . . : 
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : vc.shawcable.net
 
Ethernet adapter Ethernet 2:
 
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : TAP-Windows Adapter V9
   Physical Address. . . . . . . . . : 00-FF-F8-AA-B3-0B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   Link-local IPv6 Address . . . . . : fe80::1923:642e:f94e:9d84%40(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.4.12.129(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.0.0
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 1:07:03 PM
   Lease Expires . . . . . . . . . . : Monday, June 10, 2019 1:07:03 PM
   Default Gateway . . . . . . . . . : 
   DHCP Server . . . . . . . . . . . : 10.4.255.254
   DHCPv6 IAID . . . . . . . . . . . : 671154168
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40-8d-5C-E5-42-9D
   DNS Servers . . . . . . . . . . . : 10.4.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Ethernet adapter Ethernet:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Intel® Ethernet Connection (2) I219-V
   Physical Address. . . . . . . . . : 40-8d-5C-E5-42-9D
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 1:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter
   Physical Address. . . . . . . . . : 7A-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Local Area Connection* 2:
 
   Media State . . . . . . . . . . . : Media disconnected
   Connection-specific DNS Suffix  . : 
   Description . . . . . . . . . . . : Microsoft Wi-Fi Direct Virtual Adapter #2
   Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
 
Wireless LAN adapter Wi-Fi:
 
   Connection-specific DNS Suffix  . : vc.shawcable.net
   Description . . . . . . . . . . . : D-Link DWA-582 Wireless AC1200 Dual Band PCI Express Adapter
   Physical Address. . . . . . . . . : 78-32-1B-A9-F1-6B
   DHCP Enabled. . . . . . . . . . . : Yes
   Autoconfiguration Enabled . . . . : Yes
   IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2::4b9b(Preferred) 
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:40 AM
   Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:31:47 AM
   IPv6 Address. . . . . . . . . . . : 2604:3d08:807f:fff2:d9a:651b:8f8c:3d75(Deprecated) 
   Temporary IPv6 Address. . . . . . : 2604:3d08:807f:fff2:6068:eaf3:7657:beff(Deprecated) 
   Link-local IPv6 Address . . . . . : fe80::d9a:651b:8f8c:3d75%17(Preferred) 
   IPv4 Address. . . . . . . . . . . : 10.0.0.28(Preferred) 
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Lease Obtained. . . . . . . . . . : Sunday, June 10, 2018 11:52:35 AM
   Lease Expires . . . . . . . . . . : Sunday, June 17, 2018 11:52:35 AM
   Default Gateway . . . . . . . . . : 10.0.0.1
   DHCP Server . . . . . . . . . . . : 10.0.0.1
   DHCPv6 IAID . . . . . . . . . . . : 158872091
   DHCPv6 Client DUID. . . . . . . . : 00-01-00-01-22-AF-26-EA-40-8d-5C-E5-42-9D
   DNS Servers . . . . . . . . . . . : 2001:4e8:0:4009::11
                                       2001:4e8:0:4007::15
                                       10.0.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled






Similar Topics Collapse


1 user(s) are reading this topic

0 members, 1 guests, 0 anonymous users

Servers online. Online Sessions: 15505 - BW: 56564 Mbit/sYour IP: 54.82.99.169Guest Access.