IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2023/12/29
~dr|z3d
@RN
@StormyCloud
@T3s|4
@T3s|4_
@eyedeekay
@orignal
@postman
@zzz
%Liorar
%acetone
%snex
+FreefallHeavens
+Xeha
+ardu
+bak83_
+hk
+mareki2p
+poriori
+profetikla
+qend-irc2p
+r00tobo
+uop23ip
+weko
AHON1
Arch
BubbRubb
Danny
DeltaOreo
FreeB
HowardPlayzOfAdmin
Irc2PGuest36498
Irc2PGuest6412
Irc2PGuest95056
Meow
Onn4l7h
Onn4|7h
altonen
anontor
boonst
evasiveStillness
l337
maylay
not_bob_afk
not_human_
r00tobo[2]
shiver_
solidx66
thetia
tonsi
tr
u5657
y2kboy23
zer0bitz_
orignal if a router doesn't publish IP you don't know it's country
orignal the only way to regnize it is through existing connections
uop23ip Was just an idea that the attacker uses hidden routers for tunnel demanding. Maybe that's the reason that there are some more nonGeoLocated peers.
uop23ip Have a question, i didn't find the answer for: What does "Inactive participating tunnels" mean? Are these tunnels "parked"/buffered, or over my max settings? Are they not demanded for a while?
uop23ip Mmmh maybe i should ask this in #i2p as it could be a canon question. I will, wish me luck :)