IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2023/12/29
@RN_
@StormyCloud
@T3s|4_
@eyedeekay
@orignal
@postman
@zzz
%snex
+FreefallHeavens
+Onn4l7h
+Onn4|7h
+leopold
+nyaa2pguy
+poriori
+profetikla
+qend-irc2p
+r00tobo_BNC
+uop23ip
AlV5tGf7
Arch
Danny
Holmes
Irc2PGuest10395
Irc2PGuest26634
Irc2PGuest28384
Irc2PGuest34440
Irc2PGuest68355
Liorar_
NiceBoat_
OfficialCIA
Over1
T3s|4
U1F642
Wikk_0_
acetone_
ahiru
anontor
cims
mahlay
makoto
mareki2p_
n2__
nilbog
not_bob_afk
pinotto
pory
r00tobo[2]
sektorchef
user_
orignal if a router doesn't publish IP you don't know it's country
orignal the only way to regnize it is through existing connections
uop23ip Was just an idea that the attacker uses hidden routers for tunnel demanding. Maybe that's the reason that there are some more nonGeoLocated peers.
uop23ip Have a question, i didn't find the answer for: What does "Inactive participating tunnels" mean? Are these tunnels "parked"/buffered, or over my max settings? Are they not demanded for a while?
uop23ip Mmmh maybe i should ask this in #i2p as it could be a canon question. I will, wish me luck :)