IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2023/12/29
~dr|z3d
@RN
@RN_
@StormyCloud
@T3s|4
@T3s|4_
@orignal
@postman
@zzz
%Liorar
%acetone
%cumlord
+FreefallHeavens
+Onn4l7h
+Sh0ck
+bak83_
+bpb
+leopold_
+r00tobo_BNC
+sidereal
+uop23ip
+xHarr
Arch
BubbRubb
Danny
DeltaOreo
H20
Irc2PGuest16752
Irc2PGuest97218
Irc2PGuest99581
Maylay
Meow
ac9f_
anontor
b4dab00m
duck
elthommy
halloy13412
john231
makoto
nZDoYBkF_
nilbog-
not_bob_afk
ntty
poriori_
profetik1
r00tobo[2]
shiver_
simprelay
solidx66
thetia
u5657
vivid_reader56
zer0bitz
orignal if a router doesn't publish IP you don't know it's country
orignal the only way to regnize it is through existing connections
uop23ip Was just an idea that the attacker uses hidden routers for tunnel demanding. Maybe that's the reason that there are some more nonGeoLocated peers.
uop23ip Have a question, i didn't find the answer for: What does "Inactive participating tunnels" mean? Are these tunnels "parked"/buffered, or over my max settings? Are they not demanded for a while?
uop23ip Mmmh maybe i should ask this in #i2p as it could be a canon question. I will, wish me luck :)