IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2023/12/29
~dr|z3d
@RN
@RN_
@StormyCloud
@T3s|4
@T3s|4_
@eyedeekay
@not_bob_afk
@orignal
@postman
@zzz
%Liorar
%acetone
%cumlord
%snex
+FreefallHeavens
+Xeha
+ardu
+bak83
+hk
+mareki2p
+poriori
+profetikla
+qend-irc2p
+r00tobo
+segfault
+uop23ip
+weko
AHON1
Arch
BubbRubb
Danny
DeltaOreo
HowardPlayzOfAdmin1
Irc2PGuest58427
Irc2PGuest70152
Meow
Onn4l7h
Onn4|7h
SigSegv
anontor
b4dab00m
boonst
duck
maylay
not_human_
onon_1
pisslord
r3med1tz
shiver_
simprelay
solidx66
thetia
u5657
usr001
zer0bitz_
orignal if a router doesn't publish IP you don't know it's country
orignal the only way to regnize it is through existing connections
uop23ip Was just an idea that the attacker uses hidden routers for tunnel demanding. Maybe that's the reason that there are some more nonGeoLocated peers.
uop23ip Have a question, i didn't find the answer for: What does "Inactive participating tunnels" mean? Are these tunnels "parked"/buffered, or over my max settings? Are they not demanded for a while?
uop23ip Mmmh maybe i should ask this in #i2p as it could be a canon question. I will, wish me luck :)