IRCaBot 2.1.0
GPLv3 © acetone, 2021-2022
#saltr
/2023/12/29
~dr|z3d
@RN
@RN_
@StormyCloud
@T3s|4
@T3s|4_
@orignal
@postman
@zzz
%Liorar
%acetone
%cumlord
+FreefallHeavens
+Leopold
+Xeha
+ardu
+bak83
+hk
+onon_
+qend-irc2p
+r00tobo_BNC
+uop23ip
AHON1
Arch
BubbRubb1
Dann
DeltaOreo
HowardPlayzOfAdmin1
Irc2PGuest31296
Irc2PGuest35799
Irc2PGuest55055
Irc2PGuest69335
Irc2PGuest87322
Irc2PGuest99002
Meow
Onn4l7h
Onn4|7h
SigSegv
T3s|4__
anontor
boonst
maylay
not_bob_afk
pisslord
poriori_
shiver_
simprelay
solidx66
thetia
u5657
usr002
weko_
zer0bitz_
orignal if a router doesn't publish IP you don't know it's country
orignal the only way to regnize it is through existing connections
uop23ip Was just an idea that the attacker uses hidden routers for tunnel demanding. Maybe that's the reason that there are some more nonGeoLocated peers.
uop23ip Have a question, i didn't find the answer for: What does "Inactive participating tunnels" mean? Are these tunnels "parked"/buffered, or over my max settings? Are they not demanded for a while?
uop23ip Mmmh maybe i should ask this in #i2p as it could be a canon question. I will, wish me luck :)