I'm on resold ATT fiber while I await sonic fiber in my neighborhood. So, for years, I have routed almost all of my desktop traffic through sonic's openvpn service, which occasionally updates my publicly-visible IPv4 address.
Today I was unable to access the FreeBSD ports database at https://cgit.freebsd.org/ports/log/databases/mongodb60 because
I speculate that I can force a rollover of the assigned IP address on my tunnel, so I'm probably not dead in the water, but that just means some other sonic end user is going to get this assignment.
Any chance someone at sonic could follow up and get this IP address off of the dronebl list?
Today I was unable to access the FreeBSD ports database at https://cgit.freebsd.org/ports/log/databases/mongodb60 because
The page at that URL says:DroneBL reported an entry: DroneBLResponse(19), see https://dronebl.org/lookup?ip=192.184.191.134.
There is a "remove" link that asks service providers (e.g., sonic) and not end users to make the request for VPN services.There are listings for 192.184.191.134 in DroneBL. To get removed from our DNSBL, you will need to address all of these incident listings.
Incident ID Date Class Why? Comments Port
8388330 Oct-27-2021 03:26:57 GMT 19 Abused VPN Service VPNGate server (connect verified)
I speculate that I can force a rollover of the assigned IP address on my tunnel, so I'm probably not dead in the water, but that just means some other sonic end user is going to get this assignment.
Any chance someone at sonic could follow up and get this IP address off of the dronebl list?