[Dxspider-support] List of users/nodes with incorrect IP addresses

Rene Olsen rene at rcolsen.dk
Sat Mar 22 21:32:07 GMT 2025


Hi andy.

Dirk wrote this in a previous post.

-----

One of the things that is going to important for the next release is for
sysops running (test?) instances behind masquerading firewalls (eg my
development node GB7TLH)  is to have these three statements (suitably
modified) in your startup script:

set/var $main::localhost_alias_ipv4 '82.68.205.1'
set/var $main::localhost_alias_ipv6 '2a02:8010:9019::6'
set/var @main::localhost_names qw(127.0.0.1 ::1 192.168.19.20)

These are the ip addresses that will be used on PC92 sentences (amongst
others) when the node is not physically connected directly to the
internet.

-----

So, guess that is what you (and other behind NAT) should do.

Not really sure what one is supposed to put there, if one has a dynamic IP. Guess one will 
have to run a script that updates the startup script or whatever.

Vy 73 de Rene / OZ1LQH


On 22 Mar 2025 at 21:13, g4piq--- via Dxspider-support wrote:

> Sorry Kin - I haven't clue why G4PIQ/GB7DXM shows up on your list. I'm just
> the sysop user on my local GB7DXM node on the local LAN. 192.168.1.254. I've
> done no special coding and am running 1.57 build 564. Please be clear on
> what I've done wrong to get on the naughty step. You've no reason to start
> dropping my spots.
> 
> 73
> 
> Andy, G4PIQ
> 
> 
> 
> _____________________________________________
> From: Dxspider-support <dxspider-support-bounces at tobit.co.uk> On Behalf Of
> Kin via Dxspider-support
> Sent: 22 March 2025 21:02
> To: 'The DXSpider Support list' <dxspider-support at tobit.co.uk>
> Cc: Kin <ea3cv at cronux.net>
> Subject: [Dxspider-support] List of users/nodes with incorrect IP addresses
> 
> 
> Hi,
> 
> List of users/nodes that are being identified by an intranet IP address:
> 
> IPv4: RFC 1918
> 	10.0.0.0/8		(10.0.0.0 - 10.255.255.255)
> 	172.16.0.0/12	(172.16.0.0 - 172.31.255.255)
> 	192.168.0.0/16	(192.168.0.0 - 192.168.255.255)
> 
> IPv4: RFC 3927
> 	169.254.0.0/16	(169.254.0.0 - 169.254.255.255)
> 
> IPv6: RFC 4193
> 	fc00::/8
> 	fd00::/8
> 
> IPv6: RFC 4291
> 	fe80::/10
> 	ff00::/8
> 	::/128
> 	::1/128
> 
> Please note that all users of these addresses will soon have their
> spots/anns removed.
> This list is only of what has been seen today.
> 
> User		IP Address		Node
> -------	-------------	-------	
> CX1MS		10.0.0.4		M0KGX-3
> CX4RL		10.0.0.4		M0KGX-3
> EA5HNF	10.0.0.4		M0KGX-3
> EA5RKB	10.0.0.4		M0KGX-3
> EA7JPT	10.0.0.4		M0KGX-3
> EA7KWC	10.0.0.4		M0KGX-3
> EC7ZT		10.0.0.4		M0KGX-3
> G0VAX		192.168.1.254	GB7VAX
> G1DIF		192.168.1.116	G7VJA-2
> G4PIQ		192.168.1.254	GB7DXM
> G6NHU		192.168.1.8	G6NHU-2
> G7RAU		192.168.0.2	GB7RAU
> G7VJA		192.168.1.64	GB7HTL
> G7VJA		192.168.1.140	GB7HTL
> IT7GGK	10.0.0.4		M0KGX-3
> IT9BGB	10.0.0.4		M0KGX-3
> IZ0EHV	10.0.0.4		M0KGX-3
> IZ0IJC	10.0.0.4		M0KGX-3
> IZ0ORT	192.168.1.84	IZ0ORT-6
> IZ2LUS	10.0.0.4		M0KGX-3
> IZ5FSA	192.168.1.6	IZ5FSA-6
> K2LS-22	192.168.1.254	K2LS
> KD3ABP	10.0.0.4		M0KGX-3
> LZ2EN		10.0.0.4		M0KGX-3
> M7CVK		10.0.0.4		M0KGX-3
> N1PPP		10.0.2.2		EA6VQ-1
> PD1WC		10.0.0.4		M0KGX-3
> Q1QQQ		192.168.4.197	IZ2LSC-55
> RN8C		10.0.0.4		M0KGX-3
> RN8C		10.0.0.4		K1TTT
> UA4CC-5	192.168.11.253	UA4CC
> UA4NDX	10.0.0.4		M0KGX-3
> UA4YE		10.0.0.4		M0KGX-3
> VE3EY-3	192.168.10.30	VE3EY-7
> WP4JD		10.0.0.4		M0KGX-3
> YE4IJ		10.0.0.4		M0KGX-3
> 
> Nodes that do not propagate the user's real IP will end up on blacklists.
> It's a matter of time.
> 
> Kin EA3CV
>  << File: Untitled attachment 00006.txt >> 
> 






More information about the Dxspider-support mailing list