IP-Address Reputation

Dear IVPN Team,

it is getting increasingly difficult for me to use IVPN on a daily basis. I am used to and okay with manually solving cloudflare captchas but recently many websites started to just block me outright:

- prepaid-host.com (https://imgur.com/pDGHo2j)

- A university website I dont want to name

- openai.com

- my ISP website

- Reddit (https://imgur.com/a/RDOxbW3)

- Even some IP reputation services blocked me:

https://talosintelligence.com/reputation_center/

- and many more

Since you dont offer a browser extension that lets me whitelist certain domains, I cant do anything about it other than to disable the VPN alltogether. And I cant blame these websites for blocking me. Look this information about my IP from crowdsec:

de1.wg.ivpn.net

How am I supposed to continue using IVPN like this? Rotate IP-Addresses, introduce more IPs, anything, find a solution, please!

This has become a daily topic for me as well. In fact, I just had a conversation with a bank I use that is now doing full blocks on VPNs. It seems the issue is at an increasing impasse between those of us insistent on privacy and online entities wanting to protect themselves. This doesn’t just apply to VPN use but with increasing scope to other areas like ad-blocking and other forms of tracking.

Anyhow, there’s much more to be said about this and I’m considering raising the topic in /r/privacy

For the time being, I’d like to point out this project which has been helpful for me:

Hi,

Thanks for your report.

This is an issue that affects all VPN providers, and there is no straightforward and sustainable solution to resolve it. You will see most established VPN exits having reputation scores like this, and if you do some research you will see the same reports popping up for virtually all VPN providers.

You can achieve cleaner reputation for IPs, but for that, as a service you need to monitor customer traffic and collect PII - a combination of this can help identify and ban “bad actors”. Privacy guarantees are/can be compromised, so we won’t take these steps.

Yes, there are other measures you can take eg. rotating IPs, but they are not going to solve the core problem. It will remain a cat-and-mouse game - and you will experience the same issues in a couple of days/weeks.

Having said all this, here are some practical tips we share for situations like this when using IVPN:

  • Connecting to a server in a different location to obtain a different public IP address.
  • In some locations, we offer multiple VPN servers. In the IVPN app `Settings` - `General` area, have the `Enable selection of individual servers in server location list` option enabled to select a specific server in the server selection area to obtain a different public IP address while connecting to the same location.
  • Changing a VPN protocol, e.g. from OpenVPN to WireGuard (and the other way round), might yield you a different IP, and so does using a Multihop feature.
  • Another option is to configure and enable the SOCKS5 proxy feature in your browser - this will route your traffic via a different IP address: https://www.ivpn.net/knowledgebase/general/socks5-proxy-service/
  • A further option is to enable a Split-Tunnelling feature, exclude one of your browsers from the VPN tunnel and use it to access the website blocking the VPN’s IP address.

This won’t solve this problem in all cases and all the time, but it will improve your experience.

Selective routing on your firewall/router. You’re never going to find a VPN IP that is perpetually “clean” unless you buy a dedicated address.

Are you currently living in Germany? I am blocked more often using other countries than my own

The issue with IP addresses is there aren’t too many of them. I think with greater adoption of IPv6 hopefully VPNs will get access to MASSIVE amounts of IP addresses and make blocking of IPs simply impractical.

That and hopefully dumbass blackhats will quit doing their stupid shenanigans from VPN IPs and use freaking bouncing servers instead. Sometimes when you’re bored grab your VPN IP via ‘curl api.ipify.org’ then go shove it into abuseipdb.com and look at all the fine work script kiddies hammering every single thing on the internet with nmap been doing.

Excellent answer, and exactly what I would have replied. :slight_smile:

Have you considered creating a browser plugin to make it easier to use SOCKS?

geoblocking isn’t real?