If you are using the built in DDNS option then you wont be able to connect because the server cant update your ip address. Enter your actual ip or use another DDNS provider and it will work.Couldn't use the app yesterday. Eval just came up on screen a few moments ago. Just renewed last month.
Mine is currently running normally fingers crossed hopefully it remains that way. I put a wildcard domain block in my Pihole DNS server for blueirissoftware.com, blueiris.pro and blueiris.software...
are you saying it goes direct to an ip or uses some other domain? i’ve also blocked blueirissoftware.com at my dns server and haven’t had issues yet. i haven’t seen other suspicious queries yetNot sure since it's been a while but I don't think that it looks there. I think that it's an Amazon-hosted IP that it goes to. I remember long ago wondering why it was phoning out and that's my recollection.
Check your Pi Hole logs for traffic coming from the BI server IP and you may see it.
...Check your Pi Hole logs for traffic coming from the BI server IP and you may see it...
are you saying it goes direct to an ip or uses some other domain? i’ve also blocked blueirissoftware.com at my dns server and haven’t had issues yet. i haven’t seen other suspicious queries yet
I did a check for updates after blocking blueirissoftware.com and see a query for blueirissoftware.com, but nothing else that stands out. I don't have detailed netflow logs to see what other traffic may have been sent.I don't recall now whether it was to an IP or to a domain hosted at Amazon. I'm not at home where I can check my logs easily. Also, was long ago when I noticed it so it could be done completely differently now. I just blocked everything out to the WAN from that host. Can still get there via my VPN the way that mine is set up.
It is not malicious. It was placed there by Ken. It is 100 percent safe. VirusTotalJust an FYI:
I would suggest that you DO NOT download anything from the BI website during it's current downtime.
It's possible it is a malicious payload a bad actor placed there.
The developer has already replied to emails and posted on their facebook page indicating that their server is down and the file has been uploaded. The malware engines can detect viruses new viruses based on code using AI among other techniques.. Again what kind of foolish malicious actor would take down a site then upload a malicious file rather than simply uploading the file to the working site. Why would you then even download any file from the BI website or any site- even its working fine...if you dont trust it move on to an alternative product you can trust.That's Funny. Well not really. I just downloaded it and was thinking the same thing. But just because it doesn't trip any malware flags doesn't necessarily mean it's not a bad actor! Takes a while for malware to be discovered, then a malware identifier to be sent out to all of the AV programs...... by then too late....