Scheduled server maintenance – June 2015

IVPN News Posted on May 26, 2015

In preparation for the new Multi-hop network we need to perform maintenance on several servers. Expected downtime is less than 30 mins per server. Only the servers listed below will be affected. Any active connections to the servers below will be disconnected at the time of the upgrade. All times shown using 24-hour clock.

Monday 1st June

Server Location PST EST UTC BST CEST
nl1.gw (gw1.nl) Amsterdam 23:00 02:00 07:00 08:00 09:00

Tuesday 2nd June

Server Location PST EST UTC BST CEST
gb1.gw (gw1.uk) London 23:00 02:00 07:00 08:00 09:00
us-tx.gw (gw1.us) Dallas, TX 01:00 04:00 09:00 10:00 11:00
gb2.gw (gw2.uk) London 02:00 05:00 10:00 11:00 12:00
nl2.gw (gw2.nl) Amsterdam 03:00 06:00 11:00 12:00 13:00
us-ut.gw (gw3.us) Salt Lake, UT 04:00 07:00 12:00 13:00 14:00
ch1.gw (gw1.ch) Zurich, CH 05:00 08:00 13:00 14:00 15:00
We invite you to discuss this post in our Reddit community or on Twitter. You can also send your feedback to blog@ivpn.net.
IVPN News

Independent security audit concluded

By Nick Pestell

IVPN News

IVPN applications are now open source

By Viktor Vecsei

Releases

Beta IVPN Linux app released

By Viktor Vecsei

IVPN News

IVPN acquires Safing, operator of Portmaster and the SPN network

Posted on December 3, 2024 by Nicholas Pestell Viktor Vecsei

The key points IVPN has acquired Safing ICS Technologies GmbH*, the company behind the consumer firewall application Portmaster and the SPN network Over the coming months, the IVPN team will take over the operation of the Portmaster and SPN services IVPN is committed to continuing the improvement of the VPN service, Portmaster, and the SPN network with a focus on better integration across our services The why and how We believe a trustworthy VPN service is just one part of the essential toolkit for resisting online surveillance.
DNS traffic leak outside VPN tunnel on Android IVPN News

DNS traffic leak outside VPN tunnel on Android

Posted on June 13, 2024 by IVPN Staff

Recently we were made aware of a potential DNS traffic leak outside the VPN tunnel on Android. Even with Android OS “Always-on VPN” and “Block connections without VPN” options enabled, as per the report the plaintext DNS traffic can be observed outside the VPN tunnel.
Spotted a mistake or have an idea on how to improve this page?
Suggest an edit on GitHub.