pradt2 / always-online-stun
A list of publicly available STUN servers, refreshed every hour.
AI Architecture Analysis
This repository is indexed by RepoMind. By analyzing pradt2/always-online-stun in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.
Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.
Repository Overview (README excerpt)
Crawler viewAlways Online: STUN servers Have you ever thought: *Gosh, why isn't there a regularly updated, comprehensive list of publicly available STUN servers*? **Well, this is it. A list of online STUN servers, refreshed hourly.** How to use Hardcode this link valid_hosts.txt into your application, and use it anytime you need a fresh list of online STUN servers. Or, if you don't want to rely on DNS resolution, use valid_ipv4s.txt for IPv4, and valid_ipv6s.txt for IPv6 addresses. JS example with Geolocation FAQ But hard-coding of links is baaaad?! Well, not exactly. Hard-coding of links which were never meant to be hard-coded is bad. Here the situation is different. Since I recommend that users hard-code the links to the few specific files, I'll avoid doing anything that would make the link invalid (e.g. I won't change the name of the file, name of the repository, my Github username, etc.). But I still don't feel comfortable hard-coding any links... Feel free to open an issue and let's discuss your specific needs. How often are the lists refreshed? Hourly, you can see the timestamp of the last check in the commit message. What RFC specs do the servers conform to? The lists contain servers that should be capable of both NAT detection and behaviour testing. These capabilities roughly correspond to RFC5780 (and, implicitly, to RFC5389). To qualify for these lists, a server has to correctly respond to a RFC5389 request and provide the attribute in the response. The presence of the attribute is the spec-compliant way to advertise that a STUN server can be used for NAT behaviour tests. _At the moment, no actual verification of the NAT behaviour testing capabilities is carried out. We rely on the STUN server maintainers to set the attribute only if their server supports NAT behaviour testing. If that's a problem for you (i.e. you need a stronger guarantee), please open an issue._ The other lists contain servers that are capable of NAT detection only. These are much bigger lists as only a small fraction of servers is configured to provide the full NAT testing capabilities. To qualify for these lists, a server has to correctly respond to a RFC5389 request. What IP versions and transport protocols are tested? IP versions 4 and 6. UDP and TCP. I noticed that the lists are shuffled on each check. Why? Lazy/inconsiderate devs will tend to just grab the top-most link from the list (and TBF, can we blame them?). By shuffling the list, I ensure that we don't end up spamming the same host forever. What servers are checked, and how can I add more publicly available servers? The list is in . Feel free to create a PR adding more servers, or just open an issue and list them there. My server is on your list, and I don't like it. What can I do? Open an issue, and it will be removed from the automated checks within 24 hours.