- ADD_CHAIN138_TO_LEDGER_LIVE: Ledger form done; public code review repo bis-innovations/LedgerLive; init/push commands - CONTRACT_DEPLOYMENT_RUNBOOK: Chain 138 gas price 1 gwei, 36-addr check, TransactionMirror workaround - CONTRACT_*: AddressMapper, MirrorManager deployed 2026-02-12; 36-address on-chain check - NEXT_STEPS_FOR_YOU: Ledger done; steps completable now (no LAN); run-completable-tasks-from-anywhere - MASTER_INDEX, OPERATOR_OPTIONAL, SMART_CONTRACTS_INVENTORY_SIMPLE: updates - LEDGER_BLOCKCHAIN_INTEGRATION_COMPLETE: bis-innovations/LedgerLive reference Co-authored-by: Cursor <cursoragent@cursor.com>
5.4 KiB
76.53.10.34:8545 Connection Refused - Explanation
Last Updated: 2026-01-31
Document Version: 1.0
Status: Active Documentation
Date: 2026-01-04
Issue: Connection to 76.53.10.34:8545 is being refused
Status: ✅ EXPECTED BEHAVIOR (This is not an error)
Note: ER605 was replaced by the UDM Pro; UDM Pro edge IP is 76.53.10.34. Port forwarding: 76.53.10.36:80/443 → 192.168.11.167:80/443 (NPMplus). NPMplus LXC has 192.168.11.166 and .167; only .167 is used in UDM Pro.
🔍 Why Connection is Refused
IP Address Identity
76.53.10.34 is the ER605 router's WAN IP address, not an RPC service endpoint.
- Device: TP-Link ER605 v2.20 (er605-1)
- Role: Primary Edge Router (WAN interface)
- Network: Public WAN IP (Block #1: 76.53.10.32/28)
- Gateway: 76.53.10.33
Why Port 8545 is Not Available
- Router Functionality: Routers forward traffic, they don't host services on port 8545
- No RPC Service: The ER605 router does not run a blockchain RPC service
- Port Not Forwarded: Even if an RPC service existed internally, port 8545 is not forwarded from the router's WAN interface to any internal service
✅ Correct RPC Endpoints
Internal Network RPC Endpoints
These are accessible from within the internal network (192.168.11.0/24):
| VMID | IP Address | Port | Service | Purpose |
|---|---|---|---|---|
| 2500 | 192.168.11.250 | 8545 | Besu HTTP RPC | Primary RPC node |
| 2500 | 192.168.11.250 | 8546 | Besu WebSocket RPC | Primary RPC node (WS) |
| 2501 | 192.168.11.251 | 8545 | Besu HTTP RPC | Permissioned RPC node |
| 2502 | 192.168.11.252 | 8545 | Besu HTTP RPC | Public RPC node |
Example Internal Access:
# From internal network
curl -X POST http://192.168.11.250:8545 \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}'
Public RPC Endpoints
These are accessible from the public internet via Cloudflare:
| Domain | Type | Authentication | Routing |
|---|---|---|---|
https://rpc-http-pub.d-bis.org |
HTTP RPC | ❌ No Auth | Cloudflare → Tunnel → VMID 2502 |
https://rpc-ws-pub.d-bis.org |
WebSocket RPC | ❌ No Auth | Cloudflare → Tunnel → VMID 2502 |
https://rpc-http-prv.d-bis.org |
HTTP RPC | ✅ JWT Required | Cloudflare → Tunnel → VMID 2501 |
https://rpc-ws-prv.d-bis.org |
WebSocket RPC | ✅ JWT Required | Cloudflare → Tunnel → VMID 2501 |
Example Public Access:
# Public endpoint (no authentication)
curl -X POST https://rpc-http-pub.d-bis.org \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}'
🌐 Network Architecture
Request Flow for Public RPC Access
Internet Client
↓
Cloudflare DNS (rpc-http-pub.d-bis.org)
↓
Cloudflare Edge (SSL Termination, DDoS Protection)
↓
Cloudflared Tunnel (VMID 102: 192.168.11.9)
↓
Nginx Proxy (VMID 2502: 192.168.11.252:443)
↓
Besu RPC Service (VMID 2502: 192.168.11.252:8545)
Important: Traffic does NOT go through the router's WAN IP (76.53.10.34) for RPC services. It goes through Cloudflare Tunnel, which bypasses the router's WAN interface.
Why Router WAN IP is Not Used
- Cloudflare Tunnel: Public services use Cloudflare Tunnel (VMID 102) which creates an encrypted connection directly from Cloudflare to internal services
- No Port Forwarding Needed: Tunnel bypasses the need for port forwarding on the router
- Security: Tunnel provides better security than exposing ports directly on the router's WAN interface
- DDoS Protection: Cloudflare provides DDoS protection before traffic reaches internal network
🔧 If You Need to Access RPC from External Network
Option 1: Use Public Endpoints (Recommended)
Use the public domain names that route through Cloudflare:
# Public RPC (no authentication)
curl -X POST https://rpc-http-pub.d-bis.org \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}'
Response:
{
"jsonrpc": "2.0",
"id": 1,
"result": "0x8a"
}
Option 2: Connect to Internal Network First
If you're on the internal network (192.168.11.0/24), use internal IPs:
curl -X POST http://192.168.11.250:8545 \
-H "Content-Type: application/json" \
-d '{"jsonrpc":"2.0","method":"eth_chainId","params":[],"id":1}'
Option 3: VPN Access (If Available)
If VPN access is configured, connect to VPN first, then use internal IPs.
📋 Summary
| Item | Value |
|---|---|
| 76.53.10.34 | ER605 Router WAN IP (not an RPC service) |
| Connection Refused | ✅ Expected (router doesn't host RPC service) |
| Internal RPC | 192.168.11.250:8545 (and other RPC nodes) |
| Public RPC | https://rpc-http-pub.d-bis.org (via Cloudflare) |
| Router Role | Network routing only, not service hosting |
✅ Conclusion
The connection refusal is expected and correct behavior.
76.53.10.34is a router, not an RPC service- Use internal IPs for internal access:
192.168.11.250:8545 - Use public domains for external access:
https://rpc-http-pub.d-bis.org - Router WAN IP is not used for RPC service routing
Last Updated: 2026-01-04
Status: ✅ EXPECTED BEHAVIOR - NOT AN ERROR