The Undernet is the third largest publicly monitored Internet Relay Chat (IRC) network, c. 2021, with about 42 client servers serving 17,444 users in 6707 channels at any given time.[1][2]

IRC clients can connect to Undernet via the global round robin irc.undernet.org, the region-specific round robins us.undernet.org and eu.undernet.org, IPv6client servers irc6.undernet.org or a specific server from the server list.[3]


Undernet was established in October 1992 by Danny Mitchell, Donald Lambert, and Laurent Demally as an experimental network running a modified version of the EFnet irc2.7 IRCd software, created in an attempt to make it less bandwidth-consumptive and less chaotic, as netsplits and takeovers were starting to plague EFnet.[4] The Undernet IRC daemon became known as "ircu". Undernet was formed at a time when many small IRC networks were being started and subsequently disappearing; however, it managed to grow into one of the largest and oldest IRC networks despite some initial in-fighting and setbacks. For a period in 1994, Undernet was wracked by an ongoing series of flame wars. Again in 2001, it was threatened by automated heavy spamming of its users for potential commercial gain. Undernet survived these periods relatively intact and its popularity continues to the present day.

It is notable as being the first network to utilize timestamping, originally made by Carlo Wood, in the IRC server protocol as a means to curb abuse.


Undernet uses GNUworld to provide X, its channel service bot.[5] X operates on a username basis; a username is independent from a nickname, which cannot be registered on Undernet.[5]

As Undernet limits channel registration to "established channels" or channels with an active userbase, Undernet introduced a version of ChanFix (under the nickname C) designed to work like EFNet's CHANFIX. Its use is to protect unregistered channels. ChanFix tracks channel op usage by username basis and restores ops if channels become opless or are taken over.[6]

Undernet also runs an open proxy scanner.[7] This scans users currently connecting to the network for open WinGate, SOCKS version 4/5, and HTTP proxy servers. IP addresses hosting open proxy servers are automatically G-lined from the network. These changes were put in place after the 2001 Denial-of-service attacks almost destroyed the network and left Undernet without the registered channel service bot for months. In 2010, Undernet also started to g-line Tor exit nodes, instead of assigning those users a cloak like e.g. Quakenet.