``` $ chisel server --reverse -v 2020/12/31 00:08:04 server: Reverse tunnelling enabled 2020/12/31 00:08:04 server: Fingerprint 1mS6n2APlkBh30oiqG1yb79RHzQezhGQqj3ogVTrauI= 2020/12/31 00:08:04 server: Listening on http://0.0.0.0:8080 2020/12/31 00:08:20 server: session#1: Handshaking... 2020/12/31 00:08:20 server: session#1: Verifying configuration 2020/12/31 00:08:20 server: session#1: tun: Created 2020/12/31 00:08:20 server: session#1: tun: SSH connected 2020/12/31 00:08:20 server: session#1: tun: proxy#R:1080=>socks: Listening 2020/12/31 00:08:20 server: session#1: tun: Bound proxies ``` ^-- would be nice to know the client address