Can´t reach or ping to any academy machines (Parrot instance or vm Kali)

Hi all,

I´m having problems connecting to the windows fundamentals → Operating System Structure machine. I have completed a few other modules without problems, but suddenly, I cant ping to this one.
I have restored a screenshot of my kali where everything worked, changed the server of htb academy to EU academy 2, and connected to the VPN:

└─$ sudo openvpn academy-regular.ovpn 
[sudo] password for kali: 
2022-08-19 14:24:28 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2022-08-19 14:24:28 Cannot find ovpn_dco netlink component: Object not found
2022-08-19 14:24:28 Note: Kernel support for ovpn-dco missing, disabling data channel offload.
2022-08-19 14:24:28 OpenVPN 2.6_git x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] built on May 30 2022
2022-08-19 14:24:28 library versions: OpenSSL 3.0.3 3 May 2022, LZO 2.10
2022-08-19 14:24:28 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA2-256' for HMAC authentication
2022-08-19 14:24:28 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA2-256' for HMAC authentication
2022-08-19 14:24:28 TCP/UDP: Preserving recently used remote address: [AF_INET]23.106.59.94:1337
2022-08-19 14:24:28 Socket Buffers: R=[212992->212992] S=[212992->212992]
2022-08-19 14:24:28 Note: enable extended error passing on TCP/UDP socket failed (IPV6_RECVERR): Protocol not available (errno=92)
2022-08-19 14:24:28 UDP link local: (not bound)
2022-08-19 14:24:28 UDP link remote: [AF_INET]23.106.59.94:1337
2022-08-19 14:24:28 TLS: Initial packet from [AF_INET]23.106.59.94:1337, sid=ca7d8a06 2b9c895f
2022-08-19 14:24:28 VERIFY OK: depth=1, C=UK, ST=City, L=London, O=HackTheBox, CN=HackTheBox CA, name=htb, emailAddress=info@hackthebox.eu
2022-08-19 14:24:28 VERIFY KU OK
2022-08-19 14:24:28 Validating certificate extended key usage
2022-08-19 14:24:28 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2022-08-19 14:24:28 VERIFY EKU OK
2022-08-19 14:24:28 VERIFY OK: depth=0, C=UK, ST=City, L=London, O=HackTheBox, CN=htb, name=htb, emailAddress=info@hackthebox.eu
2022-08-19 14:24:28 WARNING: 'auth' is used inconsistently, local='auth SHA2-256', remote='auth SHA256'
2022-08-19 14:24:28 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA1
2022-08-19 14:24:28 [htb] Peer Connection Initiated with [AF_INET]23.106.59.94:1337
2022-08-19 14:24:28 PUSH: Received control message: 'PUSH_REPLY,route 10.10.10.0 255.255.254.0,route 10.129.0.0 255.255.0.0,route-ipv6 dead:beef::/64,tun-ipv6,route-gateway 10.10.14.1,topology subnet,ping 10,ping-restart 120,ifconfig-ipv6 dead:beef:2::11ca/64 dead:beef:2::1,ifconfig 10.10.15.204 255.255.254.0,peer-id 37,cipher AES-256-CBC'
2022-08-19 14:24:28 net_route_v4_best_gw query: dst 0.0.0.0
2022-08-19 14:24:28 net_route_v4_best_gw result: via 192.168.1.1 dev eth0
2022-08-19 14:24:28 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=eth0 HWADDR=08:00:27:95:bd:54
2022-08-19 14:24:28 GDG6: remote_host_ipv6=n/a
2022-08-19 14:24:28 net_route_v6_best_gw query: dst ::
2022-08-19 14:24:28 sitnl_send: rtnl: generic error (-101): Network is unreachable
2022-08-19 14:24:28 ROUTE6: default_gateway=UNDEF
2022-08-19 14:24:28 TUN/TAP device tun0 opened
2022-08-19 14:24:28 net_iface_mtu_set: mtu 1500 for tun0
2022-08-19 14:24:28 net_iface_up: set tun0 up
2022-08-19 14:24:28 net_addr_v4_add: 10.10.15.204/23 dev tun0
2022-08-19 14:24:28 net_iface_mtu_set: mtu 1500 for tun0
2022-08-19 14:24:28 net_iface_up: set tun0 up
2022-08-19 14:24:28 net_addr_v6_add: dead:beef:2::11ca/64 dev tun0
2022-08-19 14:24:28 net_route_v4_add: 10.10.10.0/23 via 10.10.14.1 dev [NULL] table 0 metric -1
2022-08-19 14:24:28 net_route_v4_add: 10.129.0.0/16 via 10.10.14.1 dev [NULL] table 0 metric -1
2022-08-19 14:24:28 add_route_ipv6(dead:beef::/64 -> dead:beef:2::1 metric -1) dev tun0
2022-08-19 14:24:28 net_route_v6_add: dead:beef::/64 via :: dev tun0 table 0 metric -1
2022-08-19 14:24:28 OPTIONS IMPORT: timers and/or timeouts modified
2022-08-19 14:24:28 OPTIONS IMPORT: --ifconfig/up options modified
2022-08-19 14:24:28 OPTIONS IMPORT: route options modified
2022-08-19 14:24:28 OPTIONS IMPORT: route-related options modified
2022-08-19 14:24:28 OPTIONS IMPORT: peer-id set
2022-08-19 14:24:28 OPTIONS IMPORT: data channel crypto options modified
2022-08-19 14:24:28 Data Channel: using negotiated cipher 'AES-256-CBC'
2022-08-19 14:24:28 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2022-08-19 14:24:28 Outgoing Data Channel: Using 256 bit message hash 'SHA2-256' for HMAC authentication
2022-08-19 14:24:28 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
2022-08-19 14:24:28 Incoming Data Channel: Using 256 bit message hash 'SHA2-256' for HMAC authentication
2022-08-19 14:24:28 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2022-08-19 14:24:28 Initialization Sequence Completed

I can´t find any error with the ifconfig either

└─$ ifconfig 
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 192.168.1.142  netmask 255.255.255.0  broadcast 192.168.1.255
        inet6 fe80::a00:27ff:fe95:bd54  prefixlen 64  scopeid 0x20<link>
        ether 08:00:27:95:bd:54  txqueuelen 1000  (Ethernet)
        RX packets 1611  bytes 587250 (573.4 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1525  bytes 232939 (227.4 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

tun0: flags=4305<UP,POINTOPOINT,RUNNING,NOARP,MULTICAST>  mtu 1500
        inet 10.10.15.204  netmask 255.255.254.0  destination 10.10.15.204
        inet6 dead:beef:2::11ca  prefixlen 64  scopeid 0x0<global>
        inet6 fe80::717f:8ea9:cd05:6ed8  prefixlen 64  scopeid 0x20<link>
        unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00  txqueuelen 500  (UNSPEC)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 9  bytes 648 (648.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

I cant see it from the parrot instance either.

I have tried other machines from other modules and they are unreachble also