IPduh.com   About   IPduh Internet Tools   Propaganda




IPduh is a set of Internet Forencics and Troubleshooting Tools made to work Together.   IPduh may be used as an Internet Forensics Search Engine or a General Purpose Search Engine.   Smart Humans and Aliens researching the internetz on Earth Love IPduh.






ip    Tools Menu

IP address verbose report





input:



an IPv4 address in dot-decimal notation



output:

For non public, special IP addresses a short explanation and a URI to more information.



xor



For public and special public IP addresses:


  1. The IANA designation of the /8 block containing this IP address.

  2. The Internet Regional Registry of this IP address.

  3. The Autonomous System Path.

  4. The IP Prefix.

  5. The Autonomous System Number.

  6. The Organization using this IP address.

  7. The country or city of the organization to which this IP address is assigned.



    Sometimes the machine(s) using this IP address happen to be in the same country or city.



    The geographical coordinates of the country or the city.



    Two Databases made by IPduh and the MaxMind database are used to determine the geographical location of the IP address. The databases made by IPduh are based mostly on data provided by the Regional Internet Registries. A macro view of the IPduh Country database used is available.



    The physical location of the machine(s) using this IP address is not guaranteed to be the same as the location suggested by IPduh .

  8. The name of the IP address ( known as Reverse DNS record ).

  9. The A record of the IP address name.

  10. The registered domain name associated with the IP address name.

  11. The A records registered domain name.

  12. The dot-decimal IP address entered as a 32b Base 10 Integer.





Examples of using ip with GET requests








ip/dnstrace    Tools Menu





input:



A pubic IPv4 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the PTR.




Examples of using ip/dnstrace.








ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








ip/tor-exit    Tools Menu





input:



A unicast IPv4 address



output:


  1. If the IPv4 address entered is listed on the IPduh Tor Exit List, the first and the last times it was seen used as a Tor Exit.

  2. If the IPv4 address entered is listed on the tor.dan.me.uk DNSBL ( a list of currently used Tor Exits ), some information regarding its Tor Network characteristics.




The lookups performed by ip/tor-exit are performed by ip/dnsbl as well.




Examples of using ip/tor-exit.








dns/list    Tools Menu

Create a List of DNS names





input:



DNS names



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;   &www=1   &sc=1   &sa=1



comments:

All listed strings of characters not Identified by dns/list as DNS names are printed.

A ; stops list processing and hides all characters following it.



output:

A list of DNS names along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using dns/list.








ip/list    Tools Menu

Create a List of IP numbers





input:



IP numbers:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number ]



ipduh-list built-in variables and punctuation marks:

&list=   --   ,   &title=   ;



comments:

All listed strings of characters not Identified by ip/list as IP numbers are printed.

A ; stops list processing and hides all characters following it.



output:

A list of IP numbers along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using ip/list.








IPduh List Syntax    Tools Menu   about ip/list   about dns/list   about demux/list


IPduh list syntax is used to create lists with ip/list , dns/list , and demux/list and it is a simple way of denoting lists in a form text area or a URL.



HTML tags are not allowed.

URL Enconding and URL decoding are handled by the list tools.








Every list item not identified as an IP number by ip/list , a DNS name by dns/list , and an IP number or a DNS name or a URI by demux/list will be printed without IPduh links. This way comments and almost empty lines may be put in a list.

eg:http://ipduh.com/dns/list/?&list=`---google.fr---Google in French---.---google.gr---Google in Greek---'





ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








dns/trace    Tools Menu





input:



A DNS domain name



output:

The delegation path from the root Name Servers to the Authoritative Name Servers of the DNS name.




Examples of using ip/dnstrace.








ipv6/cidr    Tools Menu





input:



An IPv6 CIDR block in CIDR notation



output:


  1. Whether the IPv6 CIDR block entered is valid.

  2. If the IPv6 CIDR block entered is invalid a correction is attempted.

  3. The Type of the IPv6 network address.

  4. The IPv6 Range. Network Address - Broadcast Address.

  5. The Number of IPv6 addresses in the CIDR block.





Examples of using ipv6/cidr








ipv6/traceroute    Tools Menu





input:



An IPv6 address



output:

If the IPv6 address entered is a routable Unicast Internet IPv6 address, the intermediate routers along the path from an IPduh Internet Host to the Internet host using the IPv6 address entered. For each of the routers in the path ipv6/traceroute attempts to output their reverse records, their IPv6 addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.








ipv6    Tools Menu

IPv6 address basic information lookup





input:



An IPv6 Address



output:


  1. The type of the IPv6 address entered, URIs to more information and the appropriate RFC, if needed.

  2. Allocation Prefix , Status , Responsible RIR , Allocation Date.

  3. The short form of the IPv6 address entered.

  4. The long form of IPv6 address entered Hexadecimal and Binary.

  5. The unsigned integer number represantating the IPv6 address entered.

  6. The Country in which the Organization using this IPv6 address is located.



    The machine(s) using this IPv6 address may not be on the same country.



    The Location is determined by the Regional Internet Registries data and a macro view of the IPv6 addresses per country is also available.





Examples of using ipv6.








as/prefix    Tools Menu

IP prefixes originating an Autonomous System





input:



An Autonomous System Number



output:

The IP prefixes originating the autonomous system




Examples of using as/prefix.





Still in Beta release --Not consistent Results.



Glitch - Bug: If you get "I did not find IP prefixes originating from 'AS#'" for an autonomous system number with prefixes in the IPduh Database, try to refresh the page.







ipv6/whois    Tools Menu

IPv6 address whois information lookup





input:



An IPv6 Address



output:

For non Global Unicast IPv6 addresses,



a short explanation and a URI to more information or the apprpopriate RFC.



For Global Unicast IPv6 addresses,


  1. The parent IANA block.

  2. The IANA status.

  3. The Regional Internet Registry.

  4. The whois server.

  5. The whois information for the owner of the block.





Examples of using ipv6.








ipv6/ptr    Tools Menu

IPv6 address PTR ( Reverse DNS name ) lookup





input:



An IPv6 address



output:

The PTR of the IPv6 address entered.




Examples of ipv6/ptr.








ip/ptr/24    Tools Menu

The PTR of all IP addresses in a /24 network





input:



A pubic IPv4 address or a /24 CIDR or the three first Bytes of an IP address in decimal dotted notation



output:

The PTR ( Reverse DNS names ) for all the IP addresses in the /24 ( C ) Network along with pointers to more information.




Examples of using ip/ptr/24 .








idn/ace    Tools Menu

IDNA - Unicode to ACE convertion





input:



An International Domain Name in Unicode.



output:

An ASCII Comptible Encoded string of characters.




Examples of using idn/ace.








idn/unicode    Tools Menu

IDNA - ACE to UNICODE convertion





input:



An International Domain Name in ASCII Compatible Encoding ACE.



output:

The International Domain Name in Unicode.




Examples of using idn/unicode.








pdb/as    Tools Menu

PeeringDB information about an Autonomous System





input:



An autonomous system number



output:

The information that the Autonomous System Owner put in the Peering database.



The peeringdb information is cached for at least 15 days. The latest PeeringDB information can be viewed at peeringdb.com.




Examples of using pdb/as.








ip/whois    Tools Menu

IP address whois lookup





input:



a public IPv4 address



output:

The whois information for the IP address entered.






Examples of using ip/whois with GET requests






Caveat


ip/whois caches whois information for 15 days.





idn    Tools Menu

International Domain Name convertions ( Unicode to ACE xor ACE to Unicode )





input:



a Domain Name



output:

If the domain entered is an international domain name encoded in Unicode it's ASCII Compatible encoded ( ACE ) version.

If the domain name entered is an Internation domain name encode in ACE it's equivalent Unicode encoded version.




Examples of using idn.








ip/whois/as    Tools Menu

Autonomous System Number whois lookup





input:



an Autonomous System number

an Autonomous System number with the "AS" prefix

an Autonomous System number with the "ASN" prefix.



output:

The whois information for an Internet Autonomous System.



If the Autonomous System Number entered is not used in Internet BGP routing an explanation is attempted.






Examples of using ip/whois/as with GET requests








ip/cidr    Tools Menu

IP CIDR Calculator





input:



A network block in CIDR notation



output:


  1. If the network address on the CIDR is valid and the network mask on the CIDR is valid. Each Byte in the network address in Binary (put your cursor above the network address on the CIDR block)

  2. If the CIDR block is invalid ( the network address is not compatible with the network mask ) a valid CIDR block is suggested.

  3. The IP Range. Network Address - Broadcast Address.

  4. The Network Mask in decimal dotted notation and each Byte in binary ( put your cursor above the mask).

  5. The Number of IP addresses in the network block.

  6. If the the CIDR block is in a special block a short explanation and URI to more information, usually the appropriate RFC.





Examples of using ip/cidr with GET requests








ip/reverse or ip/ptr   Tools Menu

IP address PTR RR lookup - IP reverse mapping - reverse IP address DNS lookup




ip/reverse or ip/ptr is based on a IP PTR RR lookup also known as reverse DNS lookup and it is usefull in associating an IP address with a host name or a DNS name.




input:



a public IPv4 address



output:


  1. The IP PTR resource record.

  2. The registered domain name -deduced by the PTR record.

  3. The A records of the registered domain name.





Note


For single IP addresses ip output includes the ip/reverse output as well.






Examples of using ip/reverse with GET requests








epoch    Tools Menu

Epoch Clock and Epoch to Date Conversion





input:



An Epoch -an integer number



output:


  1. The equivalent UTC Date.

  2. The Δsec since the Unix Epoch.

  3. The Δsec from the Unix epoch timestamp entered.





Examples of using epoch.









url/bouncer    Tools Menu

Bounce URLs - Basic Protection against Malicious URLs





input:



[ IPv4 address | IPv6 address | URI | DNS name ]



output:

The Bouncer will lookup the DNS name or the IP address contained in the URI in a few major Black Lists. If the URI , IP address , or DNS name pass the test , the bouncer will redirect you there after a few seconds.





The Bouncer transforms plain DNS names , plain IPv4 addresses , and plain IPv6 addresses to HTTP URLs.



The Bouncer will bounce URIs using the protocols used often with web browsers: HTTP , HTTPS , and FTP.



The Bouncer runs a basic test against the host you are destined.

For a more thorough test consult dns/bl for domain names and ip/dnsbl for IPv4 address.



The Bouncer is ideal when you need to link to URIs beyond your control or to hide your referrer.




Examples of using url/bouncer.





The Bouncer waits for 4.5 sec before redirecting.

If you do not like the 4.5 sec wait time before the redirection you may use one of the following:

/url/bouncer/1

/url/bouncer/2

/url/bouncer/3

/url/bouncer/4





/url/bouncer/1 waits 0.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/1/?http://alog.ipduh.com



/url/bouncer/2 waits 1.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/2/?http://alog.ipduh.com



/url/bouncer/3 waits 2.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/3/?http://alog.ipduh.com





url/encode    Tools Menu

Percent Encode a URI





input:



A URI



output:

A percent-encoded URI.


Examples of using url/encode.










ip/dnsbl    Tools Menu

IP address Blacklist check.





input:



a public IPv4 address



output:


  1. The answer for this IP address from each of the major IP DNS BlackLists and IP 'black' lists queried.

  2. An explanation for each answer and if needed a URI to more information.









DNS BlackLists and IP 'black' lists queried by ip/dnsbl



  1. ZEN - zen.spamhaus.org

    ZEN combines all Spamhaus IP DNSBLs.




    1. Spamhaus Block List - SBL - sbl.spamhaus.org

      A database of IP addresses of spam-sources, spam support services, and snowshoe spammers ( the CSS component ).

    2. Exploits Block List - XBL - xbl.spamhaus.org

      XBL includes CBL and a customized NJABL




      1. Composite Blocking List - CBL - cbl.abuseat.org

        CBL lists IP addresses exhibiting characteristics which are specific to open proxies, spam bots, and spam malware.

      2. Not Just Another Bogus List - NJABL - njabl.org

        An IP database of known and potential spam sources ( open relays, open proxies, open form to mail HTTP gateways, dynamic IP pools, and direct spammers )



    3. Policy Block List - PBL - pbl.spamhaus.org

      A database of end-user IP addresses which should not be delivering unauthenticated SMTP email to any Internet mail server.

      Many ISPs participate in the PBL project. The PBL lists both dynamic and static IP addresses which by policy whether the block owner's or -interim in its absence- Spamhaus' policy) should not be sending email directly to the MX servers of third parties.



  2. SORBS - dnsbl.sorbs.net

    Contains all the SORBS DNSBLs




    1.   http.dnsbl.sorbs.net

      List of Open HTTP Proxy Servers.

    2.   socks.dnsbl.sorbs.net

      List of Open SOCKS Proxy Servers.

    3.   misc.dnsbl.sorbs.net

      List of open Proxy Servers not listed in the SOCKS or HTTP lists.

    4.   smtp.dnsbl.sorbs.net

      List of Open SMTP relay servers.

    5.   web.dnsbl.sorbs.net

      Hosts that have abusable vulnerabilities

    6.   spam.dnsbl.sorbs.net

      List of hosts that have been noted as sending spam/UCE/UBE to the administrators of SORBS. This zone also contains net blocks of spam supporting service providers, including those who provide web sites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.

    7.   block.dnsbl.sorbs.net

      List of hosts demanding that they never be tested by SORBS.

    8.   zombie.dnsbl.sorbs.net

      List of networks hijacked from their original owners, some of which have been used for spamming.

    9.   dul.dnsbl.sorbs.net

      Dynamic IP Address ranges (NOT a Dial Up list!)

    10.   badconf.rhsbl.sorbs.net

      List of domain names where the A or MX records point to bad address space.

    11.   nomail.rhsbl.sorbs.net

      List of domain names where the owners have indicated no email should ever originate from these domains.



  3. SpamCop Blocking List - SCBL - bl.spamcop.net

    SCBL lists IP addresses that were used to spam.

  4. Barracuda Reputation Block List - BRBL - b.barracudacentral.org

    Lists IP addresses which are sending spam or viruses

  5. Tor.dan.me.uk - dan.me.uk - A list of IP addresses used currently by the Tor Network.

    If the IPv4 address entered is listed on tor.dan.me.uk some information regarding its Tor Network characteristics ( the node name, the port used by Tor, and whether it is: Fast,Guard,Named,Running,Stable, or Valid ).

  6. Team Cymru Full Bogons List - Team Cymru

    This List contains IP addresses that are not assigned to an ISP or other end-user and they should not be seen in the Internet.

  7. IPduh Black List - An IP black List, not a DNSBL.

    Contains IP addresses used by abusive or compromised systems.

  8. IPduh Tor Exit List - A list of IP addresses that have been Tor Exits, not a DNSBL.

    This list is maintained by IPduh and it is composed mainly by the Tor Project data .

    If the IPv4 address entered is listed on the IPduh Tor Exit List the first and the last times it was seen used as a Tor Exit are displayed.





Examples of using ip/dnsbl








ip/srv    Tools Menu



Check which of the most common services are running on the host(s) using a remote IP address.





input:



a public IPv4 address



output:


  1. The TCP ports that accepted connection within 300ms.

  2. Limited software recognition for the daemons found listening and some of the headers.

  3. Limited OS recognition, Uptime guess, Link Type Guess, and TOS.

  4. Guess the number of systems using the IP address.





List of the TCP ports probed by ip/srv and their common use



  1. 21 - FTP - File Transfer Protocol

  2. 22 - SSH Secure SHell

  3. 23 - Telnet

  4. 25 - SMTP - Simple Mail Protocol



  5. 465 - SMTP SSL/TLS - Simple Mail Transfer Protocol over SSL/TLS (encrypted)

  6. 53 - DNS - Domain Name System

  7. 80 - HTTP - HyperText Transfer Protocol

  8. 110 - POP3 - Post Office Protocol version 3

  9. 123 - NTP - Network Time Protocol

  10. 143 - IMAP - Internet Message Access protocol

  11. 993 - IMAP over SSL/TLS (encrypted)

  12. 389 - LDAP - Lightweitght Directory Access Protocol

  13. 443 - HTTPS - HyperText Transfer Protocol Secure (encrypted)

    ip/srv also attempts to print the certificate details.

  14. 587 - MSA - Message Submission Agent

  15. 1352 - Lotus Notes

  16. 1433 - Microsoft SQL server

  17. 3306 - MySQL Server

  18. 3389 - Windows Remote Desktop Connection Service







IPduh.com/ip/srv bot


ip/srv bot is called the piece of software that does the scans or looks up the cashed scans. The scans are cashed for no fixed periods of time. The ip/srv bot always attempts to pass the asker's IP address to the web server listening on the scanned IP when it attempts a new (non-cached) scan. The ip/srv bot always acts at someone's request and never picks arbitrary hosts to lookup.



If you are a server administrator who does not want his server's IP to be scanned by ip/srv please tell IPduh so. If you are a server administrator that wants to know who requested an ip/srv scan, search your web server's logs for IPduhSrvBot.



The ip/srv agent signature on http daemons listening on port 80 or port 443 looks like:



"Mozilla/5.0 (compatible; IPduhSrvBot/VERSION; for/192.0.2.222; +http://ipduh.com/about/#ip-srv-bot)"



where: 192.0.2.222 is the IP address of the IPduh user who requested the first ip/srv scan, and VERSION is [0.0.1 - 0.9.9].







dns/whois    Tools Menu

Domain Name whois lookup





input:



a registered DNS domain name



output:


  • The domain name whois information or a URI to the whois information.





Examples of using dns-whois










Caveat


In an effort to not be a nuisance to the whois servers dns/whois caches whois queries for at least 15 days.





dns/bl    Tools Menu

Domain name URIBL and IP BLack List lookup



input:



a DNS domain name



output:


  • The URI Black Lists' answers, and the answers of the major IP (DNS) Black Lists for all the IP addresses DNS related to the domain name.





The URI Black Lists



  1. Google Safe Browsing - Google Safe Browsing FAQ



    This is a list of sites involved in phising or sites dedicated to the spread of malware.

  2. URIBL - uribl.com



    URIBL lists domain names found in URIs in the body of spam messages. These domain names may be used in one or more of the following categories of web sites: spamadvertized sites that are trying to sell something, phising sites, sites that host malware or used by malware, sites that infect visitors with malware.



The IP Black Lists


The IP Black Lists queried for every DNS related IP address are the same with the ones queried by ip/dnbl.




Examples of using dns-bl





For each of the DNS related IP addresses of the domain name dns/bl does not print IP Black Lists that answered "not listed".

You could use dns/bl/verbose if you want to see everything printed.



The domain names listed in the URI Black Lists are: dedicated to the propagation of malware, used for phising, used for spamming, or advertized though spamming.



IPduh suggests to not use your browser to visit any of the domain names listed on the URI Black Lists.




phishing site: Forgery or imitation of another website, designed to trick users into sharing personal or financial information. Entering any personal information on such site may result in identity theft or other abuse of the information entered.



malware site: A site that contains malicious software that could be downloaded to a user's computer without the user's content. A site used in controlling infected computers and coordinate malicious attacks or attempts to spread software viruses and other malicious software.



It is possible for the lists used by dns/bl to contain outdated or false information. It is possible that the lists compiled by IPduh to contain errors. The IPduh experience shows that the external lists chosen and the lists compiled by IPduh have a low false/positive ratio.





dns    Tools Menu

Lookup the A, MX, NS, SOA DNS records, relevant IP addresses, and servers' locations.





input:



a DNS name



output:


  1.  The purpose and the country (if any) of the Top Level Domain TLD.

  2.  The Address ( A ) records and the locations of these IP addresses.

    The A records usually point to webservers.

  3.  The A record of www --The www subdomain usually points to webservers.

  4.  The CNAME record

  5.  The DNAME record

  6.  The AAAA record(s)

    IPv6 address records.

  7.  The TXT record

  8.  The Mail Exchange ( MX ) records, their priority and their location.

    The MX records point to Mail Transfer Agents - mailservers. The number in front of the MX records specifies the preference value for the mailserver or the array of mailservers the record points to.

  9.  The Name Server ( NS ) records and the nameservers' locations.

  10.  The Start Of Authority ( SOA ) record, which includes:




    1.   SERIAL - the domain serial number.

      This is an unsigned 32 bit integer that must be incremented on the primary server every time a change is made. [RFC1912 2.2] recommends the YYYYMMDDnn syntax where YYYY=year,MM=month,DD=day,nn=revision number.

    2.   MNAME - the primary name server.

    3.   RNAME - the email of the domain name administrator.

      RNAME must follow the hostmaster.example.tld format meaning hostmaster@example.tld.

    4.   REFRESH -the refresh timer.

      A signed 32 bit integer that specifies the number of seconds between the time that a secondary name server checks if the zone was changed on the primary nameserver.

    5.   RETRY - the retry timer.

      A signed 32 bit integer that specifies the number of seconds that the secondary name server(s) have to wait if a REFRESH fails.

    6.   TTL - the Time To Live timer.

      TTL is an unsigned 32 bit integer that defines the number of seconds that a record may be cached.









Examples of using dns with GET requests








Note


For better results use the registered domain name example.com and do not use subdomains like www.example.com



There are cases that subdomain zones are delegated to name servers different than the domain authoritative name servers, and the subdomain has a different set of DNS records.




To see the root nameservers for a Top Level Domain use "TLD." and not just "TLD"




For International Domain Names, just use their UTF8 encoded form







ip/traceroute    Tools Menu

IP traceroute




Trace packets on their route from an Internet host in AS2490 along their route to another IPv4 Internet host.




input <



An Internet IPv4 address



output >

If the IP address entered is a routable Internet IP address, the intermediate routers along the IP path from IPduh to the IP address entered. For each of the routers in the path ip/traceroute attempts to output their reverse records, their IP addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.





anonymity-check    Tools Menu


The anonymity-check shows what a web server can see or deduce about a web user. The web user information leaked to the WWW servers varies and depends on the web user's system, browser, settings, and local or proxy network. Even though the anonymity-check was intended to be used as a tool to demonstrate ways used by many sites to track web users, to check the anonymity of a connection through an HTTP proxy , check the integrity of an HTTP conversation, and test a Tor setup , it is more commonly used to find out the browser and network settings when troubleshooting. The anonymity checker is also a good way to find out if your privacy plugin conceals or ruins your Privacy.




Anonymity-check performs a plethora of tests and it is enhanced with new tests at a regular basis.

For the most part it reports only its finds.



Some of the Anonymity-check checks:


  1. Searching the HTTP headers for proxy traces.



    Some common HTTP headers used by web proxy servers are the following.




    1. HTTP_FORWARDED

    2. HTTP_X_FORWARDED_FOR

    3. HTTP_VIA

    4. HTTP_PROXY_CONNECTION

    5. HTTP_PROXY_ID

    6. HTTP_XROXY_CONNECTION

    7. HTTP_PROXY_CONNECTION

    8. HTTP_CLIENT_IP



  2. If cookies are accepted,anonymity-check processes the *leg cookies which hold information about the client's earlier visits and the previous IP address.

  3. The anonymity checker attempts to virtually ( it does not really store any of your inforamtion to the IPduh systems ) track you through an ETag.

  4. If Java is enabled, anonymity-check attempts to figure out your private IP address along with your computer's host name. None of this information is sent back to IPduh.

  5. Anonymity-check looks at the IP packets coming from your system or proxy system. This way it attempts to find out the MTU and advertised MSS along with information about your OS, your uptime, whether you are behind a NAT router or a firewall, your link type, and the number of the intermediate routers.

  6. Anonymity-check attempts to print the referral URI and the visiting system's host name as seen in the HTTP headers.

  7. Anonymity-check shows a report about your public IP addess. This report contains the same information with ip.

  8. Anonymity-check prints your user agent information as seen in the HTTP headers.

  9. Anonymity-check attemps to figure out the language(s) set to default on your web browser.

  10. If javascript is enabled on your browser, anonymity-check

    1. prints the cookies set by IPduh

    2. the visiting system's screen dimensions

    3. the character string identifying your WWW user agent.

    4. the plugins installed on the web browser, if any

    5. the operating system and the operating system vendor if available

    6. Attempts to store information about your visit on your system.

    7. If the Flash plugin is installed and enabled the anonymity checker attempts to store information about your visit on the Flash Local Share Object.

    8. Attempts to find previously stored information about your visits on your system.



  11. The Anonymity checker attempts to find the cashing name servers used by your system and print links to more information about them.

  12. The Anonymity checker attempts to detect anomalies such as missing or extra headers and HTML injections in the HTTP conversations between you system and IPduh.





Note


To see all the anonymity-check finds visit it two times in a browsing session, then do what you usually do when you want to clean up your browsing history and visit the Anonymity Checker again.

To encrypt your communication with the anonymity checker use https://ipduh.com/anonymity-check.



To use TLS - SSL encryption in between your browser and IPduh you may need to trust the IPduh Certificate Authortity - install the IPduh CA public certificate.

To automate your public IP address lookup you could use http://ipduh.com/my/ip.

Most privacy and anti-tracking Firefox plugins tested against the anonymity-check, so far ( 1330538493 ), failed to deliver what they promise. Actually, 90% of them are completely useless or do Privacy Concealing like it is 1996.





my/geoloc    Tools Menu

geographical location




Yet another HTML5 Location Aware Browsing Demo. Let Google Location Services to estimate your geographical location and draw it on a map.



Before using my/geoloc your browser should ask you if you would like to share the geographical estimation of your system and your IP address with the browser's location service provider --Usually Google Location Services. Your IP address, your GPS reading (if any), and a unique ID identifying your web browser are sent to the location service provider. In case of Google Location Services a cookie with the name PREF is stored in your browser's cookie jar.





demux    Tools Menu

Submit a string of characters to an appropriate IPduh tool





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

The string of characters submitted to Demux is submitted to an appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode]




Examples of using demux








demux/class    Tools Menu

Classify a string of characters and see the appropriate IPduh links





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

A classification and appropriate IPduh links to further information about the string of characters submitted given.





Examples of using demux/class








demux/list    Tools Menu

Create a List of IP numbers, DNS names, and URIs





input:



listed items:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number | DNS names | URI ]



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;



comments:

All strings of characters not Identified by demux/list as IP numbers, DNS names, or URIs are printed without IPduh links.

A ; stops list processing and hides all characters following it.



output:

A bookmarkable list of DNS names, IP numbers, URIs and your comments along with links to the appropriate IPduh tools.




Examples of using demux/list






Note


-- is not a valid delimeter anymore. Use , or --- instead. Lists using -- may be compiled by http://ipduh.com/demux/list/old.



There is a 3KB limit on the size of the demux lists.



Through Bouncer URLs are printed only for HTTP , HTTPS , and FTP URIs.





apropos    Tools Menu    apropos guides    add apropos to your browser

Apropos will submit any string of characters to the appropriate IPduh tool.




Apropos may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Apropos is a good place to start your research and the most commonly used Tool of IPduh.




input:

Any string of characters





output:

The string of characters submitted to apropos will be submitted to the appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode | torrent search | search ]




Examples of using apropos





Note: apropos does not handle IPduh lists ( ip/list , dns/list , demux/list )




apropos guides







Add Apropos to your Browser:



You can add apropos to your browser search engines or set it as your default search engine.



Add Apropos to Mozilla Firefox and Mozilla based browsers

Add Apropos to Chrome

Add Apropos to Internet Explorer

Add Apropos to Opera









To add Apropos to your Mozilla Firefox Search Engines:



Add the Firefox IPduh Apropos add-on from https://addons.mozilla.org/addon/ipduh-apropos/



OR



Click on this



OR


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos.






To set Apropos as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter http://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To add IPduh Apropos to your Search Engines on Chrome Based Browsers:



Click on this



To set IPduh Apropos as your default search engine on Chrome Based Browsers:


  • visit IPduh

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. You can also differentiate URIs you want to visit from URIs you want to decode and analyse by prepending !u to the ones you want to analyze, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos to your Internet Explorer Search Engines:



Click on this



OR






  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos.








To add IPduh Apropos to your Opera Search Engines:


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to http://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








You can add Apropos over an encrypted connection to your Browser search engines.



Add Apropos over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Apropos over HTTPS to Chrome

Add Apropos over HTTPS to Internet Explorer

Add Apropos over HTTPS to Opera









To add Apropos over HTTPS ( an encrypted connection ) to the Mozilla Firefox Search Engines:



add the Firefox IPduh Apropos SSL add-on from https://addons.mozilla.org/en-US/firefox/addon/apropos-ssl/



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos SSL.






To set Apropos over SSL as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter https://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To set IPduh Apropos over SSL as your default search engine on Chrome Based Browsers:


  • visit the IPduh privacy page.

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos SSL from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. If you want to decode and analyze a URI instead of visiting it you can prepend !u to your query, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos SSL.








To add IPduh Apropos over HTTPS to your Opera Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to https://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








Torrent Search    Tools Menu

Search Torrents across all the major Torrent Trackers, Torrent Directories, and Torrent Search Engines.




Add the Torrent Search to your Browser Search Engines.



Add Torrent Search to Mozilla Firefox and Mozilla based browsers

Add Torrent Search to Internet Explorer

Add Torrent Search to Opera





To add Torrent Search to your Firefox Search Engines:



Add the Firefox Torrent add-on from https://addons.mozilla.org/en-US/firefox/addon/torrent/



OR


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Torrent Search.






To add Torrent Search to your Internet Explorer Search Engines:


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search.






To add Torrent Search to your Opera Search Engines:


  • visit the Torrent Search


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search.

  • set the Keyword -- t.

  • set the address to http://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








The Torrent Search is available through apropos with the !t guide.



Add the Torrent Search over HTTPS --an encrypted Connection-- to your Browser Search Engines.



Add Torrent Search over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Torrent Search over HTTPS to Internet Explorer

Add Torrent Search over HTTPS to Opera





To add Torrent Search over HTTPS to your Mozilla Firefox Search Engines:



Add the Firefox Torrent SSL add-on.



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add Torrent Search SSL.






To add Torrent Search over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search SSL.






To add Torrent Search SSL to your Opera Search Engines:


  • visit the IPduh privacy page.


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search SSL.

  • set the Keyword -- t or whatever else you think appropriate.

  • set the address to https://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








gmap    Tools Menu

Display a set of coordinates ( latitude , longitude ) on a google map.





input:



Decimal latitude φ, longitude λ in the uri parameters



output:

A google map with a marker on the set of coordinates passed.


Examples of using gmap.






gmap/tolatlon    Tools Menu

Display and Find coordinates ( latitude , longitude ) on a google map.







input:



Markers with Right Click and decimal latitude and longitude in the uri parameters



output:

A google map with a marker on the set of coordinates passed.

You may right click on the map to enter markers and get the coordinates of points.


Examples of using gmap/tolatlon.

















ip  ip/whois  ip/dnsbl  ip/cidr  ip/ptr  ip/ptr/24  ip/dnstrace  ip/srv  ip/traceroute  ip/tor-exit  ip/list

 ip/whois/as  pdb/as  as/prefix  apropos  demux  demux/class  demux/list

 ipv6  ipv6/whois  ipv6/ptr  ipv6/dnstrace  ipv6/cidr  ipv6/traceroute

dns  dns/whois  dns/trace  dns/bl  dns/list  idn  idn/ace  idn/unicode

 anonymity check  url/decode  url/encode  url/bouncer  my/geoloc  epoch

© 1372644985 IPduh Search Contact Privacy








0 komentar:

Posting Komentar

silahkan komentar

Luncurkan toko Anda hanya dalam 4 detik dengan 
 
Top