IPduh.com About
IPduh Internet Tools
Propaganda
|
IPduh is a set of Internet Forencics and Troubleshooting Tools made to work Together. IPduh may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Smart Humans, Robots, and Aliens researching the internetz on Earth Love IPduh.
For non public, special IP addresses a short explanation and a URI to more information.
xor
For public and special public IP addresses:
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the PTR.
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.
The lookups performed by ip/tor-exit are performed by ip/dnsbl as well.
A list of DNS names along with links to the appropriate IPduh tools and the URL producing the list.
A list of IP numbers along with links to the appropriate IPduh tools and the URL producing the list.
IPduh list syntax is used to create lists with ip/list , dns/list ,
and demux/list
and it is a simple way of denoting lists in a form text area or a URL.
HTML tags are not allowed.
URL Enconding and URL decoding are handled by the list tools.
Every list item not identified as an IP number by ip/list , a DNS name by dns/list , and an IP number or a DNS name or a URI by
demux/list
will be printed without IPduh links. This way comments and almost empty lines may be put in a list.
eg:
https://ipduh.com/dns/list/?&list=`---google.fr---Google in French---.---google.gr---Google in Greek---'
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.
The delegation path from the root Name Servers to the Authoritative Name Servers of the DNS name.
If the IPv6 address entered is a routable Unicast Internet IPv6 address, the intermediate routers along the path from an IPduh Internet Host to the Internet host using the IPv6 address entered. For each of the routers in the path ipv6/traceroute attempts to output their reverse records, their IPv6 addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.
The IP prefixes originating the autonomous system
Still in Beta release --Not consistent Results.
Glitch - Bug: If you get "I did not find IP prefixes originating from 'AS#'" for an autonomous system number with prefixes in the IPduh Database, try
to refresh the page.
For non Global Unicast IPv6 addresses,
a short explanation and a URI to more information or the apprpopriate RFC.
For Global Unicast IPv6 addresses,
The PTR of the IPv6 address entered.
The PTR ( Reverse DNS names ) for all the IP addresses in the /24 ( C ) Network along with pointers to more information.
An ASCII Comptible Encoded string of characters.
The International Domain Name in Unicode.
The information that the Autonomous System Owner put in the Peering database.
The peeringdb information is cached for at least 15 days. The latest PeeringDB information can be viewed at peeringdb.com.
The whois information for the IP address entered.
ip/whois caches whois information for 15 days.
If the domain entered is an international domain name encoded in Unicode it's ASCII Compatible encoded ( ACE ) version.
If the domain name entered is an Internation domain name encode in ACE it's equivalent Unicode encoded version.
The whois information for an Internet Autonomous System.
If the Autonomous System Number entered is not used in Internet BGP routing an explanation is attempted.
ip/reverse or ip/ptr is based on a IP PTR RR lookup also known as reverse DNS lookup and it is usefull in associating an IP address with a host name or a DNS name.
For single IP addresses ip output includes the ip/reverse output as well.
A percent-decoded string along with an attempt to break up the URI to its main parts.
The Bouncer will lookup the DNS name or the IP address contained in the URI in a few major Black Lists. If the URI , IP address , or DNS name pass the test , the bouncer will redirect you there after a few seconds.
Any of the sites to which Bouncer redirects you may host offending content, malware, or phishing hooks.
Proceed at your own risk.
The Bouncer transforms plain DNS names , plain IPv4 addresses , and plain IPv6 addresses to HTTP URLs.
The Bouncer will bounce URIs using the protocols used often with web browsers: HTTP , HTTPS , and FTP.
The Bouncer runs a basic test against the host you are destined.
For a more thorough test consult dns/bl for domain names
and ip/dnsbl for IPv4 address.
The Bouncer is ideal when you need to link to URIs beyond your control or to hide your referrer.
The Bouncer waits for 4.5 sec before redirecting.
If you do not like the 4.5 sec wait time before the redirection you may use one of the following:
/url/bouncer/1
/url/bouncer/2
/url/bouncer/3
/url/bouncer/4
/url/bouncer/1 waits 0.5 sec before redirecting and it may be used in the same way.
eg:https://ipduh.com/url/bouncer/1/?http://alog.ipduh.com
/url/bouncer/2 waits 1.5 sec before redirecting and it may be used in the same way.
eg:https://ipduh.com/url/bouncer/2/?https://alog.ipduh.com
/url/bouncer/3 waits 2.5 sec before redirecting and it may be used in the same way.
eg:https://ipduh.com/url/bouncer/3/?https://alog.ipduh.com
A percent-encoded URI.
ip/srv bot is called the piece of software that does the scans or looks up the cashed scans. The scans are cashed for no fixed periods of time.
The ip/srv bot always attempts to pass the asker's IP address to the web server listening on the scanned IP when it attempts a new (non-cached) scan.
The ip/srv bot always acts at someone's request and never picks arbitrary hosts to lookup.
If you are a server administrator who does not want his server's IP to be scanned by ip/srv please tell IPduh so.
If you are a server administrator that wants to know who requested an ip/srv scan, search your web server's logs for IPduhSrvBot.
The ip/srv agent signature on http daemons listening on port 80 or port 443 looks like:
"Mozilla/5.0 (compatible; IPduhSrvBot/VERSION; for/192.0.2.222; +http://ipduh.com/about/#ip-srv-bot)"
where: 192.0.2.222 is the IP address of the IPduh user who requested the first ip/srv scan, and VERSION is [0.0.1 - 0.9.9].
In an effort to not be a nuisance to the whois servers dns/whois caches whois queries for at least 15 days.
The IP Black Lists queried for every DNS related IP address are the same with the ones queried by ip/dnbl.
For each of the DNS related IP addresses of the domain name dns/bl does not print IP Black Lists that answered "not listed".
You could use dns/bl/verbose if you want to see everything printed.
The domain names listed in the URI Black Lists are:
dedicated to the propagation of malware, used for phising, used for spamming, or advertized though spamming.
IPduh suggests to not use your browser to visit any of the domain names listed on the URI Black Lists.
phishing site: Forgery or imitation of another website, designed to trick users into sharing personal or financial information.
Entering any personal information on such site may result in identity theft or other abuse of the information entered.
malware site: A site that contains malicious software that could be downloaded to a user's computer without the user's content.
A site used in controlling infected computers and coordinate malicious attacks or attempts to spread software viruses and other malicious software.
It is possible for the lists used by dns/bl to contain outdated or false information. It is possible that the lists compiled by IPduh to contain errors. The IPduh experience shows that the external lists chosen and the lists compiled by IPduh have a low false/positive ratio.
For better results use the registered domain name example.com and do not use subdomains like www.example.com
There are cases that subdomain zones are delegated to name servers different than the domain authoritative name servers, and the subdomain has a different set of DNS records.
To see the root nameservers for a Top Level Domain use "TLD." and not just "TLD"
For International Domain Names, just use their UTF8 encoded form
Trace packets on their route from an Internet host in AS2490 along their route to another IPv4 Internet host.
If the IP address entered is a routable Internet IP address, the intermediate routers along the IP path from IPduh to the IP address entered. For each of the routers in the path ip/traceroute attempts to output their reverse records, their IP addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.
The anonymity-check shows what a web server can see or deduce about a web user. The web user information leaked to the WWW servers varies and depends on the web user's system, browser, settings, and local or proxy network. Even though the anonymity-check was intended to be used as a tool to demonstrate ways used by many sites to track web users, to check the anonymity of a connection through an HTTP proxy , check the integrity of an HTTP conversation, and test a Tor setup , it is more commonly used to find out the browser and network settings when troubleshooting. The anonymity checker is also a good way to find out if your privacy plugin conceals or ruins your Privacy.
To see all the anonymity-check finds visit it two times in a browsing session, then do what you usually do when you want to clean up your browsing history and visit the Anonymity Checker again.
To encrypt your communication with the anonymity checker use https://ipduh.com/anonymity-check.
To use TLS - SSL encryption in between your browser and IPduh you may need to trust the IPduh Certificate Authortity - install the IPduh CA public certificate.
To automate your public IP address lookup you could use https://ipduh.com/my/ip.
Most privacy and anti-tracking Firefox plugins tested against the anonymity-check, so far ( 1330538493 ), failed to deliver what they promise. Actually, 90% of them are completely useless or do Privacy Concealing like it is 1996.
Yet another HTML5 Location Aware Browsing Demo. Let Google Location Services to estimate your geographical location and draw it on a map.
Before using my/geoloc your browser should ask you if you would like to share the geographical estimation of your system and your IP address with the browser's location service provider --Usually Google Location Services. Your IP address, your GPS reading (if any), and a unique ID identifying your web browser are sent to the location service provider. In case of Google Location Services a cookie with the name PREF is stored in your browser's cookie jar.
A bookmarkable list of DNS names, IP numbers, URIs and your comments along with links to the appropriate IPduh tools.
-- is not a valid delimeter anymore. Use , or ---
instead. Lists using -- may be compiled by https://ipduh.com/demux/list/old.
There is a 3KB limit on the size of the demux lists.
Through Bouncer URLs are printed only for HTTP , HTTPS , and FTP URIs.
Apropos may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Apropos is a good place to start your research and the most commonly used Tool of IPduh.
Note: apropos does not handle IPduh lists ( ip/list , dns/list , demux/list )
Add Apropos to your Browser:
You can add apropos to your browser search engines or set it as your default search engine.
Add Apropos to Mozilla Firefox and Mozilla based browsers
Add Apropos to Chrome
Add Apropos to Internet Explorer
Add Apropos to Opera
To add Apropos to your Mozilla Firefox Search Engines:
Add the Firefox IPduh Apropos add-on from https://addons.mozilla.org/addon/ipduh-apropos/
OR
Click on this
OR
To set Apropos as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):
To add IPduh Apropos to your Search Engines on Chrome Based Browsers:
Click on this
To set IPduh Apropos as your default search engine on Chrome Based Browsers:
In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. You can also differentiate URIs you want to visit from URIs you want to decode and analyse by prepending !u to the ones you want to analyze, and jump to a Torrent Search by prepending !t to your query.
To add IPduh Apropos to your Internet Explorer Search Engines:
Click on this
OR
To add IPduh Apropos to your Opera Search Engines:
You can add Apropos over an encrypted connection to your Browser search engines.
Add Apropos over HTTPS to Mozilla Firefox and Mozilla based browsers
Add Apropos over HTTPS to Chrome
Add Apropos over HTTPS to Internet Explorer
Add Apropos over HTTPS to Opera
To add Apropos over HTTPS ( an encrypted connection ) to the Mozilla Firefox Search Engines:
add the Firefox IPduh Apropos SSL add-on from https://addons.mozilla.org/en-US/firefox/addon/apropos-ssl/
OR
To set Apropos over SSL as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):
To set IPduh Apropos over SSL as your default search engine on Chrome Based Browsers:
In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. If you want to decode and analyze a URI instead of visiting it you can prepend !u to your query, and jump to a Torrent Search by prepending !t to your query.
To add IPduh Apropos over HTTPS to your Internet Explorer Search Engines:
To add IPduh Apropos over HTTPS to your Opera Search Engines:
Add the Torrent Search to your Browser Search Engines.
Add Torrent Search to Mozilla Firefox and Mozilla based browsers
Add Torrent Search to Internet Explorer
Add Torrent Search to Opera
To add Torrent Search to your Firefox Search Engines:
Add the Firefox Torrent add-on from https://addons.mozilla.org/en-US/firefox/addon/torrent/
OR
To add Torrent Search to your Internet Explorer Search Engines:
To add Torrent Search to your Opera Search Engines:
Add the Torrent Search over HTTPS --an encrypted Connection-- to your Browser Search Engines.
Add Torrent Search over HTTPS to Mozilla Firefox and Mozilla based browsers
Add Torrent Search over HTTPS to Internet Explorer
Add Torrent Search over HTTPS to Opera
To add Torrent Search over HTTPS to your Mozilla Firefox Search Engines:
Add the Firefox Torrent SSL add-on.
OR
To add Torrent Search over HTTPS to your Internet Explorer Search Engines:
To add Torrent Search SSL to your Opera Search Engines: