IPduh is a set of Internet Forencics and Troubleshooting Tools made to work Together. IPduh may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Smart Humans and Aliens researching the internetz on Earth Love IPduh.
ip Tools Menu
IP address verbose report
input:
an IPv4 address in dot-decimal notation
output:
For non public, special IP addresses a short explanation and a URI to more information.
xor
For public and special public IP addresses:
- The IANA designation of the /8 block containing this IP address.
- The Internet Regional Registry of this IP address.
- The Autonomous System Path.
- The IP Prefix.
- The Autonomous System Number.
- The Organization using this IP address.
- The country or city of the organization to which this IP address is assigned.
Sometimes the machine(s) using this IP address happen to be in the same country or city.
The geographical coordinates of the country or the city.
Two Databases made by IPduh and the MaxMind database are used to determine the geographical location of the IP address. The databases made by IPduh are based mostly on data provided by the Regional Internet Registries. A macro view of the IPduh Country database used is available.
The physical location of the machine(s) using this IP address is not guaranteed to be the same as the location suggested by IPduh .
- The name of the IP address ( known as Reverse DNS record ).
- The A record of the IP address name.
- The registered domain name associated with the IP address name.
- The A records registered domain name.
- The dot-decimal IP address entered as a 32b Base 10 Integer.
Examples of using ip with GET requests
input:
A pubic IPv4 address
output:
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the PTR.
Examples of using ip/dnstrace.
input:
A pubic IPv6 address
output:
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.
Examples of using ip/dnstrace.
input:
A unicast IPv4 address
output:
- If the IPv4 address entered is listed on the IPduh Tor Exit List, the first and the last times it was seen used as a Tor Exit.
- If the IPv4 address entered is listed on the tor.dan.me.uk DNSBL ( a list of currently used Tor Exits ), some information regarding its Tor Network characteristics.
The lookups performed by
ip/tor-exit are performed by
ip/dnsbl as well.
Examples of using ip/tor-exit.
input:
DNS names
ipduh-list built-in variables and punctuation marks:
&list= --- , &title= ; &www=1 &sc=1 &sa=1
comments:
All listed strings of characters not Identified by dns/list as DNS names are printed.
A ; stops list processing and hides all characters following it.
output:
A list of DNS names along with links to the appropriate IPduh tools and the URL producing the list.
Examples of using dns/list.
input:
IP numbers:
[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number ]
ipduh-list built-in variables and punctuation marks:
&list= -- , &title= ;
comments:
All listed strings of characters not Identified by ip/list as IP numbers are printed.
A ; stops list processing and hides all characters following it.
output:
A list of IP numbers along with links to the appropriate IPduh tools and the URL producing the list.
Examples of using ip/list.
IPduh list syntax is used to create lists with
ip/list ,
dns/list , and
demux/list and it is a simple way of denoting lists in a form text area or a URL.
HTML tags are not allowed.
URL Enconding and URL decoding are handled by the list tools.
- &title= is optional and it is used to set the list title
eg: http://ipduh.com/dns/list/?&title=This an one item list&list=sixxs.net
If &title= is omitted then the title is set to 'First List Element - Last List Element'
eg: http://ipduh.com/dns/list/?&list=twitter.com,linkedin.com,facebook.com
- &list= is needed and it is used to set a list
eg:http://ipduh.com/dns/list/?&list=blogspot.com--tumblr.com--wordpress.com
Omitting or not setting &list= results to an empty list error
eg:http://ipduh.com/dns/list/?&title=I am not a list
eg:http://ipduh.com/dns/list/?&title=I am an empty list&list=
- , is used as a list item delimeter
eg: http://ipduh.com/dns/list/?&list=youtube.com,v.qq.com
- -- is used as a list item delimeter on ip lists and it is equivalent and interchangeable with ,
eg: http://ipduh.com/ip/list/?&list=1.2.3.4--2.4.8.16--3.6.9.12--3.9.27.81
- --- it is used as a list item delimeter and it is equivalent and interchangeable with ,
eg: http://ipduh.com/dns/list/?&list=google.com.hk---google.co.in---google.de---google.co.uk---google.co.jp
- ; is used to stop list processing and hide whatever follows
eg: http://ipduh.com/ip/list/?&list=4.2.2.2--8.8.8.8;hidden--nothing--niente-testing
- &www=1 is optional and it is used to put external links for all DNS names on the list. The external links are checked by the Bouncer. eg: http://ipduh.com/dns/list/?&title=example%20list&www=1&list=example.com,example.net,example.org
&sc=1 optional , puts the count of listed items.
&sa=1 optional , puts one advertisement.
eg: Web Ads Sites
Every list item not identified as an IP number by
ip/list , a DNS name by
dns/list , and an IP number or a DNS name or a URI by
demux/list will be printed without IPduh links. This way comments and almost empty lines may be put in a list.
eg:
http://ipduh.com/dns/list/?&list=`---google.fr---Google in French---.---google.gr---Google in Greek---'
input:
A pubic IPv6 address
output:
The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.
Examples of using ip/dnstrace.
input:
A DNS domain name
output:
The delegation path from the root Name Servers to the Authoritative Name Servers of the DNS name.
Examples of using ip/dnstrace.
input:
An IPv6 CIDR block in CIDR notation
output:
- Whether the IPv6 CIDR block entered is valid.
- If the IPv6 CIDR block entered is invalid a correction is attempted.
- The Type of the IPv6 network address.
- The IPv6 Range. Network Address - Broadcast Address.
- The Number of IPv6 addresses in the CIDR block.
Examples of using ipv6/cidr
input:
An IPv6 address
output:
If the IPv6 address entered is a routable Unicast Internet IPv6 address, the intermediate routers along the path from an IPduh Internet Host to the Internet host using the IPv6 address entered. For each of the routers in the path ipv6/traceroute attempts to output their reverse records, their IPv6 addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.
ipv6 Tools Menu
IPv6 address basic information lookup
input:
An IPv6 Address
output:
- The type of the IPv6 address entered, URIs to more information and the appropriate RFC, if needed.
- Allocation Prefix , Status , Responsible RIR , Allocation Date.
- The short form of the IPv6 address entered.
- The long form of IPv6 address entered Hexadecimal and Binary.
- The unsigned integer number represantating the IPv6 address entered.
- The Country in which the Organization using this IPv6 address is located.
The machine(s) using this IPv6 address may not be on the same country.
The Location is determined by the Regional Internet Registries data and a macro view of the IPv6 addresses per country is also available.
Examples of using ipv6.
as/prefix Tools Menu
IP prefixes originating an Autonomous System
input:
An Autonomous System Number
output:
The IP prefixes originating the autonomous system
Examples of using as/prefix.
Still in Beta release --Not consistent Results.
Glitch - Bug: If you get "I did not find IP prefixes originating from 'AS#'" for an autonomous system number with prefixes in the IPduh Database, try to refresh the page.
input:
An IPv6 Address
output:
For non Global Unicast IPv6 addresses,
a short explanation and a URI to more information or the apprpopriate RFC.
For Global Unicast IPv6 addresses,
- The parent IANA block.
- The IANA status.
- The Regional Internet Registry.
- The whois server.
- The whois information for the owner of the block.
Examples of using ipv6.
ipv6/ptr Tools Menu
IPv6 address PTR ( Reverse DNS name ) lookup
input:
An IPv6 address
output:
The PTR of the IPv6 address entered.
Examples of ipv6/ptr.
ip/ptr/24 Tools Menu
The PTR of all IP addresses in a /24 network
input:
A pubic IPv4 address or a /24 CIDR or the three first Bytes of an IP address in decimal dotted notation
output:
The PTR ( Reverse DNS names ) for all the IP addresses in the /24 ( C ) Network along with pointers to more information.
Examples of using ip/ptr/24 .
input:
An International Domain Name in Unicode.
output:
An ASCII Comptible Encoded string of characters.
Examples of using idn/ace.
input:
An International Domain Name in ASCII Compatible Encoding ACE.
output:
The International Domain Name in Unicode.
Examples of using idn/unicode.
pdb/as Tools Menu
PeeringDB information about an Autonomous System
input:
An autonomous system number
output:
The information that the Autonomous System Owner put in the Peering database.
The peeringdb information is cached for at least 15 days. The latest PeeringDB information can be viewed at
peeringdb.com.
Examples of using pdb/as.
input:
a public IPv4 address
output:
The whois information for the IP address entered.
Examples of using ip/whois with GET requests
Caveat
ip/whois caches whois information for 15 days.
idn Tools Menu
International Domain Name convertions ( Unicode to ACE xor ACE to Unicode )
input:
a Domain Name
output:
If the domain entered is an international domain name encoded in Unicode it's ASCII Compatible encoded ( ACE ) version.
If the domain name entered is an Internation domain name encode in ACE it's equivalent Unicode encoded version.
Examples of using idn.
input:
an Autonomous System number
an Autonomous System number with the "AS" prefix
an Autonomous System number with the "ASN" prefix.
output:
The whois information for an Internet Autonomous System.
If the Autonomous System Number entered is not used in Internet BGP routing an explanation is attempted.
Examples of using ip/whois/as with GET requests
input:
A network block in CIDR notation
output:
- If the network address on the CIDR is valid and the network mask on the CIDR is valid. Each Byte in the network address in Binary (put your cursor above the network address on the CIDR block)
- If the CIDR block is invalid ( the network address is not compatible with the network mask ) a valid CIDR block is suggested.
- The IP Range. Network Address - Broadcast Address.
- The Network Mask in decimal dotted notation and each Byte in binary ( put your cursor above the mask).
- The Number of IP addresses in the network block.
- If the the CIDR block is in a special block a short explanation and URI to more information, usually the appropriate RFC.
Examples of using ip/cidr with GET requests
ip/reverse or ip/ptr Tools Menu
IP address PTR RR lookup - IP reverse mapping - reverse IP address DNS lookup
ip/reverse or ip/ptr is based on a IP PTR RR lookup also known as reverse DNS lookup and it is usefull in associating an IP address with a host name or a DNS name.
input:
a public IPv4 address
output:
- The IP PTR resource record.
- The registered domain name -deduced by the PTR record.
- The A records of the registered domain name.
Note
For single IP addresses
ip output includes the ip/reverse output as well.
Examples of using ip/reverse with GET requests
epoch Tools Menu
Epoch Clock and Epoch to Date Conversion
input:
An Epoch -an integer number
output:
- The equivalent UTC Date.
- The Δsec since the Unix Epoch.
- The Δsec from the Unix epoch timestamp entered.
Examples of using epoch.
input:
A URI
output:
A percent-decoded string along with an attempt to break up the URI to its main parts.
Examples of using url/decode.
url/bouncer Tools Menu
Bounce URLs - Basic Protection against Malicious URLs
input:
[ IPv4 address | IPv6 address | URI | DNS name ]
output:
The Bouncer will lookup the DNS name or the IP address contained in the URI in a few major Black Lists. If the URI , IP address , or DNS name pass the test , the bouncer will redirect you there after a few seconds.
The Bouncer transforms plain DNS names , plain IPv4 addresses , and plain IPv6 addresses to HTTP URLs.
The Bouncer will bounce URIs using the protocols used often with web browsers: HTTP , HTTPS , and FTP.
The Bouncer runs a basic test against the host you are destined.
For a more thorough test consult
dns/bl for domain names and
ip/dnsbl for IPv4 address.
The Bouncer is ideal when you need to link to URIs beyond your control or to hide your referrer.
Examples of using url/bouncer.
The Bouncer waits for 4.5 sec before redirecting.
If you do not like the 4.5 sec wait time before the redirection you may use one of the following:
/url/bouncer/1/url/bouncer/2/url/bouncer/3/url/bouncer/4/url/bouncer/1 waits 0.5 sec before redirecting and it may be used in the same way.
eg:
http://ipduh.com/url/bouncer/1/?http://alog.ipduh.com /url/bouncer/2 waits 1.5 sec before redirecting and it may be used in the same way.
eg:
http://ipduh.com/url/bouncer/2/?http://alog.ipduh.com /url/bouncer/3 waits 2.5 sec before redirecting and it may be used in the same way.
eg:
http://ipduh.com/url/bouncer/3/?http://alog.ipduh.com
input:
A URI
output:
A percent-encoded URI.
Examples of using url/encode.
input:
a public IPv4 address
output:
- The answer for this IP address from each of the major IP DNS BlackLists and IP 'black' lists queried.
- An explanation for each answer and if needed a URI to more information.
DNS BlackLists and IP 'black' lists queried by ip/dnsbl
- ZEN - zen.spamhaus.org
ZEN combines all Spamhaus IP DNSBLs.
- Spamhaus Block List - SBL - sbl.spamhaus.org
A database of IP addresses of spam-sources, spam support services, and snowshoe spammers ( the CSS component ).
- Exploits Block List - XBL - xbl.spamhaus.org
XBL includes CBL and a customized NJABL
- Composite Blocking List - CBL - cbl.abuseat.org
CBL lists IP addresses exhibiting characteristics which are specific to open proxies, spam bots, and spam malware.
- Not Just Another Bogus List - NJABL - njabl.org
An IP database of known and potential spam sources ( open relays, open proxies, open form to mail HTTP gateways, dynamic IP pools, and direct spammers )
- Policy Block List - PBL - pbl.spamhaus.org
A database of end-user IP addresses which should not be delivering unauthenticated SMTP email to any Internet mail server.
Many ISPs participate in the PBL project. The PBL lists both dynamic and static IP addresses which by policy whether the block owner's or -interim in its absence- Spamhaus' policy) should not be sending email directly to the MX servers of third parties.
- SORBS - dnsbl.sorbs.net
Contains all the SORBS DNSBLs
- http.dnsbl.sorbs.net
List of Open HTTP Proxy Servers.
- socks.dnsbl.sorbs.net
List of Open SOCKS Proxy Servers.
- misc.dnsbl.sorbs.net
List of open Proxy Servers not listed in the SOCKS or HTTP lists.
- smtp.dnsbl.sorbs.net
List of Open SMTP relay servers.
- web.dnsbl.sorbs.net
Hosts that have abusable vulnerabilities
- spam.dnsbl.sorbs.net
List of hosts that have been noted as sending spam/UCE/UBE to the administrators of SORBS. This zone also contains net blocks of spam supporting service providers, including those who provide web sites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.
- block.dnsbl.sorbs.net
List of hosts demanding that they never be tested by SORBS.
- zombie.dnsbl.sorbs.net
List of networks hijacked from their original owners, some of which have been used for spamming.
- dul.dnsbl.sorbs.net
Dynamic IP Address ranges (NOT a Dial Up list!)
- badconf.rhsbl.sorbs.net
List of domain names where the A or MX records point to bad address space.
- nomail.rhsbl.sorbs.net
List of domain names where the owners have indicated no email should ever originate from these domains.
- SpamCop Blocking List - SCBL - bl.spamcop.net
SCBL lists IP addresses that were used to spam.
- Barracuda Reputation Block List - BRBL - b.barracudacentral.org
Lists IP addresses which are sending spam or viruses
- Tor.dan.me.uk - dan.me.uk - A list of IP addresses used currently by the Tor Network.
If the IPv4 address entered is listed on tor.dan.me.uk some information regarding its Tor Network characteristics ( the node name, the port used by Tor, and whether it is: Fast,Guard,Named,Running,Stable, or Valid ).
- Team Cymru Full Bogons List - Team Cymru
This List contains IP addresses that are not assigned to an ISP or other end-user and they should not be seen in the Internet.
- IPduh Black List - An IP black List, not a DNSBL.
Contains IP addresses used by abusive or compromised systems.
- IPduh Tor Exit List - A list of IP addresses that have been Tor Exits, not a DNSBL.
This list is maintained by IPduh and it is composed mainly by the Tor Project data .
If the IPv4 address entered is listed on the IPduh Tor Exit List the first and the last times it was seen used as a Tor Exit are displayed.
Examples of using ip/dnsbl
input:
a registered DNS domain name
output:
- The domain name whois information or a URI to the whois information.
Examples of using dns-whois
Caveat
In an effort to not be a nuisance to the whois servers dns/whois caches whois queries for at least 15 days.
dns/bl Tools Menu
Domain name URIBL and IP BLack List lookup
input:
a DNS domain name
output:
- The URI Black Lists' answers, and the answers of the major IP (DNS) Black Lists for all the IP addresses DNS related to the domain name.
The URI Black Lists
- Google Safe Browsing - Google Safe Browsing FAQ
This is a list of sites involved in phising or sites dedicated to the spread of malware.
- URIBL - uribl.com
URIBL lists domain names found in URIs in the body of spam messages. These domain names may be used in one or more of the following categories of web sites: spamadvertized sites that are trying to sell something, phising sites, sites that host malware or used by malware, sites that infect visitors with malware.
The IP Black Lists
The IP Black Lists queried for every DNS related IP address are the same with the ones queried by
ip/dnbl.
Examples of using dns-bl
For each of the DNS related IP addresses of the domain name dns/bl does not print IP Black Lists that answered "not listed".
You could use
dns/bl/verbose if you want to see everything printed.
The domain names listed in the URI Black Lists are: dedicated to the propagation of malware, used for phising, used for spamming, or advertized though spamming.
IPduh suggests to not use your browser to visit any of the domain names listed on the URI Black Lists. phishing site: Forgery or imitation of another website, designed to trick users into sharing personal or financial information. Entering any personal information on such site may result in identity theft or other abuse of the information entered.
malware site: A site that contains malicious software that could be downloaded to a user's computer without the user's content. A site used in controlling infected computers and coordinate malicious attacks or attempts to spread software viruses and other malicious software.
It is possible for the lists used by
dns/bl to contain outdated or false information. It is possible that the lists compiled by IPduh to contain errors. The IPduh experience shows that the external lists chosen and the lists compiled by IPduh have a low false/positive ratio.
dns Tools Menu
Lookup the A, MX, NS, SOA DNS records, relevant IP addresses, and servers' locations.
input:
a DNS name
output:
- The purpose and the country (if any) of the Top Level Domain TLD.
- The Address ( A ) records and the locations of these IP addresses.
The A records usually point to webservers.
- The A record of www --The www subdomain usually points to webservers.
- The CNAME record
- The DNAME record
- The AAAA record(s)
IPv6 address records.
- The TXT record
- The Mail Exchange ( MX ) records, their priority and their location.
The MX records point to Mail Transfer Agents - mailservers. The number in front of the MX records specifies the preference value for the mailserver or the array of mailservers the record points to.
- The Name Server ( NS ) records and the nameservers' locations.
- The Start Of Authority ( SOA ) record, which includes:
- SERIAL - the domain serial number.
This is an unsigned 32 bit integer that must be incremented on the primary server every time a change is made. [RFC1912 2.2] recommends the YYYYMMDDnn syntax where YYYY=year,MM=month,DD=day,nn=revision number.
- MNAME - the primary name server.
- RNAME - the email of the domain name administrator.
RNAME must follow the hostmaster.example.tld format meaning hostmaster@example.tld.
- REFRESH -the refresh timer.
A signed 32 bit integer that specifies the number of seconds between the time that a secondary name server checks if the zone was changed on the primary nameserver.
- RETRY - the retry timer.
A signed 32 bit integer that specifies the number of seconds that the secondary name server(s) have to wait if a REFRESH fails.
- TTL - the Time To Live timer.
TTL is an unsigned 32 bit integer that defines the number of seconds that a record may be cached.
Examples of using dns with GET requests
Note
For better results use the registered domain name
example.com and do not use subdomains like
www.example.com There are cases that subdomain zones are delegated to name servers different than the domain authoritative name servers, and the subdomain has a different set of DNS records.
To see the root nameservers for a Top Level Domain use "TLD." and not just "TLD"
For International Domain Names, just use their UTF8 encoded form
Trace packets on their route from an Internet host in AS2490 along their route to another IPv4 Internet host.
input <
An Internet IPv4 address
output >
If the IP address entered is a routable Internet IP address, the intermediate routers along the IP path from IPduh to the IP address entered. For each of the routers in the path ip/traceroute attempts to output their reverse records, their IP addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.
The anonymity-check shows what a web server can see or deduce about a web user. The web user information leaked to the WWW servers varies and depends on the web user's system, browser, settings, and local or proxy network. Even though the anonymity-check was intended to be used as a tool to demonstrate ways used by many sites to track web users, to check the anonymity of a connection through an HTTP proxy , check the integrity of an HTTP conversation, and test a Tor setup , it is more commonly used to find out the browser and network settings when troubleshooting. The anonymity checker is also a good way to find out if your privacy plugin
conceals or
ruins your
Privacy.
Anonymity-check performs a plethora of tests and it is enhanced with new tests at a regular basis.
For the most part it reports only its finds.
Some of the Anonymity-check checks:
- Searching the HTTP headers for proxy traces.
Some common HTTP headers used by web proxy servers are the following.
- HTTP_FORWARDED
- HTTP_X_FORWARDED_FOR
- HTTP_VIA
- HTTP_PROXY_CONNECTION
- HTTP_PROXY_ID
- HTTP_XROXY_CONNECTION
- HTTP_PROXY_CONNECTION
- HTTP_CLIENT_IP
- If cookies are accepted,anonymity-check processes the *leg cookies which hold information about the client's earlier visits and the previous IP address.
- The anonymity checker attempts to virtually ( it does not really store any of your inforamtion to the IPduh systems ) track you through an ETag.
- If Java is enabled, anonymity-check attempts to figure out your private IP address along with your computer's host name. None of this information is sent back to IPduh.
- Anonymity-check looks at the IP packets coming from your system or proxy system. This way it attempts to find out the MTU and advertised MSS along with information about your OS, your uptime, whether you are behind a NAT router or a firewall, your link type, and the number of the intermediate routers.
- Anonymity-check attempts to print the referral URI and the visiting system's host name as seen in the HTTP headers.
- Anonymity-check shows a report about your public IP addess. This report contains the same information with ip.
- Anonymity-check prints your user agent information as seen in the HTTP headers.
- Anonymity-check attemps to figure out the language(s) set to default on your web browser.
- If javascript is enabled on your browser, anonymity-check
- prints the cookies set by IPduh
- the visiting system's screen dimensions
- the character string identifying your WWW user agent.
- the plugins installed on the web browser, if any
- the operating system and the operating system vendor if available
- Attempts to store information about your visit on your system.
- If the Flash plugin is installed and enabled the anonymity checker attempts to store information about your visit on the Flash Local Share Object.
- Attempts to find previously stored information about your visits on your system.
- The Anonymity checker attempts to find the cashing name servers used by your system and print links to more information about them.
- The Anonymity checker attempts to detect anomalies such as missing or extra headers and HTML injections in the HTTP conversations between you system and IPduh.
Note
To see all the anonymity-check finds visit it two times in a browsing session, then do what you usually do when you want to clean up your browsing history and visit the
Anonymity Checker again.
To encrypt your communication with the anonymity checker use
https://ipduh.com/anonymity-check.
To use TLS - SSL encryption in between your browser and IPduh you may need to
trust the IPduh Certificate Authortity - install the IPduh CA public certificate.
To automate your public IP address lookup you could use
http://ipduh.com/my/ip.
Most privacy and anti-tracking Firefox plugins tested against the anonymity-check, so far (
1330538493 ), failed to deliver what they promise. Actually, 90% of them are completely useless or do Privacy Concealing like it is 1996.
Yet another HTML5 Location Aware Browsing Demo. Let Google Location Services to estimate your geographical location and draw it on a map.
Before using my/geoloc your browser should ask you if you would like to share the geographical estimation of your system and your IP address with the browser's location service provider --Usually Google Location Services. Your IP address, your GPS reading (if any), and a unique ID identifying your web browser are sent to the location service provider. In case of Google Location Services a cookie with the name PREF is stored in your browser's cookie jar.
demux Tools Menu
Submit a string of characters to an appropriate IPduh tool
input:
A string of characters:
[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]
output:
The string of characters submitted to Demux is submitted to an appropriate IPduh tool.
[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode]
Examples of using demux
demux/class Tools Menu
Classify a string of characters and see the appropriate IPduh links
input:
A string of characters:
[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]
output:
A classification and appropriate IPduh links to further information about the string of characters submitted given.
Examples of using demux/class
demux/list Tools Menu
Create a List of IP numbers, DNS names, and URIs
input:
listed items:
[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number | DNS names | URI ]
ipduh-list built-in variables and punctuation marks:
&list= --- , &title= ;
comments:
All strings of characters not Identified by demux/list as IP numbers, DNS names, or URIs are printed without IPduh links.
A ; stops list processing and hides all characters following it.
output:
A bookmarkable list of DNS names, IP numbers, URIs and your comments along with links to the appropriate IPduh tools.
Examples of using demux/list
Note
-- is not a valid delimeter anymore. Use
, or
--- instead. Lists using
-- may be compiled by
http://ipduh.com/demux/list/old.
There is a 3KB limit on the size of the demux lists.
Through
Bouncer URLs are printed only for HTTP , HTTPS , and FTP URIs.
Apropos may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Apropos is a good place to start your research and the most commonly used Tool of IPduh.
input:
Any string of characters
output:
The string of characters submitted to apropos will be submitted to the appropriate IPduh tool.
[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode | torrent search | search ]
Examples of using apropos
Note: apropos does not handle IPduh lists (
ip/list ,
dns/list ,
demux/list )
Add Apropos to your Browser: You can add apropos to your browser search engines or set it as your default search engine.
Add Apropos to Mozilla Firefox and Mozilla based browsers Add Apropos to ChromeAdd Apropos to Internet ExplorerAdd Apropos to Opera
To add Apropos to your Mozilla Firefox Search Engines: Add the Firefox IPduh Apropos add-on from
https://addons.mozilla.org/addon/ipduh-apropos/ OR
Click on
this OR
- visit IPduh
- click on the down arrow used to select search engine
- click on Add IPduh Apropos.
To set Apropos as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):
- Enter about:config in the browser location bar.
- Promise, you 'll be carefull.
- Enter keyword.URL in the Filter: under the location bar.
- Double-click on the keyword.URL result.
- Enter http://ipduh.com/apropos/? in the text box that pops up
- OK and close the about:config tab.
To add IPduh Apropos to your Search Engines on Chrome Based Browsers: Click on
this To set IPduh Apropos as your default search engine on Chrome Based Browsers:
- visit IPduh
- Click the Wrench
- Click Settings
- Choose IPduh Apropos from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"
In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg:
http://ipduh.com/apropos/?!d bing.no. You can also differentiate URIs you want to visit from
URIs you want to decode and analyse by prepending !u to the ones you want to analyze, and jump to a
Torrent Search by prepending !t to your query.
To add IPduh Apropos to your Internet Explorer Search Engines: Click on
this OR
- visit IPduh
- click on the down arrow used to select search engine
- click on Add Search Providers.
- click on IPduh Apropos.
To add IPduh Apropos to your Opera Search Engines:
- visit IPduh
- click on the down arrow used to select search engine
- click on Manage Search Engines.
- click the Add... Button.
- set the Name -- Apropos.
- set the Keyword -- a.
- set the address to http://ipduh.com/apropos/?%s
- The check boxes following are optional.
- Hit OK
You can add Apropos over an encrypted connection to your Browser search engines. Add Apropos over HTTPS to Mozilla Firefox and Mozilla based browsers Add Apropos over HTTPS to ChromeAdd Apropos over HTTPS to Internet ExplorerAdd Apropos over HTTPS to Opera
To add Apropos over HTTPS ( an encrypted connection ) to the Mozilla Firefox Search Engines: add the Firefox IPduh Apropos SSL add-on from
https://addons.mozilla.org/en-US/firefox/addon/apropos-ssl/ OR
- visit IPduh Privacy
- click on the down arrow used to select search engine
- click on Add IPduh Apropos SSL.
To set Apropos over SSL as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):
- Enter about:config in the browser location bar.
- Promise, you 'll be carefull.
- Enter keyword.URL in the Filter: under the location bar.
- Double-click on the keyword.URL result.
- Enter https://ipduh.com/apropos/? in the text box that pops up
- OK and close the about:config tab.
To set IPduh Apropos over SSL as your default search engine on Chrome Based Browsers:
- visit the IPduh privacy page.
- Click the Wrench
- Click Settings
- Choose IPduh Apropos SSL from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"
In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg:
http://ipduh.com/apropos/?!d bing.no. If you want to
decode and analyze a URI instead of visiting it you can prepend !u to your query, and jump to a
Torrent Search by prepending !t to your query.
To add IPduh Apropos over HTTPS to your Internet Explorer Search Engines:
- visit the IPduh privacy page.
- click on the down arrow used to select search engine
- click on Add Search Providers.
- click on IPduh Apropos SSL.
To add IPduh Apropos over HTTPS to your Opera Search Engines:
- visit the IPduh privacy page.
- click on the down arrow used to select search engine
- click on Manage Search Engines.
- click the Add... Button.
- set the Name -- Apropos.
- set the Keyword -- a.
- set the address to https://ipduh.com/apropos/?%s
- The check boxes following are optional.
- Hit OK
gmap Tools Menu
Display a set of coordinates ( latitude , longitude ) on a google map.
input:
Decimal latitude φ, longitude λ in the uri parameters
output:
A google map with a marker on the set of coordinates passed.
Examples of using gmap.
gmap/tolatlon Tools Menu
Display and Find coordinates ( latitude , longitude ) on a google map.
input:
Markers with Right Click and decimal latitude and longitude in the uri parameters
output:
A google map with a marker on the set of coordinates passed.
You may right click on the map to enter markers and get the coordinates of points.
Examples of using gmap/tolatlon.
ip ip/whois ip/dnsbl ip/cidr ip/ptr ip/ptr/24 ip/dnstrace ip/srv ip/traceroute ip/tor-exit ip/list
ip/whois/as pdb/as as/prefix apropos demux demux/class demux/list
ipv6 ipv6/whois ipv6/ptr ipv6/dnstrace ipv6/cidr ipv6/traceroute
dns dns/whois dns/trace dns/bl dns/list idn idn/ace idn/unicode
anonymity check url/decode url/encode url/bouncer my/geoloc epoch
© 1372644985 IPduh Search Contact Privacy