Senin

Index search


Search index
is a database search engine, in which a structured fine saves and
stores information about Web documents collected by search engine
crawlers.
The process of adding documents to the database search system, organizing and storing them is called indexing. Each search engine indexing performed by their algorithms.

What is included in the index

The content of the index is structured data consisting of key phrases,
text and multimedia elements, links, so that shortened the time it takes
to search the database and find the documents in accordance with the
request.
This database is constantly updated using crawlers that continuously scan the web for new pages, content and resources.

Adding a site to the search engines
In the process of positioning the indexing plays an important role. The faster service is indexed by a bot indexing, the sooner you can expect that it will appear in search results. To speed up the indexing, you must notify the search engine of the existence of a new page in the network. For this purpose, all search engines exist function (adurl), where by filling out a special form pages are added to the index. The positive impact can also create a profile page on social networking and dissemination of information in their website.
Management is indexed pages using robots.txt.

HTML


(HTML stands for Hyper Text Markup Language) - hypertext markup language on the Internet. With the ability to interpret HTML browsers can define the appearance of the document to be displayed in them. This language is widely used in the world and most commonly used to create web pages.


Documents written using HTML are processed by web browsers that
understand the language of signs and transform them into easy to listen
format.
Typically, these files have the extension htm. or html. For editing HTML documents, you can use any text editor such as Notepad. There are also designed specifically for this purpose programs, such as Adobe Dreamweaver.


History of HTML


HTML was created by Tim Berners-Lee in the 90's of last century. It was originally only used as a tool to create and share documents by users.
The invention was revolutionary: the user, using the reference, your
computer could see the documents that were found in any other location
in the world.
The main task of the first version of HTML was correct text playback on different devices without any structural distortion.
Since then, HTML has been repeatedly modified and significantly expanded the ability to view documents. This language has several versions:

The first versions of HTML in the early 90's do not have a detailed
specification, because at that time there was no single official
language standard.

The purpose of the first version of HTML was the only word processing
and the use of the most popular styles of formatting such as bold test,
italic, etc.

HTML 2.0 - Added ability to handle forms.

HTML 3.2 - the ability to create tables, display mathematical formulas,
graphs, text wrap effect and the passage of the elements.

HTML 4.0 - Some HTML elements have been removed and in its place proposed to use CSS tables. Added support for scripting and frames.
HTML 4.01 - Modified version 4.0.
HTML 5 - year 2010 - until today. The fifth version is currently under development, work on it should be completed in 2014.

Format HTML document

All HTML documents are created using tags - special tags, most often occurring in tandem - the opening and closing tag. Among them is the attribute and content or only content.
Top element (opening tag) is defined as an attribute should be
formulated within, and finally - where the formatting should be
terminated.


Sample text bold by tag: b
<b> bold text </ b>
already be formatted as follows:
bold text

Standard HTML document contains a mandatory set of tags and has the form:


<! DOCTYPE HTML PUBLIC "- / / W3C / / DTD HTML 4.01 / / EN"
" http://www.w3.org/TR/html4/strict.dtd ">
<HTML>
<HEAD>
<TITLE> Document Title </ TITLE>
</ HEAD>
<BODY>
The text of the document
</ BODY>
</ HTML>

where:
XHTML 1.0 Transitional / / EN "- reveals the nature of the document.
<html> - Beginning of the document;
<head> - use the page header, it posted the information for browsers and search engine spiders;
<title> </ title> - the title of the document is indexed by the search engines;
</ Head> - the end of the page header;
<body> </ body> - the beginning and end of the document, which shall be indicated specific content of the page;
</ Html> - end of html document.

Google


Google - the most popular Internet search engine, owned by Google Inc., an American corporation.

Google's name is derived from the misspelled (specifically or
accidentally) by one of the makers of the English word googol, which
means ten to the hundredth power.
From the name Google has developed a verb to google - guglować, guglić, guglać (all forms are correct), meaning the search for something on the Web using the Google search engine.
Since Google is the most popular search engine in the world, a priority
in the process of positioning is to gain the trust of Google
Positioning page.


The history of the

Google Search was created in March 1996 by Stanford University
students, Larry Page and Sergey Brin, in the work of the Digital Library
Project.

September 15, 1997, he officially domain google.com was registered, and
the following year was created corporation Google, Inc..
At the end of 1998 Google's crawler about 60 million crawled web pages. Google is constantly developing and improving. Search algorithms are updated on average 300 times a year, and the amount of features and services are rising.

Indexing pages
In the process of indexing (scan pages in order to introduce them to the database) Google uses special crawlers:


  • Googlebot - the main robot that scans the content of the page in order to create a search engine's index. - Googlebot-Image - scans the page content to index images.

  • Mediapartners-Google - scans the content of your pages for the presence of AdSense ads.

  • AdsBot-Google - checks for quality content pages that AdWords ads are placed.

  • Googlebot-Mobile - indexed web portals for mobile devices.

  • Google Search Appliance - is responsible for the indexation of the Google Search Appliance devices.



There are two primary theories of indexing:


  1. "Sandbox effect".
    The essence of this phenomenon is that Google places specific pages
    (those that have new domain names, the young sites) in the so-called
    sandbox (waiting area), where the parties are located until the system
    deems them ready to appear in the search results.

  2. The opposite theory, which says that the new party is assigned a high PageRank and high positions in search results. Typically, this privilege working soon - until the real parameters of the test.




In order to avoid placing the works in the Google sandbox, avoid too
rapid acquisition of external links for the "new service" and gradually
acquiring links from trusted sites, so that the process looks natural to
the search engines.


Create a page ranking

One of the most important factors that influence the order of the pages
in the Google search results (as determined on the basis of their
credibility, presumably, stability, etc.) is the PageRank indicator or
simply LP (named after the creator, Larry Page `s - co-founder of
Google) - the number of specifying the value of the by Google.
The PR entire site adopted to recognize LP's main page. PR value can be between 1 and 10 High PR is one of the guarantors of the emergence of the highly in search results. The term PR side affects mainly the quantity and quality of links leading to it. Google did not disclose the exact algorithm for calculating PageRank, and hides data on the frequency of updates. As of today, is one of a number of parameters (it is believed that there are over 200), affecting the position of the hand.
Important is the degree of relevance of the page, the inner contents
and code optimization, quality and quantity of links, and other factors.

Google provides its users the ability to use a variety of services. Among other things, these are:


  • Google Search (search) - the main Google.
    The search is based on the content of the pages also scans files in
    PDF, RTF, Flash SWF, PostScript, Microsoft Word, Microsoft Excel,
    Microsoft Power Point and others.
    There is also a voice search function.

  • Gmail - mailbox.

  • Blogger - service providing the possibility of running a blog.

  • AdSense and AdWords - programs adequately develop and deploy contextual advertising on Google and its network.

  • Google Maps - service with a geographical map of the world.

  • Google Music - gives you the ability to create audioteki on Google's servers.

  • Google Books - Search books (over 10 million. Titles of the largest libraries in the U.S. and elsewhere).

  • Google Checkout - electronic payment system.

  • Google Finance - find financial information for major international corporations.

  • Google Translate - online encyclopedia.

  • Google Scholar - search of scientific publications in a variety of formats, with a wide spectrum of disciplines.

  • Google Video - Search and services of hosted video files.

  • Google News - news service.


FTP

FTP (File Transfer Protocol) - one of the protocols used to exchange data over a network. It is used for loading files, web documents with personal computers (Client), the servers that provide web hosting.

Key phrase

Key phrase
(keyword queries, keys, key phrase) - a word or phrase that is
positioned on the site in search engines, which are also part of the
content Positioning page.
Search results show the most relevant to the user's query websites, and the same search is based on the keywords you entered. Therefore, when creating text for the Positioning is very important to place the optimal number of keywords.
It is recommended, however, that the amount does not exceed the
standards of the search engines and the same text remains readable and
understandable to the user.


The density of the keywords in the text


The density of keywords (called Keyword density) is the ratio of the
amount contained in the text keyword to the number of words.
The density is expressed as a percentage. The optimal keyword density is 3-5%.
For example, the text promoted a preset list of specific keywords and
set a limit of 300 words, the calculation of the key phrases that should
be evenly distributed throughout the text, as follows: if the
recommended density is 3-5%, then we get 300 * 0 , 03 = 9
It follows that in this case you can use keywords nine times. Note, however, that the calculation of densities should not be taken into account stop-words (called stopwords).
It is also worth mentioning that, depending on the frequency of query
and its competitiveness is not only directly make key phrase (exact
match), but the use and form of expression, and extensive descriptions
(use additional words) to zagęczszenie not too high, which could be
treated as spamming by words.


Keywords tag

A web page containing text should have headers. It organizes its logical structure and thus simplifies the collection of text. The header tags H1-H6 necessarily should include the keywords.
The H1 headings should be used immediately, while lower levels in the
headlines - should resort to forms of expression and more rozbudowanch
entries.

Similarly, the title tag should be the location directly key phrases
and word combinations containing them and the surrounding text.
It is necessary to separate a small amount of keywords in the text of logical tags: bold (strong) or italic (em). Mandatory to fill in the fields description, and keywords, where you can enter occurring on the keyword phrases.

Keyword Selection

Among the selected key phrases may be asking for different popularity - HR, PA and NP (high, medium, low popular). For promotion on search engines to be effective you must first properly assess the competitiveness of selected key phrases. Such an assessment will choose the keywords that will be the easiest to promote and bring the highest return. Promoting a page using wysokokonkurencyjnych, common words is difficult, unpopular and may not produce the desired result. The main link key words are on average common queries.

DMOZ


DMOZ, also known as COP (called Open Directory Project) - acclaimed, multi-lingual "white" web directory which undergo a rigorous manual moderation. Catalog edited by a group of enthusiasts, working for free, so anyone willing can contribute to its development. The catalog has been created by U.S. developers in 1998. In the same year, Netscape corporation bought it, which was then acquired by AOL, which owns the directory today. The catalog has a total 5 million pages, and Polish-language section is about 73,000 pages.

Effect on positioning

DMOZ plays a significant role in the process of optimizing your pages,
as it represents a huge database of hand selected high quality services.
Base directory is constantly updated based on Google resources.

Advantages DMOZ directory for positioner:


  • the presence of the catalog shows it as really valuable resource;

  • link from the directory increases the level of confidence of the search engines;

  • positive impact on the growth parameters, such as PR, increase footfall and value of outbound links.



For webmasters - owner of the site - a resource placement in the directory is also important from a financial point of view. Links to pages from the catalog are priced higher than the sides of the services that are not listed in DMOZ.

Content


Website Content (Content) - a general term characterizing any information that can be found at the website.
The literal meaning of the content of the texts can be called, audio
and video files, images, graphics, animations and other information
placed on the site, or anything that you can hand on it to see, hear and
read.

Characteristics page content

The most important feature of providing a quality website is its uniqueness. On this basis, there are two types of content distributed on the Internet:


  • unique content that has never before been published on the Internet (in the search engine index no information about them);

  • non-unique content that have already been deployed in the Internet.



Unique content should have a value of information.
Distribution of unrelated words logically does not meet with a positive
response from both network users and crawlers that have long learned to
recognize similar tricks (such as incompetent multiplication products)
and absolutely banish these pages.

Taking into consideration the manner of its receipt of the content may be:


  • author - deployed on by the owner;

  • created by users (comments, photos, videos distributed on the visitors).



Depending on the contents of distributed content, stands out:



  • thematically related content (for example, an article about the content
    and code optimization for search engines on the web page positioning);

  • content unrelated topic (for example, a film about making the web portal a car).



Moreover, the content can be divided into:


  • solid;

  • refillable (for example, the content of blogs, news sites).


Ways to create content

Taking into account the method of creating content can be conventionally separated into three groups:


  • approved by retrieval systems.
    These are text, graphics, video, etc. created independently by the
    owner, bought the so-called content or exchanges created under the
    relevant orders by experts in the field (most copywriters).
    It is the most effective, but also the most expensive way to create content;

  • tolerated by the search engines.
    The website owner hired a specialist or change existing external
    content to the extent that crawlers found them unique, but the starting
    point remained the same (eg, text editing, change the images in computer
    graphics programs, etc.).

    It is a method not consuming so much time and money as the previous
    one, but the ratio of users to such content is more critical;

  • not accepted by the search engines. This content obtained by copy-paste (copy and paste), or plagiarism other people's texts or images. It is a most undesirable way of creating content.



The importance of the content of the positioning of the

Content is extremely important in the process of positioning the hand
and is one of the key factors affecting the growth of the search engine
page rankings.
For positioning to be effective, content must meet certain requirements:


  • Uniqueness.
    Non_unique content stands in the way of achieving high results, reduces
    confidence in the side, and quite often it is not even indexed by
    search engine spiders.

  • Optimized for search engines (this applies particularly to texts).
    Dedicated to the text keywords and phrases give robots the possibility
    to najdokładaniejszego determine what pages of the site and, as a
    result, views them as best suited to the search results based on
    specific queries.

  • Informacyjność and timeliness. Interesting articles help to attract high-quality audience and keeping her attention fixed.

  • Ease of receipt. The individual elements of the content should be arranged on the page in a logical and understandable.

  • Trust (called trust) (not to be confused with TrustRankiem).
    One of the main contents of the cell used in the positioning of the
    excitation at the user directly to the trust through
    confidence-inspiring content.

    Be sure not to put pressure on the visitors to your website in order to
    obtain the desired result, or do not use an open advertisement.

    You should not feel that he is compelled to do anything, simply direct
    their attention to specific goods (services, events, etc., depending on
    the subject of the page).


CMS (content management system)


Content Management System (CMS called Content Management System) - a web application used to create, edit, organize, structure and management of the website.

Principles of Operation

Working in content management systems gives you the ability to add,
change, and editorial content on the website without having to make
changes to the internal mechanisms of the organization.

A content management system can be conventionally divided into two
parts: a database, which collects information on the contents and
memory-storing elements of visualization, allowing display content on
the Internet (templates, graphics, etc.).

In order to further increase the convenience of work, most of the
systems have a means of visual editor (WYSIWYG), which are programs that
generate HTML code from user-formatted text, so that the main task of
content management systems is to allow self-populating web content by
users who are not specialize in creating websites and programming
(although, before working with CMS to carefully read the instructions).


Classification of content management systems
CMS systems are divided on the basis of a few categories.
Due to the type of license are distinguished:



  • open systems (called open-source), characterized by the open source
    code that is available for users who can view it, edit, and on this
    basis to create new scripts.
    Typically, all open systems are free. Examples of such programs are Joomla, Drupal, Wordpress;

  • closed systems, privately owned its authors, who have a monopoly on their use. The source code is hidden, and users are unable to edit it. Most closed CMS is payable. An example of a closed CMS is Microsoft SharePoint Server, Site Sapiens ECMP UlterSuite CMS.




Depending on the method of working with a template system that performs
the functions of visualization and structuring content, we can
distinguish the following types of CMS:


  • autonomous systems, compilers (called Offline processing). Users of the site, created with the help of this system, see the previously formed and drafted towards the site.
    These content management systems are used to create a static website -
    an online resource, the content of which can be changed only by
    modifying the source code of the document.

  • interactive systems (Online processing).
    The content every time it is created and formed anew on the basis of
    information from a database or cache upon receipt of the requests from
    visitors to the page.

    Systems of this type are used to create dynamic pages, ie those whose
    contents can be changed using the same page, without resorting to
    programming and editing source code.

  • hybrid systems (called hybrid systems) combine the functions of both autonomous systems and interactive.



Advantages and disadvantages of the use of content management systems
Focused CMS for the average computer user and the Internet provides many benefits, including:


  • reduce the cost of maintenance;

  • Minimizing the time required to create a website;

  • simple parameter settings of content management;

  • ease of use of the programs.



Cons CMS:


  • large amount of information that can cause server overload;

  • instability generated page URLs, which leads to lower reputation in the search engines;

  • for the construction of the need to spend your time;


  • sometimes you have to incur expenditure in support of the system (often
    have to install the modules and templates that may be payable).



Most open content management systems
The most popular free CMS are Joomla, Drupal, Wordpress.
Joomla - the CMS open source, written in PHP and JavaScript languages ​​and providing a MySQL database.
It is used to create pages of different types (corporate, interactive,
newspapers, private parties, etc.) with varying degrees of difficulty.
Examples of sites created with Joomla! are www.linux.com and www.itwire.com.


  • Advantages of Joomla!:

    • a simple and convenient user interface;

    • minimum set of instruments for the original installation, which can be expanded as needed;

    • high functionality;

    • multilingualism;

    • regular updates.



  • Cons:

    • relatively large load on the server;

    • the possibility of a problem with the code;

    • "Holes" in the security system;

    • excessive attachment to the menu items.





Drupal - an open content management system written in PHP and supports MySQL and PostgreSQL. It is a CMS, with which you can easily create great websites. In this system have been developed such as the www.mtv.co.uk, www.whitehouse.gov or www.ubuntu.com.
Main advantages:


  • functionality and flexibility

  • with the number of modules in the system can create unconventional page to the specific contract;

  • relatively low load on the servers.



Cons:


  • difficult to use;

  • system too heavy to pages hosted on the cheap web hosting service subscriptions;

  • inefficient use of objective features of PHP.



Wordpress - open CMS written in PHP and MySQL database support. In this system, mainly blogs are created, for example ebayinkblog.com or newsroom.mtv.com.
Pros:


  • intuitive, functional and simple interface;

  • easy to install;

  • Friendly URL (friendly URL);

  • multiple languages.



Cons:


  • frequent system errors in the case of high footfall;

  • weak security system;

  • poor reputation in the search engines.


Cloaking


Cloaking
(called cloak - hide, hide) - one of the methods of Black SEO, which
basically means that the same page presents other content crawlers, and
other users.

This method simplifies the positioning to achieve high position in
search results, and at the same time the user gets niezaspamowaną site
with content addressed to him.


Identification of the visitor's side (if it is a robot or user) and to
identify what information is displayed at any given time are made on the
basis of the IP address or User Agent.

Cloaking is picked up by search systems as SPAM, which pollutes the search engine database. Where a case is detected illegal substitution sites can be imposed upon it by the search engine penalties.

Aims use cloakingu
It is generally believed that cloaking is used only to lying to the search engines.
The most glaring example of this is the positioning of the key phrases
that can be achieved quickly and showing TOP Internet users completely
different content, intentionally full of ads, links do not meet user
expectations.
It is worth noting that there are also other reasons cloakingu technique is used, among other things:


Some well-known websites use cloakingu to use their resources for users was simpler. For example, Google opens its home page in version tailored to the user's location and the language used by him.


Other applications


  • protection of content from theft - users see a different code than the
    one that the site owner wants to protect from being copied;


  • user orientation - for example, the method takes into account cloakingu
    settings in your browser and displays the content in that language,
    which is set in the browser;

  • geo targeting - displays relevant content based on the user's location, which is determined by IP address;


  • the behavior of the template, by using technologies that are not
    noticed by search engine spiders when indexing (javascript elements) -
    the machines showing the indexing pages are identical to the originals
    in terms of structure and content, but presented in a clear way for them
    (eg links text in navigation).


Cache Search


Internet browser cache (called cache) - a mechanism for storing all documents indexed by the search engine online. The aim is to improve the speed of access to information that is likely to be needed in the near future. Websites and content are both indexed and copied and stored in the cache. Through this mechanism, the user can go directly to the search results page or on the saved copy. Go to a page is usually when the party itself for some reason does not work, or when access to it is a threat to your computer.
The content and a copy of the cached search engines may differ from
each other because of the time by copying the contents of crawlers page
may have been changed, and the changes have not been saved by the search
engine.

Audit Service


Audit service is accurate, complete analysis of the site in terms of its compliance with the requirements of search engines.
During the audit takes into account factors that affect visibility in
search engine pages, its attractiveness and usability for web users.

This is the stage prior to the optimization and positioning that are
carried out on the basis of data obtained during the audit.


Components of the audit service:




  • Marketing analysis, in which a check is naming the range of services
    offered, description of goods, competition in the industry, the level of
    activity and visibility of sites of competitors.




  • Analysis of figurative elements: fonts for their clarity, selection of
    graphics from the point of view of search engine robots, visibility
    graphics for different browsers and at different resolution, etc.



  • The analysis of textual content:

    • unique angle;

    • Query evaluation and compliance with the content on the site;

    • assessment of density of the text keywords;

    • analysis of content description tags, keywords and title;

    • check for the presence of text semantic markup;

    • friendliness rating URLs;

    • analysis of news content and frequency of the refresh rate.



  • Usability analysis with an assessment of the site's pages for your convenience to navigate.



  • Technical analysis of the source code, so that works:

    • service presence in search engine indexes;

    • Page Rank indicator;

    • domain zone, the geographical location of the servers hosting, quality web hosting;

    • for errors in the files and scripts;

    • instructions for the search engine robots (robots.txt);

    • presence of unnecessary code;

    • CSS and HTML compliance with W3C standards;

    • proper functioning of links;

    • maintenance logs;

    • errors when loading documents;

    • compliance with the requirements of search engines.



  • Analysis of visibility with search engine and its location in the natural search results.



Results
As a result of the audit data are obtained on the basis of which earns the recommendations for each component. On the basis of these findings is then carried out optimization and positioning.
Recommendations relate mainly to determine the primary target group and
key phrases, their distribution in the body, changes in the design of
hand, its subject matter, improve internal linking, etc.

Anchor (anchor text)


Anchor text
(anchor text, called "anchor" - anchor) - hyperlink text contained
between the tags and <a> </ a>, significantly affecting the
increase page rankings.
The link type <a href = "" http://www.strona.pl "> Web design," Web design "is the anchor text.


Anchor text is the visible to the user, and carries the information of a page on which the link leads. SEO website promotes the inclusion in the text of the anchor key phrases corresponding to the basic query.
External links with anchor texts that contain keyword phrases are
arranged in content links and significantly affect the process of
gaining links to the linked page (Link Building).
Properly selected anchor text to help put the website high in the search results.


Types of anchor text:


Create a text selection anchor key phrases for anchor text is made on
the basis of statistics of searches in the selected search engine (eg
Google).

Keep in mind that in addition to the basic key words to create anchor
text used and their synonyms, and also take into account the most common
typos, that can occur when writing the word.

Anchor text should correspond to the content of the page that links
lead containing them and should be personally created by the optimizer
as links generated by the systems they create can not give adequate
results.
Links that are not classified as SPAM by your browser must look natural and intelligible.
Do not use too much of links containing the same phrase, and the ratio
of links containing pure keyword phrases to links in which the content
of your keywords are "with interwoven" more specific words should be 1
to 3
It is also important that the text surrounding the link was unique and understandable.



  • Texts of key phrases - the contents of such links is placed unmodified, usually highly competitive, key phrase. This anchor text generally consist of two - three words (such as "sale of flats").


  • Lyrics "diluted" - that texts in which the main phrases were added
    additional substantiation words, forming together an average or
    niskokonkurencyjne keyword phrases (such as "sale new construction
    apartments Krakow").

  • Natural (domain) anchor text - consist exclusively of domain names or adverbs such as "here".


Alt

ALT - HTML attribute used to describe the content of the graphic elements. Through the use of this attribute is generated "alternate text" or text describing the image content.


Text assigned to the ALT attribute is displayed in place of the image
when the user settings is disabled downloading graphics or it is blocked
by your browser.
This allows the user to easily navigate the site and have some idea of ​​what images are missing. It is important for users of the readers and the free internet connection.

In addition, some browsers show an alternative text when you hover your mouse over a graphic element.

Importance of SEO

Search engines do not index the same graphics on the website, so reads the description of alt and file name, and on this basis determine which image is the most relewantny to the user's query.


The alt attribute does not play a significant role in shaping the
results, no less should be placed on the primary alternative text key
phrases, which is important when searching the artwork by the search
engine.
However, note that the maximum sentence was entered in accordance with the contents of the graphics.
You also can not go overboard with the amount entered in the alto
phrases, because it can be picked up by the search engine as spam.

IPduh - The Internet Tools




IPduh.com   About   IPduh Internet Tools   Propaganda




IPduh is a set of Internet Forencics and Troubleshooting Tools made to work Together.   IPduh may be used as an Internet Forensics Search Engine or a General Purpose Search Engine.   Smart Humans and Aliens researching the internetz on Earth Love IPduh.






ip    Tools Menu

IP address verbose report





input:



an IPv4 address in dot-decimal notation



output:

For non public, special IP addresses a short explanation and a URI to more information.



xor



For public and special public IP addresses:


  1. The IANA designation of the /8 block containing this IP address.

  2. The Internet Regional Registry of this IP address.

  3. The Autonomous System Path.

  4. The IP Prefix.

  5. The Autonomous System Number.

  6. The Organization using this IP address.

  7. The country or city of the organization to which this IP address is assigned.



    Sometimes the machine(s) using this IP address happen to be in the same country or city.



    The geographical coordinates of the country or the city.



    Two Databases made by IPduh and the MaxMind database are used to determine the geographical location of the IP address. The databases made by IPduh are based mostly on data provided by the Regional Internet Registries. A macro view of the IPduh Country database used is available.



    The physical location of the machine(s) using this IP address is not guaranteed to be the same as the location suggested by IPduh .

  8. The name of the IP address ( known as Reverse DNS record ).

  9. The A record of the IP address name.

  10. The registered domain name associated with the IP address name.

  11. The A records registered domain name.

  12. The dot-decimal IP address entered as a 32b Base 10 Integer.





Examples of using ip with GET requests








ip/dnstrace    Tools Menu





input:



A pubic IPv4 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the PTR.




Examples of using ip/dnstrace.








ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








ip/tor-exit    Tools Menu





input:



A unicast IPv4 address



output:


  1. If the IPv4 address entered is listed on the IPduh Tor Exit List, the first and the last times it was seen used as a Tor Exit.

  2. If the IPv4 address entered is listed on the tor.dan.me.uk DNSBL ( a list of currently used Tor Exits ), some information regarding its Tor Network characteristics.




The lookups performed by ip/tor-exit are performed by ip/dnsbl as well.




Examples of using ip/tor-exit.








dns/list    Tools Menu

Create a List of DNS names





input:



DNS names



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;   &www=1   &sc=1   &sa=1



comments:

All listed strings of characters not Identified by dns/list as DNS names are printed.

A ; stops list processing and hides all characters following it.



output:

A list of DNS names along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using dns/list.








ip/list    Tools Menu

Create a List of IP numbers





input:



IP numbers:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number ]



ipduh-list built-in variables and punctuation marks:

&list=   --   ,   &title=   ;



comments:

All listed strings of characters not Identified by ip/list as IP numbers are printed.

A ; stops list processing and hides all characters following it.



output:

A list of IP numbers along with links to the appropriate IPduh tools and the URL producing the list.




Examples of using ip/list.








IPduh List Syntax    Tools Menu   about ip/list   about dns/list   about demux/list


IPduh list syntax is used to create lists with ip/list , dns/list , and demux/list and it is a simple way of denoting lists in a form text area or a URL.



HTML tags are not allowed.

URL Enconding and URL decoding are handled by the list tools.








Every list item not identified as an IP number by ip/list , a DNS name by dns/list , and an IP number or a DNS name or a URI by demux/list will be printed without IPduh links. This way comments and almost empty lines may be put in a list.

eg:http://ipduh.com/dns/list/?&list=`---google.fr---Google in French---.---google.gr---Google in Greek---'





ipv6/dnstrace    Tools Menu





input:



A pubic IPv6 address



output:

The delegation path from the root Name Servers to the Authoritative DNS Netwok Servers of the IPv6 address PTR.




Examples of using ip/dnstrace.








dns/trace    Tools Menu





input:



A DNS domain name



output:

The delegation path from the root Name Servers to the Authoritative Name Servers of the DNS name.




Examples of using ip/dnstrace.








ipv6/cidr    Tools Menu





input:



An IPv6 CIDR block in CIDR notation



output:


  1. Whether the IPv6 CIDR block entered is valid.

  2. If the IPv6 CIDR block entered is invalid a correction is attempted.

  3. The Type of the IPv6 network address.

  4. The IPv6 Range. Network Address - Broadcast Address.

  5. The Number of IPv6 addresses in the CIDR block.





Examples of using ipv6/cidr








ipv6/traceroute    Tools Menu





input:



An IPv6 address



output:

If the IPv6 address entered is a routable Unicast Internet IPv6 address, the intermediate routers along the path from an IPduh Internet Host to the Internet host using the IPv6 address entered. For each of the routers in the path ipv6/traceroute attempts to output their reverse records, their IPv6 addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.








ipv6    Tools Menu

IPv6 address basic information lookup





input:



An IPv6 Address



output:


  1. The type of the IPv6 address entered, URIs to more information and the appropriate RFC, if needed.

  2. Allocation Prefix , Status , Responsible RIR , Allocation Date.

  3. The short form of the IPv6 address entered.

  4. The long form of IPv6 address entered Hexadecimal and Binary.

  5. The unsigned integer number represantating the IPv6 address entered.

  6. The Country in which the Organization using this IPv6 address is located.



    The machine(s) using this IPv6 address may not be on the same country.



    The Location is determined by the Regional Internet Registries data and a macro view of the IPv6 addresses per country is also available.





Examples of using ipv6.








as/prefix    Tools Menu

IP prefixes originating an Autonomous System





input:



An Autonomous System Number



output:

The IP prefixes originating the autonomous system




Examples of using as/prefix.





Still in Beta release --Not consistent Results.



Glitch - Bug: If you get "I did not find IP prefixes originating from 'AS#'" for an autonomous system number with prefixes in the IPduh Database, try to refresh the page.







ipv6/whois    Tools Menu

IPv6 address whois information lookup





input:



An IPv6 Address



output:

For non Global Unicast IPv6 addresses,



a short explanation and a URI to more information or the apprpopriate RFC.



For Global Unicast IPv6 addresses,


  1. The parent IANA block.

  2. The IANA status.

  3. The Regional Internet Registry.

  4. The whois server.

  5. The whois information for the owner of the block.





Examples of using ipv6.








ipv6/ptr    Tools Menu

IPv6 address PTR ( Reverse DNS name ) lookup





input:



An IPv6 address



output:

The PTR of the IPv6 address entered.




Examples of ipv6/ptr.








ip/ptr/24    Tools Menu

The PTR of all IP addresses in a /24 network





input:



A pubic IPv4 address or a /24 CIDR or the three first Bytes of an IP address in decimal dotted notation



output:

The PTR ( Reverse DNS names ) for all the IP addresses in the /24 ( C ) Network along with pointers to more information.




Examples of using ip/ptr/24 .








idn/ace    Tools Menu

IDNA - Unicode to ACE convertion





input:



An International Domain Name in Unicode.



output:

An ASCII Comptible Encoded string of characters.




Examples of using idn/ace.








idn/unicode    Tools Menu

IDNA - ACE to UNICODE convertion





input:



An International Domain Name in ASCII Compatible Encoding ACE.



output:

The International Domain Name in Unicode.




Examples of using idn/unicode.








pdb/as    Tools Menu

PeeringDB information about an Autonomous System





input:



An autonomous system number



output:

The information that the Autonomous System Owner put in the Peering database.



The peeringdb information is cached for at least 15 days. The latest PeeringDB information can be viewed at peeringdb.com.




Examples of using pdb/as.








ip/whois    Tools Menu

IP address whois lookup





input:



a public IPv4 address



output:

The whois information for the IP address entered.






Examples of using ip/whois with GET requests






Caveat


ip/whois caches whois information for 15 days.





idn    Tools Menu

International Domain Name convertions ( Unicode to ACE xor ACE to Unicode )





input:



a Domain Name



output:

If the domain entered is an international domain name encoded in Unicode it's ASCII Compatible encoded ( ACE ) version.

If the domain name entered is an Internation domain name encode in ACE it's equivalent Unicode encoded version.




Examples of using idn.








ip/whois/as    Tools Menu

Autonomous System Number whois lookup





input:



an Autonomous System number

an Autonomous System number with the "AS" prefix

an Autonomous System number with the "ASN" prefix.



output:

The whois information for an Internet Autonomous System.



If the Autonomous System Number entered is not used in Internet BGP routing an explanation is attempted.






Examples of using ip/whois/as with GET requests








ip/cidr    Tools Menu

IP CIDR Calculator





input:



A network block in CIDR notation



output:


  1. If the network address on the CIDR is valid and the network mask on the CIDR is valid. Each Byte in the network address in Binary (put your cursor above the network address on the CIDR block)

  2. If the CIDR block is invalid ( the network address is not compatible with the network mask ) a valid CIDR block is suggested.

  3. The IP Range. Network Address - Broadcast Address.

  4. The Network Mask in decimal dotted notation and each Byte in binary ( put your cursor above the mask).

  5. The Number of IP addresses in the network block.

  6. If the the CIDR block is in a special block a short explanation and URI to more information, usually the appropriate RFC.





Examples of using ip/cidr with GET requests








ip/reverse or ip/ptr   Tools Menu

IP address PTR RR lookup - IP reverse mapping - reverse IP address DNS lookup




ip/reverse or ip/ptr is based on a IP PTR RR lookup also known as reverse DNS lookup and it is usefull in associating an IP address with a host name or a DNS name.




input:



a public IPv4 address



output:


  1. The IP PTR resource record.

  2. The registered domain name -deduced by the PTR record.

  3. The A records of the registered domain name.





Note


For single IP addresses ip output includes the ip/reverse output as well.






Examples of using ip/reverse with GET requests








epoch    Tools Menu

Epoch Clock and Epoch to Date Conversion





input:



An Epoch -an integer number



output:


  1. The equivalent UTC Date.

  2. The Δsec since the Unix Epoch.

  3. The Δsec from the Unix epoch timestamp entered.





Examples of using epoch.









url/bouncer    Tools Menu

Bounce URLs - Basic Protection against Malicious URLs





input:



[ IPv4 address | IPv6 address | URI | DNS name ]



output:

The Bouncer will lookup the DNS name or the IP address contained in the URI in a few major Black Lists. If the URI , IP address , or DNS name pass the test , the bouncer will redirect you there after a few seconds.





The Bouncer transforms plain DNS names , plain IPv4 addresses , and plain IPv6 addresses to HTTP URLs.



The Bouncer will bounce URIs using the protocols used often with web browsers: HTTP , HTTPS , and FTP.



The Bouncer runs a basic test against the host you are destined.

For a more thorough test consult dns/bl for domain names and ip/dnsbl for IPv4 address.



The Bouncer is ideal when you need to link to URIs beyond your control or to hide your referrer.




Examples of using url/bouncer.





The Bouncer waits for 4.5 sec before redirecting.

If you do not like the 4.5 sec wait time before the redirection you may use one of the following:

/url/bouncer/1

/url/bouncer/2

/url/bouncer/3

/url/bouncer/4





/url/bouncer/1 waits 0.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/1/?http://alog.ipduh.com



/url/bouncer/2 waits 1.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/2/?http://alog.ipduh.com



/url/bouncer/3 waits 2.5 sec before redirecting and it may be used in the same way.

eg:http://ipduh.com/url/bouncer/3/?http://alog.ipduh.com





url/encode    Tools Menu

Percent Encode a URI





input:



A URI



output:

A percent-encoded URI.


Examples of using url/encode.










ip/dnsbl    Tools Menu

IP address Blacklist check.





input:



a public IPv4 address



output:


  1. The answer for this IP address from each of the major IP DNS BlackLists and IP 'black' lists queried.

  2. An explanation for each answer and if needed a URI to more information.









DNS BlackLists and IP 'black' lists queried by ip/dnsbl



  1. ZEN - zen.spamhaus.org

    ZEN combines all Spamhaus IP DNSBLs.




    1. Spamhaus Block List - SBL - sbl.spamhaus.org

      A database of IP addresses of spam-sources, spam support services, and snowshoe spammers ( the CSS component ).

    2. Exploits Block List - XBL - xbl.spamhaus.org

      XBL includes CBL and a customized NJABL




      1. Composite Blocking List - CBL - cbl.abuseat.org

        CBL lists IP addresses exhibiting characteristics which are specific to open proxies, spam bots, and spam malware.

      2. Not Just Another Bogus List - NJABL - njabl.org

        An IP database of known and potential spam sources ( open relays, open proxies, open form to mail HTTP gateways, dynamic IP pools, and direct spammers )



    3. Policy Block List - PBL - pbl.spamhaus.org

      A database of end-user IP addresses which should not be delivering unauthenticated SMTP email to any Internet mail server.

      Many ISPs participate in the PBL project. The PBL lists both dynamic and static IP addresses which by policy whether the block owner's or -interim in its absence- Spamhaus' policy) should not be sending email directly to the MX servers of third parties.



  2. SORBS - dnsbl.sorbs.net

    Contains all the SORBS DNSBLs




    1.   http.dnsbl.sorbs.net

      List of Open HTTP Proxy Servers.

    2.   socks.dnsbl.sorbs.net

      List of Open SOCKS Proxy Servers.

    3.   misc.dnsbl.sorbs.net

      List of open Proxy Servers not listed in the SOCKS or HTTP lists.

    4.   smtp.dnsbl.sorbs.net

      List of Open SMTP relay servers.

    5.   web.dnsbl.sorbs.net

      Hosts that have abusable vulnerabilities

    6.   spam.dnsbl.sorbs.net

      List of hosts that have been noted as sending spam/UCE/UBE to the administrators of SORBS. This zone also contains net blocks of spam supporting service providers, including those who provide web sites, DNS or drop boxes for a spammer. Spam supporters are added on a 'third strike and you are out' basis, where the third spam will cause the supporter to be added to the list.

    7.   block.dnsbl.sorbs.net

      List of hosts demanding that they never be tested by SORBS.

    8.   zombie.dnsbl.sorbs.net

      List of networks hijacked from their original owners, some of which have been used for spamming.

    9.   dul.dnsbl.sorbs.net

      Dynamic IP Address ranges (NOT a Dial Up list!)

    10.   badconf.rhsbl.sorbs.net

      List of domain names where the A or MX records point to bad address space.

    11.   nomail.rhsbl.sorbs.net

      List of domain names where the owners have indicated no email should ever originate from these domains.



  3. SpamCop Blocking List - SCBL - bl.spamcop.net

    SCBL lists IP addresses that were used to spam.

  4. Barracuda Reputation Block List - BRBL - b.barracudacentral.org

    Lists IP addresses which are sending spam or viruses

  5. Tor.dan.me.uk - dan.me.uk - A list of IP addresses used currently by the Tor Network.

    If the IPv4 address entered is listed on tor.dan.me.uk some information regarding its Tor Network characteristics ( the node name, the port used by Tor, and whether it is: Fast,Guard,Named,Running,Stable, or Valid ).

  6. Team Cymru Full Bogons List - Team Cymru

    This List contains IP addresses that are not assigned to an ISP or other end-user and they should not be seen in the Internet.

  7. IPduh Black List - An IP black List, not a DNSBL.

    Contains IP addresses used by abusive or compromised systems.

  8. IPduh Tor Exit List - A list of IP addresses that have been Tor Exits, not a DNSBL.

    This list is maintained by IPduh and it is composed mainly by the Tor Project data .

    If the IPv4 address entered is listed on the IPduh Tor Exit List the first and the last times it was seen used as a Tor Exit are displayed.





Examples of using ip/dnsbl








ip/srv    Tools Menu



Check which of the most common services are running on the host(s) using a remote IP address.





input:



a public IPv4 address



output:


  1. The TCP ports that accepted connection within 300ms.

  2. Limited software recognition for the daemons found listening and some of the headers.

  3. Limited OS recognition, Uptime guess, Link Type Guess, and TOS.

  4. Guess the number of systems using the IP address.





List of the TCP ports probed by ip/srv and their common use



  1. 21 - FTP - File Transfer Protocol

  2. 22 - SSH Secure SHell

  3. 23 - Telnet

  4. 25 - SMTP - Simple Mail Protocol



  5. 465 - SMTP SSL/TLS - Simple Mail Transfer Protocol over SSL/TLS (encrypted)

  6. 53 - DNS - Domain Name System

  7. 80 - HTTP - HyperText Transfer Protocol

  8. 110 - POP3 - Post Office Protocol version 3

  9. 123 - NTP - Network Time Protocol

  10. 143 - IMAP - Internet Message Access protocol

  11. 993 - IMAP over SSL/TLS (encrypted)

  12. 389 - LDAP - Lightweitght Directory Access Protocol

  13. 443 - HTTPS - HyperText Transfer Protocol Secure (encrypted)

    ip/srv also attempts to print the certificate details.

  14. 587 - MSA - Message Submission Agent

  15. 1352 - Lotus Notes

  16. 1433 - Microsoft SQL server

  17. 3306 - MySQL Server

  18. 3389 - Windows Remote Desktop Connection Service







IPduh.com/ip/srv bot


ip/srv bot is called the piece of software that does the scans or looks up the cashed scans. The scans are cashed for no fixed periods of time. The ip/srv bot always attempts to pass the asker's IP address to the web server listening on the scanned IP when it attempts a new (non-cached) scan. The ip/srv bot always acts at someone's request and never picks arbitrary hosts to lookup.



If you are a server administrator who does not want his server's IP to be scanned by ip/srv please tell IPduh so. If you are a server administrator that wants to know who requested an ip/srv scan, search your web server's logs for IPduhSrvBot.



The ip/srv agent signature on http daemons listening on port 80 or port 443 looks like:



"Mozilla/5.0 (compatible; IPduhSrvBot/VERSION; for/192.0.2.222; +http://ipduh.com/about/#ip-srv-bot)"



where: 192.0.2.222 is the IP address of the IPduh user who requested the first ip/srv scan, and VERSION is [0.0.1 - 0.9.9].







dns/whois    Tools Menu

Domain Name whois lookup





input:



a registered DNS domain name



output:


  • The domain name whois information or a URI to the whois information.





Examples of using dns-whois










Caveat


In an effort to not be a nuisance to the whois servers dns/whois caches whois queries for at least 15 days.





dns/bl    Tools Menu

Domain name URIBL and IP BLack List lookup



input:



a DNS domain name



output:


  • The URI Black Lists' answers, and the answers of the major IP (DNS) Black Lists for all the IP addresses DNS related to the domain name.





The URI Black Lists



  1. Google Safe Browsing - Google Safe Browsing FAQ



    This is a list of sites involved in phising or sites dedicated to the spread of malware.

  2. URIBL - uribl.com



    URIBL lists domain names found in URIs in the body of spam messages. These domain names may be used in one or more of the following categories of web sites: spamadvertized sites that are trying to sell something, phising sites, sites that host malware or used by malware, sites that infect visitors with malware.



The IP Black Lists


The IP Black Lists queried for every DNS related IP address are the same with the ones queried by ip/dnbl.




Examples of using dns-bl





For each of the DNS related IP addresses of the domain name dns/bl does not print IP Black Lists that answered "not listed".

You could use dns/bl/verbose if you want to see everything printed.



The domain names listed in the URI Black Lists are: dedicated to the propagation of malware, used for phising, used for spamming, or advertized though spamming.



IPduh suggests to not use your browser to visit any of the domain names listed on the URI Black Lists.




phishing site: Forgery or imitation of another website, designed to trick users into sharing personal or financial information. Entering any personal information on such site may result in identity theft or other abuse of the information entered.



malware site: A site that contains malicious software that could be downloaded to a user's computer without the user's content. A site used in controlling infected computers and coordinate malicious attacks or attempts to spread software viruses and other malicious software.



It is possible for the lists used by dns/bl to contain outdated or false information. It is possible that the lists compiled by IPduh to contain errors. The IPduh experience shows that the external lists chosen and the lists compiled by IPduh have a low false/positive ratio.





dns    Tools Menu

Lookup the A, MX, NS, SOA DNS records, relevant IP addresses, and servers' locations.





input:



a DNS name



output:


  1.  The purpose and the country (if any) of the Top Level Domain TLD.

  2.  The Address ( A ) records and the locations of these IP addresses.

    The A records usually point to webservers.

  3.  The A record of www --The www subdomain usually points to webservers.

  4.  The CNAME record

  5.  The DNAME record

  6.  The AAAA record(s)

    IPv6 address records.

  7.  The TXT record

  8.  The Mail Exchange ( MX ) records, their priority and their location.

    The MX records point to Mail Transfer Agents - mailservers. The number in front of the MX records specifies the preference value for the mailserver or the array of mailservers the record points to.

  9.  The Name Server ( NS ) records and the nameservers' locations.

  10.  The Start Of Authority ( SOA ) record, which includes:




    1.   SERIAL - the domain serial number.

      This is an unsigned 32 bit integer that must be incremented on the primary server every time a change is made. [RFC1912 2.2] recommends the YYYYMMDDnn syntax where YYYY=year,MM=month,DD=day,nn=revision number.

    2.   MNAME - the primary name server.

    3.   RNAME - the email of the domain name administrator.

      RNAME must follow the hostmaster.example.tld format meaning hostmaster@example.tld.

    4.   REFRESH -the refresh timer.

      A signed 32 bit integer that specifies the number of seconds between the time that a secondary name server checks if the zone was changed on the primary nameserver.

    5.   RETRY - the retry timer.

      A signed 32 bit integer that specifies the number of seconds that the secondary name server(s) have to wait if a REFRESH fails.

    6.   TTL - the Time To Live timer.

      TTL is an unsigned 32 bit integer that defines the number of seconds that a record may be cached.









Examples of using dns with GET requests








Note


For better results use the registered domain name example.com and do not use subdomains like www.example.com



There are cases that subdomain zones are delegated to name servers different than the domain authoritative name servers, and the subdomain has a different set of DNS records.




To see the root nameservers for a Top Level Domain use "TLD." and not just "TLD"




For International Domain Names, just use their UTF8 encoded form







ip/traceroute    Tools Menu

IP traceroute




Trace packets on their route from an Internet host in AS2490 along their route to another IPv4 Internet host.




input <



An Internet IPv4 address



output >

If the IP address entered is a routable Internet IP address, the intermediate routers along the IP path from IPduh to the IP address entered. For each of the routers in the path ip/traceroute attempts to output their reverse records, their IP addresses, the Autonomous Systems in which they belong, and the time it took them to respond to the traceroute probes.





anonymity-check    Tools Menu


The anonymity-check shows what a web server can see or deduce about a web user. The web user information leaked to the WWW servers varies and depends on the web user's system, browser, settings, and local or proxy network. Even though the anonymity-check was intended to be used as a tool to demonstrate ways used by many sites to track web users, to check the anonymity of a connection through an HTTP proxy , check the integrity of an HTTP conversation, and test a Tor setup , it is more commonly used to find out the browser and network settings when troubleshooting. The anonymity checker is also a good way to find out if your privacy plugin conceals or ruins your Privacy.




Anonymity-check performs a plethora of tests and it is enhanced with new tests at a regular basis.

For the most part it reports only its finds.



Some of the Anonymity-check checks:


  1. Searching the HTTP headers for proxy traces.



    Some common HTTP headers used by web proxy servers are the following.




    1. HTTP_FORWARDED

    2. HTTP_X_FORWARDED_FOR

    3. HTTP_VIA

    4. HTTP_PROXY_CONNECTION

    5. HTTP_PROXY_ID

    6. HTTP_XROXY_CONNECTION

    7. HTTP_PROXY_CONNECTION

    8. HTTP_CLIENT_IP



  2. If cookies are accepted,anonymity-check processes the *leg cookies which hold information about the client's earlier visits and the previous IP address.

  3. The anonymity checker attempts to virtually ( it does not really store any of your inforamtion to the IPduh systems ) track you through an ETag.

  4. If Java is enabled, anonymity-check attempts to figure out your private IP address along with your computer's host name. None of this information is sent back to IPduh.

  5. Anonymity-check looks at the IP packets coming from your system or proxy system. This way it attempts to find out the MTU and advertised MSS along with information about your OS, your uptime, whether you are behind a NAT router or a firewall, your link type, and the number of the intermediate routers.

  6. Anonymity-check attempts to print the referral URI and the visiting system's host name as seen in the HTTP headers.

  7. Anonymity-check shows a report about your public IP addess. This report contains the same information with ip.

  8. Anonymity-check prints your user agent information as seen in the HTTP headers.

  9. Anonymity-check attemps to figure out the language(s) set to default on your web browser.

  10. If javascript is enabled on your browser, anonymity-check

    1. prints the cookies set by IPduh

    2. the visiting system's screen dimensions

    3. the character string identifying your WWW user agent.

    4. the plugins installed on the web browser, if any

    5. the operating system and the operating system vendor if available

    6. Attempts to store information about your visit on your system.

    7. If the Flash plugin is installed and enabled the anonymity checker attempts to store information about your visit on the Flash Local Share Object.

    8. Attempts to find previously stored information about your visits on your system.



  11. The Anonymity checker attempts to find the cashing name servers used by your system and print links to more information about them.

  12. The Anonymity checker attempts to detect anomalies such as missing or extra headers and HTML injections in the HTTP conversations between you system and IPduh.





Note


To see all the anonymity-check finds visit it two times in a browsing session, then do what you usually do when you want to clean up your browsing history and visit the Anonymity Checker again.

To encrypt your communication with the anonymity checker use https://ipduh.com/anonymity-check.



To use TLS - SSL encryption in between your browser and IPduh you may need to trust the IPduh Certificate Authortity - install the IPduh CA public certificate.

To automate your public IP address lookup you could use http://ipduh.com/my/ip.

Most privacy and anti-tracking Firefox plugins tested against the anonymity-check, so far ( 1330538493 ), failed to deliver what they promise. Actually, 90% of them are completely useless or do Privacy Concealing like it is 1996.





my/geoloc    Tools Menu

geographical location




Yet another HTML5 Location Aware Browsing Demo. Let Google Location Services to estimate your geographical location and draw it on a map.



Before using my/geoloc your browser should ask you if you would like to share the geographical estimation of your system and your IP address with the browser's location service provider --Usually Google Location Services. Your IP address, your GPS reading (if any), and a unique ID identifying your web browser are sent to the location service provider. In case of Google Location Services a cookie with the name PREF is stored in your browser's cookie jar.





demux    Tools Menu

Submit a string of characters to an appropriate IPduh tool





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

The string of characters submitted to Demux is submitted to an appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode]




Examples of using demux








demux/class    Tools Menu

Classify a string of characters and see the appropriate IPduh links





input:

A string of characters:

[ IP address | IP CIDR block | IPv6 address | IPv6 CIDR block | Autonomous System Number | DNS name | URI ]



output:

A classification and appropriate IPduh links to further information about the string of characters submitted given.





Examples of using demux/class








demux/list    Tools Menu

Create a List of IP numbers, DNS names, and URIs





input:



listed items:

[ IPv4 address | IPv6 address | IPv4 CIDR block | IPv6 CIDR block | Autonomous System Number | DNS names | URI ]



ipduh-list built-in variables and punctuation marks:

&list=   ---   ,   &title=   ;



comments:

All strings of characters not Identified by demux/list as IP numbers, DNS names, or URIs are printed without IPduh links.

A ; stops list processing and hides all characters following it.



output:

A bookmarkable list of DNS names, IP numbers, URIs and your comments along with links to the appropriate IPduh tools.




Examples of using demux/list






Note


-- is not a valid delimeter anymore. Use , or --- instead. Lists using -- may be compiled by http://ipduh.com/demux/list/old.



There is a 3KB limit on the size of the demux lists.



Through Bouncer URLs are printed only for HTTP , HTTPS , and FTP URIs.





apropos    Tools Menu    apropos guides    add apropos to your browser

Apropos will submit any string of characters to the appropriate IPduh tool.




Apropos may be used as an Internet Forensics Search Engine or a General Purpose Search Engine. Apropos is a good place to start your research and the most commonly used Tool of IPduh.




input:

Any string of characters





output:

The string of characters submitted to apropos will be submitted to the appropriate IPduh tool.

[ ip | ip/cidr | ipv6 | ipv6/cidr | ip/whois/as | dns | url/decode | torrent search | search ]




Examples of using apropos





Note: apropos does not handle IPduh lists ( ip/list , dns/list , demux/list )




apropos guides







Add Apropos to your Browser:



You can add apropos to your browser search engines or set it as your default search engine.



Add Apropos to Mozilla Firefox and Mozilla based browsers

Add Apropos to Chrome

Add Apropos to Internet Explorer

Add Apropos to Opera









To add Apropos to your Mozilla Firefox Search Engines:



Add the Firefox IPduh Apropos add-on from https://addons.mozilla.org/addon/ipduh-apropos/



OR



Click on this



OR


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos.






To set Apropos as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter http://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To add IPduh Apropos to your Search Engines on Chrome Based Browsers:



Click on this



To set IPduh Apropos as your default search engine on Chrome Based Browsers:


  • visit IPduh

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. You can also differentiate URIs you want to visit from URIs you want to decode and analyse by prepending !u to the ones you want to analyze, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos to your Internet Explorer Search Engines:



Click on this



OR






  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos.








To add IPduh Apropos to your Opera Search Engines:


  • visit IPduh

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to http://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








You can add Apropos over an encrypted connection to your Browser search engines.



Add Apropos over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Apropos over HTTPS to Chrome

Add Apropos over HTTPS to Internet Explorer

Add Apropos over HTTPS to Opera









To add Apropos over HTTPS ( an encrypted connection ) to the Mozilla Firefox Search Engines:



add the Firefox IPduh Apropos SSL add-on from https://addons.mozilla.org/en-US/firefox/addon/apropos-ssl/



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add IPduh Apropos SSL.






To set Apropos over SSL as the default search engine used for invalid URLs on Firefox and Mozilla Based Browsers ( Iceweasel , Seamonkey , etc ):


  • Enter about:config in the browser location bar.

  • Promise, you 'll be carefull.

  • Enter keyword.URL in the Filter: under the location bar.

  • Double-click on the keyword.URL result.

  • Enter https://ipduh.com/apropos/? in the text box that pops up

  • OK and close the about:config tab.








To set IPduh Apropos over SSL as your default search engine on Chrome Based Browsers:


  • visit the IPduh privacy page.

  • Click the Wrench

  • Click Settings

  • Choose IPduh Apropos SSL from the drop down list in the Search section under "Set which search engine is used when searching from the omnibox"






In Chrome's omnibox and when Apropos is set as the search engine used on the location bar, you can differentiate domain names you want to lookup from domain names you want to visit by prepending !d to your query eg: http://ipduh.com/apropos/?!d bing.no. If you want to decode and analyze a URI instead of visiting it you can prepend !u to your query, and jump to a Torrent Search by prepending !t to your query.



To add IPduh Apropos over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on IPduh Apropos SSL.








To add IPduh Apropos over HTTPS to your Opera Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Apropos.

  • set the Keyword -- a.

  • set the address to https://ipduh.com/apropos/?%s

  • The check boxes following are optional.

  • Hit OK








Torrent Search    Tools Menu

Search Torrents across all the major Torrent Trackers, Torrent Directories, and Torrent Search Engines.




Add the Torrent Search to your Browser Search Engines.



Add Torrent Search to Mozilla Firefox and Mozilla based browsers

Add Torrent Search to Internet Explorer

Add Torrent Search to Opera





To add Torrent Search to your Firefox Search Engines:



Add the Firefox Torrent add-on from https://addons.mozilla.org/en-US/firefox/addon/torrent/



OR


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Torrent Search.






To add Torrent Search to your Internet Explorer Search Engines:


  • visit the Torrent Search

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search.






To add Torrent Search to your Opera Search Engines:


  • visit the Torrent Search


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search.

  • set the Keyword -- t.

  • set the address to http://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








The Torrent Search is available through apropos with the !t guide.



Add the Torrent Search over HTTPS --an encrypted Connection-- to your Browser Search Engines.



Add Torrent Search over HTTPS to Mozilla Firefox and Mozilla based browsers

Add Torrent Search over HTTPS to Internet Explorer

Add Torrent Search over HTTPS to Opera





To add Torrent Search over HTTPS to your Mozilla Firefox Search Engines:



Add the Firefox Torrent SSL add-on.



OR


  • visit IPduh Privacy

  • click on the down arrow used to select search engine

  • click on Add Torrent Search SSL.






To add Torrent Search over HTTPS to your Internet Explorer Search Engines:


  • visit the IPduh privacy page.

  • click on the down arrow used to select search engine

  • click on Add Search Providers.

  • click on Torrent Search SSL.






To add Torrent Search SSL to your Opera Search Engines:


  • visit the IPduh privacy page.


  • click on the down arrow used to select search engine

  • click on Manage Search Engines.

  • click the Add... Button.

  • set the Name -- Torrent Search SSL.

  • set the Keyword -- t or whatever else you think appropriate.

  • set the address to https://ipduh.com/search/torrent/?q=%s

  • The check boxes following are optional.

  • Hit OK








gmap    Tools Menu

Display a set of coordinates ( latitude , longitude ) on a google map.





input:



Decimal latitude φ, longitude λ in the uri parameters



output:

A google map with a marker on the set of coordinates passed.


Examples of using gmap.






gmap/tolatlon    Tools Menu

Display and Find coordinates ( latitude , longitude ) on a google map.







input:



Markers with Right Click and decimal latitude and longitude in the uri parameters



output:

A google map with a marker on the set of coordinates passed.

You may right click on the map to enter markers and get the coordinates of points.


Examples of using gmap/tolatlon.

















ip  ip/whois  ip/dnsbl  ip/cidr  ip/ptr  ip/ptr/24  ip/dnstrace  ip/srv  ip/traceroute  ip/tor-exit  ip/list

 ip/whois/as  pdb/as  as/prefix  apropos  demux  demux/class  demux/list

 ipv6  ipv6/whois  ipv6/ptr  ipv6/dnstrace  ipv6/cidr  ipv6/traceroute

dns  dns/whois  dns/trace  dns/bl  dns/list  idn  idn/ace  idn/unicode

 anonymity check  url/decode  url/encode  url/bouncer  my/geoloc  epoch

© 1372644985 IPduh Search Contact Privacy








Krisis Moral di Era Digital: Analisis Kritis dan Strategi Penguatan Nilai Kemanusiaan dalam Ruang Siber

  Krisis Moral di Era Digital: Analisis Kritis dan Strategi Penguatan Nilai Kemanusiaan dalam Ruang Siber   Ringkasan Eksekutif Laporan ini ...