Why you shouldn't shine your IP

Hacker

Professional
Messages
1,044
Reaction score
834
Points
113
lweb.ru. Allows you to define a country, sometimes a city and a region. Additionally, there is information from the whois server. At this point you can find information about the provider, as well as a contact phone number and mail for abuse.

getipintel.net. The service determines on a scale from 0 to 1 what the likelihood of using anonymization tools is.

52a91e91e756f35bee1af.png

ip-score.com/checkip. Checker for different blacklists. Allows you to determine how "clean address". More than 4 lists indicate that the IP address was related to spam, botnet, etc. In order to view the lists, you must click on "More BLs".

dbbf5dfd1c4f5bcf545dc.png

ipqualityscore.com/user/proxy-detection-api/lookup. To check, you must go through a free registration. With the help of this service, you can get information about the use of proxy, VPN or TOR.

6f5b71231cd5ec35a7b04.png

iknowwhatyoudownload.com/ru/peer/. Resource for information on using torrent trackers. Thus, you can find out what a person has been downloading over the past few months through a torrent. It is possible to create an infected link and send it to the "victim". After that, you can look at the list of downloaded files.

List of services for working with IP addresses:
  • "XSpider 7.7" Checks and analyzes ports and you can get information about busy ports and vulnerabilities.
  • "Shadow Security Scanner" Audits the system and identifies the operating system, machine name, and date and time on the computer.

Conclusion
Having information about the user, it can be used for different purposes.

For example, some scammers try to blackmail inexperienced users. Among the list of downloaded files via torrent (you can check iknowwhatyoudownload.com/ru/peer/) there may be videos for adults, as well as various other formats. And users hardly want someone else to see this information.

You can think of 100 more different ways to use all the information about the IP address.

The bottom line is, don't pop your IP address.

What is needed for this?
Do not follow the links, log in to different services and do not use unverified software. For these purposes, you can use a virtual machine.
 
Top