And according to https://tools.keycdn.com/http2-test it looks like they took advantage of its performance feature too. So using HTTPS on the Store means taking advantage of a 21st century version of the protocol. Not sure if the image CDNs support it yet though, and some Store pages have mixed content still.
This will give you basic idea of where the IP could be located.
You will not get any other info without a warrant. Enable 2FA on the account so it doesn't happen again.
A little bit of testing - by matchmaking in Rivals & then checking the the IP address shown in the Geo-Filter section of my router OS - has suggested there is an active UK server, based in central London and hosted by AWS (Amazon):
https://tools.keycdn.com/geo?host=18.133.1.111
I had though to reduce my Geo-Filter location to UK only and it took a few attempts to match-up there; as it normally looks to connect me to a European server (historically Frankfurt, but more recently Paris) and so I end up with a host of 'lost connections' before getting to the ready to matchmake screen.
So EA are certainly expanding the data centers they are using.
The three CSS files with the long purple bars towards the top are what is slowing down the page being loaded. Purple means "waiting" which basically means the browser is waiting for the server to send the file. Given they are CSS files they should be served statically and come back very quickly when requested.
You could look at adding Cloudflare (the free option) in front of your server Cloudflare should cache and serve those files which will land them faster and reduce server load. I would still look at whether combining CSS and JS files into fewer files helps (using WP Optimize or similar) as fewer requests to the server is generally better. Note that combining CSS files (or JS files) can mess up the appearance of the site so you may need to switch it off.
Lastly, check that your site is served over HTTP/2 (https://tools.keycdn.com/http2-test) as this will improve performance when there are lots of files.
That sucks that you still can't access the game. I still think it's a problem with your ISP or something. The only thing that changed for gats.io was the domain name, we're still using all the same servers behind the scenes.
This site shows that the game is loading fine from 6 different global locations: https://geopeeker.com/fetch/?url=gats.io
And this service shows that http://gats.io is available from another 14 locations: https://tools.keycdn.com/ping
We're using Vultr to host the servers, the actual number of servers increases/decreases depending on the demand. Right now, there are 8 servers, we can scale up to a max of 25 if we need to.
That's a rough issue for sure, If they won't resolve the IP not even a trace route would work.
Perhaps you can show your ISP that outside their network it works but while on it you can't even trace route
if you check with dig
, is your hostname resolving to the server's IP address?
Can you check for web connectivity with curl
?
Learning how to troubleshoot your site issues from your own device's CLI is an immensely valuable skill to have. I also like to troubleshoot DNS and connectivity issues with some external tools such as these:
>212.32.237.101
I'm pretty sure you have DNS hijack happening. If you use online Traceroute, which traces from 14 different locations, they all point to a different IP - 13.107.4.52.
Not certain of which AWS youll be playing on. From task manager (ctrl+shift+esc) performance > network (ethernet or wifi) > resource monitor (bottom of window) > TCP connections.
Find the fallout76.exe in the list and copy all the "Remote Address" IPs addresses. There will be about 10 or so, 21ish connections many will be the same IP, just different ports. You can Select all of them and hit Ctrl+C to copy, then dump them into a text file.
With IPs in hand, Gelocate em here: https://tools.keycdn.com/geo
Server matching is automatic, Id assume its based on ping stats. EG: the server thats closest responds the fastest, so youll get dropped onto it. (this doesnt seem to be the case in survival. I get the same server repeatedly)
To get on an american server, just hop on with a freind thats on american servers. Dunno why you'd want to as you'll be instantly increasing your lag times by a sizable amount.
Solved it. It turns out I needed to add the full trust chain in the cert file on my "Server".
I used the comodo 90 day cert instead of the lets encrypt cert.
Heres now I laid out the server.crt on the "Server"
The freshly issued comodo cert ontop.
The 2 comodo intermediate certs.
The root comodo cert
I used this tool to check my chaining. https://tools.keycdn.com/ssl
Solved it. It turns out I needed to add the full trust chain in the cert file on my "Server".
I used the comodo 90 day cert instead of the lets encrypt cert.
Heres now I laid out the server.crt on the "Server"
The freshly issued comodo cert ontop.
The 2 comodo intermediate certs.
The root comodo cert
I used this tool to check my chaining. https://tools.keycdn.com/ssl
well you don't need to be a hacker to get someones IP.
If eg. a good catfish on Tinder can make you click a fake youtube link with grabify.com he already has your IP. To find your IP via exploit (like the one in your linked article) is unlikely and if then it would only be people with deep technical knowledge.
If you have the IP you can simply open up an IP geolocation site and track it down. (However it's only as precise as a city area)
Like this one: https://tools.keycdn.com/geo
Your VPN looks too good to be true.
Rule of thumbs I would say are: if it looks to good to be true, it probably is. & If you don't pay for the product then you are the product. (They sell your information)
To find a good VPN you can take a look at this chart: https://thatoneprivacysite.net/simple-vpn-comparison-chart/
Don't expect a good VPN to be free tho ;) If you only use the VPN for Tinder and you don't care about them selling your data - that's fine too if it's only for Tinder.
It's good to see people that still care about privacy tho :)
Good luck with the client side workaround. It's notifying you that your server is vulnerable to Logjam. It's worth it to beef up the Ciphers you use for SSL on your server.
When you start making changes, use a Logjam checker to see if your fixes are working.
Psh, according to the tool https://tools.keycdn.com/logjam my server is not susceptible. I can't remember the last time I configured it but I do remember configuring it to only use 'strong' ciphers. I guess I did it right
It's explained well on this website: https://tools.keycdn.com/geo
Basically, when ISPs request/get public IP addresses they have to register as the owner, which includes their location. Most likely your ISP is located in Sydney and your IP address is registered to their main office.
I have the same problem. Websites always assume I'm in Taipei but I don't live there.
It may depend on your internet connection it's self. Without having data sent from your device websites will sometimes fall back to using IP locations which are usually fine for language, etc, but there are instances where larger companies might have different netblocks registered in different regions where an IP geolocates to somewhere else. To compound this issue, geolocation by IP addresses are serviced by various different databases. Right now I can go to two different Geolocation IP sites and get two different results. Try searching for "Geolocation IP" but here's one site you can use: https://tools.keycdn.com/geo
Here are the results to googles DNS servers using this website https://tools.keycdn.com/traceroute :
9.|-- 8.8.8.8 0.0% 4 1.8 1.8 1.6 2.1 0.2
I would assume that these numbers are good? What does this result tell me?
Should I be using googles DNS servers for my router?
kanka ben pek bilmiyorum ama büyük ihtimal bişey değiştirmen gerekmez ya eğer tam güvenlik istiyosan harbiden iyi olan (bedavalar değil) bi vpn kullan derim sadece bu ip ile alakalı konuyu website design ettiğim için biliyordum bu arada şu linke giderek websitelerinin senin hakkında bildiği bilgileri görebilirsin bunlar sana fazla geliyorsa dediğim gibi vpn kullan
So I went to iplocation.net , whatismyipaddress.com, and tools.keycdn.com. I plugged in my ip address. one says I was in Washington State. Another says I was in Georgia and the third one said I was in the Midwest.
amazon.co.uk has a DNS A record of 54.239.33.58, which is in Ireland. So the website is, in fact, based in Ireland.
I’m just describing what they are doing. I’m not advocating for or against it. I didn’t invent the international trade system.
No. Someone knowing your public IP is not inherently a security risk. Here's mine: 98.10.36.150
Here's the information you can see about my location: https://tools.keycdn.com/geo?host=+98.10.36.150
Update for GTA is being widely reported on the front page, nothing to do with that most likely.
Do a google search. At the bottom of the page, it tells me my home city, and it is correct - and it tells me it's getting this from my IP. Your hacker is not doing anything clever, just using information available to anyone. This site https://tools.keycdn.com/geo is also accurate for my home town. Paste in any IP and it will tell you the location, that's as far as anyone can go though.
Just reset your xbox/gta account passwords as a precaution...
Not sure the exact method target uses to determine the users location, but assuming just based on IP it could be wrong/outdated ip geolocation info. You can check what location is reported for your ip here: https://tools.keycdn.com/geo
Hmm, sounds interesting. I have just tested setting up multiple A records, it seems to do the trick. But I want to have something that can check for responses of my proxies and remove them if not responding. My current solution works for the most part, you can see it here: https://tools.keycdn.com/ping - Then ping "ingest.perth.mitch.gq" and watch the different addresses appear under each location.
I don't think I'm able to do much with the router/ONT, since they're in a place that isn't very accessible.
I have tried pinging the "IPv6 WAN Address" from https://tools.keycdn.com/ipv6-ping before (with IPv6 "WAN PING block mode" disabled) and always get the same 100% packet loss. You may be right that Telus has to fix something.
For the NAS running DSM, I try to determine IPv6 access two ways:
Is there any way you can unplug your router form the ONT, and plug your Windows machine into the ONT directly (into the port currently used by the router)? Windows has a DHCPv6 client built in (although as I'm not a Windows guy, I have no idea if you need to do anything to enable it or if it's automatic), and should be able to get an address and route directly from Telus. You should be able to use this to see if you're getting any IPv6 connectivity in the first place.
I'm not sure why you're not able to ping6 from your router, but maybe try it in the other direction: this site allows you to ping6 an IPv6 address from multiple locations around the world at once. Give it your routers IPv6 WAN Address (the 2001:
public address), and see if you get a response (you may want to double-check that the IPv6 security settings have stealth mode disabled, and all your ICMP and traceroute options allow service in and out first).
If you don't, then it would seem there is some sort of routing issue between your router and Telus. That's probably going to require Telus to fix, but I'm really hoping that's not the case.
BTW, how are you verifying that your NAS doesn't have IPv6 access? It's good that it seems to be getting an address and a default route automatically, but I'm curious as to what you've been able to attempt to see if it's working or not. Who knows? It might give us a clue!
So, that's not the same as the stadia game servers. This is the address of a load balancer for the web site and you can be served from a number of locations, depending on far-too-many parameters.
E.g. try using this: https://tools.keycdn.com/ping. You'll see that it shows single-digit milliseconds for US, Europe and Asia, something that is not physically possible (because of the speed of light). It happens though because each location is hitting an endpoint that's close to them instead of travelling through countries and continents.
Interesting question. Looking glass is a software server with access to its routers in the ASN. The rest is just data aggregation I guess.
Hmm, interesting. I have no idea what CGNAT is, but on my routers config page it claims I have a different IP than the one i get when i go to whatismyip.com or similar sites.
on whatismyip i see 74.113.#.# (Which I think is right)
on my router config page, it claims my external ip is 100.64.#.#
EDIT: I used https://tools.keycdn.com/ping to ping both ip's, and got nothing
EDIT2: So I looked up this CGNAT shit. Yeah, you'd think they would tell me that! Holy crap this could have all been avoided!
Calling ISP tomorrow to complain and get a real IP.
Using whatismyipaddress.com, whatismyip.com, tools.keycdn.com, (ultratools gives me a bunch but I don't understand anything), I can get a general info of city, region, country, isp, asn, postal code and somewhat of a longitude and latitude. I suppose this won't be any help?
Seems like you are playing on the wrong server when having auto pick on.
https://youtu.be/6tfwdnY5cDg?t=57 watch this until ~2:30.
You can check your IP location here
Yes, exactly, having GPS in a desktop computer would make no sense at all. GPS requires a clear view of a large portion of sky so that there is nothing between four or more satellites and the device. It's preferred that the satellites being used are as far apart as possible. GPS is just plain not intended for indoors or even close to buildings.
OP, your computer does not have GPS. if it does have wireless do you have it turned on? Again it doesn't matter if you're connecting with it, it matters if it's on. If it's on then it will be looking for nearby devices to help figure out where it is located; and if somebody has moved a device, whose location was already known, from a distance away to close to your computer then that could fool Maps into thinking that you're close to that device since that will then be one of its few indicators as to your location.
Try turning off your WiFi. Also, tell us if this shows your correct location, and if not how far away is it? https://tools.keycdn.com/geo?host=199.7.159.51
ISPs generally assign IP address ranges to certain head end pools. This information can be gathers and IP addresses can be correlated to particular cities from the pool info. Frequently ISPs go so far as to put locality specific info in the revers dns pointers for the IPs.
All of this is worthless if you use tor browser or a vpn or other ip obfuscation tool.
Go here to see where your IP is geolocated to.
Brilliant, I've had a machine on the local network set up with RDP allowed, a really long complex password etc, and I know I shouldn't, and no don't, but enabling this IDS and checking behaviour has shown me a brute force attack against that machine I was unaware of, from a IP in the netherlands https://tools.keycdn.com/geo?host=185.132.134.35
Checking the security logs on the Win10 machine in question there's been a brute force running on it for at least three days.
Thank you, for attracting my attention to this part of OpnSense.
Thanks for the heads-up. That really sucks for people having a genuine problem when their ISP acquires a new block of IP addresses which haven't been updated correctly. They can try one of the location sites, such as the two examples below, but that's not as accurate, because no one knows which service Crunchyroll actually uses, and if that one is behind the others getting updated, it could lead to false results if these use a different one.
If you want a trace route from other sites, there are various websites that will run a traceroute for you. In addition, you could fire up some VMs in various datacenters and run traceroutes from there.
This is what is most concerning to me about your original post. If you are seeing inbound SSH attempts on many different ports in your log, it sounds to me like your router is passing TCP traffic on any port uninhibited or another device in your network is compromised.
Fail2Ban and a new WAN IP are bandaid solutions as that traffic should not be reaching your server in the first place. I would start by verifying where the traffic is coming from. Look up the source IP using https://tools.keycdn.com/geo.
Since port 22 is not available publicly, it’s also possible that this traffic is coming from a compromised device on your local network. Take a look at your router’s DHCP leases and make sure you verify every device on your network. I’ve seen cases of Raspberry Pis hidden in server closets to snoop on corporate traffic. Take devices off the network one by one and see if the traffic stops.
I really would seek out a proper solution. Your spidy senses are correct; something is definitely wrong.
Moving goalposts, now we're talking Wordpress. I sure as hell could get WP to have a low TTFB.
See standard installation with Easy Engine:
https://tools.keycdn.com/performance?url=http://wp.agilegains.com/
https://performance.sucuri.net/domain/wp.agilegains.com
You're full of shit and can't own up to this. I don't care about WP engine, and their bullshit hosting.
TTFB is not even a good metric when it comes to performance. Why don't you show some 'tegridy - and just admit that you were wrong?
I didn't even say something against your business, just that I prefer to have root access. Because I'm a developer / system engineer and I build stuff. I know a thing or two about networking and the way http works, and how to optimize for speed. Nothing more, nothing less. I'm not taking anything away from you, except that I oppose wrong marketing communications.
I indeed put up a test-page just to prove my point.
It got a simple bootstrap template on it and is pretty much the standard nginx config on a very small DO droplet in central europe.
As I said, TTFB is dependent on where the request comes from relative to the server. And I'm happy with that load time. Here's two performance checks for your convenience.
https://tools.keycdn.com/performance?url=agilegains.com
https://performance.sucuri.net/domain/agilegains.com
We go from 5 ms in close proximity, up to 590 ms on the other side of the globe.
Check if your site supports HTTP/2.
Forget about the tutorial on how to serve static content from a cookieless domain. None of them works (tried some of them before) & you don't need it if your site is HTTP/2 compliant. You can disregard site speed test warning (GTMetrix, Pingdom, etc.).
Every reasonable XMPP provider does indeed provide some kind of transparency how their operate their servers, stating their status, what OS they run, how secure it is, etc. and yes they state their ToS and Acceptable Use Policy. I've been promoting XMPP ever since the creation of this reddit account, so yes I know what XMPP is.
They state that you can get a JMP number, my questions are, what is their privacy policy on this and how do their deal with the data of their users? How do their deal with the paid accounts and how is the process done in terms privacy for the users? You should have stated their privacy status and if you don't know anything about these things of the one you are promoting, why on earth are you then promoting it here in r/Privacy?
Riot games is in LA but that IP is Chicago time zone. I only looked at it briefly. The cox server he points out as throttling is also in Chicago which is the higher ping result of traveling across country. Not all the IP tracers are accurate.
A better method when Geo isn’t accurate is to do a global ping test. https://tools.keycdn.com/ping You can see the Riot server pings 17ms from New York and 50+ from California. It’s clearly an east coast and Cox routing to it is perfectly good.
Interesting and strange.
Do you have another device in your network that you could use to ping these mirrors?
What happens when pinging them with your phone via mobile data or from a service like https://tools.keycdn.com/ping?
Also, which mirror(s) are you testing with? It's extremely unlikely but maybe they're all down.
Your TTFB is really slow, should at least be under 300ms ( https://tools.keycdn.com/performance?url=https://troyharrington.com/ ), use cloudflare as DNS, then your images could get some love by optimizing them, you could save about 40-50% on them, even more if you combine them with webP images with either shortpixel.com or imagify.io . Then use a CDN like BunnyCDN.com that have great response time for their pop/nodes in US and around the world to.
This only will speed your website up a lot.
fiz o teste e aparentemente passou, mas quando eu pego o ipv6 que aparece no resultado e testo nesse outro site: https://tools.keycdn.com/ipv6-ping ele dá 100% de perda em todos os servidores. porque não conseguem pingar minha máquina?
>Thank you so much for your reply, I had a bit strange observation now...
>
>There is much speed fluctation when i test it on
>
>tools.pingdom.com
>
> and on
>
>https://tools.keycdn.com/speed
>
> but there is very little to no fluctation when test it on
>
>gtmetrix.com
>
>.
​
I loved reading it and "Split Season. Why?" post
It really helped that you provided tons of photo to help readers remember the scenes and the images loaded fast and quick for Blog Site (often blog images load so slowly, see if you add CDN to cache the images for international users, look at https://tools.keycdn.com/speed?h=5c3353c9978032431163fcc1 (Frankfurt location) and https://tools.keycdn.com/speed?h=5c3353e5978032655b349c76 (New York). For people in Europe, your website is taking almost double the time to load.
Lastly, it rendered quite poorly on my Amazon Kindle Fire and quite bad on my iPhone 6. For Desktop it was awesome experience but see if you can make website more mobile friendly. Look at https://search.google.com/test/mobile-friendly to test your website.
What host are you using? Also does it run on cpanel/whm?
You can see if your website uses http/2 by using online tools, and there is a way to do it on your browser but that's more complex. Here is one website that you can use to check https://tools.keycdn.com/http2-test
Solved it. It turns out I needed to add the full trust chain in the cert file on my "Server".
I used the comodo 90 day cert instead of the lets encrypt cert.
Heres now I laid out the server.crt on the "Server"
The freshly issued comodo cert ontop.
The 2 comodo intermediate certs.
The root comodo cert
I used this tool to check my chaining. https://tools.keycdn.com/ssl
In that case, maybe she did know it. Ideally the best way is to just look at the url and see if your IP address is in it. If it was like https://tools.keycdn.com/geo?host=34.229.1.1 (but with your ip address), then she knew. If it was like https://tools.keycdn.com/geo then she didn't.
But as most of the comments in here mention, it probably doesn't really matter that she knew it.
My second guess is that one of the places where she was stalking you allowed her to put a resource link (like an embedded image) that was hosted by her or a server where she could see the access logs. She'd be able to see IP addresses of anybody who loaded the image, and then use various methods to filter out which one was you.
Regarding how she found your IP address, are you sure she actually knew it? Is it possible it was a trick and the link she sent you will show you whatever IP address is being used to access the page? Like this: https://tools.keycdn.com/geo
I reported this same issue yesterday. I am in NY using optimum, every 2-3 games my ping to US east servers is 250+. So here is what I did, joined games until I got the problem server. Found my rocket league log files and looked up the last servers IP (104.156.245.134). Server was located in Miami, Traceroute is showing sometimes as much as 100% data loss on the last two hops. Even when I ping these servers from command prompt, they always return ping times of around 250. The traceroute ping times vary, but I consistently see larger than normal ping time when it gets closer to the Miami server.
I messaged u/dirkened and submitted a ticket, but have yet to receive a reply. This makes the game basically unplayable, as I have no idea if I'm going to get a normal or broken server.
Could this be specifically related to the way optimum routes traffic to Florida? Anyone with networking experience care to chime in, would really appreciate it!
Yah I'm confused. The extension isn't green on the website I tested, but https://tools.keycdn.com/http2-test shows that it's HTTP/2 enabled.
EDIT: https://cdnsun.com/knowledgebase/tools/http2-support-test says HTTP/2 is working as well.