Quantcast
Channel: PeerBlock Forums - Everything Else
Viewing all 52 articles
Browse latest View live

How to stop VPN leaks using PeerBlock (1 reply)

$
0
0
When you are using a VPN PeerBlock can be configured to stop DNS or packet leaks from your physical network adapter by using specific custom block and allow lists.

I've posted a tutorial on creating the custom block and allow lists at: [axablends.com]

Blocking Chaturbate Users (1 reply)

$
0
0
Hello everyone, I'm sure you all remember me from the Omegle.com IP list blocking located here, and linked to www.omeglewarden.com, well I'm very proud and happy to say that I am now collecting IPs by the thousands of users who use the website chaturbate.com

How?

Simple, I edit bios, and place a tracker code on them - They know about this, It serves a few purposes:

1: If in the event they need help with law enforcement due to a user (Has happened once) with threats - I can supply the IP
2: DMCA take down requests are made easier with the user who stole and posted the content. (Very hard to do, but do-able)
3: Capture 18,000 IPs per day from each broadcaster I have edited. Every day this amount grows by 1-2 people.

Currently, at 7/6/13 I have 11 people tagged.

This means every single day I update the lists, even if some of them are repeat visitors, it's O.K, peer-block removes the duplicates!

I use Excell to do my work in a matter of minutes Instead of 1 by 1

Daily I am adding:

11*18,000 = 198,000 IPs at a maximum potential.
We currently have 36,312 IPs on file, 887,376,854 on the main file (all ips) With 3 other lists that are too large to attach here! (All are too large to attach sadly!)

These lists are updated weekly, and of course this is for people who do not want to connect to known users of the site else-where, such as Skype or Omegle, chatrandom, facebook video chat and more.

Remember, All files are updated, and we have an Allow IP list as-well, Everything we're currently using is linked, but please visit our website for more lists, IP checks and more Info on security, IP blocking, Lists, IP-Blacklisting (skype) and more.

We will always keep up the good work, and as always our lists are free.

[www.omeglewarden.com]

~Omeglewarden~

Recent Hacker, botnet, harvester IPs list! (1 reply)

$
0
0
Hello again, Peer-block users, Omeglewarden here with a new list, and info!

We are crawling (manually) [www.projecthoneypot.org] 's country lists of recent hacker IPs (Verified Hackers, Botnets, Spam Servers and Harvesters) - and we are adding these IPs to our lists on our website, and main file (all ips we block).

These IPs are 100% verified as hackers, as always we remove IPs every 6 weeks with macros - So you won't be blocking out someone else by mistake, we hope.

Enjoy this free list, as they all are.

Visit us for more lists (Tor, Proxies, Omegle perverts, Chaturbate users, United States Government, Governments and more!)

[www.omeglewarden.com]

~Omeglewarden~

Hello (1 reply)

$
0
0
I'm new here and just want to say hi and i love peerblock. Also,is peerblock still being developed? There hasn't been any news updates for a while.

Block Iran, Iraq, India, Pakistan, Turkey Saudi Arabia from P2P. (no replies)

$
0
0
Hello again, OmegleWarden here - This file contains all the IP allocations for Turkey, Iran, Iraq, Pakistan, India and Saudi Arabia from P2P networks and Applications. This file is specifically for Omegle.com (and platforms similar) to block out these ranges, so you do not connect with them.

Reason: Most, and I do mean most people from these countries are not "dressed" via camera, or, they are recording material which, by all social means should never be seen or recorded. Though some are different, and not like this - However, Enjoy the list.

~OmegleWarden.

You can visit [www.omeglewarden.com] for more lists on P2P networking which includes Governments, Anti-P2P, Hackers, Malware, Proxies, PRISM, RAMOK, TOR, and more.

Department Of Defense WiFi/Mobile Internet + more (1 reply)

$
0
0
Attached is a file, which I am working on slowly as I uncover top-secret level WiFi/Base Connections.

These IP ranges are CIDR'd via [www.countryipblocks.net]
This automatically gives CIDR ranges, which allow me easier access to make these lists.

This list is brand-new, and contains IPs that probably should not be public.

There are DoD Wifi/Mobile, DoD base Internet, APO and more.

~OmegleWarden

P.S

Some of these ranges are Innaccurate, However, I will be fixing these lists as CIDRs are updated. Will keep list updated as possible.


List update 9/5/13
Most IP ranges probably should be /18 or /20'd But, Some are /16 /17 - Which is quite large.

Expect some normal IPs to be randomly blocked.
This list is not 100% perfect.

p2p block lists updating while my computer is asleep? (3 replies)

$
0
0
hello,
I have peeblock set to update its lists every day. just about every other day or so, peerblock on my laptop computer says that it has updated that day even though I didn't click on the update button. Does peerblock wake up my closed laptop every day to download updates? I've been re-installing peerblock every time I want to download something that could get me into trouble because I am not sure if it the block lists are actually updated.

Do Not Scan - Government IP list, LARGE. (3 replies)

$
0
0
This list is compiled from the United States Government, United Nations and F.B.I, C.I.A and some N.S.A IP's. This list is incredibly large, Almost 50,000,000 IPs are on this one list, so, get it while it's available.

This list includes:

Army & Air Force Exchange Service
US Department of Defense Network
US Navy
US Army
DoD Network Information Center
Level 1 Communications
Level 2 Communications
Level 3 Communications
Level 4 Communications
National Aeronautics and Space Administration
Navy Network Information Center (NNIC)
Department of National Defence
The Internet Access Company
U.s. Department Of State
Indiana State Library
Covenant Health
USDA Office of Operations
Central Intelligence Agency
U. S. Marshals Service
FBI Criminal Justice Information Systems
North Atlantic Treaty Organization
UK Defence Science and Technology Laboratory
University of Arkansas for Medical Sciences
VTX Services SA
USMC Network Operations Center
Stowe Access LLC
Lowe's Companies
Amazon.com
Sonic.net
Sonoma Interconnect
Eonix Corporation
National Security Administration
Department of Justice
Department of Energy

And much, much more.

As always you can find this list located at [www.omeglewarden.com] if you cannot access the website, we apologize for the strict security rules. So, we've placed the list here. :)

~OmegleWarden

Is your proxy detected? (no replies)

$
0
0
Yes, I know that the forums of peer-block are generally for "peer-block", which we all know I am a massive list creator. I have in the time of creating lists come to learn how to detect proxys, vpns,tor and other "Anonymizers".

So, I have created a light-weight script that you can connect to (website) which will run specific tests on your IP address.

Disclaimer: Peer-Block is not responsible for this post, or site. The site provided by the poster (OmegleWarden, Me) is held accountible for any issues you may receive with your server/service. The provided website will simply run a few port-scan checks, Header checks and Remote Port checks. There is nothing malicious provided, and no logs are kept.

Use this service to detect if you are truely Anonymous online or not.


However, until I can receive the knowledge of how to grab the factual IP, the IP is still your proxied connection.

You may use this service as commercial (Meaning testing out hundreds or thousands of connections before sending them online for users) or personal. Feel free to test even your local machine and see the results provided on a real connection (None actually!).

This should help people who, and yes there are a lot of "over paranoid users of the internet" become a little less paranoid while surfing over HTTP, remember, this is HTTP - not HTTPS.

HTTPS would be a much, much more secured enviroment for your communications.
HTTP (my check) requires no data from you except what your IP gives as Ports and Headers.

It's coded in PHP and works in about 5 seconds.



This post is not intended to be spam, or advertising, this is simply to attempt to help benifit those who wish to benifit.


Real Example:

We have tested your connection based on multiple aspects of IPv4 rules.
If we detected a proxy it will be listed below and list how we detected it.
If there are no results below this line then we were un-able to detect your proxy/vpn/tor/connection


Your IP was detected as 9*.1*1.1*6.1**


Proxy detected via port 80
Proxy detected via port 443
Proxy detected via port 22
Proxy Detected via Specific Ports being opened, Remote(80).
Proxy Detected via Specific Ports being opened, Remote(22).

Via: [omwprxychk.uphero.com]

Coding question/Help (2 replies)

$
0
0
I understand peer-block is not really the area to ask, or post this but i have looked at over 90 examples, 30 different websites and asked many people.

What I am trying to do is very simple in idea:

Use JavaSript or Ajax
Get .txt file
Read contents of .txt file for the user's IP address.
Return content line (the data, line it was found on) to the user.

So it would look like this

Return true: You IP was located on our database as OmegleWarden:IP-IP
Return false: Donothing

Can anyone help me?

~OmegleWarden

List of Proxy IPs (no replies)

$
0
0
Hello, OmegleWarden with another post/file.

We have been harvesting data on Proxys, or IPs with ports "20,21,22,79,80,81-86,88,443,139,443,444,445,500,1378-1378,2195,3178,5,000,6,000-6,005,6667,7000-7,005,8000,8080-8089,9,000-9,005,9050,9150 and compile a list.

[omwprxychk.com]

This link automatically updates, collects and saves to itself - It's basically a failsafe to the checks for Omeglewarden.com Though this list only contains about 1K proxys, either you wish to connect to them or block them out: they are provided for anyone.

Enjoy :)

ip lookup info (3 replies)

$
0
0
hey guys, got a quick question...

i'm wondering which is the best ip lookup site to goto to get some kind of detailed info regarding ip's that pb is blocking, google and bing most of the time aren't enough and ive seen some people here have detailed info on some ip's and i'm wondering if you could tell me what site you use to do so, thanks.

Massive 1.5mb autogenerating proxy list to block. (1 reply)

$
0
0
This list auto-creates itself, and updates every 30 minutes. In 4 hours (6,000) entries were made. All verified and all correctly documented for P2P format.


What is this list?

This list is a wide-scale attempt to create the worlds largest and up-to-date list on single IP ranged IPs which are verified as having a proxy running. You may either allow or block these IPs.

As stated: This list is auto-creating, and updating. Currently (9/30/13, 8:45 P.M E.S.T) The file contains (6,570) IPs, every 30 minutes that file is deleted, and replaced with the newest version on the server. The current size is: 245,616 bytes. By next week this will be one of the largest Proxy lists available.

(Some of these you can connect your own browser to and use as a Proxy, however I do not know exactly how to test for that during list creation, if anyone knows and would like to chip in, please do).

Enjoy!

[goo.gl]

(Message to the mods
I have placed this link here due to the size it will become, i have also placed it on a URL shortener as the manager of my affiliate hosting stated too many people (downloading/updating) will cause the (url+file) to be suspended, in that event I'd like to know what number that is).

Up-Coming list. DDoS (1 reply)

$
0
0
We will be collecting the IPs of Online Booters, we will be spending real money and hitting our own servers and recording the data. We will be doing this for the next 3 months. Each day we will release a list of IPs associated with the online booters.

These include for:

UDP attacks
DRDoS
Chargen
SSYN
SYN
UDP-LAG
TCP-AMP

These are what we are interested in, as layer 4 attacks are generally used to shut websites down, not to mention most home connections.

Once we've gathered most of the server IPs, and some of the randomized hijacked IPs - And verify they are there every second day (Double checking to make sure spoofing IS spoofing and not just randomization via pools of IPs).

We will release a stable IP list for CLOUDFLARE and other CDN structures for you to auto block.

Keep in mind, Peer-Block does not protect you or your website against DDoS, or, attacks that can stop your services, and Peer-Block does not advocate or endorse the use or the thought of 'DDoS protection'.

This is rather DDoS mitigation, automatically. We hope over the next few months we can help some web-hosts and masters.

~OmegleWarden

Resolve my Website (no replies)

$
0
0
Can any of you resolve my website's IP? I do not wish for you to post it online.. If you can actually find it, please post the first 3 numbers and nothing else.

The way it is set up is brilliant, and we monitor the connections quite heaviliy.

But please, anyone may try - we use cloudflare.

www.omeglewarden.com
(Try the resolvers)

If you need help mitigating or need someone to help you watch your traffic/ban users/DDoS prevention let me know.
You should understand when you see what my IP comes out to be. :)

~OmegleWarden

4chan.org IP list (1 reply)

$
0
0
Hello, we have created a new list for various reasons, this list is compiled of users of 4chan.org

I'm quite sure anyone could guess why we have created this list, and will keep it updated here, on peer-block, and our website - omeglewarden.com

Enjoy.

Portable latest (Beta) version (1 reply)

$
0
0
Would be nice to release a portable version for Beta testers too.
Thanks

Thanks peerblock and iblocklist :D (2 replies)

$
0
0
Hi all I just subscribed after 3 years of wanting to subscribe i now have what I wanted :D thanks for the lists and continued support with the peerblock client. Now its as if it never went 1 week per update :D

Pleasant surprise - making my browser usable while using utorrent (no replies)

$
0
0
Even though I am from Romania, where everything is much more lax when it comes to "torrenting", I decided to use PeerBlock as a precautionary measure. Took a few minutes to figure out how to use it and all was good.

After I started uTorrent, I liked watching the list of blocked IPs just scroll continuously. Anyway, I returned to browsing the web only to find something that hadn't happened before using PeerBlock. I could actually browse the net.

What I mean by this is, as some of you may know, using a torrent client while browsing the web can cause pages to load quite slowly sometimes.
So here I was, waiting, ready to stop some torrents for even youtube to work, for example, and I noticed that it wasn't the case anymore. Even with 120 torrents uploading (it slowed my browser either way, downloading/uploading), everything was fine. Maybe PeerBlock also blocked some addresses that would have otherwise bogged down my PC's internet connection.

On a sidenote, it was a software/Windows issue, as my theoretical max internet speed is 100mbs and I also had this issue using both my old router and my new one (which is properly configured).

So, anyway, just thought I'd share this.


Also, a sort of unrelated issue arose after I installed PeerBlock (and modified some settings in uTorrent the day before, so the actual cause can be either one), after a few hours I got a "an operation on a socket could not be performed because the system lacked sufficient buffer space or because a queue was full" error in uTorrent and all my webpages (in Firefox) wouldn't load.
Every page I opened just said New Tab and was blank.
Apparently this has to do with Windows XP running out of TCP buffers, which, for anyone interested, can be fixed using - [support.microsoft.com].

Vitesse.

PHP-Errors in this Forum (2 replies)

$
0
0
Hello

when I click on Forum Settings in the Control Center, I get this PHP-Errors:

Warning: file_exists() [function.file-exists]: open_basedir restriction in effect. File(./templates/.htaccess/info.php) is not within the allowed path(s): (/srv/cpanel/home/peer:/usr/lib/php:/usr/local/lib/php:/tmp) in /srv/cpanel/home/peer/public_html/forums/common.php on line 1737

Warning: Cannot modify header information - headers already sent by (output started at /srv/cpanel/home/peer/public_html/forums/common.php:1737) in /tmp/tpl-peerblock-header-16ac5850ffe9ba58aabe04650124b372.php-stage2 on line 5

This could be easily fixed I guess. If it should not be fixed, at least these warnings should be omitted.

frank
Viewing all 52 articles
Browse latest View live