Friday, September 26, 2025

Tools I collected during my time at Cloudflare...

 

https://github.com/barnybug/cli53 allows folk coming from AWS Route 53 to create a BIND file to upload to Cloudflare.

https://www.peeringdb.com/net/4224 Cloudflare peering.

https://stat.ripe.net/AS13335 Cloudflare on RIPE

https://bgp.he.net/AS13335 Cloudflare BGP

https://nettools-staging.as13335.net/ Cloudflare NetTools

https://www.dnsperf.com/dns-speed-benchmark check DNS performance for a given domain

https://developers.facebook.com/tools/debug/sharing/ check why content is not shareable on Feishbol

https://www.dareboost.com/en/website-speed-test-http2-vs-http1 HTTP/2 speed comparison

https://search.google.com/test/mobile-friendly Mobile-Friendly Test - Google Search Console

https://gf.dev/http2-test HTTP/2 test

https://http2.akamai.com/demo Check HTTP/2 browser support

https://eais.rkn.gov.ru/en/#form Check for Russian blocks

https://www.blocked.org.uk/ Check for UK blocks

https://www.denic.de/en/service/tools/nast/ DENIC Nameserver Predelegation Check Web Interface

https://httpstatus.io/ Easily check status codes, response headers, and redirect chains.

https://caddyserver.com/docs/mitm-detection Detecting HTTPS Interception

https://www.comlot.ch/en/gambling-in-switzerland/access-blocking/blacklist Switzerlads's Comlot’s blacklist of domain names of foreign gambling operators to be blocked

https://www.esbk.admin.ch/esbk/it/home/illegalesspiel/zugangssperren.html The blacklist of the Swiss Federal Gaming Board

https://www.radb.net/query The Internet Routing Registry - RADb

https://inforedes.labs.lacnic.net/

https://rdap-web.lacnic.net/

https://netox.apnic.net/

https://bgpview.io/

https://www.ripe.net/analyse/internet-measurements/ixp-country-jedi IXP Country Jedi

https://www.caida.org/services/

https://www.cidr-report.org/

https://www.smartfense.com/en-us/tools/spoofcheck/

https://observatory.manrs.org/

https://check-your-website.server-daten.de/

https://ping.pe/

https://filter.sa/en/unblock Request Saudi Arabia's Communications and Information Technology Commission CITC to remove a block.

https:/trustedsource.org/ McAfee® provides an online tool that enables you to check if a site is categorized within various versions of the SmartFilter Internet Database or the Webwasher URL Filter Database.

https://asm.ca.com/en/checkit.php CA App Synthetic Monitor

https://bkgtycvd.share.thousandeyes.com/view/tests/?roundId=1595020200&metric=availability&scenarioId=dnsServer&testId=1432487 1.1.1.1 in ThousandEyes

https://wheresitup.com/ Verify Global Accessibility Without Leaving Your Desk

https://wheresitfast.com/ Check your site’s status, DNS results & routes around the world!

https://shotsherpa.com/ View your website around the world without a single customs agent

https://exchange.xforce.ibmcloud.com/ IBM X-Force Exchange

https://www.linkedin.com/post-inspector/ LinkedIn Post Inspector

https://www.http3check.net/ HTTP/3 Check

https://gf.dev/http3-test Geekflare HTTP/3 Testing Tool

https://beian.miit.gov.cn/#/Integrated/recordQuery China ICP/IP address/domain name information filing management system

https://letsdebug.net/ Let's Debug is a diagnostic tool/website to help figure out why you might not be able to issue a certificate for Let's Encrypt™.

https://sweeps.ai/3rd-party-analyzer/ 3rd-party Performance Analyzer

https://dnsspy.io/labs/caa-validator DNS Spy: CAA record validator

Find the IP Address Ranges Used by Amazon S3

https://cloudflare-pages.manfredi.io/ Cloudflare Tools (Connection Statistics, Datacenter Statistics, Datacenter Map)

https://testconnectivity.microsoft.com/tests/o365 Microsoft Remote Connectivity Analyzer

https://mha.azurewebsites.net/ Message Header Analyzer

https://esnicheck.com/

https://domainbigdata.com/ DomainBigData is a big database of domains and whois records

https://petscams.com/ Petscams.com was created with the purpose of cataloguing the latest websites built by scammers.

https://securityheaders.com/

What is my IP address? — ifconfig.co

Online nslookup — Find DNS records nslookup.io

https://www.boce.com/ boce network monitoring platform (China)

https://dronebl.org/ DroneBL is a realtime monitor of abusable IPs, which has the goal of stopping abuse of infected machines.

https://www.entrust.com/resources/certificate-solutions/tools/certificate-transparency-search Entrust Certificate Search

https://rpki.cloudflare.com/

https://dynamic-dns-checker.tools.wiz.io/ Dynamic DNS Leakage Tester

https://www.nic.cl/dominios/doctorDNS/ doctorDNS, Herramiento de diagnóstico de DNS

https://ednscomp.isc.org/ EDNS Compliance Tester

https://ja3er.com/ This project is about collecting and sharing JA3 hashes.

https://sslbl.abuse.ch/ja3-fingerprints/ A list of malicious JA3 fingerprints identified by SSLBL. SSL Blacklist (SSLBL) is a project operated by abuse.ch

https://host-tools.com/ "online tools to test your Internet Speed, E-mail checker, your IP address, your Hostname, Domain DNS records, Domain Whois Information and more!"

https://www.cdnplanet.com/geo/ Content Delivery Networks per country

https://testlocal.ly/ TestLocally takes screenshots of websites from different locations around the world

https://ixp.cabase.org.ar/estadisticas.html Tráfico Agregado - IXPs CABASE Argentina

https://azurespeedtest.azurewebsites.net/ Azure Speed Test 2.0

http://awsspeedtest.xvf.dk/ AWS Region Speed Test

https://boce.aliyun.com/detect/http Alibaba Cloud's Network Detect Tool

https://cf.sjr.org.uk/tools/

https://otx.alienvault.com/ The World’s First Truly Open Threat Intelligence Community

https://www.robtex.com/ Robtex is used for various kinds of research of IP numbers, Domain names, etc

https://malpedia.caad.fkie.fraunhofer.de/ The primary goal of Malpedia is to provide a resource for rapid identification and actionable context when investigating malware.

https://opentip.kaspersky.com/ Kaspersky Threat Intelligence Portal


Bitcoin Abuse Database

https://www.bitcoinabuse.com/


Looking glasses

https://enterprise.verizon.com/why-verizon/looking-glass/

https://ipms.chinatelecomglobal.com/public/lookglass/lookglassDisclaimer.html

https://lg.serverius.net/

http://looking-glass.connect.com.au/lg/ TPG (AS 7545) and AAPT (AS 2764)

https://www.msk-ix.ru/en/lookingglass/ Moscow IX

https://www.cogentco.com/en/network/looking-glass

https://lookingglass.centurylink.com/

https://lg.telia.net/

https://lg.transtelco.net/

https://www.gin.ntt.net/looking-glass-landing/ NTT AS2914

https://bgp4.as/looking-glasses

https://netactuate.com/lg/

http://lg.gldn.net/ AS3216 PJSC "Vimpelcom"

http://lg.bt.net/cgi-bin/welcome  BT Looking Glass site AS5400 and AS3300 networks

https://lg.as3320.analytics.benocs.com Deutsche Telekom AG AS3320

https://lg.aussiebroadband.com.au/lg.cgi Aussie Broadband AS4764

https://looking.house/index.php 378 Looking Glass points from 174 companies in 51 countries

https://www.iptp.net/iptp-tools/lg/ IPTP Networks AS41095

https://lg.twelve99.net/ Twelve99 Looking Glass AS1299 Telia Carrier

https://lg.angolacables.co.ao/prefix_bgpmap/Luanda+Miami+Johannesburg+London+Lisbon+SaoPaulo/ipv4?q=1.1.1.1 Angola Cables AS37478

http://looking.cabase.org.ar/ Looking Glass CABASE Argentina

Friday, December 29, 2023

E: Release file for http://security.ubuntu.com/ubuntu/dists/jammy-security/InRelease is not valid yet (invalid for another 6h 16min 9s). Updates for this repository will not be applied.

 If y'all see this type of error while updating a distro on y'all's Windows Subsystem for Linux like so:


~$ sudo apt update

[sudo] password for alex:

Hit:1 http://archive.ubuntu.com/ubuntu jammy InRelease

Get:2 http://security.ubuntu.com/ubuntu jammy-security InRelease [110 kB]

Get:3 http://archive.ubuntu.com/ubuntu jammy-updates InRelease [119 kB]

Hit:4 https://pkg.cloudflare.com focal InRelease

Hit:5 http://archive.ubuntu.com/ubuntu jammy-backports InRelease

<snip>

Reading package lists... Done

E: Release file for http://security.ubuntu.com/ubuntu/dists/jammy-security/InRelease is not valid yet (invalid for another 6h 16min 9s). Updates for this repository will not be applied.

E: Release file for http://archive.ubuntu.com/ubuntu/dists/jammy-updates/InRelease is not valid yet (invalid for another 6h 16min 50s). Updates for this repository will not be applied.


issuing this command:


~$ sudo hwclock --hctosys


should allow you to update normally...

~$ sudo apt update

Hit:1 http://archive.ubuntu.com/ubuntu jammy InRelease

Get:2 http://security.ubuntu.com/ubuntu jammy-security InRelease [110 kB]

Hit:3 http://archive.ubuntu.com/ubuntu jammy-backports InRelease

Get:4 http://archive.ubuntu.com/ubuntu jammy-updates InRelease [119 kB]

Hit:5 https://pkg.cloudflare.com focal InRelease

<snip>

Fetched 229 kB in 10s (22.1 kB/s)

Reading package lists... Done

Building dependency tree... Done

Reading state information... Done

All packages are up to date.

Saturday, December 05, 2020

My phone journey thus far:

Palm Treo 600 > Palm Treo 800w > Sony Ericsson K700i  > Sony Ericsson K750i > Sony Ericsson K790i > Sony Ericsson Xperia pro > Geeksphone Keon > Flame > au Fx0 > Sony Ericsson Z3 Compact > Apple iPhone SE > Motorola One Hyper > Apple iPhone SE > Unihertz Jelly Star > ...

These are the phones I've used as "everyday carry" over the years and that had most certainly influenced the way I perceive mobile technology.

Sunday, November 10, 2019

"Shaping the Internet: History and Future" ISOC on-line course broken links

On slide 27/60 of the section 01_History of Internet I've found a broken link in the footnotes [12] and [13].

Broken: http://clinton6.nara.gov/1993/09/1993-09-15-the-national-information-infrastructure-agenda-for-action.html
Working: https://eric.ed.gov/?id=ED364215

On the Additional Reading section of slide 35/60 on the section 01_History of Internet the link for "timeline resource" is broken:

Broken: https://www.internetsociety.org/internet-governance-timeframe-2002-2016-0
Working: https://www.internetsociety.org/resources/doc/2013/internet-governance-timeframe-2003-2016/

On the resources section of slide 42/60 of the section 01_History of Internet I've found a broken link:

Broken: http://webcast.oii.ox.ac.uk/?view=Webcast&ID=20080128_216
Working: https://www.oii.ox.ac.uk/events/whats-in-a-name-the-history-and-future-of-the-domain-name-system/?videos

On the resources section of slide 54/60 of the section 01_History of Internet I've found two broken links:

Broken: http://www.isoc.org/oti/articles/0597/leiner.html
Broken: http://www.isoc.org/oti/articles/0797/leiner.html
Working: https://www.internetsociety.org/resources/doc/2017/brief-history-internet/


On slide 57/60 on the section "Technologica History of the Internet" this link "The Internet and the Public Switched Telephone Network: Disparities, Differences, and Distinctions" is broken:

Broken: https://www.internetsociety.org/sites/default/files/The%20Internet%20and%20the%20Public%20Switched%20Telephone%20Network.pdf
Working: https://docplayer.net/18924286-The-internet-and-the-public-switched-telephone-network-disparities-differences-and-distinctions.html

Saturday, November 09, 2019

Hack to fix VMware Horizon Client for 64-bit Linux in Debian Sid

If you try to run vmware-view after installing it with these instructions and are greeted by this error:

$ vmware-view
/usr/lib/vmware/view/bin/vmware-view: error while loading shared libraries: libpng12.so.0: cannot open shared object file: No such file or directory

You do this little hack:

# ln -s /usr/lib/x86_64-linux-gnu/libpng16.so.16 /lib/x86_64-linux-gnu/libpng12.so.0


Inspiration for this hack came from https://communities.vmware.com/thread/545364

Saturday, May 28, 2016

Update your Flame to B2G OS in 5 easy steps...

0. Get a GNU/Linux (64 bits) distro
1. Grab Firefox Nightly from https://nightly.mozilla.org/
2. Override add-on signing https://support.mozilla.org/kb/add-on-signing-in-firefox#w_override-add-on-signing-advanced-users
3. Get B2G Installer from https://lissyx.github.io/b2g-installer/
4. Go to about:b2g-installer
5. Follow the 3 easy steps there...

If you get stuck, please ask us questions at https://vector.im/develop/#/room/#mozilla_#fxos:matrix.org

Thursday, November 26, 2015

MozPost I'm yet to write...

Given today is a holiday at the daily grind, here I am trying to revive this olden blog of mine...

In my journey to became a hacker I've been contributing to the Mozilla Project since around early 2008 if memory serves me...

Below is a list of the major MozEvents I've participated at and that I still need to write blog posts for: