SlideShare a Scribd company logo
1 of 8
country2ip mapping entire country netblocks
Done already publicly? ,[object Object],[object Object]
Registry DBs (whois) ,[object Object],[object Object],[object Object],[object Object]
Mapping Methodology ,[object Object],[object Object],[object Object],[object Object]
Problems ,[object Object],[object Object]
Applications for this data ,[object Object],[object Object],[object Object],[object Object]
Open source geoip DBs ,[object Object],[object Object]
Lame PoC ,[object Object],[object Object],[object Object],[object Object]

More Related Content

Viewers also liked

The Road Not Taken by Robert Frost
The Road Not Taken by Robert FrostThe Road Not Taken by Robert Frost
The Road Not Taken by Robert Frost
guest32aaed
 
E D N I I D W O R L D S M H
E D N I  I D W O R L D  S M HE D N I  I D W O R L D  S M H
E D N I I D W O R L D S M H
red.es
 
Lvi Eristys
Lvi EristysLvi Eristys
Lvi Eristys
edgelvi
 
23 Apos Pentecostes 2007
23 Apos Pentecostes 200723 Apos Pentecostes 2007
23 Apos Pentecostes 2007
evertongw
 
Action Group
Action GroupAction Group
Action Group
actiongroup
 
Mapa Web 20
Mapa Web 20Mapa Web 20
Mapa Web 20
blogfqcr
 
Psicologia Juridica
Psicologia JuridicaPsicologia Juridica
Psicologia Juridica
guestff2615
 
Zoodebilbao
ZoodebilbaoZoodebilbao
Zoodebilbao
jcchichi
 

Viewers also liked (20)

10. Slideshare
10. Slideshare10. Slideshare
10. Slideshare
 
Проект "Возвращение к истокам"
Проект "Возвращение к истокам"Проект "Возвращение к истокам"
Проект "Возвращение к истокам"
 
ANALISIS OCUPACIONAL PARTICIPATIVO
ANALISIS OCUPACIONAL PARTICIPATIVOANALISIS OCUPACIONAL PARTICIPATIVO
ANALISIS OCUPACIONAL PARTICIPATIVO
 
The Road Not Taken by Robert Frost
The Road Not Taken by Robert FrostThe Road Not Taken by Robert Frost
The Road Not Taken by Robert Frost
 
Webkey Catlog
Webkey CatlogWebkey Catlog
Webkey Catlog
 
E D N I I D W O R L D S M H
E D N I  I D W O R L D  S M HE D N I  I D W O R L D  S M H
E D N I I D W O R L D S M H
 
Lvi Eristys
Lvi EristysLvi Eristys
Lvi Eristys
 
23 Apos Pentecostes 2007
23 Apos Pentecostes 200723 Apos Pentecostes 2007
23 Apos Pentecostes 2007
 
Action Group
Action GroupAction Group
Action Group
 
3
33
3
 
Fútbol Sala Temporada 2006 07
Fútbol Sala Temporada 2006 07Fútbol Sala Temporada 2006 07
Fútbol Sala Temporada 2006 07
 
Corso privacy
Corso privacyCorso privacy
Corso privacy
 
Mapa Web 20
Mapa Web 20Mapa Web 20
Mapa Web 20
 
Psicologia Juridica
Psicologia JuridicaPsicologia Juridica
Psicologia Juridica
 
六上 閱讀計畫
六上 閱讀計畫六上 閱讀計畫
六上 閱讀計畫
 
Prohibidollorar
ProhibidollorarProhibidollorar
Prohibidollorar
 
Preview Pesbrasil 3.0 28/Nov: Times
Preview Pesbrasil 3.0 28/Nov: TimesPreview Pesbrasil 3.0 28/Nov: Times
Preview Pesbrasil 3.0 28/Nov: Times
 
Shearing1
Shearing1Shearing1
Shearing1
 
Zoodebilbao
ZoodebilbaoZoodebilbao
Zoodebilbao
 
ATACS D'ASMA
ATACS D'ASMAATACS D'ASMA
ATACS D'ASMA
 

Similar to GNUCITIZEN Country2ip

Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
F _
 
Taking The Cloud Native
Taking The Cloud NativeTaking The Cloud Native
Taking The Cloud Native
Corey Clark, Ph.D.
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
drewz lin
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs
 
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docxd i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
theodorelove43763
 
Exploitation and State Machines
Exploitation and State MachinesExploitation and State Machines
Exploitation and State Machines
Michael Scovetta
 

Similar to GNUCITIZEN Country2ip (20)

Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
Gobot Meets IoT : Using the Go Programming Language to Control The “Things” A...
 
(120303) #fitalk ip finder and geo ip for fun
(120303) #fitalk   ip finder and geo ip for fun(120303) #fitalk   ip finder and geo ip for fun
(120303) #fitalk ip finder and geo ip for fun
 
(120303) #fitalk ip finder and geo ip for fun
(120303) #fitalk   ip finder and geo ip for fun(120303) #fitalk   ip finder and geo ip for fun
(120303) #fitalk ip finder and geo ip for fun
 
Hitbkl 2012
Hitbkl 2012Hitbkl 2012
Hitbkl 2012
 
Spatial mongo for PHP and Zend
Spatial mongo for PHP and ZendSpatial mongo for PHP and Zend
Spatial mongo for PHP and Zend
 
Internet of Thing, is there a place for C# and .NET Framework?
Internet of Thing, is there a place for C# and .NET Framework?Internet of Thing, is there a place for C# and .NET Framework?
Internet of Thing, is there a place for C# and .NET Framework?
 
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summerDEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
DEF CON 27 - D4KRM4TTER MIKE SPICER - I know what you did last summer
 
Taking The Cloud Native
Taking The Cloud NativeTaking The Cloud Native
Taking The Cloud Native
 
college quiz-1.pptx
college quiz-1.pptxcollege quiz-1.pptx
college quiz-1.pptx
 
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitationsAppsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
Appsec 2013-krehel-ondrej-forensic-investigations-of-web-exploitations
 
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
 
G33k Sp3ak Decoded
G33k Sp3ak DecodedG33k Sp3ak Decoded
G33k Sp3ak Decoded
 
Hashgraph as Code
Hashgraph as CodeHashgraph as Code
Hashgraph as Code
 
SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!SecTor '09 - When Web 2.0 Attacks!
SecTor '09 - When Web 2.0 Attacks!
 
Edge
EdgeEdge
Edge
 
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docxd i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
d i g i t a l i n v e s t i g a t i o n 6 ( 2 0 1 0 ) 9 5 – 1 .docx
 
Software Is Details
Software Is DetailsSoftware Is Details
Software Is Details
 
Exploitation and State Machines
Exploitation and State MachinesExploitation and State Machines
Exploitation and State Machines
 
Null HYD Playing with shodan null
Null HYD Playing with shodan nullNull HYD Playing with shodan null
Null HYD Playing with shodan null
 
Coding Is Maneuver
Coding Is  ManeuverCoding Is  Maneuver
Coding Is Maneuver
 

Recently uploaded

Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 

GNUCITIZEN Country2ip