Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

 

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      IP Ranges of the World!

      Recommended Posts

      Staff

      IP Ranges of the World!

      8.0.0.0-8.255.255.255  //United States
      9.0.0.0-9.255.255.255  //United States
      12.0.0.0-12.255.255.255  //United States
      15.0.0.0-15.255.255.255  //United States
      17.0.0.0-17.255.255.255  //United States
      19.0.0.0-19.255.255.255  //United States
      24.0.0.0-24.197.255.255  //United States
      28.0.0.0-28.255.255.255  //United States
      32.0.0.0-32.255.255.255  //United States
      38.0.0.0-38.255.255.255  //United States
      40.0.0.0-40.255.255.255  //United States
      44.0.0.0-44.255.255.255  //United States
      48.0.0.0-48.255.255.255  //United States
      52.0.0.0-52.255.255.255  //United States
      54.0.0.0-54.255.255.255  //United States
      60.0.0.0-60.255.255.255  //China
      61.0.0.0-61.255.255.255  //India
      62.0.0.0-62.255.255.255  //Israel
      63.31.0.0-63.255.255.255  //United States
      64.0.0.0-64.69.255.255  //United States
      64.71.0.0-64.220.255.255  //United States
      64.227.0.0-64.255.255.255  //United States
      65.0.0.0-65.255.255.255  //United States
      66.0.0.0-66.255.255.255  //United States
      67.0.0.0-67.255.255.255  //United States
      68.0.0.0-68.255.255.255  //United States
      69.0.0.0-69.255.255.255  //United States
      70.0.0.0-70.255.255.255  //United States
      71.0.0.0-71.255.255.255  //United States
      72.0.0.0-72.255.255.255  //United States
      74.0.0.0-74.255.255.255  //United States
      75.0.0.0-75.255.255.255  //United States
      76.0.0.0-76.255.255.255  //United States
      77.0.0.0-77.255.255.255  //Germany
      78.0.0.0-78.255.255.255  //Croatia
      79.0.0.0-79.255.255.255  //Italy
      80.0.0.0-80.255.255.255  //United Kingdom
      81.0.0.0-81.255.255.255  //Spain
      82.0.0.0-82.255.255.255  //United Kingdom
      83.0.0.0-83.255.255.255  //Poland
      84.0.0.0-84.255.255.255  //Hungary
      85.0.0.0-85.255.255.255  //Switzerland
      87.0.0.0-87.255.255.255  //Italy
      88.0.0.0-88.255.255.255  //Spain
      91.0.0.0-91.255.255.255  //Germany
      92.0.0.0-92.255.255.255  //United Kingdom
      93.0.0.0-93.255.255.255  //France
      96.0.0.0-96.255.255.255  //United States
      98.0.0.0-98.255.255.255  //United States
      99.0.0.0-99.255.255.255  //United States
      119.0.0.0-119.255.255.255  //China
      123.0.0.0-123.255.255.255  //Korea, Republic Of
      125.0.0.0-125.255.255.255  //Japan
      135.0.0.0-135.255.255.255  //United Kingdom
      139.143.0.0-139.255.255.255  //United Kingdom
      141.0.0.0-141.255.255.255  //Jordan
      142.0.0.0-142.255.255.255  //
      145.0.0.0-145.255.255.255  //Netherlands
      146.170.0.0-146.255.255.255  //United States
      148.0.0.0-148.113.255.255  //United Kingdom
      148.114.0.10-148.255.255.255  //United States
      149.0.0.0-149.255.255.255  //Turkey
      150.0.0.0-150.112.255.255  //China
      150.197.0.0-150.255.255.255  //Korea, Republic Of
      151.0.0.0-151.255.255.255  //Ukraine
      153.32.0.0-153.255.255.255  //United States
      154.0.0.0-154.255.255.255  //United Kingdom
      156.10.0.0-156.255.255.255  //Finland
      157.0.0.0-157.149.255.255  //China
      159.0.0.0-159.119.255.255  //Saudi Arabia
      159.121.0.0-159.255.255.255  //United States
      160.0.0.0-160.131.255.255  //United Kingdom
      160.151.0.0-160.255.255.255  //United States
      161.0.0.0-161.123.255.255  //United Kingdom
      161.124.0.2-161.255.255.255  //United States
      162.48.0.0-162.255.255.255  //United States
      163.0.0.0-163.204.255.255  //United Kingdom
      165.0.0.0-165.255.255.255  //United Kingdom
      166.0.0.0-166.255.255.255  //United Kingdom
      167.45.0.0-167.255.255.255  //Canada
      168.103.0.0-168.255.255.255  //United States
      170.0.0.0-170.255.255.255  //United Kingdom
      171.0.0.0-171.255.255.255  //Singapore
      172.0.0.0-172.255.255.255  //United States
      174.0.0.0-174.255.255.255  //Canada
      192.0.0.0-192.255.255.255  //United Kingdom
      193.0.0.0-193.255.255.255  //United Kingdom
      195.11.0.0-195.255.255.255  //United Kingdom
      198.0.0.0-198.255.255.255  //United Kingdom
      199.0.0.0-199.120.255.255  //United States
      199.122.0.0-199.255.255.255  //United States
      200.0.0.0-200.255.255.255  //Colombia
      202.0.0.0-202.255.255.255  //Australia
      203.60.0.0-203.255.255.255  //Australia
      204.35.0.0-204.255.255.255  //United States
      205.118.0.0-205.255.255.255  //United States
      206.0.0.0-206.255.255.255  //United States
      207.121.0.0-207.255.255.255  //United States
      208.0.0.0-208.239.255.255  //United States
      209.36.0.0-209.255.255.255  //United States
      210.0.0.0-210.255.255.255  //Australia
      214.0.0.0-214.255.255.255  //United States
      216.95.0.0-216.246.255.255  //United States
      217.7.0.0-217.255.255.255  //Germany
      218.0.0.0-218.255.255.255  //China

      Share this post


      Link to post
      Share on other sites
      this site generates ips from countries
       

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Hidden Content

        Give reaction to this post to see the hidden content.

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What IS Moriarty?
              Advanced Information Gathering And Osint Tool
              Moriarty is a tool that tries to find good information about the phone number that you provieded;
          ->Tries To Find Owner Of The Number
          ->Tries To Find Risk Level Of The Number
          ->Tries To Find Location,Time Zone Of The Number,Carrier
          ->Tries To Find Social Media Platforms That The Number Is Registered
          ->Tries To Find Links About Phone Number
          ->Tries To Find Comments About Phone Number
          ->Sends Sms To Phone Number With Amazon Aws

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. What is encryption?
           
          In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Only authorized parties can decipher a ciphertext back to plaintext and access the original information.
           
          What is shellcode?
           
          Shellcode is a set of instructions that executes a command in the software to take control of or exploit the program. Shellcode can be used to directly manipulate registers and the functionality of an exploited program. Shellcode is commonly written in machine code.
          What is Obfuscation?
           
          Obfuscation is the practice of making something difficult to understand or unintelligible. It is an act to deliberately avoid the attacker/defender to reveal the actual source code.
          Overview
           
          Obfuscator is designed to obfuscate the shellcode.
          The tool can be used to encrypt the shellcode in XOR or AES encryption.
          To encrypt the shellcode we can pass the file path argument or the URL from which the tool will download and encrypt the shellcode with specifying encryption format.
          The tool will use the default key ‘SuperStrongKey’ in case the /key parameter is not specified.
          The tool accepts the shellcode in 4 formats.
          1) C
          2) HEX
          3) BASE64
          4) RAW
          This tool can be helpful for the operators who want to encrypt the shellcode before using them with the process injection tool.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content.  
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Description
          Fully updated to include the best features of Windows, this is your complete guide to getting the best from the most popular operating system, powering over 700 million PC’s around the world.
          Containing hundreds of tutorials, guides and tips, the guidebook you hold in your hands is the best way to get more from Windows 10.
          From first time installation and setting up, to using the core apps and keeping your PC safe, The Complete Windows 10 Manual shows you everything you need to know to get started with Microsoft’s newest and greatest operating system, and to then take your knowledge further.
          Windows n ovice booting up your first laptop, there is something new to learn inside.
          Windows 10 essentials includes guides to everthing, from the best way to get your PC set up with new user accounts and the all important Microsoft account, to all the main elements of the Windows 10 desktop; including the brand new Start menu, Action Center and taskbar.
          These essential guides will make sure you understand the core features.
          The Start menu, taskbar and Action Center are likely to be three of the most used areas of the Windows 10 interface for most pepole.
          There have been several additions and improvements to these tools in the recent Anniversary update, making them even easier and more intuitive to use.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. GWTMap is a tool to help map the attack surface of Google Web Toolkit (GWT) based applications. The purpose of this tool is to facilitate the extraction of any service method endpoints buried within a modern GWT application’s obfuscated client-side code and attempt to generate example GWT-RPC requests payloads to interact with them.

          Hidden Content
          Give reaction to this post to see the hidden content.