Welcome to The Forum

Register now to gain access to all of our features. Once registered and logged in, you will be able to create topics, post replies to

existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile

and so much more. This message will be removed once you have signed in.

Active Hackers

The best community of active hackers. This community has been working in hacking for more than 10 years.

Hacker Forum

Hacker from all countries join this community to share their knowledge and their hacking tools

 

    Hacking Tools

    You can find thousands of tools shared by hackers. RAT's, Bot's, Crypters FUD, Stealers, Binders, Ransomware,, Mallware, Virus, Cracked Accounts, Configs, Guides, Videos and many other things.

      PRIV8

      Become a Priv8 user and access all parts of the forum without restrictions and without limit of download. It only costs 100 dollars, and it will last you for a lifetime.

      Read Rules

      In this community we follow and respect rules, and they are the same for everyone, regardless of the user's rank. Read the rules well not to be prohibited.

      Sign in to follow this  
      dEEpEst

      IP Ranges of the World!

      2 posts in this topic

      IP Ranges of the World!

      8.0.0.0-8.255.255.255  //United States
      9.0.0.0-9.255.255.255  //United States
      12.0.0.0-12.255.255.255  //United States
      15.0.0.0-15.255.255.255  //United States
      17.0.0.0-17.255.255.255  //United States
      19.0.0.0-19.255.255.255  //United States
      24.0.0.0-24.197.255.255  //United States
      28.0.0.0-28.255.255.255  //United States
      32.0.0.0-32.255.255.255  //United States
      38.0.0.0-38.255.255.255  //United States
      40.0.0.0-40.255.255.255  //United States
      44.0.0.0-44.255.255.255  //United States
      48.0.0.0-48.255.255.255  //United States
      52.0.0.0-52.255.255.255  //United States
      54.0.0.0-54.255.255.255  //United States
      60.0.0.0-60.255.255.255  //China
      61.0.0.0-61.255.255.255  //India
      62.0.0.0-62.255.255.255  //Israel
      63.31.0.0-63.255.255.255  //United States
      64.0.0.0-64.69.255.255  //United States
      64.71.0.0-64.220.255.255  //United States
      64.227.0.0-64.255.255.255  //United States
      65.0.0.0-65.255.255.255  //United States
      66.0.0.0-66.255.255.255  //United States
      67.0.0.0-67.255.255.255  //United States
      68.0.0.0-68.255.255.255  //United States
      69.0.0.0-69.255.255.255  //United States
      70.0.0.0-70.255.255.255  //United States
      71.0.0.0-71.255.255.255  //United States
      72.0.0.0-72.255.255.255  //United States
      74.0.0.0-74.255.255.255  //United States
      75.0.0.0-75.255.255.255  //United States
      76.0.0.0-76.255.255.255  //United States
      77.0.0.0-77.255.255.255  //Germany
      78.0.0.0-78.255.255.255  //Croatia
      79.0.0.0-79.255.255.255  //Italy
      80.0.0.0-80.255.255.255  //United Kingdom
      81.0.0.0-81.255.255.255  //Spain
      82.0.0.0-82.255.255.255  //United Kingdom
      83.0.0.0-83.255.255.255  //Poland
      84.0.0.0-84.255.255.255  //Hungary
      85.0.0.0-85.255.255.255  //Switzerland
      87.0.0.0-87.255.255.255  //Italy
      88.0.0.0-88.255.255.255  //Spain
      91.0.0.0-91.255.255.255  //Germany
      92.0.0.0-92.255.255.255  //United Kingdom
      93.0.0.0-93.255.255.255  //France
      96.0.0.0-96.255.255.255  //United States
      98.0.0.0-98.255.255.255  //United States
      99.0.0.0-99.255.255.255  //United States
      119.0.0.0-119.255.255.255  //China
      123.0.0.0-123.255.255.255  //Korea, Republic Of
      125.0.0.0-125.255.255.255  //Japan
      135.0.0.0-135.255.255.255  //United Kingdom
      139.143.0.0-139.255.255.255  //United Kingdom
      141.0.0.0-141.255.255.255  //Jordan
      142.0.0.0-142.255.255.255  //
      145.0.0.0-145.255.255.255  //Netherlands
      146.170.0.0-146.255.255.255  //United States
      148.0.0.0-148.113.255.255  //United Kingdom
      148.114.0.10-148.255.255.255  //United States
      149.0.0.0-149.255.255.255  //Turkey
      150.0.0.0-150.112.255.255  //China
      150.197.0.0-150.255.255.255  //Korea, Republic Of
      151.0.0.0-151.255.255.255  //Ukraine
      153.32.0.0-153.255.255.255  //United States
      154.0.0.0-154.255.255.255  //United Kingdom
      156.10.0.0-156.255.255.255  //Finland
      157.0.0.0-157.149.255.255  //China
      159.0.0.0-159.119.255.255  //Saudi Arabia
      159.121.0.0-159.255.255.255  //United States
      160.0.0.0-160.131.255.255  //United Kingdom
      160.151.0.0-160.255.255.255  //United States
      161.0.0.0-161.123.255.255  //United Kingdom
      161.124.0.2-161.255.255.255  //United States
      162.48.0.0-162.255.255.255  //United States
      163.0.0.0-163.204.255.255  //United Kingdom
      165.0.0.0-165.255.255.255  //United Kingdom
      166.0.0.0-166.255.255.255  //United Kingdom
      167.45.0.0-167.255.255.255  //Canada
      168.103.0.0-168.255.255.255  //United States
      170.0.0.0-170.255.255.255  //United Kingdom
      171.0.0.0-171.255.255.255  //Singapore
      172.0.0.0-172.255.255.255  //United States
      174.0.0.0-174.255.255.255  //Canada
      192.0.0.0-192.255.255.255  //United Kingdom
      193.0.0.0-193.255.255.255  //United Kingdom
      195.11.0.0-195.255.255.255  //United Kingdom
      198.0.0.0-198.255.255.255  //United Kingdom
      199.0.0.0-199.120.255.255  //United States
      199.122.0.0-199.255.255.255  //United States
      200.0.0.0-200.255.255.255  //Colombia
      202.0.0.0-202.255.255.255  //Australia
      203.60.0.0-203.255.255.255  //Australia
      204.35.0.0-204.255.255.255  //United States
      205.118.0.0-205.255.255.255  //United States
      206.0.0.0-206.255.255.255  //United States
      207.121.0.0-207.255.255.255  //United States
      208.0.0.0-208.239.255.255  //United States
      209.36.0.0-209.255.255.255  //United States
      210.0.0.0-210.255.255.255  //Australia
      214.0.0.0-214.255.255.255  //United States
      216.95.0.0-216.246.255.255  //United States
      217.7.0.0-217.255.255.255  //Germany
      218.0.0.0-218.255.255.255  //China

      • Like 1

      Share this post


      Link to post
      Share on other sites
      this site generates ips from countries
       

      Hidden Content

        Give reaction to this post to see the hidden content.
       

      Hidden Content

        Give reaction to this post to see the hidden content.

      • Like 3
      • Thanks 1

      Share this post


      Link to post
      Share on other sites
      Guest
      This topic is now closed to further replies.
      Sign in to follow this  

      • Similar Content

        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Brutemap is an open source penetration testing tool that automates testing accounts to the site's login page, based on Dictionary Attack. With this, you no longer need to search for other bruteforce tools and you also no longer need to ask CMS What is this? only to find parameter forms, because brutemap will do it automatically. Brutemap is also equipped with an attack method that makes it easy for you to do account checking or test forms with the SQL injection bypass authentication technique.

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By dEEpEst

          Hidden Content
          Give reaction to this post to see the hidden content. Scanner:

          Hidden Content
          Give reaction to this post to see the hidden content.
          Hidden Content
          Give reaction to this post to see the hidden content. Download:

          Hidden Content
          Give reaction to this post to see the hidden content. Password:
          level23hacktools.com
           
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content. Trigmap is a wrapper for Nmap. You can use it to easily start Nmap scan and especially to collect informations into a well organized directory hierarchy. The use of Nmap makes the script portable (easy to run not only on Kali Linux) and very efficient thanks to the optimized Nmap algorithms.

          Details
          Trigmap can performs several tasks using Nmap scripting engine (NSE):
              Port Scan
              Service and Version Detection
              Web Resources Enumeration
              Vulnerability Assessment
              Common Vulnerabilities Test
              Common Exploits Test
              Dictionary Attacks Against Active Services
              Default Credentials Test

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By itsMe

          Hidden Content
          Give reaction to this post to see the hidden content.
          CQURE Team has prepared tools used during penetration testing and packed those in a toolkit named CQTools. This toolkit allows to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team. CQURE was the first team that did full reverse engineering of DPAPI (Data Protection Application Programming Interface) and prepared the first public tool that allows monitoring WSL (Windows Subsystem for Linux) feature.

          This toolkit allows you to deliver complete attacks within the infrastructure, starting with sniffing and spoofing activities, going through information extraction, password extraction, custom shell generation, custom payload generation, hiding code from antivirus solutions, various keyloggers and leverage this information to deliver attacks. Some of the tools are based on discoveries that were released to the world for the first time by CQURE Team; some of the tools took years to complete, and all of the tools work in a straightforward manner. CQTools is the ultimate toolkit to have when delivering a penetration test. The tools work simply, and we use them in practice during our cybersecurity assignments. Come and have a look at how our CQTools can boost your penetration testing experience!

          Hidden Content
          Give reaction to this post to see the hidden content.
        • By JDKGreyHat
          I found a template that i really keen on, but now I have a trouble with the search label page.
          For example, this is my url label search: 
          Hidden Content
          Give reaction to this post to see the hidden content. It shows 20 posts at page 1 but then if you click on page 2, it still shows 20 page as your previous click in page 1.
          Who can help me find the solution in source code to make it show the older posts in a search label page, please 
          This is original demo: 
          Hidden Content
          Give reaction to this post to see the hidden content. This is  download link of the template: 
          Hidden Content
          Give reaction to this post to see the hidden content. I hope staff members can accept my post 😞
          Thanks you so much