Reverse IP Lookup
Find all sites hosted on a given server.
Domain / IP
Reverse Whois Lookup
Find domain names owned by an individual or company.
Registrant Name or Email Address
IP History
Show historical IP addresses for a domain.
Domain (e.g. domain.com)
DNS Report
Provides a complete report on your DNS settings.
Domain (e.g. domain.com)
Reverse MX Lookup [NEW]
Find all sites that use a given mail server.
Mail server (e.g. mail.google.com)
Reverse NS Lookup
Find all sites that use a given nameserver.
Nameserver (e.g. ns1.example.com)
IP Location Finder
Find the geographic location of an IP Address.
IP
Chinese Firewall Test
Checks whether a site is accessible from China.
URL / Domain
DNS Propagation Checker
View a complete report on the DNS settings for your domain. This tool is designed to assist webmasters and system administrators diagnose DNS related issues. A number of tests are run on your DNS settings with results displayed in an easy to understand manner.
A tool to limit the bandwidth (upload/download) of devices connected to your network without physical or administrative access. evillimiter employs ARP spoofing and traffic shaping to throttle the bandwidth of hosts on the network. This is explained in detail below.
This tool is the Windows GUI port of the original CLI tool Evil Limiter for Linux.
Requirements -- Windows 7 or higher
Missing requirements (including 3rd party applications, like Npcap) will be installed when running the setup.
The best example that I can give you for this is, the college networks where all the students are connected to the Wi-Fi router significantly slowing down the speed. So usually the only way to remove people from the network that you are using is via getting admin privileges to the router and then using the whitelisting or blacklisting method to mark devices on the basis of their MAC address and then remove from the network but unfortunately most of the time we don’t have admin privileges.
I mean if we had admin privileges to begin with we would have configured it in such a way so that problems like these wouldn’t happen in the first place. So now our goal is to block the users on our network or at least limit their internet speed without having admin.
Disabling LSO on Windows Server 2008 and higher
This is easily done using a NETSH command:
netsh interface tcp set global chimney=disabled
Disabling LSO on the Ethernet adapter
This works in all versions of versions of Windows Server since it's done at the driver level. Go to where the network adapters are located in the Control Panel. For Windows Server 2003, this will be under Network Connections. For Windows Server 2008, this will be under Network and Sharing Center –> Change Adapter Settings.
Now right-click on the network adapter and choose Properties from the pop-up menu. At the top of this windows will be a "Connect using" text field with the vendor and model of the network adapter. For my example, I'm using an Intel 52575 Gigabit adapter. Just below this text field, click on the Configure button.
Now click on the Advanced tab, which shows the configurable properties for the adapter. Find the entry for Large Send Offload. This is how it's labeled on Intel adapters, but will vary (sometimes wildly) for adapters from other other vendors. If it's modern adapter like this one, there will be a setting for both IPv4 and IPv6. For older adapters, there will only be a setting for IPv4. Change the value for Large Send Offload from "Enabled" (or "On") to "Disabled" (or "Off") and click on OK.
One issue that I continually see reported by customers is slow network performance. Although there are literally a ton of issues that can effect how fast data moves to and from a server, there is one fix I've found that will resolve this 99% of time — disable Large Send Offload on the Ethernet adapter.
So what is Large Send Offload (also known as Large Segmetation Offload, and LSO for short)? It's a feature on modern Ethernet adapters that allows the TCP\IP network stack to build a large TCP message of up to 64KB in length before sending to the Ethernet adapter. Then the hardware on the Ethernet adapter — what I'll call the LSO engine — segments it into smaller data packets (known as "frames" in Ethernet terminology) that can be sent over the wire. This is up to 1500 bytes for standard Ethernet frames and up to 9000 bytes for jumbo Ethernet frames. In return, this frees up the server CPU from having to handle segmenting large TCP messages into smaller packets that will fit inside the supported frame size. Which means better overall server performance. Sounds like a good deal. What could possibly go wrong?
In the hosting industry, the Domain Name System (DNS) is one of the most critical pieces, right behind websites themselves. Without DNS, that website you've worked so hard on would be completely invisible. (Although it's possible to access some sites using only the IP address of their web server, this is not the case for virtual websites, which require that their hostname be included in the HTTP request header. Without a working DNS record, virtual websites are completely inaccessible.) But I've found that DNS is something that is not well understood by many website operators. The basics of creating A records (which translate a hostname to an IP address) are simple enough, but when it comes to understanding how changes are propagated in DNS, this is often something of a mystery.
Our mission is to directly connect the world’s devices and enable a new era of decentralized computing.
Our software automatically handles the complexities of networking across physical network boundaries, dealing with mobility, and unifying cloud and edge to free you to spend your time building your projects and running your business. //
After installing and starting the service (which happens automatically on most platforms) your device will generate a ZeroTier address. This is a ten-digit address that looks like 89e92ceee5.
To actually connect to anything you will need to join a network. These have 16-digit network IDs that look like 8056c2e21c000001. You can get a network ID from someone else or you can create your own network at my.zerotier.com.
- Root Hints
- Root Zone File
- Root Trust Anchor
- Top-Level Domains
all ~1500+ top level domain names
As 2016 is coming to a close, we decided to look back on the past 4 years of data to see if we could find any interesting patterns in the ‘down’ events our customers experience.
Downtimes caused by timeouts have fallen each year from 85% of all ‘down’ events in 2012 to 67% this year while websites 500 errors are on the rise, nearly 80% year-over-year. I suspect it’s due to the increase use of CDNs like CloudFlare that are now kicking back 503s rather than the timeouts the source servers are showing.
Looking at our numbers, if your servers go down, there’s a slightly higher chance it will happen around 3:20 UTC on a Wednesday. Alerts will be most quiet around 16:45 UTC on Sundays.
From our data, a sysadmin’s worse day is around Nov 10 and the best is easily January 1.
-
LASVEGAS.COM sold for $90,000,000The lasvegas.com domain name was sold for $90 million (to be paid out over a few years), barring any termination of the agreement from the buying party. The agreement was made in 2005 between VEGAS.com, LLC, who is the company buying the domain name, and Stephens Media.
-
CARINSURANCE.COM sold for $49,700,000
-
INSURANCE.COM sold for $35,600,000
-
PRIVATEJET.COM sold for 30,180,000
-
VOICE.COM sold for $30,000,000
-
INTERNET.COM sold for $18,000,000
-
360.COM sold for $17,000,000
wave of the future, hand drawn in 1981
The year was 1981. We had a brand new software company as a client—VM Software, and they needed a poster to attract visibility at a trade show. The 80’s were a tumultuous time in the technology space. Mainframes were king, and it would be the mid to late part of the decade before we would even own a Macintosh which we leased along with a 10″ (maybe 12″) monitor, keyboard and mouse, for the princely sum of $15,000.
Along with my former partner, Alex Berry, we conceived a poster that would take the famous Hokusai wave and morph it into a new format—representing the transition from analog to digital and is reflective of where the software/hardware industry was starting to move. Mainframe technology and legacy systems were on their way out, and a new order was in its infancy. The internet was still just an experiment and would not be available to the public for many years to come.
Getting an image of the Hokusai wave was easy. I then contacted an illustrator that I had worked with and asked him if he would be able to create a digitized section of the map. Brad Pomeroy labored on creating hundreds of tiny little squares by overlaying an acetate sheet over a copy of the original lithograph and coloring each and every one by hand using Prismacolor pencils. While Brad was working on the digital version, we tried to figure out how to attack the line work. While this might be easy today using Illustrator or Photoshop—back then those programs did not exist. Instead, I had two designers laboriously ink each line on another vellum overlap using rapidographs and ink. Since the line work had to be precise, each artist could only work on it for 1/2 hour at a time—so three of us spent untold hours switching off. I still get requests for copies of the poster and people often want to know what program I used to create it and what filters I used. I get a chuckle out of that thinking that this poster really did portend the wave of the future. Oh, and one last hidden clue that I have never revealed—the Japanese calligraphy in the top left hand corner—it means “Grafik.”
A host is a host from coast to coast.
& no one will talk to a host that's close.
Unless the host (that isn't close)
is busy, hung or dead.
-- David Lesher wb8foz@nrk.com
A smartphone connected Ethernet network analyzer & cable tester that fits into your pocket.
It lets you check the ethernet link, find cable faults, PoE voltage, VLAN, DHCP results and much more with the press of a button. Finished? Then export those results in a detailed measurement report and send them to yourself or your client.
200EUR
2 Production Nameservers in separate datacenters
250,000 queries per month (more than enough in most non-business cases)
Dynamic DNS
Full zone control: A, CNAME, MX, NS, SRV, TXT, NAPTR and IPv6 (AAAA) records
Url Forwarding: Cloaked and redirects
Email Forwarding
Support via the Community Forums
Welcome to the Hurricane Electric Free DNS Hosting portal. This tool will allow you to easily manage and maintain your
forward and reverse DNS.
The Open Beta has been expanded and now includes our IPv6 certification or tunnelbroker account holders, Colocation customers and those with Transit services from us. If you do not have an account, you can sign up for a free one here or by clicking on the button to the left. For those with existing admin.he.net accounts, please contact Support support@he.net and request a password.
Features
Dualstack: Supports queries via both IPv4 and native IPv6.
Support for A, AAAA, ALIAS, CNAME, CAA, MX, NS, TXT, SRV, SSHFP, SPF, RP, NAPTR, HINFO, LOC and PTR records.
Smart mode IPv4 and IPv6 reverse zones simplifies reverse zones.
Slave support
Multiple reverse zone formats: Standard, RFC 4183, RFC 2317, DeGroot.
Geographically diverse servers.
Sanity checking for delegation for both forward and reverse zones.
Basic syntax checking for fields.
Multiple domains per account.
NTP Server Online Tester
This tool is useful to check if a given Network Time Protocol server is reachable over the internet using IPv4 and IPv6 connectivity.
Verify that your server and NTP service are up and running.
Verify that the time sources of your server are working well.
Verify that your server UDP 123 port is publicly accessible.
Recipients
You need to own a domain name and run a DNS service to use BuddyNS.
We serve individuals, NGOs, companies, universities, and large enterprises.
Activation
1 Create a free account
1 Add domains to protect
1 Allow BuddyNS on your DNS service
1 Delegate domains to BuddyNS
1 Enjoy security and continuity