This only misses j./app/geoip.js, but that looks like a dead URL.
We provide free and paid web services, subscription-based downloadable databases, and free downloadable databases.
We can cover all of these with *./js/apis/geoip2,*./geoip. MaxMind’s GeoIP2 and GeoLite2 IP intelligence products and services are used to discover information about a specific IP address. geoip2/geoip2-0.1.0.jar.zip( 17 k) The download jar file contains the following class files or Java source files. Js./geoip/v2.0/country/me xmlhttprequestĒ Js./geoip/v2.1/insights/me xmlhttprequestĔ Js./js/apis/geoip2/v2.0/geoip2.js scriptĖ Js./geoip/v2.1/country/me xmlhttprequestđ1 sbin / iptables -A INPUT -s BAN-IP-ADDRESS -j DROP / sbin / iptables -A. Js./js/apis/geoip2/v2.1/geoip2.js scriptđ34 GeoIP is a method of determining your geographical location based on your IP. Grepping in our 100k crawl I see the following maxmind URLs related to geoip2 (along with site count): This only misses j./app/geoip.js, but that looks like a dead. I'm not sure where the image you've posted has come from but the evidence points to the site using a dated Geo IP list from Maxmind.We've decided to fix this by adding a temporary skiplist entry for the geoip2 path since they have a reasonably well defined API both for geolocation and device identification (that latter of which will not be skiplisted).
The geoip.jar file is the actual code used to access the database/file which is GeoIPLite.
::ffff:146.200.0.0,112,2638077,6252001,53.3667,-1.5000,0,0Ģ638077,EU,Europe,GB,United Kingdom,SHF,Sheffield,Sheffield,Europe/London CountryLookupTest.java These are written by a company called maxmind and are used to work out what country a person comes from based on their IP address.
Network_start_ip,network_prefix_length,geoname_id,registered_country_geoname_id,represented_country_geoname_id,postal_code,latitude,longitude,is_anonymous_proxy,is_satellite_provider command line option : -J or -json-pretty. We found more than 33 GB of keylogger data, containing stolen information from more than 173,000 victims. This tool uses a database to use the (pre-fetched) GeoIP2 data from. This is somewhat irrelevant though, because I've extracted the necessary info form the GeoLite2 City list and get this: Based on the collected data from more than 70 dropzones, we present an empirical study of this phenomenon, giving many first-hand details about the attacks that were observed during a seven-month period between April and October 2008. It looks like they have a few different Geo IP lists.Ī a lookup on their site uses their 'GeoIP2 Precision' list, however the image you've shared suggests it's their free ' GeoLite2 City' list that's in use.