Geoip

Author: v | 2025-04-24

★★★★☆ (4.5 / 2587 reviews)

movie converter

GeoIP Target Redirection and Target Filter Redirector using GeoIP API (JS) Topics. javascript js geolocation countries geoip geoip-location traffic-routing geoip-api geoip-target-redirection geoip-target-filter traffic-management

duplicator

GitHub - v2fly/geoip: GeoIP for V2Ray. Generate and release GeoIP

Using the menu "VPN Location Map" does show me a nice overview of the currently connected VPN connections (IPSEC, SSL VPN).However, the locations of the fortigate are most of the time somewhere in the Gulf of Guniea (0°S, 0°E). The physical location of all our fortigates is configured in FortiCloud (product details) with the address (street, ZIP, town, etc.). I did not find a way to set the device location in the fortigate GUI, nor via CLI. I checked with dia "geoip geoip-query " on each fortigate it's own location and it shows a somewhat accurate location (sometimes off by a lot, based on the ISP).So, I have several questions:How does the fortigate determine it's own location used for the VPN location map? From the location configuration in FortiCloud? (difficult, if not impossible)Via geo-ip query? (most likely)If yes, which IP is used in a milti VDOM environment with several WAN IP's per VDOM?Note: If I use "dia geoip geoip-query , I get the correct location (Berne, Switzerland), yet in the VPM Location Map, the fortigate is located somewhere in Germany.Two examples:fortigate1physical location: Berne, Switzerlandlocation on VPN map: somewhere in southern Germanydia geoip geoip-query: Berne, Switzerlandlocation fortigate 2 (IPSEC) in VPN Location Map: Thun, Switzerlandfortigate2physical location Thun, Switzerlandlocation on VPN map: Gulf of Guineadia geoip geoip-query: Berne, Switzerlandlocation fortigate 1 (IPSEC) in VPN Location Map: Berne, SwitzerlandHow is the location of VPN endpoints (SSL VPN, IPSEC VPN) determined?Looking at the maps on several fortigates with active VPN's, it seems that geo-ip GeoIP Target Redirection and Target Filter Redirector using GeoIP API (JS) Topics. javascript js geolocation countries geoip geoip-location traffic-routing geoip-api geoip-target-redirection geoip-target-filter traffic-management Proxy-listsNode.js module for getting proxies from publicly available proxy lists. Support for more than two dozen different proxy lists. You can see the full list of proxy sources here.Missing a proxy list that you think should be supported? Open an issue to suggest it be added as a source. Or you can add a new source and create a pull request to have it added to this module.InstallationUpdate GeoIp DatabaseCommand-line interfaceAPIgetProxiesOptionsProxy ObjectgetProxiesFromSourceOptionsaddSourcelistSourcesOptionsUsage with ProxyContributingConfigure Local EnvironmentTestsChangelogLicenseFundingInstallationIf you wish to use this module as a CLI tool, install it globally via npm:npm install -g proxy-listsOtherwise, you can add it to your existing node application like this:npm install proxy-lists --saveThis will install proxy-lists and add it to your application's package.json file.Update GeoIp DatabaseThis module uses geoip-lite to perform geoip-country lookups on IP addresses of proxies. The geoip-lite module ships with the free version of MaxMind's geoip database. This database stopped being directly included in the module due to a change on MaxMind's side - specifically with their end-user licensing agreements. So it is necessary for each end-user (that's you!) to create their own MaxMind account and then generate a license key.If you are using this module inside another project (via the API), use the following command to update the geoip database:npm run update:geoip-database license_key=YOUR_LICENSE_KEYIf you are using the CLI:proxy-lists updateGeoIpData --license-key YOUR_LICENSE_KEYCommand-line interfaceThis section assumes that you have proxy-lists installed globally and that it is available on your current user's PATH.To view the help screen for the CLI tool:To view the help

Comments

User3813

Using the menu "VPN Location Map" does show me a nice overview of the currently connected VPN connections (IPSEC, SSL VPN).However, the locations of the fortigate are most of the time somewhere in the Gulf of Guniea (0°S, 0°E). The physical location of all our fortigates is configured in FortiCloud (product details) with the address (street, ZIP, town, etc.). I did not find a way to set the device location in the fortigate GUI, nor via CLI. I checked with dia "geoip geoip-query " on each fortigate it's own location and it shows a somewhat accurate location (sometimes off by a lot, based on the ISP).So, I have several questions:How does the fortigate determine it's own location used for the VPN location map? From the location configuration in FortiCloud? (difficult, if not impossible)Via geo-ip query? (most likely)If yes, which IP is used in a milti VDOM environment with several WAN IP's per VDOM?Note: If I use "dia geoip geoip-query , I get the correct location (Berne, Switzerland), yet in the VPM Location Map, the fortigate is located somewhere in Germany.Two examples:fortigate1physical location: Berne, Switzerlandlocation on VPN map: somewhere in southern Germanydia geoip geoip-query: Berne, Switzerlandlocation fortigate 2 (IPSEC) in VPN Location Map: Thun, Switzerlandfortigate2physical location Thun, Switzerlandlocation on VPN map: Gulf of Guineadia geoip geoip-query: Berne, Switzerlandlocation fortigate 1 (IPSEC) in VPN Location Map: Berne, SwitzerlandHow is the location of VPN endpoints (SSL VPN, IPSEC VPN) determined?Looking at the maps on several fortigates with active VPN's, it seems that geo-ip

2025-04-13
User7206

Proxy-listsNode.js module for getting proxies from publicly available proxy lists. Support for more than two dozen different proxy lists. You can see the full list of proxy sources here.Missing a proxy list that you think should be supported? Open an issue to suggest it be added as a source. Or you can add a new source and create a pull request to have it added to this module.InstallationUpdate GeoIp DatabaseCommand-line interfaceAPIgetProxiesOptionsProxy ObjectgetProxiesFromSourceOptionsaddSourcelistSourcesOptionsUsage with ProxyContributingConfigure Local EnvironmentTestsChangelogLicenseFundingInstallationIf you wish to use this module as a CLI tool, install it globally via npm:npm install -g proxy-listsOtherwise, you can add it to your existing node application like this:npm install proxy-lists --saveThis will install proxy-lists and add it to your application's package.json file.Update GeoIp DatabaseThis module uses geoip-lite to perform geoip-country lookups on IP addresses of proxies. The geoip-lite module ships with the free version of MaxMind's geoip database. This database stopped being directly included in the module due to a change on MaxMind's side - specifically with their end-user licensing agreements. So it is necessary for each end-user (that's you!) to create their own MaxMind account and then generate a license key.If you are using this module inside another project (via the API), use the following command to update the geoip database:npm run update:geoip-database license_key=YOUR_LICENSE_KEYIf you are using the CLI:proxy-lists updateGeoIpData --license-key YOUR_LICENSE_KEYCommand-line interfaceThis section assumes that you have proxy-lists installed globally and that it is available on your current user's PATH.To view the help screen for the CLI tool:To view the help

2025-04-08
User5999

Is time-consuming, and many of the ones you’ll find will either not work or will no longer be maintained. pfBlockerNG regularly updates its bundled feeds, so go ahead and use those.Click on the Feeds tab.Click the blue + to the left of PRI1 at the top. PRI1 is a group of feeds (multiple lists). Clicking the blue + takes you to the IP / IPv4 page, which displays your selected feeds. Most of the relevant fields are populated automatically.IP / IPv4At the top of the page, pfBlockerNG displays the name of the feed collection and its description. Below are the included feed URLs and their descriptions on the right. All of our feeds are set to OFF by default. We’re going to enable them.Before that, we’re going to delete one of the feeds from the PRI1 group. The 7th feed from the top, Pulsedive, requires a paid API key. This guide doesn’t require purchasing the API key, so click the orange Delete button next to the Pulsedive list.With Pulsedive deleted, set the remaining feeds to ON.Go to the Settings section of the page below the feeds list.The first field is the Action drop-down menu. Select Deny Both. This will block the IP addresses in the above lists bidirectionally (to and from the IP addresses contained in the feeds). You can deny inbound, outbound connections, or both. Bear in mind that if you only deny inbound traffic, when a host on your network establishes an outbound connection to one of the IP addresses in the above lists, pfBlocker will allow the inbound response from that IP address. In our example, I will select Deny Both.Click Save IPv4 Settings (bottom of the page).If your ISP assigns both an IPv4 and an IPv6 IP address to your WAN, you can apply the same configuration steps for IPv6 on the IPv6 tab. Currently, the majority of users are still on IPv4-only networks.GeoIP FilteringWe’re going to force an update of pfBlockerNG before configuring GeoIP filtering. Once configured, pfBlocker will automatically update itself at set intervals. But because GeoIP filtering relies on the MaxMind database, pfBlocker needs to download the database before setting that up.From the pfBlockerNG settings, select the Update tab.Click the Run button to start the update.You should see UPDATE PROCESS ENDED at the bottom of the Log window once the update is complete.The Log window shows that both my IPv4 feeds and the GeoIP database have been updated.IPv4 logsGeoIP logsSelect the GeoIP sub-menu next to IPv6 from the IP tab in the pfBlockerNG settings. This displays the GeoIP Summary.The GeoIP Summary groups GeoIP address feeds arranged by continent. There are also two extra categories: Top Spammers and Proxy and Satellite. The Top Spammers

2025-04-07
User7990

Last Update:2018-12-03 Source: InternetAuthor: User If your m website is for English customers and you may not want to accept access from Chinese IP segments, you can use Apache's geoip module to easily achieve this. Http://www.maxmind.com/app/mod_geoip For reference only! I. Briefly describe the installation process of geoip:1.Get the roo permission and prepare an empty directory:Su mkdir/home/admin/geoipCD/Home/admin/geoip 2. Download and install geoip:Wget Http://www.maxmind.com/download/geoip/a... Oip.tar.gz Tar xzfv geoip.tar.gz CDGeoip * ./ConfigureMakeMake checkMake installSecurityWhen the software is installed, the default Geo. dat file is generated.3. download and install the Apache module of geoip:Mkdir mod_geoipCDMod_geoip Wget Http://www.maxmind.com/download/geoip/a... 1.1.tar.gz Tar xzfv mod_geoip_1.1.1.tar.gzCDMod_geoip_1.1.1 Apxs-CIA-I/usr/local/include-L/usr/local/lib-Lgeoip mod_geoip.cApxs is an ApacheHTTP server tool for compiling and installing extension modules, used to compile one or more sourcesProgramOr targetCodeThe file is a dynamic shared object so that it can use the loadmodule provided by mod_so.The command is loaded to the Apache server at runtime.Therefore, to use this extension mechanism, your platform must support the DSO feature, and ApacheHttpd must have built-in mod_so module. The apxs tool can automatically detect whether such conditions are met. You can also use this command to manually detect :, 4.(Optional) Add the directory/usr/local/lib to the dynamic link library configuration file:Edit/etc/lD. So. confAdd a line/usr/local/lib at the bottom of the file/Usr/Kerberos/lib/Usr/lib/MySQL/Usr/x11r6/lib/Usr/local/lib HoweverThen run/sbin/ldconfig/etc/lD. So. conf.(Step 4 may not need to be done, as if Step 2 will automatically do this, or your system hasAfter configuration, even if you want to edit lD. So. conf, different Linux directories are different) 5. Check httpd. confAt this time, you can

2025-04-02

Add Comment