Initial commit
|
@ -0,0 +1,180 @@
|
|||
|
||||
*2020.02.25*
|
||||
|
||||
Self publishing platform, [BookRix.com](https://www.bookrix.com/), denied Mr. Jeff Cliff's book titled "_The Great Cloudwall_" and stopped publishing it. The reason is "_Copyright infringement_". All of book's data, text and image can be found in this repository. You can download this book [here](pdf/2019-Jeff_Cliff_The_Great_Cloudwall.epub).
|
||||
|
||||
|
||||
*2019.08.05*
|
||||
|
||||
@jeffcliff@niu.moe:
|
||||
```
|
||||
#greatcloudwall gets further politicized:
|
||||
Terminates Service for 8Chan - the #greatcloudwall gets one step closer to dictating what you can/cannot say on the internet
|
||||
```
|
||||
|
||||
https://niu.moe/@jeffcliff/102566376973167221
|
||||
|
||||
*2019.04.04*
|
||||
|
||||
@holydevil@birdsite:
|
||||
```
|
||||
The log file from your iOS app shows that you do track personal information, like device name, UUID, and an identifier - install_id That contradicts what you have in your blogpost - “We don't write user-identifiable log data to disk”
|
||||
```
|
||||
|
||||
https://twitter.com/holydevil/status/1112769739045158912
|
||||
|
||||
*2019.03.13*
|
||||
|
||||
@thexpaw@birdsite:
|
||||
```
|
||||
So why did I get that email anyway if I'm opted out of all email communication in the account settings?
|
||||
Which part of the privacy policy allows you to share data with marketing crap like trustpilot?
|
||||
```
|
||||
|
||||
https://twitter.com/thexpaw/status/1108424723233419264
|
||||
|
||||
*2019.03.12*
|
||||
|
||||
```Cool new tool : Cloud Firewall```
|
||||
|
||||
https://framapiaf.org/@gkrishnaks/101727497214557035
|
||||
|
||||
*2019.03.03*
|
||||
|
||||
```
|
||||
"I can't visit Army.mill and Archive Today with Cloudflare DNS."
|
||||
```
|
||||
|
||||
https://twitter.com/wongmjane/status/1102446734993551360
|
||||
|
||||
Let's test: https://danwin1210.me/url.php?id=39706
|
||||
|
||||
```
|
||||
archive.today
|
||||
CloudFlare: (None)
|
||||
Google: A 46.17.42.43 (Russia, AS51659 LLC Baxet)
|
||||
```
|
||||
|
||||
```
|
||||
archive.is
|
||||
CloudFlare: A 104.16.181.15 (NSA, AS13335 Cloudflare, Inc.)
|
||||
Google: A 46.17.42.43 (Russia, AS51659)
|
||||
```
|
||||
|
||||
Why these results are completely different!?
|
||||
Try OpenNIC: https://www.opennic.org/
|
||||
|
||||
|
||||
*2019.03.02*
|
||||
|
||||
"client was trying to make session requests to their API servers
|
||||
but before I can prevent it, cloudflare had me blocked.
|
||||
It's pretty bad as half the internet is behind Cloudflare."
|
||||
|
||||
https://twitter.com/Skyfusion89/status/1101596592426151937
|
||||
|
||||
*2019.02.27*
|
||||
|
||||
* Cloudflare XSS bypass
|
||||
https://twitter.com/ameenmaali/status/1100536056372490241
|
||||
|
||||
*2019.02.26*
|
||||
|
||||
Take a look at Cloudflare's transparency report, "Some things we have never done" section.
|
||||
|
||||
```
|
||||
Cloudflare has never terminated a customer or taken down content due to political pressure.*
|
||||
```
|
||||
|
||||
If you're using SumatraPDF, you won't notice * is a link to https://www.cloudflare.com/cloudflare-criticism/ .
|
||||
Apparently they've terminated a political account.
|
||||
Do you think it's okay to make a false statement and hide a link to tiny asterisk?
|
||||
|
||||
https://twitter.com/mattskala/status/1100479615389159424
|
||||
https://mstdn.io/@mattskala/101660051818948847
|
||||
|
||||
*2019.02.24*
|
||||
|
||||
```
|
||||
"Sites that respect their visitors do not resort to Cloudflare."
|
||||
"In some cases, for particular countries, having all traffic visible
|
||||
to the U.S.A can be a matter of life and death."
|
||||
```
|
||||
http://techrights.org/2019/02/17/the-cloudflare-trap/
|
||||
|
||||
*2019.02.21*
|
||||
|
||||
* CF defaults to HTTP connections for its customers
|
||||
https://g0v.social/@sheogorath/101404226960335320
|
||||
|
||||
*2019.02.08*
|
||||
|
||||
* well written post, along with some causes for action in privacytools.io
|
||||
https://github.com/privacytoolsIO/privacytools.io/issues/374#issuecomment-460077544
|
||||
|
||||
* another privacytools.io thread
|
||||
https://github.com/privacytoolsIO/privacytools.io/issues/711
|
||||
|
||||
* Cryptome on CF's ability to deanonymize (2016)
|
||||
https://cryptome.org/2016/07/cloudflare-de-anons-tor.htm
|
||||
|
||||
* bug report issued in wire webapp
|
||||
https://github.com/wireapp/wire-webapp/issues/5716
|
||||
|
||||
*2019.02.01*
|
||||
|
||||
* The global internet is rotting from within, and
|
||||
|
||||
"In a not-so-distant future, if we're not there already, it may be that if you're
|
||||
going to put content on the Internet you'll need to use a company with a giant
|
||||
network like Cloudflare, Google, Microsoft, Facebook, Amazon, or Alibaba."
|
||||
|
||||
Net neutrality is but a skirmish in this larger struggle for control to monopolize all global digital communications.
|
||||
https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20181218/Documents/Geoff_Huston_Presentation.pdf
|
||||
|
||||
*2018.12.10*
|
||||
|
||||
* "like this page on NSA/Facebook & allow Facebook to track you to prove you're a human being"
|
||||
https://niu.moe/@jeffcliff/101220470739320859
|
||||
|
||||
|
||||
*2018.11.12*
|
||||
|
||||
* Cloudflare's permissions for DNS are...sketchy
|
||||
https://weeaboo.space/objects/323a4b45-6e40-44f0-9108-77245638df7e
|
||||
|
||||
* AV Updates blocked by cloudflare - "how to proceed?"
|
||||
http://forums.clamwin.com/viewtopic.php?t=4915
|
||||
http://lists.clamav.net/pipermail/clamav-users/2018-November/thread.html
|
||||
|
||||
---
|
||||
|
||||
### Previous
|
||||
|
||||
|
||||
This project was started by Shiro (@shiromarieke@birdsite) and CryptoParty Berlin (@cryptopartybln@birdsite).
|
||||
Shiro handed over support to the greater internet in summer 2016.
|
||||
|
||||
|
||||
It was a text list on okfn.org text pad: (https://pad.okfn.org/p/cloudflare-tor and https://pad.okfn.org/p/noncloudflare-torblocks)
|
||||
|
||||
|
||||
However it was pointed out that this website itself was on cloudflare, and cloudflare actively blocked Tor users to access it.
|
||||
|
||||
|
||||
So it was moved to systemli.org : ( https://pad.systemli.org/p/noncloudflare-torblocks )
|
||||
and an onion service ( http://j7652k4sod2azfu6.onion/p/noncloudflare-torblocks , http://j7652k4sod2azfu6.onion/p/cloudflare-tor , http://j7652k4sod2azfu6.onion/p/cloudflare-philosophy )
|
||||
|
||||
|
||||
These systemli pads needed to be updated once in every while (week? month?) or the whole list was scrubbed.
|
||||
This happened a few times, and there were some attempts at vandalism up to and including june 2016
|
||||
|
||||
|
||||
A fork was made during a multi-day outage at http://git.vola7ileiax4ueow.onion/fuckcloudflare/cloudflare-tor/ (new, not GitHub repo)
|
||||
|
||||
|
||||
However vola7ileiax4ueow's git service went down, so it was moved to github
|
||||
|
||||
|
||||
There used to also be a list of websites that *were* on cloudflare but are no longer.
|
||||
This list has been lost ( it was on https://pad.systemli.org/p/ex-cloudflare-tor )
|
|
@ -0,0 +1,12 @@
|
|||
### License
|
||||
|
||||
* /globalist/* (Globalist) -- [GNU GPLv3](globalist/LICENSE)
|
||||
* /pdf/* -- Unknown (you can find a copy everywhere. Thanks to authors)
|
||||
* Else -- [PUBLIC DOMAIN (CC0)](https://web.archive.org/web/https://creativecommons.org/share-your-work/public-domain/cc0/)
|
||||
|
||||
|
||||
This repository, _stop\_cloudflare (aka cloudflare-tor)_, is in the PUBLIC DOMAIN (CC0).
|
||||
|
||||
It was created anonymously, in public, for the use of the world to resist [Cloudflare](https://www.cloudflare.com/).
|
||||
|
||||
Contributors who have anonymously contributed (including in [CryptoParty](https://cryptoparty.at/cryptoparty_wien_53)) have since come forward to give this project their blessing.
|
|
@ -0,0 +1,266 @@
|
|||
## I am not the author of this documentation. This is just a reupload after it got taken down from Codeberg.
|
||||
|
||||
# The Great Cloudwall
|
||||
|
||||
![](image/itsreallythatbad.jpg)
|
||||
![](image/telegram/c81238387627b4bfd3dcd60f56d41626.jpg)
|
||||
|
||||
---
|
||||
|
||||
|
||||
## No Cloudflare
|
||||
|
||||
|
||||
"The Great Cloudwall" is [Cloudflare Inc.](https://www.cloudflare.com/), the [U.S. company](https://en.wikipedia.org/wiki/Cloudflare).
|
||||
It is the [world's](https://almanac.httparchive.org/en/2019/cdn) [largest](https://w3techs.com/technologies/history_overview/proxy) MITM proxy([reverse proxy](https://en.wikipedia.org/wiki/Reverse_proxy)).
|
||||
It sits between you and origin webserver, acting like a [border patrol agent](https://www.cbp.gov/careers/bpa).
|
||||
The origin webserver administrator allowed the agent to decide [who can access](https://gitlab.com/iblech/tor-appeal/issues/1) to their "_web property_" and define "_restricted area_".
|
||||
|
||||
---
|
||||
|
||||
![](image/cfmarketshare.jpg)
|
||||
![](image/cloudflaredearuser.jpg)
|
||||
![](image/usershoulddecide.jpg)
|
||||
|
||||
---
|
||||
|
||||
Take a look at the first image posted below. You will think Cloudflare block _only_ attackers. You will think _Cloudflare is always online(never go [down](https://twitter.com/bengoldacre/status/1146058200887648258))_. However [it is not true](PEOPLE.md).
|
||||
|
||||
---
|
||||
|
||||
![](image/howcfwork.jpg)
|
||||
![](image/cfdowncfcom.jpg)
|
||||
![](image/cfdown2019.jpg)
|
||||
![](image/cloudflareinternalerror.jpg)
|
||||
|
||||
---
|
||||
|
||||
It is called this in reference to the [Great Firewall of China](https://www.comparitech.com/privacy-security-tools/blockedinchina/) which does a comparable job of [filtering out many humans](PEOPLE.md) from seeing web content (ie everyone in mainland China and people outside) while at the same time those not affected to see a dratically different web, a web free of censorship such as an image of ["tank man"](https://en.wikipedia.org/wiki/Tank_Man) and the history of ["Tiananmen Square protests"](https://en.wikipedia.org/wiki/1989_Tiananmen_Square_protests#Censorship_in_China).
|
||||
|
||||
Cloudflare also [automatically](https://twitter.com/itsybitsydots/status/1212691131508477952) [block](PEOPLE.md) legit robots/crawlers such as Google, Yandex, Yacy, and API clients.
|
||||
|
||||
---
|
||||
|
||||
![](image/cloudflarechina.jpg)
|
||||
![](image/onemorestep.jpg)
|
||||
![](image/accdenied.jpg)
|
||||
![](image/cfublock.jpg)
|
||||
![](image/omsjsck.jpg)
|
||||
![](image/cftestgoogle.jpg)
|
||||
|
||||
---
|
||||
|
||||
Cloudflare similarly prevents many people who have poor internet connectivity from accessing the websites behind it (for example, they could be behind 7+ layers of NAT or sharing same IP) unless they solve multiple image CAPTCHAs. In some cases, [this will take 10 to 30 minutes to satisfy Google](https://trac.torproject.org/projects/tor/ticket/23840). Many humans are being blocked by Cloudflare [every day](PEOPLE.md). There is no way to solve the captcha without enabling Javascript and Cookies. Cloudflare is [using them](PEOPLE.md) to make a browser signature.
|
||||
|
||||
---
|
||||
|
||||
![](image/googlerecaptcha.jpg)
|
||||
![](image/omsnote.jpg)
|
||||
![](image/omsdroid.jpg)
|
||||
![](image/omsstream.jpg)
|
||||
![](image/omsappl.jpg)
|
||||
![](image/cferr1010bsig.jpg)
|
||||
|
||||
---
|
||||
|
||||
[Tor users](https://www.torproject.org/) and [VPN users](https://airvpn.org/topic/23090-cloudflare-often-bans-my-ip-address/) are also a [victim](https://blog.torproject.org/trouble-cloudflare) of Cloudflare. If you didn't try Tor until this moment, we encourage you to [download Tor Browser](https://www.torproject.org/) and visit your favorite websites. (advice: _Do not login to your bank website or government webpage or they will flag your account. [Use VPN](https://www.vpngate.net/en/) for those websites._)
|
||||
|
||||
You might want to say "_Tor is illegal! Tor is criminal's browser! Tor is bad!_". No.
|
||||
Tor _was_ developed by US Army, but current Tor is developed by the [Tor project](https://www.torproject.org/). There are many people and organizations who use Tor including your future friends. So, if you are using Cloudflare on your website you are blocking real humans. You will lose potential friendship and business deal.
|
||||
|
||||
---
|
||||
|
||||
![](image/banvpn2.jpg)
|
||||
![](image/banvpn.jpg)
|
||||
![](image/whousetor.jpg)
|
||||
![](image/iusetor_alith.jpg)
|
||||
|
||||
---
|
||||
|
||||
And their DNS service, [1.1.1.1](https://1.1.1.1/), is also filtering out users from visiting the website by returning [fake](https://trac.torproject.org/projects/tor/ticket/32915) IP address owned by Cloudflare, localhost IP such as "127.0.0.x", or just return nothing. Cloudflare DNS also [break](https://twitter.com/bowranger/status/1213031783576428550) [online](https://twitter.com/jb510/status/1212521533907668992) [software](https://twitter.com/No_Style/status/1201525422795710466) [from](https://twitter.com/daemuth/status/1187758306535903233) [smartphone](https://twitter.com/gregortorrence/status/1183102089439805441) [app to computer game because of their fake DNS answer](PEOPLE.md).
|
||||
|
||||
---
|
||||
|
||||
![](image/cferr1016.jpg)
|
||||
![](image/cferr1016sp.jpg)
|
||||
![](image/dnsfailtest.jpg)
|
||||
![](image/cfdnsprob.jpg)
|
||||
|
||||
---
|
||||
|
||||
And here you might think, "_I am not using Tor or VPN, why should I care?_".
|
||||
If you visit website which use Cloudflare, you are sharing your information not only to website owner _but also Cloudflare_.
|
||||
It is impossible to [analyze](https://blog.cloudflare.com/the-csam-scanning-tool/) without [decrypting TLS traffic](https://github.com/nym-zone/block_cloudflare_mitm_fx/issues/15#issuecomment-354773389). Cloudflare knows all your data such as raw password.
|
||||
[Cloudbeed](https://en.wikipedia.org/wiki/Cloudbleed) can happen anytime.
|
||||
|
||||
---
|
||||
|
||||
![](image/cfbloghtmledit.jpg)
|
||||
![](image/cfhelp204144518.jpg)
|
||||
![](image/cfhelpforum.jpg)
|
||||
![](image/prism_gfe.jpg)
|
||||
![](image/sniff2.gif)
|
||||
|
||||
---
|
||||
|
||||
Do you really want to share your data with Cloudflare, and also 3-letter agency?
|
||||
Internet user's online profile is a "product" that the government and big tech companies wants to buy.
|
||||
|
||||
US [Department of Homeland Security](https://www.dhs.gov/) said:
|
||||
```
|
||||
Do you have any idea how valuable the data you have is?
|
||||
Is there any way you would sell us that data?
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
![](image/dhssaid.jpg)
|
||||
![](image/federalinterest.jpg)
|
||||
![](image/cfstrengthdata.jpg)
|
||||
|
||||
---
|
||||
|
||||
Cloudflare also offer _FREE_ VPN service called "[Cloudflare Warp](https://blog.cloudflare.com/1111-warp-better-vpn/)". If you use it, all your smartphone ([or your computer](https://techniapps.com/2019/09/26/download-cloudflare-warp-vpn-for-pc-windows-10-mac/)) connections are sent to Cloudflare servers. Cloudflare can know which website you've read, what comment you've posted, who you've talked to, etc. You are voluntary giving [all your information](https://github.com/privacytoolsIO/privacytools.io/issues/374#issuecomment-478686469) to Cloudflare. If you think "_Are you joking? Cloudflare is secure._" then you need to learn how [VPN works](https://en.wikipedia.org/wiki/VPN).
|
||||
|
||||
Cloudflare said their VPN service make your internet [fast](https://www.wired.com/story/cloudflare-says-new-vpn-service-wont-slow-you-down/). But VPN make your internet connection _slower_ than [your](https://twitter.com/ExYakuza/status/1182317536089526273) [existing](https://twitter.com/waddling/status/1177615384616325120) [connection](https://techcrunch.com/2019/04/01/cloudflares-warp-is-a-vpn-that-might-actually-make-your-mobile-connection-better/).
|
||||
|
||||
---
|
||||
|
||||
![](image/howvpnwork.jpg)
|
||||
![](image/notfastervpn.jpg)
|
||||
|
||||
---
|
||||
|
||||
You might already know about the [PRISM](https://en.wikipedia.org/wiki/PRISM_(surveillance_program)) scandal. It is true that AT&T lets NSA to [copy all internet data](https://www.cnet.com/news/at-t-lets-nsa-hide-and-surveil-in-plain-sight-the-intercept-reports/) for surveillance. Let's say you're working at the NSA, and you want _every citizen's internet profile_. You know most of them are blindly trusting Cloudflare and using it - only one centralized gateway - to proxy their company server connection([SSH](https://blog.cloudflare.com/public-keys-are-not-enough-for-ssh-security/)/[RDP](https://blog.cloudflare.com/cloudflare-access-now-supports-rdp/)), personal website, chat website, forum website, bank website, insurance website, search engine, secret member-only website, auction website, shopping, video website, NSFW website, and illegal website. You also know they use Cloudflare's DNS service ("_1.1.1.1_") and VPN service ("_Cloudflare Warp_") for "_Secure! Faster! Better!_" internet experience. Combining them with user's IP address, browser fingerprint, cookies and RAY-ID will be useful to build target's online profile. You want their data. [What will you do](https://www.reddit.com/r/privacy/comments/1gb0pa/how_prism_actually_works_1520_att_fiber_optic/)?
|
||||
|
||||
---
|
||||
|
||||
![](image/prismattnsa.jpg)
|
||||
![](image/nsaslide_prismcorp.gif)
|
||||
|
||||
---
|
||||
|
||||
### Cloudflare is a honeypot.
|
||||
|
||||
![](image/honeypot.gif)
|
||||
|
||||
### Free honey for everyone. _Some_ strings attached.
|
||||
|
||||
![](image/iminurtls.jpg)
|
||||
|
||||
### Do not use Cloudflare.
|
||||
|
||||
![](image/shadycloudflare.jpg)
|
||||
|
||||
### Decentralize the internet.
|
||||
|
||||
!["Cloudflare is not an option."](image/cfisnotanoption.jpg)
|
||||
|
||||
---
|
||||
|
||||
|
||||
## continue to next page: [Cloudflare Ethics](README_ethics.md)
|
||||
|
||||
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Data & More Information
|
||||
</summary>
|
||||
|
||||
|
||||
This repository is **a list** of websites that are **behind "_The Great Cloudwall_"**, **blocking Tor users** and **other CDNs**.
|
||||
|
||||
|
||||
**Data**
|
||||
* [Cloudflare Inc.](cloudflare_inc/)
|
||||
* [Cloudflare Users](cloudflare_users/)
|
||||
* [Cloudflare Domains](cloudflare_users/domains/)
|
||||
* [Non-Cloudflare CDN users](not_cloudflare/)
|
||||
* [Anti-Tor users](anti-tor_users/)
|
||||
|
||||
![](image/goodorbad.jpg)
|
||||
|
||||
|
||||
**More Information**
|
||||
* [Short version of README](README_short.md) `DRAFT`
|
||||
* [Myth Catalog](myth_catalog.md) `DRAFT`
|
||||
* [The Great Cloudwall](article.txt) by Mr. Jeff Cliff; PDF version [here](pdf/2019-The_Great_Cloudwall.pdf), [ePUB here](pdf/2019-Jeff_Cliff_The_Great_Cloudwall.epub) `DRAFT`
|
||||
* [Padlock icon indicates a secure SSL connection established w MITM-ed](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831835) by Anonymous
|
||||
* [Block Global Active Adversary Cloudflare](https://trac.torproject.org/projects/tor/ticket/24351) by nym-zone
|
||||
* [Problem with Cloudflare](https://github.com/privacytoolsIO/privacytools.io/issues/374#issuecomment-460077544) by libBletchley
|
||||
* [Criticism and controversies](https://en.wikipedia.org/wiki/Cloudflare#Criticism_and_controversies) by Wikipedia
|
||||
* [Cloudflare Watch](http://www.crimeflare.org:82/) (cons: _down quite a lot, old data, search restricted to EU only_)
|
||||
* [Another landmark day in the war to control, centralize and censor the internet.](https://www.reddit.com/r/privacy/comments/b8dptl/another_landmark_day_in_the_war_to_control/) by TheGoldenGoose8888
|
||||
* [Disadvantage of relying on only one service](https://twitter.com/w3Nicolas/status/1134529316904153089) ([DO is CF](https://www.digwebinterface.com/?hostnames=ns1.digitalocean.com%0D%0Ans2.digitalocean.com%0D%0Ans3.digitalocean.com%0D%0Awww.digitalocean.com&type=A&ns=resolver&useresolver=8.8.4.4&nameservers=))
|
||||
* [HashTag #FuckCloudflare on Mastodon Network](https://mastodon.social/tags/fuckcloudflare)
|
||||
|
||||
![](image/watcloudflare.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## What can you do?
|
||||
</summary>
|
||||
|
||||
* Read [our list of recommended actions](what-to-do.md) and share it with your friends.
|
||||
|
||||
* Read [other user's voice](PEOPLE.md) and write your thoughts.
|
||||
|
||||
* Search something on [Ansero](http://ansero.xgwglrypkjbgecns2zru5ekyu7tnqgg7l5blojlq7roohxbwkr5k77id.onion/)<sub><sup> [ᶜˡᵉᵃʳⁿᵉᵗ](https://ansero.eu.org/)</sup></sub> or [Searxes](http://searxes.nmqnkngye4ct7bgss4bmv5ca3wpa55yugvxen5kz2bbq67lwy6ps54yd.onion/)<sub><sup> [ᶜˡᵉᵃʳⁿᵉᵗ](https://searxes.eu.org/)</sup></sub>.
|
||||
|
||||
* Update the domain list: [List instructions](instructions.md).
|
||||
|
||||
* Add Cloudflare or project related event to [history](HISTORY.md).
|
||||
|
||||
* Try & write new [Tool / Script](tool/).
|
||||
|
||||
* Here's some [PDF](pdf/) to read.
|
||||
|
||||
---
|
||||
|
||||
### "Stop Cloudflare" Official Accounts
|
||||
|
||||
**NEVER** trust other accounts.
|
||||
|
||||
* [Mastodon (crimeflare)](https://activism.openworlds.info/@crimeflare)
|
||||
|
||||
* [Twitter (stop_cloudflare)](https://twitter.com/stop_cloudflare) ([We don't like Twitter](https://robinwils.gitlab.io/articles/why-i-made-a-twitter/#why-twitter))
|
||||
|
||||
|
||||
> We don't read _direct message_. If you want to say something [join here](https://codeberg.org/crimeflare/cloudflare-tor/issues).
|
||||
|
||||
---
|
||||
|
||||
![WTF](image/wtfcf.jpg)
|
||||
|
||||
![](image/omsirl.jpg)
|
||||
![](image/whydoihavetosolveacaptcha.jpg)
|
||||
![](image/fixthedamn.jpg)
|
||||
![](image/imnotarobot.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
|
||||
![](image/twe_lb.jpg)
|
||||
|
||||
![](image/twe_dz.jpg)
|
||||
|
||||
![](image/twe_jb.jpg)
|
||||
|
||||
![](image/twe_ial.jpg)
|
||||
|
||||
![](image/twe_eptg.jpg)
|
||||
|
||||
![What did YOU do to stop CF?](image/stopcf.jpg)
|
||||
|
||||
![](image/peopledonotthink.jpg)
|
|
@ -0,0 +1,267 @@
|
|||
# Ethical Issues
|
||||
|
||||
![](image/itsreallythatbad.jpg)
|
||||
![](image/telegram/c81238387627b4bfd3dcd60f56d41626.jpg)
|
||||
|
||||
"_Don't support this company which is void of ethics_" -- [phyzonloop](https://twitter.com/phyzonloop)
|
||||
|
||||
"_Your company isn't trustworthy. You claim to enforce DMCA but have many lawsuits for not doing so._" -- [phyzonloop](https://twitter.com/phyzonloop)
|
||||
|
||||
|
||||
---
|
||||
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## CloudFlare spams people
|
||||
</summary>
|
||||
|
||||
|
||||
Cloudflare is sending spam emails to non-Cloudflare users.
|
||||
|
||||
- Only send emails to subscribers who’ve opted in
|
||||
- When the user say "stop", then stop sending email
|
||||
|
||||
It's that simple. But Cloudflare doesn't care.
|
||||
Cloudflare said using their service [can stop all spammers or attackers](https://support.cloudflare.com/hc/en-us/articles/200170066-Will-activating-Cloudflare-stop-all-spammers-or-attackers-).
|
||||
How can we stop _Cloudflare spammers_ without activating Cloudflare?
|
||||
|
||||
|
||||
![](image/cfspam01.jpg)
|
||||
![](image/cfspam03.jpg)
|
||||
![](image/cfspam02.jpg)
|
||||
![](image/cfspambrittany.jpg)
|
||||
![](image/cfspamtwtr.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Remove user's review
|
||||
</summary>
|
||||
|
||||
|
||||
Cloudflare censor [negative reviews](https://web.archive.org/web/20191116004046/https://www.trustpilot.com/reviews/5aa6ee0ed5a5700a7c8cf853). If you post _anti-Cloudflare_ text on Twitter, you have a chance to get a [reply](https://twitter.com/CloudflareHelp/status/1126051764917145601) from [Cloudflare employee](cloudflare_inc/cloudflare_members.txt) with "_[No, it's not](PEOPLE.md)_" message. If you post a negative review on any review site, they will try to [censor](https://twitter.com/phyzonloop/status/1178836176985366529) [it](https://twitter.com/dxgl_org/status/1178722159432220672).
|
||||
|
||||
|
||||
![](image/cfcenrev_01.jpg)
|
||||
![](image/cfcenrev_02.jpg)
|
||||
![](image/cfcenrev_03.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Doxxing users
|
||||
</summary>
|
||||
|
||||
|
||||
Cloudflare has a massive [harassment problem](https://web.archive.org/web/20171024040313/http://www.businessinsider.com/cloudflare-ceo-suggests-people-who-report-online-abuse-use-fake-names-2017-5).
|
||||
Cloudflare [shares personal information](https://archive.ph/ePdvi) of those [who](https://twitter.com/ZJemptv/status/898299709634248704) [complain](https://twitter.com/TinyPirate/status/554718958176067584) [about](https://twitter.com/remembrancermx/status/1010329041235148802) [hosted](https://twitter.com/Bridaguy/status/915003769280172037) [sites](https://twitter.com/HelloAndrew/status/897260208845500416). They sometimes ask you to provide
|
||||
your true ID. If you don't want to get harassed, [assaulted](https://twitter.com/NiteShade925/status/1158469203420205056), [swatted](https://boingboing.net/2015/01/19/invasion-boards-set-out-to-rui.html) or [killed](https://twitter.com/RusEmbUSA/status/1187363092793040901), you better stay away from Cloudflared websites.
|
||||
|
||||
|
||||
![](image/cfdox_what.jpg)
|
||||
![](image/cfdox_swat.jpg)
|
||||
![](image/cfdox_kill.jpg)
|
||||
![](image/cfdox_threat.jpg)
|
||||
![](image/cfdox_dox.jpg)
|
||||
![](image/cfdox_ex1.jpg)
|
||||
![](image/cfdox_ex2.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Corporate solicitation of charitable contributions
|
||||
</summary>
|
||||
|
||||
|
||||
CloudFlare is [asking](https://web.archive.org/web/20191112033605/https://opencollective.com/cloudflarecollective#section-about) for charitable contributions. It’s quite appalling that an American corporation would ask for charity alongside non-profit organizations that have good causes. If you like [blocking people or wasting other people's time](PEOPLE.md), you might want to order some pizzas🍕 for Cloudflare employees.
|
||||
|
||||
|
||||
![](image/cfdonate.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Terminating sites
|
||||
</summary>
|
||||
|
||||
|
||||
What will you do if your site goes down _suddenly_? There are reports that Cloudflare is [deleting](https://twitter.com/stefan_eady/status/1126033791267426304) [user's](https://twitter.com/derivativeburke/status/903755267053117440) [configuration](https://twitter.com/lordscarlet/status/1046785164792205314) or [stopping service without any warning](https://twitter.com/svolentin/status/1227324408475344896), [silently](https://twitter.com/BlnaryMlke/status/1194339461984854018). We suggest you find [better provider](what-to-do.md).
|
||||
|
||||
![](image/cftmnt.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Browser vendor discrimination
|
||||
</summary>
|
||||
|
||||
|
||||
CloudFlare gives preferential treatment to those using Firefox while giving hostile treatment to users of non-Tor-Browser over Tor.
|
||||
Tor users of who rightfully refuse to execute non-free javascript also receive hostile treatment.
|
||||
This access inequality is a network neutrality abuse and an abuse of power.
|
||||
|
||||
![](image/browdifftbcx.gif)
|
||||
|
||||
- Left: `Tor Browser` , Right: `Chrome`. Same IP address.
|
||||
|
||||
![](image/browserdiff.jpg)
|
||||
|
||||
- Left: `[Tor Browser] Javascript Disabled, Cookie Enabled`
|
||||
- Right: `[Chrome] Javascript Enabled, Cookie Disabled`
|
||||
|
||||
![](image/cfsiryoublocked.jpg)
|
||||
|
||||
- QuteBrowser(minor browser) without Tor (Clearnet IP)
|
||||
|
||||
| ***Browser*** | ***Access treatment*** |
|
||||
| --- | --- |
|
||||
| Tor Browser (Javascript enabled) | access permitted |
|
||||
| Firefox (Javascript enabled) | access degraded |
|
||||
| Chromium (Javascript enabled) | access degraded (pushes Google reCAPTCHA) |
|
||||
| Chromium or Firefox (Javascript disabled) | access denied (pushes *broken* Google reCAPTCHA) |
|
||||
| Chromium or Firefox (Cookie disabled) | access denied |
|
||||
| QuteBrowser | access denied |
|
||||
| lynx | access denied |
|
||||
| w3m | access denied |
|
||||
| wget | access denied |
|
||||
|
||||
|
||||
"_Why not use Audio button to solve easy challenge?_"
|
||||
|
||||
Yes, there is an audio button, but it _always_ [doesn't work over Tor](https://trac.torproject.org/projects/tor/ticket/23840). You will get this message when you click it:
|
||||
|
||||
```
|
||||
Try again later
|
||||
Your computer or network may be sending automated queries.
|
||||
To protect our users, we can't process your request right now.
|
||||
For more details visit our help page
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Voter suppression
|
||||
</summary>
|
||||
|
||||
|
||||
Voters in US states register to vote ultimately through the state secretary's website in the state of their residence.
|
||||
Republican-controlled state secretary offices engage in voter suppression by proxying the state secretary's website through Cloudflare.
|
||||
Cloudflare's hostile treatment of Tor users, its MITM position as a centralized global point of surveillance, and its detrimental role overall
|
||||
makes prospective voters reluctant to register. Liberals in particular tend to embrace privacy. Voter registration forms collect sensitive information about a voter's political leaning, personal physical address, social security number, and date of birth.
|
||||
Most states only make a subset of that information publicly available, but Cloudflare sees ***all*** that information when someone registers to vote.
|
||||
|
||||
Note that paper registration does not circumvent Cloudflare because the secretary of state data entry staff workers will likely use the
|
||||
Cloudflare website to enter the data.
|
||||
|
||||
![](image/cfvotm_01.jpg)
|
||||
![](image/cfvotm_02.jpg)
|
||||
|
||||
Change.org is a famous website for gathering votes and take action. "[people everywhere are starting campaigns, mobilizing supporters, and working with decision makers to drive solutions.](https://web.archive.org/web/20200206120027/https://www.change.org/about)"
|
||||
Unfortunately, many people cannot view change.org at all due to Cloudflare's aggressive filter. They cannot vote even if they want to.
|
||||
|
||||
![](image/changeorgasn.jpg)
|
||||
![](image/changeorgtor.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Ignoring user's preference
|
||||
</summary>
|
||||
|
||||
|
||||
If you opt-out something, you expect that you receive no email about it. Cloudflare ignore user's preference and share data with third-party corporations [without customer's consent](https://twitter.com/thexpaw/status/1108424723233419264).
|
||||
|
||||
![](image/cfviopl_tp.jpg)
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Lying about deleting user's data
|
||||
</summary>
|
||||
|
||||
|
||||
According to this [ex-cloudflare customer's blog](https://shkspr.mobi/blog/2019/11/can-you-trust-cloudflare-with-your-personal-data/), Cloudflare is lying about deleting accounts. Nowadays, many [companies keep your data](https://justdeleteme.xyz/) after you've closed or removed your account. Most of good companies do mention about it in their privacy policy. Cloudflare? No.
|
||||
|
||||
```
|
||||
2019-08-05 CloudFlare sent me confirmation that they'd removed my account.
|
||||
2019-10-02 I received an email from CloudFlare "because I am a customer"
|
||||
```
|
||||
|
||||
Cloudflare didn't know about the word "remove". If it is really _removed_, why this ex-customer got an email? He also mentioned that Cloudflare's privacy policy doesn't mention about it.
|
||||
|
||||
```
|
||||
Their new privacy policy doesn't make any mention of retaining data for a year.
|
||||
```
|
||||
|
||||
![](image/cfviopl_notdel.jpg)
|
||||
|
||||
How can you trust Cloudflare if [their privacy policy is a LIE](https://twitter.com/daviddlow/status/1197787135526555648)?
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
<details>
|
||||
<summary>_click me_
|
||||
|
||||
## Keep your personal information
|
||||
</summary>
|
||||
|
||||
|
||||
Deleting Cloudflare account is [hard level](https://justdeleteme.xyz/).
|
||||
|
||||
```
|
||||
Submit a support ticket using the "Account" category,
|
||||
and request account deletion in the message body.
|
||||
You must have no domains or credit cards attached to your account prior to requesting deletion.
|
||||
```
|
||||
|
||||
You will [receive this confirmation email](https://twitter.com/originalesushi/status/1199041528414527495).
|
||||
|
||||
![](image/cf_deleteandkeep.jpg)
|
||||
|
||||
"We have begun to process your deletion request" but "We will continue to store your personal information".
|
||||
|
||||
Can you "trust" this?
|
||||
|
||||
</details>
|
||||
|
||||
---
|
||||
|
||||
# continue to next page: [Cloudflare Voices](PEOPLE.md)
|
||||
|
||||
!["Cloudflare is not an option."](image/cfisnotanoption.jpg)
|
|
@ -0,0 +1,106 @@
|
|||
# CrimeFlarE
|
||||
***Why you should say "NO" to Cloudflare***
|
||||
|
||||
# `This is a draft`
|
||||
|
||||
![CrimeFlarE logo](image/crimeflare-logo.png)
|
||||
|
||||
Are you already aware of the problems?
|
||||
You might want to check:
|
||||
- [Alternatives](#alternatives)
|
||||
- [Solutions](#solutions)
|
||||
|
||||
## Who are we?
|
||||
`CrimeFlarE` is a group of volunteer Tor, privacy and net neutrality
|
||||
enthusiasts working to counter CloudFlare’s oppressive attack on the Tor
|
||||
community and reduce the harms CloudFlare brings to all users (Tor users and
|
||||
clearnet users).
|
||||
|
||||
## Who is Cloudflare?
|
||||
Cloudflare is the world's largest man-in-the-middle proxy. This means that it
|
||||
sits between you and the server which sent you the pages and images.
|
||||
|
||||
Cloudflare is a content delivery network, which means that it has different
|
||||
servers in different locations, so that websites are supposed to be better
|
||||
reachable. This has a bad side.
|
||||
|
||||
*ADD IMAGE*
|
||||
|
||||
## Why you shouldn't use it
|
||||
### Privacy problems
|
||||
#### Single point of failure
|
||||
Cloudflare goes down from time to time. All the content which uses Cloudflare
|
||||
goes down as well when that happens.
|
||||
|
||||
Read more about the
|
||||
[single point of failure](subfiles/single-point-of-failure-problem.md).
|
||||
*ADD IMAGE*
|
||||
|
||||
#### It removes anonymity
|
||||
Cloudflare usually blocks Tor or makes it hard for Tor users to access the
|
||||
website or content. Tor is not only for criminals. It is important for many
|
||||
people and everyone has the right on privacy.
|
||||
|
||||
Tor is important, read more about
|
||||
[why Tor matters](subfiles/why-tor-matters.md).
|
||||
|
||||
Cloudflare often uses Google reCATPCHAs to check if you are human. These
|
||||
CAPTCHAs which check if you are human, track you and many claim that they
|
||||
even try to find out which human you are.
|
||||
|
||||
Read more about the
|
||||
[reCAPTCHA problem](subfiles/recaptcha-problem.md).
|
||||
|
||||
#### Project Honey Pot
|
||||
Project Honey Pot is a project which collects a lot of personal data
|
||||
and much of that data is from innocent people who deserve privacy.
|
||||
Cloudflare was created by people who worked on that project.
|
||||
|
||||
![Honeypot](image/honeypot.gif)
|
||||
|
||||
### Not convenient
|
||||
Cloudflare is not convenient for many visitors of your site. You will
|
||||
lose visitors when you choose Cloudflare. Many people who helped writing
|
||||
this file even block Cloudflare.
|
||||
|
||||
Did you know that you can lose visitors because your site doesn't load
|
||||
in a few seconds?
|
||||
|
||||
Cloudflare often makes visitors wait for a few seconds. Many visitors will
|
||||
leave your site when they see this.
|
||||
|
||||
### Other problems
|
||||
There are other problems as well, but we want to keep this file simple.
|
||||
Those problems are listed in
|
||||
[another file](subfiles/more-cloudflare-problems.md).
|
||||
|
||||
## Alternatives
|
||||
Do own a website?
|
||||
We created a
|
||||
[file with Cloudflare alternatives](subfiles/cloudflare-alternatives.md)
|
||||
to make your life easier if you agree with us.
|
||||
## Solutions
|
||||
### Blocking Cloudflare request or IPs
|
||||
- [Add-ons](what-to-do.md#website-consumer)
|
||||
- [Cloudflare IPs to block](cloudflare_inc/)
|
||||
- [Change default DNS provider of firefox](subfiles/change-firefox-dns.md)
|
||||
|
||||
### Share information about the problem
|
||||
Many supporters of CrimeFlarE have written some
|
||||
[articles](subfiles/articles.md) about the problem.
|
||||
You can check them out and share them.
|
||||
|
||||
You can ask website owners to stop using Cloudflare, please do so in
|
||||
a polite way. It might be good to mention some [alternatives](#alternatives).
|
||||
|
||||
There are more files on this repository to educate yourself.
|
||||
We haven't included them all in the README to keep it fairly readable.
|
||||
|
||||
## Not convinced yet?
|
||||
Many supporters of CrimeFlarE have written some
|
||||
[articles](subfiles/articles.md) about the problem.
|
||||
You can check them out and share them.
|
||||
|
||||
Still not convinced?
|
||||
That's fine. Just know that many people won't be able to use your content or
|
||||
website. It works against you.
|
|
@ -0,0 +1,7 @@
|
|||
# Which websites are hostile to **Tor users**?
|
||||
|
||||
Don't block us!
|
||||
|
||||
![](../image/sorry.jpg)
|
||||
|
||||
See [instructions.md](../instructions.md) for file purpose and format specifications.
|
|
@ -0,0 +1,12 @@
|
|||
# Anti-Tor users FQDN list
|
||||
|
||||
- Not all Tor users are bad. Do not punish everyone.
|
||||
- Blocking Tor is not a solution. There are VPNs, webproxies, and botnets.
|
||||
- Also read: [Tor Project - Don't Block Me](https://trac.torproject.org/projects/tor/wiki/org/projects/DontBlockMe)
|
||||
|
||||
|
||||
![](../../image/anonexist.jpg)
|
||||
|
||||
|
||||
|
||||
See [instructions.md](../../instructions.md) for file purpose and format specifications.
|
|
@ -0,0 +1,326 @@
|
|||
Audience: General, people who stumble upon gnu.org
|
||||
1924+/-395 words english
|
||||
1028+/-395 words instead?
|
||||
755 words rahisibhasha
|
||||
stab at french
|
||||
Version: 2019-05-29
|
||||
|
||||
|
||||
#########################################
|
||||
|
||||
大云墙 (Dà Yún qiáng)
|
||||
大きな雲壁 (Ookina Kumo kabe)
|
||||
The Great Cloudwall
|
||||
|
||||
by Jeff Cliff
|
||||
|
||||
essistensa una reason you go to
|
||||
|
||||
#########################################
|
||||
|
||||
|
||||
|
||||
There is a reason that none of your favourite work has appeared on Tor since early 2016[15].
|
||||
That reason has lead to the discovery of a threat to the operation of the World Wide Web.
|
||||
|
||||
Prerequisites:
|
||||
- The JavaScript Trap[47]
|
||||
- Understanding that Google is not to be trusted[45][46]
|
||||
- Nick Szabo: "Trusted Third Parties are Security Holes"[44][48]
|
||||
|
||||
Cloudflare is a network service for turing tests its users use against visitors, which means that it frustrates attempts
|
||||
by users of its users to develop software to interact with their websites[3].
|
||||
This might seem strange at first - why would you need a program to access a web resource?
|
||||
But there's many things that work on the web like this, including RSS, streaming, chat, podcasts, and anti-virus definitions[57][58] which
|
||||
are completely broken by a CAPTCHA appearing mid stream[11].
|
||||
"We humans don't make HTTP requests, our machines to do it for us."
|
||||
This makes clear what is really being tested here - whether or not you have the right software stack in between you and
|
||||
Cloudflare.
|
||||
|
||||
This is not hypothetical: Cloudflare is currently attempting to dictate which browsers users of their "protected"
|
||||
websites may use[60].
|
||||
|
||||
{{expand}}
|
||||
|
||||
Your right to use Free Software in this stack is at risk and could disappear at any moment.
|
||||
|
||||
It also is extracting free labor from website users[35], in effect tricking humans into acting like robots in order to
|
||||
pass a test designed to see whether or not they are a robot. Worse, this labor is being used to train[62] Google's artificial intelligence, a very
|
||||
poor candidate for "friendly AI"[36]. Given unfriendly AI is an existential[43] risk[42] to mankind, avoiding this
|
||||
should be among the highest of priorities.
|
||||
|
||||
This software stack includes human language: the CAPTCHAs are in English, leaving non-English speakers around the world
|
||||
at a disadvantage[13]. Attempts to fix this are bound by the fact that they also leak language information to
|
||||
Cloudflare[21].
|
||||
|
||||
Furthermore, they use Google's reCaptcha for their turing test/"proof you are a human" challenge and Google is known as a part of NSA's PRISM surveillance project so they expose their website visitor's data to PRISM data collection.
|
||||
|
||||
On its own, this is terrible bad but it's also worth pointing out how the reCAPTCHAs work. It isn't by whether or not you
|
||||
click on the correct icon (though that is a factor too) but also collect:
|
||||
|
||||
> mouse movement, its slightness and straightness
|
||||
> page scrolls
|
||||
> time intervals between browser events
|
||||
> keystrokes
|
||||
> click location history tied to user fingerprint
|
||||
> device information
|
||||
> All these criteria are stored in the browser’s cookie and are processed by Google’s servers
|
||||
> It should be emphasized that there is DARPA technology to identify people by mouse movements and typing
|
||||
[23]
|
||||
|
||||
This collection of data is likely illegal in regions where privacy is taken seriously (like the EU)[24].
|
||||
|
||||
It is frustrating even when it works because you have to fill out 20 captchas on the off-chance that you succeed one time in
|
||||
twenty. So this is 95% censorship and 5% wasting users' time[5].
|
||||
|
||||
More important, though, is that it starts to form a ratchet for web browser technology; the captchas are upgraded all the
|
||||
time and if you use an older browser, you risk being left behind even when it works.
|
||||
|
||||
|
||||
*How Cloudflare Threatens You*
|
||||
|
||||
"When you fetch a page from a website that is served from Cloudflare, JavaScript has been injected on-the-fly into that
|
||||
page by Cloudflare. And they also plant a cookie that brands your browser with a globally-unique ID. This happens even if
|
||||
the website is using SSL and shows a cute little padlock in your browser" [10]
|
||||
|
||||
- Cloudflare tracks you
|
||||
Even if your traffic is protected from onlookers, Cloudflare itself can see your traffic[6] because they are a MITM[14][31].
|
||||
In addition, if Cloudflare[53] has intercepted your traffic(MITM), so has the NSA[33].
|
||||
"If a site uses Cloudflare, then the browser lock icon is a false promise."[14]
|
||||
"The short version, a rhetorical question: Would you trust a key escrow regime, in which an “authorized” entity was
|
||||
entrusted with the potential to decrypt all communications at will? If not, why would you trust a de facto mass decryption
|
||||
chokepoint at which many communications are actually decrypted?"[34]
|
||||
In other words,
|
||||
|
||||
- They are in a position to track, tap, and link Internet activity across a wide range of sites. [14]
|
||||
|
||||
- Cloudflare frustrates accessibility efforts[25][27][36]:
|
||||
"CAPTCHA remains the most problematic item indicated by respondents"
|
||||
Cloudflare is one of the largest, if not the largest source of unconsensual CAPTCHAS, making them quite possibly the
|
||||
biggest impediment in accessibility efforts worldwide.
|
||||
|
||||
- Cloudflare makes using Tor frustrating by making efforts to become anonymous more difficult and making it more likely
|
||||
that people will use non-Tor connections for some or all of their web browsing. The problem is getting worse with time.
|
||||
[13]
|
||||
|
||||
- It's not just Tor[19] but Tor users are the biggest group of people who've noticed it and are organizing against it so
|
||||
far.
|
||||
|
||||
- In particular, the model of Project Honeypot depends on one IPv4 address, meaning one person. As IPv4 addresses become
|
||||
scarce, more and more ISPs (and whole countries[22]) are forced to use higher and higher levels of NAT. The result is that
|
||||
the kinds of treatment of Tor users by Cloudflare starts to be not just for Tor, but for all web users. "Tor is just being
|
||||
slightly ahead of what the IPv4 Internet is going to look like pretty soon."
|
||||
The next time a large group wakes up, millions of websites might be down (including critical ones) across a whole
|
||||
continent. This has actually happened already. [49]
|
||||
|
||||
"It was made clear in the Snowden leaks that GCHQ, the NSA, etc. would like people to stop using Tor so I am sure they are
|
||||
very happy to see CF make general web browsing difficult and frustrating for ordinary users." [12]
|
||||
|
||||
- Worse, Cloudflare makes using Tor *dangerous* because enabling JavaScript and images to deal with their system makes it
|
||||
likely that some people will enable JavaScript and images on other websites, which, even if Cloudflare wasn't threatening
|
||||
them, would. [9]
|
||||
|
||||
- Cloudflare is capable of tracking users of its websites, and initial looks into its JavaScript/CAPTCHA seems to bear out
|
||||
that they are doing so.
|
||||
|
||||
- Cloudflare can target individual users with JavaScript malware; since you typically wind up enabling their JavaScript
|
||||
to use websites, you fall into their trap. Because they track users, are giving, individualised code, and work directly
|
||||
with the US government/DHS, there's no reason why they can't tailor attacks to specific users.
|
||||
|
||||
- Even if they aren't doing it yet, they are at any point one US government administration, one vulture capital funding
|
||||
purchase[26], or one internally rogue element away from executing JavaScript code on hundreds of millions of people's
|
||||
computers a "highly attractive" target[7] with no oversight. The code CAPTCHA itself protects attempts to detect such
|
||||
things from happening.
|
||||
|
||||
- The way that Cloudflare is constructed means that even by accident, billions of people can be analyzed by their
|
||||
government[51] and have their access limited or completely cut off at the government's whim.
|
||||
|
||||
*Background : How Cloudflare threatens the web*
|
||||
|
||||
- Cloudflare is a MITM for the whole web
|
||||
|
||||
- As of 3 years ago 10% of the top 25,000 websites used Cloudflare[2]
|
||||
- A billion people in china are restricted by the Great Firewall[8]. Anyone who goes so far as to circumvent that must then
|
||||
deal with the "Great Cloudwall" for accessing the open internet.
|
||||
|
||||
- This is not just an individual problem, but fundamentally threatens the ecosystem of the web.
|
||||
Cloudflare is breaking the open internet one site at a time. The web is massively resilient - we can do without Stack
|
||||
Overflow, GNU.org or even Google but when a significant enough portion of websites use a single provider, there starts to
|
||||
be a systematic risk that if that single provider goes down, all of the websites behind it will be inaccessible. Worse, you
|
||||
won't be allowed to access it unless you have the right kind of US government approved credential, contingent, perhaps, on
|
||||
running software only they approve of.
|
||||
|
||||
It is becoming a single point of failure for the internet. [39]
|
||||
|
||||
Right now, there are alternative sources for, for example, the US constitution[17]. It is not unthinkable that Cloudflare
|
||||
is getting big enough to threaten even that.
|
||||
|
||||
{FIX ME - make section clearer}
|
||||
"A.1 sometimes there are necessary websites for some degree of necessary. Government websites, public service, etc. How
|
||||
long until those are behind the "Great Cloudwall"?
|
||||
B: Not long. Our service is competitive and convenient. If public service websites choose to use our service for awesome
|
||||
DDoS protection, it's their choice."[36]
|
||||
|
||||
- Cloudflare has already started down the slippery slope[52] of censoring websites. If they didn't have a stranglehold on
|
||||
people accessing the internet, it would not be a problem. They are big enough that censorship from Cloudflare is starting
|
||||
to be a systematic exclusion from the political process.
|
||||
|
||||
"Cloudflare is perfect: it can implement censorship on the fly without anyone getting wise to it!"[40]
|
||||
|
||||
- DNS[39]: given that they have become so systematically powerful, the next step to cementing their power is to attack
|
||||
DNS. Their 1.1.1.1 DNS server, like Google's 8.8.8.8, is marketed to people so that Cloudflare will still be able to see
|
||||
you're going to them even if you don't interact with websites "protected" by them. It gives them even more data to track you
|
||||
with.
|
||||
|
||||
*Background : Where does Cloudflare come from?*
|
||||
|
||||
Cloudflare comes from a project called "Project Honey Pot"[61], originally intended to track online fraud and abuse.
|
||||
|
||||
"What was Project Honey Pot?
|
||||
'A service that positions itself as some kind of a grassroot-y anti-spam registry, but in reality seems to be a pro-
|
||||
corporate law enforcement tool with the specific aim of entrapping and prosecuting spammers/phishing scammers in a way
|
||||
that’s friendly to the marketing industry.'"
|
||||
|
||||
The US Department of Homeland Security approached the developers in 2007-8[1][36] for access to their data and they have
|
||||
been working with the US government[54] and law enforcement ever since[1].
|
||||
|
||||
On HTTP GET requests:
|
||||
|
||||
Cloudflare has a history of shutting down open DNS and open NTP servers.
|
||||
|
||||
"It would be great if they allowed GET requests - for example - such requests should not and generally do not modify server
|
||||
side content. They do not do this - this breaks the web in so many ways, it is incredible. Using wget with Tor on a website
|
||||
hosted by CF is... a disaster. Using Tor Browser with it - much the same. These requests should be idempotent according to
|
||||
spec, I believe."
|
||||
|
||||
{FIX ME - "critical of it"?}
|
||||
Cloudflare has a history of closing tickets that are critical of it without actually resolving the issue[29][30][32]
|
||||
|
||||
"Cloudflare is based in a country with secret courts, secret police, and secret prisons that are above the law - and this
|
||||
secret government has characterized Cloudflare's data as extremely valuable"[28]
|
||||
"The CEO says, "Cloudflare's strength lies in the DATA it collects -- not in its CODE.'"[28]
|
||||
"The U.S. federal government is a Cloudflare customer."[28]
|
||||
"Cloudflare has never stated that a government agency did not install wiretapping equipment or software on the same
|
||||
premises as a Cloudflare server."[28]
|
||||
"Cloudflare has never indicated that the architecture of its content distribution network is resistant to warrantless
|
||||
mass surveillance."[28]
|
||||
"Cloudflare has given the Chinese government unprecedented censorship capability."[28]
|
||||
"Cloudflare has no intention to shut down as Lavabit did in order to protect the user from unlawful surveillance."[28]
|
||||
"Some Cloudflare customers are paying over 1 million dollars per year for an undisclosed service."[28]
|
||||
|
||||
*"But Cloudflare is really necessary, the web is a nasty place"*
|
||||
|
||||
- The more of the web is held within Cloudflare, the more pressure will be on websites not behind Cloudflare
|
||||
- As of 2016, by Cloudflare's own data, Tor was not as bad as normal internet connections.
|
||||
- People: "But we need Cloudflare to protect us from DDoS.”
|
||||
Cloudflare: "That’s a nice site you have there. It would be a shame, such a shame, if anything happened to it. Why don’t
|
||||
you let us decrypt all your TLS sessions[59] so we can protect you?"[14]
|
||||
|
||||
*I heard Cloudflare is working with Tor and all is good now?*
|
||||
|
||||
- Just because you can't see the problem doesn't mean it's not there.
|
||||
|
||||
- This is not true. Their websites still CAPTCHA their users, same as ever, and news agencies across the political spectrum
|
||||
screwed up stories about how the 'problem is fixed'. [18]
|
||||
|
||||
- It's actually worse, though[17], if we couldn't see it[60] - it was easy to get a lot of riled up Tor users to understand
|
||||
that Cloudflare was their adversary. It's a lot harder to convince people who are not blocked from their websites, today,
|
||||
why giving systematic control over the world wide web might be a bad thing tomorrow.
|
||||
|
||||
"Right now, Cloudflare says it monitors nearly 1/5 of all Internet visits. An astounding claim for a company most people
|
||||
haven’t even heard of"[40]
|
||||
|
||||
- But they are now doing more to track users and threaten the anonymity of Tor users.
|
||||
|
||||
- Cloudflare is one of a couple of large network providers that are capturing the vast majority of digital communications,
|
||||
effectively creating private networks the size of the modern internet that are competitive with and not subject to the
|
||||
same kinds of scrutiny and regulation as the internet[58].
|
||||
|
||||
*What if we shut down Cloudflare and migrate all websites out of them?*
|
||||
|
||||
We're probably going to have the same problem with another company very soon. Just as when suddenly Microsoft no longer had
|
||||
a monopoly on software, we didn't get rid of the problem of proprietary software, there's a couple of problems that, if we
|
||||
don't solve them, something like Cloudflare is roughly inevitable as a consequence:
|
||||
|
||||
*Cloudflare DNS*
|
||||
|
||||
"DNS[50] is around, servers are insecure, proper end-to-end crypto isn't the norm hence MITM goes unnoticed, anonymity is an edge case, routing lacks built-in resiliency to disruption, we're always going to have actors building a business model around cobbling together superficial, overapproximating mitigations."[20]
|
||||
|
||||
*Mozilla and Cloudflare*
|
||||
|
||||
"At least for browsing with Firefox, because Mozilla has partnered up with Cloudflare and will resolve the domain names
|
||||
from the application itself via a DNS server from Cloudflare based in the United States. Cloudflare will then be able to
|
||||
read everyone's DNS requests."
|
||||
Sharing DNS requests with Cloudflare represents mozilla having a security hole, straight to the Cloudflare (and probably:
|
||||
the NSA).
|
||||
|
||||
*What can you do?*
|
||||
|
||||
Learn more about Cloudflare and make sure the people around you know about Cloudflare. Use Tor by default to be more
|
||||
exposed to the blocks. Go to the anti-Cloudflare collaboration repository[41] and make sure websites you use aren't
|
||||
"protected", and if they are, contact the people who run the website requesting that they no longer use Cloudflare. Get
|
||||
involved!
|
||||
|
||||
|
||||
References
|
||||
|
||||
[1] crimeflare. Is CloudFlare a honey pot? https://web.archive.org/web/20170721161127/http://www.crimeflare.us/honeypot.html
|
||||
[2] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:15
|
||||
[3] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:21
|
||||
[5] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:28
|
||||
[6] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:30
|
||||
[7] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:32
|
||||
[8] ioerror. Issues with corporate censorship and mass surveillance. https://www.bloomberg.com/quicktake/great-firewall-of-china
|
||||
[9] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:51
|
||||
[10] crimeflare. Is CloudFlare a honey pot? https://web.archive.org/web/20170721161127/http://www.crimeflare.us/honeypot.html
|
||||
[11] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:59
|
||||
[12] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:66
|
||||
[13] mikeperry. The Trouble with CloudFlare. https://blog.torproject.org/trouble-cloudflare
|
||||
[14] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24351#comment:8
|
||||
[15] Unknown. Google+ https://plus.google.com/105395547687614433866/posts/G9nnQBnLtjp
|
||||
[16] Unknown. Google+ https://plus.google.com/105395547687614433866/posts/XnQryQ7hR9G
|
||||
[17] msmach. Cloudflare Ends CAPTCHAs For Tor Users https://it.slashdot.org/comments.pl?sid=12641622&cid=57348584
|
||||
[18] msmach. Cloudflare Ends CAPTCHAs For Tor Users https://it.slashdot.org/comments.pl?sid=12641622&cid=57388544
|
||||
[19] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:90
|
||||
[20] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:112
|
||||
[21] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:132
|
||||
[22] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:141
|
||||
[23] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:147
|
||||
[24] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:160
|
||||
[25] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:175
|
||||
[26] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:183
|
||||
[27] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:231
|
||||
[28] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:236
|
||||
[29] ioerror. Issues with corporate censorship and mass surveillance. https://trac.torproject.org/projects/tor/ticket/18361#comment:255
|
||||
[30] gk. Cloudflare breaks loading the chat. https://trac.torproject.org/projects/tor/ticket/23141
|
||||
[31] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24351#comment:20
|
||||
[32] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24351#comment:44
|
||||
[33] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24351#comment:52
|
||||
[34] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24351#comment:60
|
||||
[35] nullius. Block Global Active Adversary Cloudflare. https://trac.torproject.org/projects/tor/ticket/24321#comment:13
|
||||
[36] Anonymous. Cloudflare philosophy. https://codeberg.org/crimeflare/cloudflare-tor/src/master/cloudflare-philosophy.md
|
||||
[37] Peter O'Shaughnessy. Screen Reader User Survey Results #7. https://toot.cafe/@peter/99398584471715976
|
||||
[39] ungeich. A new feature in Firefox https://blog.ungleich.ch/en-us/cms/blog/2018/08/04/mozillas-new-dns-resolution-is-dangerous/
|
||||
[40] Yasha Levine. iSucker: Big Brother Internet Culture http://exiledonline.com/isucker-big-brother-internet-culture/
|
||||
[41] Anonymous. The Great Cloudwall. http://codeberg.org/crimeflare/cloudflare-tor
|
||||
[42] lesswrong wiki. Unfriendly artificial intelligence https://wiki.lesswrong.com/wiki/Unfriendly_artificial_intelligence
|
||||
[43] Ben Harack. What is an existential risk? https://www.visionofearth.org/future-of-humanity/existential-risks/what-is-an-existential-risk/
|
||||
[44] Nick Szabo. Twitter http://twitter.com/nickszabo4
|
||||
[45] FSF. Google's Software is Malware https://www.gnu.org/proprietary/malware-google.en.html
|
||||
[46] Richard Stallman. Reasons not to use Google https://stallman.org/google.html
|
||||
[47] Richard Stallman. The JavaScript Trap https://www.gnu.org/philosophy/javascript-trap.html
|
||||
[48] Nick Szabo. Trusted Third Parties are Security Holes. 2001. https://nakamotoinstitute.org/trusted-third-parties
|
||||
[49] slashgeek. CloudFlare is ruining the internet (for me) https://www.slashgeek.net/2016/05/17/cloudflare-is-ruining-the-internet-for-me/
|
||||
[50] Hamid Sarfraz. How likely is it that CloudFlare is an NSA operation? https://www.quora.com/How-likely-is-it-that-CloudFlare-is-an-NSA-operation/answer/Hamid-Sarfraz
|
||||
[51] Karthik Balakrishnan. Airtel is sniffing and censoring CloudFlare’s traffic in India and CloudFlare doesn’t even know it. https://medium.com/@karthikb351/airtel-is-sniffing-and-censoring-cloudflares-traffic-in-india-and-they-don-t-even-know-it-90935f7f6d98
|
||||
[52] http://pleroma.oniichanylo2tsi4.onion/notice/1563
|
||||
[53] StopMITMInt. Add an option to stop trusting Cloudflare certificate https://github.com/mozilla-mobile/focus-android/issues/1743#issuecomment-351555735
|
||||
[54] goody2shoes. Block Global Active Adversary Cloudflare https://lists.torproject.org/pipermail/tor-talk/2018-January/043889.html
|
||||
[55] EFF. The Crypto Wars https://www.eff.org/document/crypto-wars
|
||||
[56] http://forums.clamwin.com/viewtopic.php?t=4915
|
||||
[57] November 2018 Archives by thread http://lists.clamav.net/pipermail/clamav-users/2018-November/thread.html
|
||||
[58] https://www.itu.int/en/ITU-T/Workshops-and-Seminars/20181218/Documents/Geoff_Huston_Presentation.pdf
|
||||
[59] Thorin-Oakenpants. let's talk about our little buddy cloudflare. https://github.com/ghacksuserjs/ghacks-user.js/issues/310#issuecomment-351913412
|
||||
[60] ghost. What do you think about Cloudflare? https://github.com/privacytoolsIO/privacytools.io/issues/374#issuecomment-460413259
|
||||
[61] Unspam Technologies, Inc. https://projecthoneypot.org/
|
||||
[62] TechRader. Captcha if you can: how you’ve been training AI for years without realising it https://www.techradar.com/news/captcha-if-you-can-how-youve-been-training-ai-for-years-without-realising-it
|
|
@ -0,0 +1,8 @@
|
|||
# Cloudflare, inc.
|
||||
|
||||
Anti-human surveilance & censorship company.
|
||||
|
||||
![](../image/blockedbyjustin.jpg)
|
||||
![](../image/blockedbymatthewprince.jpg)
|
||||
|
||||
See [instructions.md](../instructions.md) for file purpose and format specifications.
|
|
@ -0,0 +1,843 @@
|
|||
1.0.0.0/24
|
||||
1.1.1.0/24
|
||||
103.21.244.0/22
|
||||
103.21.246.0/24
|
||||
103.21.247.0/24
|
||||
103.22.200.0/22
|
||||
103.22.200.0/23
|
||||
103.22.202.0/24
|
||||
103.22.203.0/24
|
||||
103.31.4.0/22
|
||||
103.31.4.0/23
|
||||
104.16.0.0/12
|
||||
104.16.0.0/20
|
||||
104.16.112.0/20
|
||||
104.16.128.0/20
|
||||
104.16.144.0/20
|
||||
104.16.16.0/20
|
||||
104.16.160.0/20
|
||||
104.16.176.0/20
|
||||
104.16.192.0/20
|
||||
104.16.208.0/20
|
||||
104.16.224.0/20
|
||||
104.16.240.0/20
|
||||
104.16.32.0/20
|
||||
104.16.48.0/20
|
||||
104.16.64.0/20
|
||||
104.16.80.0/20
|
||||
104.16.96.0/20
|
||||
104.17.0.0/20
|
||||
104.17.112.0/20
|
||||
104.17.128.0/20
|
||||
104.17.144.0/20
|
||||
104.17.16.0/20
|
||||
104.17.160.0/20
|
||||
104.17.176.0/20
|
||||
104.17.192.0/20
|
||||
104.17.208.0/20
|
||||
104.17.224.0/20
|
||||
104.17.240.0/20
|
||||
104.17.32.0/20
|
||||
104.17.48.0/20
|
||||
104.17.64.0/20
|
||||
104.17.80.0/20
|
||||
104.17.96.0/20
|
||||
104.18.0.0/20
|
||||
104.18.112.0/20
|
||||
104.18.128.0/20
|
||||
104.18.144.0/20
|
||||
104.18.16.0/20
|
||||
104.18.160.0/20
|
||||
104.18.176.0/20
|
||||
104.18.192.0/20
|
||||
104.18.208.0/20
|
||||
104.18.224.0/20
|
||||
104.18.240.0/20
|
||||
104.18.32.0/20
|
||||
104.18.48.0/20
|
||||
104.18.64.0/20
|
||||
104.18.80.0/20
|
||||
104.18.96.0/20
|
||||
104.19.0.0/20
|
||||
104.19.112.0/20
|
||||
104.19.128.0/20
|
||||
104.19.144.0/20
|
||||
104.19.16.0/20
|
||||
104.19.160.0/20
|
||||
104.19.176.0/20
|
||||
104.19.192.0/20
|
||||
104.19.208.0/20
|
||||
104.19.224.0/20
|
||||
104.19.240.0/20
|
||||
104.19.32.0/20
|
||||
104.19.48.0/20
|
||||
104.19.64.0/20
|
||||
104.19.80.0/20
|
||||
104.19.96.0/20
|
||||
104.20.0.0/20
|
||||
104.20.112.0/20
|
||||
104.20.128.0/20
|
||||
104.20.144.0/20
|
||||
104.20.16.0/20
|
||||
104.20.160.0/20
|
||||
104.20.176.0/20
|
||||
104.20.192.0/20
|
||||
104.20.208.0/20
|
||||
104.20.224.0/20
|
||||
104.20.240.0/20
|
||||
104.20.32.0/20
|
||||
104.20.48.0/20
|
||||
104.20.64.0/20
|
||||
104.20.80.0/20
|
||||
104.20.96.0/20
|
||||
104.22.0.0/20
|
||||
104.23.112.0/20
|
||||
104.23.128.0/20
|
||||
104.23.192.0/20
|
||||
104.23.240.0/22
|
||||
104.23.96.0/20
|
||||
104.24.0.0/20
|
||||
104.24.112.0/20
|
||||
104.24.128.0/20
|
||||
104.24.144.0/20
|
||||
104.24.16.0/20
|
||||
104.24.160.0/20
|
||||
104.24.176.0/20
|
||||
104.24.192.0/20
|
||||
104.24.208.0/20
|
||||
104.24.224.0/20
|
||||
104.24.240.0/20
|
||||
104.24.32.0/20
|
||||
104.24.48.0/20
|
||||
104.24.64.0/20
|
||||
104.24.80.0/20
|
||||
104.24.96.0/20
|
||||
104.25.0.0/20
|
||||
104.25.112.0/20
|
||||
104.25.128.0/20
|
||||
104.25.144.0/20
|
||||
104.25.16.0/20
|
||||
104.25.160.0/20
|
||||
104.25.176.0/20
|
||||
104.25.192.0/20
|
||||
104.25.208.0/20
|
||||
104.25.224.0/20
|
||||
104.25.240.0/20
|
||||
104.25.32.0/20
|
||||
104.25.48.0/20
|
||||
104.25.64.0/20
|
||||
104.25.80.0/20
|
||||
104.25.96.0/20
|
||||
104.26.0.0/20
|
||||
104.27.0.0/20
|
||||
104.27.112.0/20
|
||||
104.27.128.0/20
|
||||
104.27.144.0/20
|
||||
104.27.16.0/20
|
||||
104.27.160.0/20
|
||||
104.27.176.0/20
|
||||
104.27.192.0/20
|
||||
104.27.208.0/20
|
||||
104.27.240.0/22
|
||||
104.27.32.0/20
|
||||
104.27.48.0/20
|
||||
104.27.64.0/20
|
||||
104.27.80.0/20
|
||||
104.27.96.0/20
|
||||
104.28.0.0/20
|
||||
104.28.112.0/20
|
||||
104.28.128.0/20
|
||||
104.28.144.0/20
|
||||
104.28.16.0/20
|
||||
104.28.160.0/20
|
||||
104.28.176.0/20
|
||||
104.28.192.0/20
|
||||
104.28.208.0/20
|
||||
104.28.224.0/20
|
||||
104.28.240.0/20
|
||||
104.28.32.0/20
|
||||
104.28.48.0/20
|
||||
104.28.64.0/20
|
||||
104.28.80.0/20
|
||||
104.28.96.0/20
|
||||
104.31.0.0/20
|
||||
104.31.112.0/22
|
||||
104.31.128.0/20
|
||||
104.31.144.0/20
|
||||
104.31.16.0/20
|
||||
104.31.160.0/20
|
||||
104.31.176.0/20
|
||||
104.31.192.0/20
|
||||
104.31.208.0/20
|
||||
104.31.224.0/20
|
||||
104.31.240.0/20
|
||||
104.31.64.0/20
|
||||
104.31.80.0/20
|
||||
108.162.192.0/18
|
||||
108.162.208.0/24
|
||||
108.162.210.0/24
|
||||
108.162.211.0/24
|
||||
108.162.212.0/24
|
||||
108.162.213.0/24
|
||||
108.162.214.0/24
|
||||
108.162.215.0/24
|
||||
108.162.216.0/24
|
||||
108.162.217.0/24
|
||||
108.162.218.0/24
|
||||
108.162.219.0/24
|
||||
108.162.220.0/24
|
||||
108.162.221.0/24
|
||||
108.162.222.0/24
|
||||
108.162.223.0/24
|
||||
108.162.226.0/24
|
||||
108.162.227.0/24
|
||||
108.162.228.0/24
|
||||
108.162.229.0/24
|
||||
108.162.235.0/24
|
||||
108.162.236.0/24
|
||||
108.162.237.0/24
|
||||
108.162.238.0/24
|
||||
108.162.239.0/24
|
||||
108.162.240.0/24
|
||||
108.162.241.0/24
|
||||
108.162.242.0/24
|
||||
108.162.243.0/24
|
||||
108.162.244.0/24
|
||||
108.162.245.0/24
|
||||
108.162.246.0/24
|
||||
108.162.247.0/24
|
||||
108.162.248.0/24
|
||||
108.162.249.0/24
|
||||
108.162.250.0/24
|
||||
108.162.252.0/24
|
||||
108.162.253.0/24
|
||||
108.162.255.0/24
|
||||
131.0.72.0/22
|
||||
141.101.100.0/22
|
||||
141.101.104.0/24
|
||||
141.101.105.0/24
|
||||
141.101.106.0/24
|
||||
141.101.107.0/24
|
||||
141.101.108.0/24
|
||||
141.101.109.0/24
|
||||
141.101.110.0/24
|
||||
141.101.111.0/24
|
||||
141.101.112.0/20
|
||||
141.101.112.0/23
|
||||
141.101.114.0/23
|
||||
141.101.120.0/22
|
||||
141.101.64.0/18
|
||||
141.101.64.0/24
|
||||
141.101.65.0/24
|
||||
141.101.66.0/24
|
||||
141.101.67.0/24
|
||||
141.101.68.0/24
|
||||
141.101.69.0/24
|
||||
141.101.70.0/24
|
||||
141.101.71.0/24
|
||||
141.101.72.0/24
|
||||
141.101.73.0/24
|
||||
141.101.74.0/24
|
||||
141.101.75.0/24
|
||||
141.101.76.0/23
|
||||
141.101.82.0/24
|
||||
141.101.83.0/24
|
||||
141.101.84.0/24
|
||||
141.101.85.0/24
|
||||
141.101.88.0/22
|
||||
141.101.94.0/24
|
||||
141.101.95.0/24
|
||||
141.101.96.0/24
|
||||
141.101.97.0/24
|
||||
141.101.98.0/24
|
||||
141.101.99.0/24
|
||||
162.158.0.0/15
|
||||
162.158.0.0/22
|
||||
162.158.10.0/24
|
||||
162.158.100.0/24
|
||||
162.158.101.0/24
|
||||
162.158.102.0/24
|
||||
162.158.103.0/24
|
||||
162.158.104.0/24
|
||||
162.158.105.0/24
|
||||
162.158.106.0/24
|
||||
162.158.107.0/24
|
||||
162.158.108.0/22
|
||||
162.158.11.0/24
|
||||
162.158.112.0/24
|
||||
162.158.113.0/24
|
||||
162.158.114.0/24
|
||||
162.158.115.0/24
|
||||
162.158.116.0/22
|
||||
162.158.12.0/22
|
||||
162.158.120.0/24
|
||||
162.158.121.0/24
|
||||
162.158.122.0/24
|
||||
162.158.123.0/24
|
||||
162.158.124.0/22
|
||||
162.158.128.0/22
|
||||
162.158.132.0/24
|
||||
162.158.133.0/24
|
||||
162.158.134.0/24
|
||||
162.158.135.0/24
|
||||
162.158.136.0/22
|
||||
162.158.140.0/24
|
||||
162.158.141.0/24
|
||||
162.158.142.0/24
|
||||
162.158.143.0/24
|
||||
162.158.144.0/24
|
||||
162.158.145.0/24
|
||||
162.158.146.0/24
|
||||
162.158.147.0/24
|
||||
162.158.148.0/22
|
||||
162.158.152.0/22
|
||||
162.158.156.0/22
|
||||
162.158.16.0/22
|
||||
162.158.160.0/20
|
||||
162.158.176.0/24
|
||||
162.158.177.0/24
|
||||
162.158.178.0/24
|
||||
162.158.179.0/24
|
||||
162.158.180.0/22
|
||||
162.158.184.0/24
|
||||
162.158.185.0/24
|
||||
162.158.186.0/24
|
||||
162.158.187.0/24
|
||||
162.158.188.0/24
|
||||
162.158.189.0/24
|
||||
162.158.190.0/24
|
||||
162.158.191.0/24
|
||||
162.158.192.0/24
|
||||
162.158.193.0/24
|
||||
162.158.194.0/24
|
||||
162.158.195.0/24
|
||||
162.158.196.0/24
|
||||
162.158.197.0/24
|
||||
162.158.198.0/24
|
||||
162.158.199.0/24
|
||||
162.158.20.0/22
|
||||
162.158.200.0/22
|
||||
162.158.204.0/23
|
||||
162.158.206.0/23
|
||||
162.158.206.0/24
|
||||
162.158.208.0/22
|
||||
162.158.212.0/22
|
||||
162.158.216.0/23
|
||||
162.158.218.0/23
|
||||
162.158.220.0/22
|
||||
162.158.224.0/22
|
||||
162.158.224.0/24
|
||||
162.158.225.0/24
|
||||
162.158.226.0/23
|
||||
162.158.228.0/22
|
||||
162.158.232.0/22
|
||||
162.158.236.0/22
|
||||
162.158.24.0/24
|
||||
162.158.240.0/22
|
||||
162.158.244.0/22
|
||||
162.158.248.0/22
|
||||
162.158.248.0/23
|
||||
162.158.25.0/24
|
||||
162.158.250.0/23
|
||||
162.158.252.0/22
|
||||
162.158.26.0/24
|
||||
162.158.27.0/24
|
||||
162.158.28.0/24
|
||||
162.158.29.0/24
|
||||
162.158.30.0/24
|
||||
162.158.31.0/24
|
||||
162.158.32.0/22
|
||||
162.158.36.0/24
|
||||
162.158.37.0/24
|
||||
162.158.38.0/24
|
||||
162.158.39.0/24
|
||||
162.158.4.0/22
|
||||
162.158.40.0/24
|
||||
162.158.41.0/24
|
||||
162.158.42.0/24
|
||||
162.158.43.0/24
|
||||
162.158.44.0/22
|
||||
162.158.44.0/24
|
||||
162.158.45.0/24
|
||||
162.158.46.0/24
|
||||
162.158.47.0/24
|
||||
162.158.48.0/24
|
||||
162.158.49.0/24
|
||||
162.158.50.0/24
|
||||
162.158.51.0/24
|
||||
162.158.52.0/24
|
||||
162.158.53.0/24
|
||||
162.158.54.0/24
|
||||
162.158.55.0/24
|
||||
162.158.56.0/22
|
||||
162.158.60.0/22
|
||||
162.158.64.0/21
|
||||
162.158.64.0/22
|
||||
162.158.72.0/22
|
||||
162.158.76.0/22
|
||||
162.158.8.0/24
|
||||
162.158.80.0/23
|
||||
162.158.82.0/23
|
||||
162.158.82.0/24
|
||||
162.158.83.0/24
|
||||
162.158.84.0/22
|
||||
162.158.84.0/24
|
||||
162.158.85.0/24
|
||||
162.158.86.0/24
|
||||
162.158.87.0/24
|
||||
162.158.88.0/21
|
||||
162.158.88.0/24
|
||||
162.158.89.0/24
|
||||
162.158.9.0/24
|
||||
162.158.90.0/24
|
||||
162.158.91.0/24
|
||||
162.158.92.0/24
|
||||
162.158.93.0/24
|
||||
162.158.94.0/24
|
||||
162.158.95.0/24
|
||||
162.158.96.0/24
|
||||
162.158.97.0/24
|
||||
162.158.98.0/24
|
||||
162.158.99.0/24
|
||||
162.159.0.0/20
|
||||
162.159.0.0/24
|
||||
162.159.1.0/24
|
||||
162.159.10.0/24
|
||||
162.159.11.0/24
|
||||
162.159.12.0/24
|
||||
162.159.128.0/17
|
||||
162.159.128.0/19
|
||||
162.159.13.0/24
|
||||
162.159.132.0/24
|
||||
162.159.14.0/24
|
||||
162.159.15.0/24
|
||||
162.159.16.0/20
|
||||
162.159.16.0/24
|
||||
162.159.17.0/24
|
||||
162.159.18.0/24
|
||||
162.159.19.0/24
|
||||
162.159.192.0/22
|
||||
162.159.2.0/24
|
||||
162.159.20.0/24
|
||||
162.159.208.0/22
|
||||
162.159.208.0/24
|
||||
162.159.209.0/24
|
||||
162.159.21.0/24
|
||||
162.159.210.0/24
|
||||
162.159.211.0/24
|
||||
162.159.212.0/22
|
||||
162.159.216.0/21
|
||||
162.159.22.0/24
|
||||
162.159.224.0/20
|
||||
162.159.23.0/24
|
||||
162.159.24.0/24
|
||||
162.159.25.0/24
|
||||
162.159.26.0/24
|
||||
162.159.27.0/24
|
||||
162.159.28.0/24
|
||||
162.159.29.0/24
|
||||
162.159.3.0/24
|
||||
162.159.30.0/24
|
||||
162.159.31.0/24
|
||||
162.159.32.0/20
|
||||
162.159.32.0/23
|
||||
162.159.34.0/23
|
||||
162.159.36.0/24
|
||||
162.159.4.0/24
|
||||
162.159.40.0/23
|
||||
162.159.42.0/23
|
||||
162.159.46.0/24
|
||||
162.159.5.0/24
|
||||
162.159.6.0/24
|
||||
162.159.7.0/24
|
||||
162.159.8.0/24
|
||||
162.159.9.0/24
|
||||
162.251.82.0/24
|
||||
172.64.0.0/13
|
||||
172.64.0.0/16
|
||||
172.64.0.0/20
|
||||
172.64.112.0/20
|
||||
172.64.128.0/20
|
||||
172.64.144.0/20
|
||||
172.64.16.0/20
|
||||
172.64.160.0/20
|
||||
172.64.176.0/20
|
||||
172.64.192.0/20
|
||||
172.64.208.0/20
|
||||
172.64.32.0/20
|
||||
172.64.48.0/20
|
||||
172.64.64.0/20
|
||||
172.64.96.0/20
|
||||
172.65.0.0/20
|
||||
172.65.112.0/20
|
||||
172.65.128.0/20
|
||||
172.65.144.0/20
|
||||
172.65.16.0/20
|
||||
172.65.160.0/20
|
||||
172.65.176.0/20
|
||||
172.65.192.0/20
|
||||
172.65.208.0/20
|
||||
172.65.224.0/20
|
||||
172.65.240.0/20
|
||||
172.65.32.0/20
|
||||
172.65.48.0/20
|
||||
172.65.64.0/20
|
||||
172.65.80.0/20
|
||||
172.65.96.0/20
|
||||
172.68.0.0/22
|
||||
172.68.100.0/22
|
||||
172.68.104.0/22
|
||||
172.68.108.0/22
|
||||
172.68.112.0/22
|
||||
172.68.116.0/22
|
||||
172.68.12.0/22
|
||||
172.68.120.0/22
|
||||
172.68.120.0/23
|
||||
172.68.124.0/22
|
||||
172.68.128.0/22
|
||||
172.68.132.0/22
|
||||
172.68.136.0/22
|
||||
172.68.140.0/22
|
||||
172.68.144.0/22
|
||||
172.68.148.0/22
|
||||
172.68.152.0/22
|
||||
172.68.16.0/20
|
||||
172.68.16.0/21
|
||||
172.68.160.0/22
|
||||
172.68.164.0/23
|
||||
172.68.166.0/23
|
||||
172.68.168.0/23
|
||||
172.68.171.0/24
|
||||
172.68.172.0/22
|
||||
172.68.176.0/22
|
||||
172.68.180.0/22
|
||||
172.68.184.0/22
|
||||
172.68.188.0/22
|
||||
172.68.196.0/22
|
||||
172.68.200.0/22
|
||||
172.68.204.0/22
|
||||
172.68.208.0/22
|
||||
172.68.212.0/22
|
||||
172.68.216.0/22
|
||||
172.68.220.0/22
|
||||
172.68.224.0/22
|
||||
172.68.228.0/22
|
||||
172.68.232.0/22
|
||||
172.68.236.0/22
|
||||
172.68.24.0/22
|
||||
172.68.240.0/22
|
||||
172.68.244.0/22
|
||||
172.68.248.0/21
|
||||
172.68.28.0/24
|
||||
172.68.29.0/24
|
||||
172.68.30.0/24
|
||||
172.68.31.0/24
|
||||
172.68.32.0/22
|
||||
172.68.36.0/22
|
||||
172.68.4.0/22
|
||||
172.68.40.0/22
|
||||
172.68.44.0/22
|
||||
172.68.48.0/22
|
||||
172.68.52.0/22
|
||||
172.68.56.0/24
|
||||
172.68.57.0/24
|
||||
172.68.58.0/24
|
||||
172.68.59.0/24
|
||||
172.68.60.0/22
|
||||
172.68.64.0/22
|
||||
172.68.68.0/22
|
||||
172.68.72.0/22
|
||||
172.68.76.0/22
|
||||
172.68.8.0/22
|
||||
172.68.80.0/22
|
||||
172.68.84.0/22
|
||||
172.68.88.0/22
|
||||
172.68.92.0/22
|
||||
172.68.96.0/22
|
||||
172.69.0.0/22
|
||||
172.69.0.0/23
|
||||
172.69.100.0/22
|
||||
172.69.104.0/22
|
||||
172.69.108.0/22
|
||||
172.69.108.0/23
|
||||
172.69.110.0/24
|
||||
172.69.111.0/24
|
||||
172.69.112.0/22
|
||||
172.69.116.0/22
|
||||
172.69.12.0/24
|
||||
172.69.120.0/22
|
||||
172.69.124.0/22
|
||||
172.69.128.0/22
|
||||
172.69.132.0/22
|
||||
172.69.136.0/22
|
||||
172.69.140.0/22
|
||||
172.69.144.0/22
|
||||
172.69.148.0/22
|
||||
172.69.152.0/22
|
||||
172.69.156.0/22
|
||||
172.69.16.0/20
|
||||
172.69.16.0/21
|
||||
172.69.160.0/22
|
||||
172.69.160.0/24
|
||||
172.69.164.0/22
|
||||
172.69.168.0/22
|
||||
172.69.172.0/22
|
||||
172.69.176.0/22
|
||||
172.69.180.0/22
|
||||
172.69.184.0/22
|
||||
172.69.188.0/22
|
||||
172.69.192.0/22
|
||||
172.69.196.0/22
|
||||
172.69.2.0/24
|
||||
172.69.200.0/22
|
||||
172.69.204.0/22
|
||||
172.69.208.0/22
|
||||
172.69.212.0/22
|
||||
172.69.216.0/22
|
||||
172.69.220.0/22
|
||||
172.69.224.0/22
|
||||
172.69.224.0/23
|
||||
172.69.226.0/23
|
||||
172.69.228.0/22
|
||||
172.69.232.0/22
|
||||
172.69.232.0/23
|
||||
172.69.234.0/24
|
||||
172.69.235.0/24
|
||||
172.69.236.0/22
|
||||
172.69.24.0/21
|
||||
172.69.240.0/22
|
||||
172.69.244.0/22
|
||||
172.69.244.0/23
|
||||
172.69.246.0/23
|
||||
172.69.248.0/22
|
||||
172.69.252.0/22
|
||||
172.69.252.0/24
|
||||
172.69.253.0/24
|
||||
172.69.254.0/24
|
||||
172.69.255.0/24
|
||||
172.69.32.0/22
|
||||
172.69.36.0/23
|
||||
172.69.38.0/23
|
||||
172.69.4.0/22
|
||||
172.69.40.0/22
|
||||
172.69.44.0/22
|
||||
172.69.44.0/24
|
||||
172.69.45.0/24
|
||||
172.69.46.0/24
|
||||
172.69.47.0/24
|
||||
172.69.48.0/22
|
||||
172.69.52.0/22
|
||||
172.69.56.0/22
|
||||
172.69.60.0/22
|
||||
172.69.64.0/21
|
||||
172.69.72.0/22
|
||||
172.69.76.0/22
|
||||
172.69.8.0/22
|
||||
172.69.80.0/22
|
||||
172.69.84.0/22
|
||||
172.69.88.0/22
|
||||
172.69.92.0/22
|
||||
172.69.96.0/22
|
||||
173.245.48.0/20
|
||||
173.245.48.0/24
|
||||
173.245.49.0/24
|
||||
173.245.52.0/24
|
||||
173.245.54.0/24
|
||||
173.245.56.0/24
|
||||
173.245.58.0/24
|
||||
173.245.59.0/24
|
||||
173.245.60.0/23
|
||||
173.245.62.0/24
|
||||
173.245.63.0/24
|
||||
185.122.0.0/24
|
||||
188.114.100.0/24
|
||||
188.114.101.0/24
|
||||
188.114.102.0/24
|
||||
188.114.103.0/24
|
||||
188.114.104.0/24
|
||||
188.114.106.0/23
|
||||
188.114.108.0/24
|
||||
188.114.109.0/24
|
||||
188.114.110.0/24
|
||||
188.114.111.0/24
|
||||
188.114.96.0/20
|
||||
188.114.96.0/24
|
||||
188.114.97.0/24
|
||||
188.114.98.0/24
|
||||
188.114.99.0/24
|
||||
190.93.240.0/20
|
||||
190.93.244.0/22
|
||||
197.234.240.0/22
|
||||
197.234.240.0/24
|
||||
197.234.241.0/24
|
||||
197.234.242.0/24
|
||||
197.234.243.0/24
|
||||
198.217.251.0/24
|
||||
198.41.128.0/17
|
||||
198.41.128.0/24
|
||||
198.41.129.0/24
|
||||
198.41.130.0/24
|
||||
198.41.132.0/22
|
||||
198.41.136.0/22
|
||||
198.41.144.0/22
|
||||
198.41.144.0/24
|
||||
198.41.148.0/22
|
||||
198.41.148.0/24
|
||||
198.41.152.0/22
|
||||
198.41.192.0/19
|
||||
198.41.192.0/21
|
||||
198.41.200.0/21
|
||||
198.41.208.0/23
|
||||
198.41.212.0/24
|
||||
198.41.213.0/24
|
||||
198.41.214.0/23
|
||||
198.41.216.0/24
|
||||
198.41.220.0/23
|
||||
198.41.222.0/24
|
||||
198.41.223.0/24
|
||||
198.41.224.0/22
|
||||
198.41.228.0/22
|
||||
198.41.228.0/24
|
||||
198.41.229.0/24
|
||||
198.41.230.0/24
|
||||
198.41.231.0/24
|
||||
198.41.232.0/23
|
||||
198.41.232.0/24
|
||||
198.41.233.0/24
|
||||
198.41.234.0/24
|
||||
198.41.235.0/24
|
||||
198.41.236.0/22
|
||||
198.41.240.0/24
|
||||
198.41.241.0/24
|
||||
198.41.242.0/24
|
||||
198.41.243.0/24
|
||||
198.41.245.0/24
|
||||
198.41.246.0/23
|
||||
198.41.248.0/23
|
||||
198.41.250.0/24
|
||||
198.41.252.0/24
|
||||
198.41.254.0/24
|
||||
198.41.255.0/24
|
||||
199.21.96.0/22
|
||||
199.27.132.0/24
|
||||
64.68.192.0/24
|
||||
66.235.200.0/24
|
||||
8.10.148.0/24
|
||||
8.14.199.0/24
|
||||
8.14.201.0/24
|
||||
8.14.202.0/24
|
||||
8.14.203.0/24
|
||||
8.14.204.0/24
|
||||
8.17.205.0/24
|
||||
8.17.207.0/24
|
||||
8.35.57.0/24
|
||||
8.35.58.0/24
|
||||
8.35.59.0/24
|
||||
8.36.216.0/24
|
||||
8.36.217.0/24
|
||||
8.36.218.0/24
|
||||
8.36.219.0/24
|
||||
8.36.220.0/24
|
||||
8.37.41.0/24
|
||||
8.37.43.0/24
|
||||
8.38.147.0/24
|
||||
8.38.148.0/24
|
||||
8.38.149.0/24
|
||||
8.38.172.0/24
|
||||
8.39.125.0/24
|
||||
8.39.126.0/24
|
||||
8.39.127.0/24
|
||||
8.39.18.0/24
|
||||
8.39.201.0/24
|
||||
8.39.202.0/24
|
||||
8.39.203.0/24
|
||||
8.39.204.0/24
|
||||
8.39.205.0/24
|
||||
8.39.206.0/24
|
||||
8.39.207.0/24
|
||||
8.39.212.0/24
|
||||
8.39.213.0/24
|
||||
8.39.214.0/24
|
||||
8.39.215.0/24
|
||||
8.39.6.0/24
|
||||
8.40.107.0/24
|
||||
8.40.111.0/24
|
||||
8.40.140.0/24
|
||||
8.40.26.0/24
|
||||
8.40.27.0/24
|
||||
8.40.28.0/24
|
||||
8.40.29.0/24
|
||||
8.40.30.0/24
|
||||
8.40.31.0/24
|
||||
8.41.36.0/24
|
||||
8.41.37.0/24
|
||||
8.41.39.0/24
|
||||
8.41.5.0/24
|
||||
8.41.6.0/24
|
||||
8.41.7.0/24
|
||||
8.42.161.0/24
|
||||
8.42.164.0/24
|
||||
8.42.172.0/24
|
||||
8.42.245.0/24
|
||||
8.42.51.0/24
|
||||
8.42.52.0/24
|
||||
8.42.54.0/24
|
||||
8.42.55.0/24
|
||||
8.43.121.0/24
|
||||
8.43.122.0/24
|
||||
8.43.123.0/24
|
||||
8.43.224.0/24
|
||||
8.43.225.0/24
|
||||
8.43.226.0/24
|
||||
8.44.0.0/24
|
||||
8.44.1.0/24
|
||||
8.44.2.0/24
|
||||
8.44.3.0/24
|
||||
8.44.58.0/24
|
||||
8.44.59.0/24
|
||||
8.44.6.0/24
|
||||
8.44.60.0/24
|
||||
8.44.62.0/24
|
||||
8.44.63.0/24
|
||||
8.45.100.0/24
|
||||
8.45.101.0/24
|
||||
8.45.102.0/24
|
||||
8.45.108.0/24
|
||||
8.45.111.0/24
|
||||
8.45.144.0/24
|
||||
8.45.145.0/24
|
||||
8.45.146.0/24
|
||||
8.45.147.0/24
|
||||
8.45.151.0/24
|
||||
8.45.41.0/24
|
||||
8.45.42.0/24
|
||||
8.45.43.0/24
|
||||
8.45.44.0/24
|
||||
8.45.45.0/24
|
||||
8.45.46.0/24
|
||||
8.45.47.0/24
|
||||
8.45.97.0/24
|
||||
8.46.113.0/24
|
||||
8.46.114.0/24
|
||||
8.46.115.0/24
|
||||
8.46.116.0/24
|
||||
8.46.118.0/24
|
||||
8.46.119.0/24
|
||||
8.47.12.0/24
|
||||
8.47.13.0/24
|
||||
8.47.14.0/24
|
||||
8.47.15.0/24
|
||||
8.47.69.0/24
|
||||
8.47.71.0/24
|
||||
8.47.9.0/24
|
||||
8.48.130.0/24
|
||||
8.48.131.0/24
|
||||
8.48.132.0/24
|
||||
8.48.133.0/24
|
||||
8.48.134.0/24
|
||||
8.6.112.0/24
|
||||
8.6.144.0/24
|
||||
8.6.145.0/24
|
||||
8.6.146.0/24
|
||||
8.9.230.0/24
|
||||
8.9.231.0/24
|
|
@ -0,0 +1,572 @@
|
|||
2400:cb00:100::/48
|
||||
2400:cb00:101::/48
|
||||
2400:cb00:102::/48
|
||||
2400:cb00:103::/48
|
||||
2400:cb00:104::/48
|
||||
2400:cb00:105::/48
|
||||
2400:cb00:106::/48
|
||||
2400:cb00:107::/48
|
||||
2400:cb00:109::/48
|
||||
2400:cb00:110::/48
|
||||
2400:cb00:111::/48
|
||||
2400:cb00:112::/48
|
||||
2400:cb00:113::/48
|
||||
2400:cb00:114::/48
|
||||
2400:cb00:115::/48
|
||||
2400:cb00:116::/48
|
||||
2400:cb00:117::/48
|
||||
2400:cb00:118::/48
|
||||
2400:cb00:119::/48
|
||||
2400:cb00:11::/48
|
||||
2400:cb00:120::/48
|
||||
2400:cb00:121::/48
|
||||
2400:cb00:122::/48
|
||||
2400:cb00:123::/48
|
||||
2400:cb00:124::/48
|
||||
2400:cb00:125::/48
|
||||
2400:cb00:126::/48
|
||||
2400:cb00:127::/48
|
||||
2400:cb00:128::/48
|
||||
2400:cb00:129::/48
|
||||
2400:cb00:12::/48
|
||||
2400:cb00:130::/48
|
||||
2400:cb00:131::/48
|
||||
2400:cb00:132::/48
|
||||
2400:cb00:133::/48
|
||||
2400:cb00:134::/48
|
||||
2400:cb00:135::/48
|
||||
2400:cb00:136::/48
|
||||
2400:cb00:137::/48
|
||||
2400:cb00:138::/48
|
||||
2400:cb00:139::/48
|
||||
2400:cb00:140::/48
|
||||
2400:cb00:141::/48
|
||||
2400:cb00:142::/48
|
||||
2400:cb00:143::/48
|
||||
2400:cb00:144::/48
|
||||
2400:cb00:145::/48
|
||||
2400:cb00:146::/48
|
||||
2400:cb00:148::/48
|
||||
2400:cb00:149::/48
|
||||
2400:cb00:14::/48
|
||||
2400:cb00:150::/48
|
||||
2400:cb00:151::/48
|
||||
2400:cb00:152::/48
|
||||
2400:cb00:153::/48
|
||||
2400:cb00:154::/48
|
||||
2400:cb00:155::/48
|
||||
2400:cb00:156::/48
|
||||
2400:cb00:157::/48
|
||||
2400:cb00:158::/48
|
||||
2400:cb00:159::/48
|
||||
2400:cb00:15::/48
|
||||
2400:cb00:160::/48
|
||||
2400:cb00:161::/48
|
||||
2400:cb00:162::/48
|
||||
2400:cb00:163::/48
|
||||
2400:cb00:166::/48
|
||||
2400:cb00:167::/48
|
||||
2400:cb00:168::/48
|
||||
2400:cb00:169::/48
|
||||
2400:cb00:16::/48
|
||||
2400:cb00:170::/48
|
||||
2400:cb00:171::/48
|
||||
2400:cb00:172::/48
|
||||
2400:cb00:173::/48
|
||||
2400:cb00:174::/48
|
||||
2400:cb00:175::/48
|
||||
2400:cb00:176::/48
|
||||
2400:cb00:177::/48
|
||||
2400:cb00:178::/48
|
||||
2400:cb00:179::/48
|
||||
2400:cb00:17::/48
|
||||
2400:cb00:180::/48
|
||||
2400:cb00:181::/48
|
||||
2400:cb00:182::/48
|
||||
2400:cb00:185::/48
|
||||
2400:cb00:186::/48
|
||||
2400:cb00:188::/48
|
||||
2400:cb00:189::/48
|
||||
2400:cb00:19::/48
|
||||
2400:cb00:2048::/48
|
||||
2400:cb00:2049::/48
|
||||
2400:cb00:20::/48
|
||||
2400:cb00:21::/48
|
||||
2400:cb00:22::/48
|
||||
2400:cb00:23::/48
|
||||
2400:cb00:26::/48
|
||||
2400:cb00:27::/48
|
||||
2400:cb00:28::/48
|
||||
2400:cb00:29::/48
|
||||
2400:cb00:31::/48
|
||||
2400:cb00:34::/48
|
||||
2400:cb00:35::/48
|
||||
2400:cb00:36::/48
|
||||
2400:cb00:38::/48
|
||||
2400:cb00:39::/48
|
||||
2400:cb00:40::/48
|
||||
2400:cb00:41::/48
|
||||
2400:cb00:42::/48
|
||||
2400:cb00:43::/48
|
||||
2400:cb00:44::/48
|
||||
2400:cb00:45::/48
|
||||
2400:cb00:46::/48
|
||||
2400:cb00:47::/48
|
||||
2400:cb00:48::/48
|
||||
2400:cb00:49::/48
|
||||
2400:cb00:4::/48
|
||||
2400:cb00:504::/48
|
||||
2400:cb00:505::/48
|
||||
2400:cb00:50::/48
|
||||
2400:cb00:51::/48
|
||||
2400:cb00:52::/48
|
||||
2400:cb00:53::/48
|
||||
2400:cb00:54::/48
|
||||
2400:cb00:55::/48
|
||||
2400:cb00:569::/48
|
||||
2400:cb00:56::/48
|
||||
2400:cb00:57::/48
|
||||
2400:cb00:58::/48
|
||||
2400:cb00:59::/48
|
||||
2400:cb00:60::/48
|
||||
2400:cb00:61::/48
|
||||
2400:cb00:62::/48
|
||||
2400:cb00:63::/48
|
||||
2400:cb00:64::/48
|
||||
2400:cb00:65::/48
|
||||
2400:cb00:66::/48
|
||||
2400:cb00:67::/48
|
||||
2400:cb00:68::/48
|
||||
2400:cb00:69::/48
|
||||
2400:cb00:70::/48
|
||||
2400:cb00:71::/48
|
||||
2400:cb00:72::/48
|
||||
2400:cb00:73::/48
|
||||
2400:cb00:74::/48
|
||||
2400:cb00:75::/48
|
||||
2400:cb00:76::/48
|
||||
2400:cb00:77::/48
|
||||
2400:cb00:78::/48
|
||||
2400:cb00:79::/48
|
||||
2400:cb00:80::/48
|
||||
2400:cb00:81::/48
|
||||
2400:cb00:83::/48
|
||||
2400:cb00:84::/48
|
||||
2400:cb00:85::/48
|
||||
2400:cb00:86::/48
|
||||
2400:cb00:87::/48
|
||||
2400:cb00:88::/48
|
||||
2400:cb00:89::/48
|
||||
2400:cb00:90::/48
|
||||
2400:cb00:92::/48
|
||||
2400:cb00:93::/48
|
||||
2400:cb00:94::/48
|
||||
2400:cb00:95::/48
|
||||
2400:cb00:96::/48
|
||||
2400:cb00:97::/48
|
||||
2400:cb00:98::/48
|
||||
2400:cb00::/32
|
||||
2400:cb00:a040::/48
|
||||
2400:cb00:a041::/48
|
||||
2400:cb00:a042::/48
|
||||
2400:cb00:a043::/48
|
||||
2400:cb00:a044::/48
|
||||
2400:cb00:a045::/48
|
||||
2400:cb00:a046::/48
|
||||
2400:cb00:a0b0::/48
|
||||
2400:cb00:a0b1::/48
|
||||
2400:cb00:a0b2::/48
|
||||
2400:cb00:a0b3::/48
|
||||
2400:cb00:a0b4::/48
|
||||
2400:cb00:a0b5::/48
|
||||
2400:cb00:a0b6::/48
|
||||
2400:cb00:a0b7::/48
|
||||
2400:cb00:a0c0::/48
|
||||
2400:cb00:a0c1::/48
|
||||
2400:cb00:a0c2::/48
|
||||
2400:cb00:a0c3::/48
|
||||
2400:cb00:a0c4::/48
|
||||
2400:cb00:a0c5::/48
|
||||
2400:cb00:a0c6::/48
|
||||
2400:cb00:a0c7::/48
|
||||
2400:cb00:a0e0::/48
|
||||
2400:cb00:a0e1::/48
|
||||
2400:cb00:a0e2::/48
|
||||
2400:cb00:a0e3::/48
|
||||
2400:cb00:a0e4::/48
|
||||
2400:cb00:a0e5::/48
|
||||
2400:cb00:a0e6::/48
|
||||
2400:cb00:a0e7::/48
|
||||
2400:cb00:a0f0::/48
|
||||
2400:cb00:a0f1::/48
|
||||
2400:cb00:a0f2::/48
|
||||
2400:cb00:a0f3::/48
|
||||
2400:cb00:a0f4::/48
|
||||
2400:cb00:a0f5::/48
|
||||
2400:cb00:a0f6::/48
|
||||
2400:cb00:a0f7::/48
|
||||
2400:cb00:a100::/48
|
||||
2400:cb00:a101::/48
|
||||
2400:cb00:a102::/48
|
||||
2400:cb00:a103::/48
|
||||
2400:cb00:a104::/48
|
||||
2400:cb00:a105::/48
|
||||
2400:cb00:a106::/48
|
||||
2400:cb00:a107::/48
|
||||
2400:cb00:a110::/48
|
||||
2400:cb00:a111::/48
|
||||
2400:cb00:a112::/48
|
||||
2400:cb00:a113::/48
|
||||
2400:cb00:a114::/48
|
||||
2400:cb00:a115::/48
|
||||
2400:cb00:a116::/48
|
||||
2400:cb00:a117::/48
|
||||
2400:cb00:a130::/48
|
||||
2400:cb00:a131::/48
|
||||
2400:cb00:a132::/48
|
||||
2400:cb00:a133::/48
|
||||
2400:cb00:a134::/48
|
||||
2400:cb00:a135::/48
|
||||
2400:cb00:a136::/48
|
||||
2400:cb00:a140::/48
|
||||
2400:cb00:a141::/48
|
||||
2400:cb00:a142::/48
|
||||
2400:cb00:a143::/48
|
||||
2400:cb00:a144::/48
|
||||
2400:cb00:a145::/48
|
||||
2400:cb00:a146::/48
|
||||
2400:cb00:a150::/48
|
||||
2400:cb00:a151::/48
|
||||
2400:cb00:a152::/48
|
||||
2400:cb00:a153::/48
|
||||
2400:cb00:a154::/48
|
||||
2400:cb00:a155::/48
|
||||
2400:cb00:a160::/48
|
||||
2400:cb00:a161::/48
|
||||
2400:cb00:a162::/48
|
||||
2400:cb00:a163::/48
|
||||
2400:cb00:a164::/48
|
||||
2400:cb00:a170::/48
|
||||
2400:cb00:a171::/48
|
||||
2400:cb00:a172::/48
|
||||
2400:cb00:a173::/48
|
||||
2400:cb00:a174::/48
|
||||
2400:cb00:a175::/48
|
||||
2400:cb00:a1a0::/48
|
||||
2400:cb00:a1a1::/48
|
||||
2400:cb00:a1a2::/48
|
||||
2400:cb00:a1b0::/48
|
||||
2400:cb00:a1b1::/48
|
||||
2400:cb00:a1b2::/48
|
||||
2400:cb00:a1b3::/48
|
||||
2400:cb00:a1b4::/48
|
||||
2400:cb00:a1b5::/48
|
||||
2400:cb00:a1b6::/48
|
||||
2400:cb00:a1b7::/48
|
||||
2400:cb00:a1c0::/48
|
||||
2400:cb00:a1c1::/48
|
||||
2400:cb00:a1c2::/48
|
||||
2400:cb00:a1c3::/48
|
||||
2400:cb00:a1c4::/48
|
||||
2400:cb00:a1c5::/48
|
||||
2400:cb00:a1c6::/48
|
||||
2400:cb00:a1c7::/48
|
||||
2400:cb00:a1d0::/48
|
||||
2400:cb00:a1d1::/48
|
||||
2400:cb00:a1d2::/48
|
||||
2400:cb00:a1d3::/48
|
||||
2400:cb00:a1d4::/48
|
||||
2400:cb00:a1d5::/48
|
||||
2400:cb00:a1f0::/48
|
||||
2400:cb00:a1f1::/48
|
||||
2400:cb00:a1f2::/48
|
||||
2400:cb00:a1f3::/48
|
||||
2400:cb00:a1f4::/48
|
||||
2400:cb00:a220::/48
|
||||
2400:cb00:a221::/48
|
||||
2400:cb00:a222::/48
|
||||
2400:cb00:a223::/48
|
||||
2400:cb00:a230::/48
|
||||
2400:cb00:a231::/48
|
||||
2400:cb00:a232::/48
|
||||
2400:cb00:a233::/48
|
||||
2400:cb00:a234::/48
|
||||
2400:cb00:a235::/48
|
||||
2400:cb00:a236::/48
|
||||
2400:cb00:a260::/48
|
||||
2400:cb00:a261::/48
|
||||
2400:cb00:a270::/48
|
||||
2400:cb00:a271::/48
|
||||
2400:cb00:a272::/48
|
||||
2400:cb00:a273::/48
|
||||
2400:cb00:a274::/48
|
||||
2400:cb00:a275::/48
|
||||
2400:cb00:a276::/48
|
||||
2400:cb00:a2b0::/48
|
||||
2400:cb00:a2b1::/48
|
||||
2400:cb00:a2c0::/48
|
||||
2400:cb00:a2c1::/48
|
||||
2400:cb00:a2c2::/48
|
||||
2400:cb00:a2f0::/48
|
||||
2400:cb00:a2f1::/48
|
||||
2400:cb00:a2f2::/48
|
||||
2400:cb00:a300::/48
|
||||
2400:cb00:a301::/48
|
||||
2400:cb00:a302::/48
|
||||
2400:cb00:a303::/48
|
||||
2400:cb00:a304::/48
|
||||
2400:cb00:a310::/48
|
||||
2400:cb00:a311::/48
|
||||
2400:cb00:a312::/48
|
||||
2400:cb00:a313::/48
|
||||
2400:cb00:a314::/48
|
||||
2400:cb00:a315::/48
|
||||
2400:cb00:a316::/48
|
||||
2400:cb00:a320::/48
|
||||
2400:cb00:a321::/48
|
||||
2400:cb00:a322::/48
|
||||
2400:cb00:a323::/48
|
||||
2400:cb00:a324::/48
|
||||
2400:cb00:a325::/48
|
||||
2400:cb00:a326::/48
|
||||
2400:cb00:a330::/48
|
||||
2400:cb00:a331::/48
|
||||
2400:cb00:a332::/48
|
||||
2400:cb00:a333::/48
|
||||
2400:cb00:a334::/48
|
||||
2400:cb00:a340::/48
|
||||
2400:cb00:a341::/48
|
||||
2400:cb00:a342::/48
|
||||
2400:cb00:a343::/48
|
||||
2400:cb00:a3a0::/48
|
||||
2400:cb00:a3a1::/48
|
||||
2400:cb00:a3f0::/48
|
||||
2400:cb00:a3f1::/48
|
||||
2400:cb00:a3f2::/48
|
||||
2400:cb00:a3f3::/48
|
||||
2400:cb00:a400::/48
|
||||
2400:cb00:a401::/48
|
||||
2400:cb00:a402::/48
|
||||
2400:cb00:a403::/48
|
||||
2400:cb00:a404::/48
|
||||
2400:cb00:a410::/48
|
||||
2400:cb00:a411::/48
|
||||
2400:cb00:a412::/48
|
||||
2400:cb00:a413::/48
|
||||
2400:cb00:a414::/48
|
||||
2400:cb00:a420::/48
|
||||
2400:cb00:a421::/48
|
||||
2400:cb00:a422::/48
|
||||
2400:cb00:a423::/48
|
||||
2400:cb00:a424::/48
|
||||
2400:cb00:a425::/48
|
||||
2400:cb00:a430::/48
|
||||
2400:cb00:a431::/48
|
||||
2400:cb00:a432::/48
|
||||
2400:cb00:a433::/48
|
||||
2400:cb00:a434::/48
|
||||
2400:cb00:a450::/48
|
||||
2400:cb00:a451::/48
|
||||
2400:cb00:a452::/48
|
||||
2400:cb00:a453::/48
|
||||
2400:cb00:a460::/48
|
||||
2400:cb00:a461::/48
|
||||
2400:cb00:a462::/48
|
||||
2400:cb00:a463::/48
|
||||
2400:cb00:a464::/48
|
||||
2400:cb00:a465::/48
|
||||
2400:cb00:a470::/48
|
||||
2400:cb00:a471::/48
|
||||
2400:cb00:a472::/48
|
||||
2400:cb00:a473::/48
|
||||
2400:cb00:a474::/48
|
||||
2400:cb00:a475::/48
|
||||
2400:cb00:a476::/48
|
||||
2400:cb00:a480::/48
|
||||
2400:cb00:a481::/48
|
||||
2400:cb00:a482::/48
|
||||
2400:cb00:a483::/48
|
||||
2400:cb00:a484::/48
|
||||
2400:cb00:a490::/48
|
||||
2400:cb00:a491::/48
|
||||
2400:cb00:a492::/48
|
||||
2400:cb00:a493::/48
|
||||
2400:cb00:a494::/48
|
||||
2400:cb00:a495::/48
|
||||
2400:cb00:a496::/48
|
||||
2400:cb00:a4a0::/48
|
||||
2400:cb00:a4a1::/48
|
||||
2400:cb00:a4a2::/48
|
||||
2400:cb00:a4a3::/48
|
||||
2400:cb00:a4a4::/48
|
||||
2400:cb00:a4a5::/48
|
||||
2400:cb00:a4b0::/48
|
||||
2400:cb00:a4b1::/48
|
||||
2400:cb00:a4b2::/48
|
||||
2400:cb00:a4b3::/48
|
||||
2400:cb00:a4c0::/48
|
||||
2400:cb00:a4c1::/48
|
||||
2400:cb00:a4e0::/48
|
||||
2400:cb00:a4e1::/48
|
||||
2400:cb00:a4e2::/48
|
||||
2400:cb00:a4e3::/48
|
||||
2400:cb00:a4e4::/48
|
||||
2400:cb00:a4e5::/48
|
||||
2400:cb00:a4e6::/48
|
||||
2400:cb00:a4f0::/48
|
||||
2400:cb00:a4f1::/48
|
||||
2400:cb00:a4f2::/48
|
||||
2400:cb00:a500::/48
|
||||
2400:cb00:a501::/48
|
||||
2400:cb00:a502::/48
|
||||
2400:cb00:a503::/48
|
||||
2400:cb00:a530::/48
|
||||
2400:cb00:a531::/48
|
||||
2400:cb00:a532::/48
|
||||
2400:cb00:a533::/48
|
||||
2400:cb00:a534::/48
|
||||
2400:cb00:a540::/48
|
||||
2400:cb00:a541::/48
|
||||
2400:cb00:a542::/48
|
||||
2400:cb00:a550::/48
|
||||
2400:cb00:a552::/48
|
||||
2400:cb00:a570::/48
|
||||
2400:cb00:a571::/48
|
||||
2400:cb00:a580::/48
|
||||
2400:cb00:a581::/48
|
||||
2400:cb00:a590::/48
|
||||
2400:cb00:a591::/48
|
||||
2400:cb00:a592::/48
|
||||
2400:cb00:a593::/48
|
||||
2400:cb00:a594::/48
|
||||
2400:cb00:a595::/48
|
||||
2400:cb00:a596::/48
|
||||
2400:cb00:a5e0::/48
|
||||
2400:cb00:a5e1::/48
|
||||
2400:cb00:a5e2::/48
|
||||
2400:cb00:a5e3::/48
|
||||
2400:cb00:a5e4::/48
|
||||
2400:cb00:a600::/48
|
||||
2400:cb00:a601::/48
|
||||
2400:cb00:a610::/48
|
||||
2400:cb00:a611::/48
|
||||
2400:cb00:a612::/48
|
||||
2400:cb00:a620::/48
|
||||
2400:cb00:a621::/48
|
||||
2400:cb00:a622::/48
|
||||
2400:cb00:a623::/48
|
||||
2400:cb00:a624::/48
|
||||
2400:cb00:a625::/48
|
||||
2400:cb00:a626::/48
|
||||
2400:cb00:a640::/48
|
||||
2400:cb00:a641::/48
|
||||
2400:cb00:a642::/48
|
||||
2400:cb00:a643::/48
|
||||
2400:cb00:a644::/48
|
||||
2400:cb00:a650::/48
|
||||
2400:cb00:a651::/48
|
||||
2400:cb00:a6a0::/48
|
||||
2400:cb00:a6a1::/48
|
||||
2400:cb00:a6a2::/48
|
||||
2400:cb00:a6a3::/48
|
||||
2400:cb00:a6a4::/48
|
||||
2400:cb00:a6a5::/48
|
||||
2400:cb00:a6a6::/48
|
||||
2400:cb00:a6b0::/48
|
||||
2400:cb00:a6b1::/48
|
||||
2400:cb00:a6b2::/48
|
||||
2400:cb00:a720::/48
|
||||
2400:cb00:a721::/48
|
||||
2400:cb00:a722::/48
|
||||
2400:cb00:a723::/48
|
||||
2400:cb00:a724::/48
|
||||
2400:cb00:a725::/48
|
||||
2400:cb00:a730::/48
|
||||
2400:cb00:a731::/48
|
||||
2400:cb00:a732::/48
|
||||
2400:cb00:a733::/48
|
||||
2400:cb00:a734::/48
|
||||
2400:cb00:a760::/48
|
||||
2400:cb00:a761::/48
|
||||
2400:cb00:a762::/48
|
||||
2400:cb00:a770::/48
|
||||
2400:cb00:a771::/48
|
||||
2400:cb00:a772::/48
|
||||
2400:cb00:a773::/48
|
||||
2400:cb00:a774::/48
|
||||
2400:cb00:a800::/48
|
||||
2400:cb00:a801::/48
|
||||
2400:cb00:a802::/48
|
||||
2400:cb00:a803::/48
|
||||
2400:cb00:a804::/48
|
||||
2400:cb00:a805::/48
|
||||
2400:cb00:a820::/48
|
||||
2400:cb00:a821::/48
|
||||
2400:cb00:a840::/48
|
||||
2400:cb00:a841::/48
|
||||
2400:cb00:a842::/48
|
||||
2400:cb00:a880::/48
|
||||
2400:cb00:a881::/48
|
||||
2400:cb00:a940::/48
|
||||
2400:cb00:a941::/48
|
||||
2400:cb00:a970::/48
|
||||
2400:cb00:a971::/48
|
||||
2400:cb00:a972::/48
|
||||
2400:cb00:a980::/48
|
||||
2400:cb00:a981::/48
|
||||
2400:cb00:a982::/48
|
||||
2400:cb00:a9a0::/48
|
||||
2400:cb00:a9a1::/48
|
||||
2400:cb00:a9a2::/48
|
||||
2400:cb00:a9f0::/48
|
||||
2400:cb00:a9f1::/48
|
||||
2400:cb00:aa60::/48
|
||||
2400:cb00:aa61::/48
|
||||
2400:cb00:aa90::/48
|
||||
2400:cb00:aa91::/48
|
||||
2400:cb00:f00e::/48
|
||||
2405:8100:8001::/48
|
||||
2405:8100:8002::/48
|
||||
2405:8100:8005::/48
|
||||
2405:8100::/32
|
||||
2405:b500::/32
|
||||
2606:4700:10::/44
|
||||
2606:4700:1100::/40
|
||||
2606:4700:11::/48
|
||||
2606:4700:1::/48
|
||||
2606:4700:2001::/48
|
||||
2606:4700:20::/44
|
||||
2606:4700:21::/48
|
||||
2606:4700:30::/44
|
||||
2606:4700:3131::/48
|
||||
2606:4700:31::/48
|
||||
2606:4700:4700::/48
|
||||
2606:4700:50::/44
|
||||
2606:4700:60::/44
|
||||
2606:4700:70::/44
|
||||
2606:4700:80::/44
|
||||
2606:4700:90::/44
|
||||
2606:4700::/32
|
||||
2606:4700::/36
|
||||
2606:4700::/44
|
||||
2606:4700:a0::/48
|
||||
2606:4700:a8::/48
|
||||
2606:4700:c0::/44
|
||||
2606:4700:d0::/44
|
||||
2606:4700:e0::/47
|
||||
2606:4700:e2::/47
|
||||
2606:4700:e4::/47
|
||||
2606:4700:e6::/47
|
||||
2606:4700:e8::/47
|
||||
2606:4700:ea::/47
|
||||
2606:4700:ec::/47
|
||||
2606:4700:ee::/47
|
||||
2606:4700:ff01::/48
|
||||
2606:4700:ff02::/48
|
||||
2803:f800::/32
|
||||
2a06:98c0:1000::/48
|
||||
2a06:98c0:1400::/48
|
||||
2a06:98c0:1401::/48
|
||||
2a06:98c0:3600::/48
|
||||
2a06:98c0::/29
|
||||
2c0f:f248::/32
|
|
@ -0,0 +1,8 @@
|
|||
AS132892
|
||||
AS13335
|
||||
AS133877
|
||||
AS14789
|
||||
AS202623
|
||||
AS203898
|
||||
AS394536
|
||||
AS395747
|
|
@ -0,0 +1,713 @@
|
|||
aaden.ns.cloudflare.com
|
||||
aarav.ns.cloudflare.com
|
||||
aaron.ns.cloudflare.com
|
||||
abby.ns.cloudflare.com
|
||||
achiel.ns.cloudflare.com
|
||||
ada.ns.cloudflare.com
|
||||
adaline.ns.cloudflare.com
|
||||
adam.ns.cloudflare.com
|
||||
addilyn.ns.cloudflare.com
|
||||
addyson.ns.cloudflare.com
|
||||
adel.ns.cloudflare.com
|
||||
adele.ns.cloudflare.com
|
||||
adi.ns.cloudflare.com
|
||||
adrian.ns.cloudflare.com
|
||||
agustin.ns.cloudflare.com
|
||||
aida.ns.cloudflare.com
|
||||
aiden.ns.cloudflare.com
|
||||
ainsley.ns.cloudflare.com
|
||||
aisha.ns.cloudflare.com
|
||||
ajay.ns.cloudflare.com
|
||||
alan.ns.cloudflare.com
|
||||
alaric.ns.cloudflare.com
|
||||
albert.ns.cloudflare.com
|
||||
alberto.ns.cloudflare.com
|
||||
alec.ns.cloudflare.com
|
||||
alex.ns.cloudflare.com
|
||||
alexa.ns.cloudflare.com
|
||||
alexis.ns.cloudflare.com
|
||||
algin.ns.cloudflare.com
|
||||
ali.ns.cloudflare.com
|
||||
alice.ns.cloudflare.com
|
||||
alina.ns.cloudflare.com
|
||||
alla.ns.cloudflare.com
|
||||
amalia.ns.cloudflare.com
|
||||
amanda.ns.cloudflare.com
|
||||
amber.ns.cloudflare.com
|
||||
amir.ns.cloudflare.com
|
||||
amit.ns.cloudflare.com
|
||||
amy.ns.cloudflare.com
|
||||
anahi.ns.cloudflare.com
|
||||
anastasia.ns.cloudflare.com
|
||||
anderson.ns.cloudflare.com
|
||||
andronicus.ns.cloudflare.com
|
||||
andy.ns.cloudflare.com
|
||||
angela.ns.cloudflare.com
|
||||
angelina.ns.cloudflare.com
|
||||
anirban.ns.cloudflare.com
|
||||
anita.ns.cloudflare.com
|
||||
anna.ns.cloudflare.com
|
||||
anton.ns.cloudflare.com
|
||||
anuj.ns.cloudflare.com
|
||||
apollo.ns.cloudflare.com
|
||||
april.ns.cloudflare.com
|
||||
ara.ns.cloudflare.com
|
||||
aragorn.ns.cloudflare.com
|
||||
arch.ns.cloudflare.com
|
||||
archer.ns.cloudflare.com
|
||||
aria.ns.cloudflare.com
|
||||
ariadne.ns.cloudflare.com
|
||||
ariella.ns.cloudflare.com
|
||||
armando.ns.cloudflare.com
|
||||
arnold.ns.cloudflare.com
|
||||
aron.ns.cloudflare.com
|
||||
art.ns.cloudflare.com
|
||||
arturo.ns.cloudflare.com
|
||||
arvind.ns.cloudflare.com
|
||||
arya.ns.cloudflare.com
|
||||
aryanna.ns.cloudflare.com
|
||||
asa.ns.cloudflare.com
|
||||
ashley.ns.cloudflare.com
|
||||
ashton.ns.cloudflare.com
|
||||
aspen.ns.cloudflare.com
|
||||
athena.ns.cloudflare.com
|
||||
audrey.ns.cloudflare.com
|
||||
augustus.ns.cloudflare.com
|
||||
aurora.ns.cloudflare.com
|
||||
austin.ns.cloudflare.com
|
||||
barbara.ns.cloudflare.com
|
||||
bart.ns.cloudflare.com
|
||||
bayan.ns.cloudflare.com
|
||||
beau.ns.cloudflare.com
|
||||
becky.ns.cloudflare.com
|
||||
bella.ns.cloudflare.com
|
||||
ben.ns.cloudflare.com
|
||||
benedict.ns.cloudflare.com
|
||||
beth.ns.cloudflare.com
|
||||
bethany.ns.cloudflare.com
|
||||
betty.ns.cloudflare.com
|
||||
bill.ns.cloudflare.com
|
||||
bjorn.ns.cloudflare.com
|
||||
blair.ns.cloudflare.com
|
||||
bob.ns.cloudflare.com
|
||||
bonnie.ns.cloudflare.com
|
||||
bowen.ns.cloudflare.com
|
||||
boyd.ns.cloudflare.com
|
||||
brad.ns.cloudflare.com
|
||||
bradley.ns.cloudflare.com
|
||||
brady.ns.cloudflare.com
|
||||
braelyn.ns.cloudflare.com
|
||||
brenda.ns.cloudflare.com
|
||||
brett.ns.cloudflare.com
|
||||
brian.ns.cloudflare.com
|
||||
brianna.ns.cloudflare.com
|
||||
brit.ns.cloudflare.com
|
||||
brodie.ns.cloudflare.com
|
||||
bruce.ns.cloudflare.com
|
||||
bryce.ns.cloudflare.com
|
||||
brynne.ns.cloudflare.com
|
||||
buck.ns.cloudflare.com
|
||||
burt.ns.cloudflare.com
|
||||
byron.ns.cloudflare.com
|
||||
cameron.ns.cloudflare.com
|
||||
camilo.ns.cloudflare.com
|
||||
candy.ns.cloudflare.com
|
||||
carioca.ns.cloudflare.com
|
||||
carl.ns.cloudflare.com
|
||||
carla.ns.cloudflare.com
|
||||
carlane.ns.cloudflare.com
|
||||
carlos.ns.cloudflare.com
|
||||
carol.ns.cloudflare.com
|
||||
carter.ns.cloudflare.com
|
||||
cartman.ns.cloudflare.com
|
||||
casey.ns.cloudflare.com
|
||||
cash.ns.cloudflare.com
|
||||
cass.ns.cloudflare.com
|
||||
cesar.ns.cloudflare.com
|
||||
chad.ns.cloudflare.com
|
||||
chan.ns.cloudflare.com
|
||||
chance.ns.cloudflare.com
|
||||
charles.ns.cloudflare.com
|
||||
chase.ns.cloudflare.com
|
||||
cheryl.ns.cloudflare.com
|
||||
chin.ns.cloudflare.com
|
||||
chip.ns.cloudflare.com
|
||||
chloe.ns.cloudflare.com
|
||||
chris.ns.cloudflare.com
|
||||
christian.ns.cloudflare.com
|
||||
christina.ns.cloudflare.com
|
||||
chuck.ns.cloudflare.com
|
||||
clara.ns.cloudflare.com
|
||||
clarissa.ns.cloudflare.com
|
||||
clark.ns.cloudflare.com
|
||||
clay.ns.cloudflare.com
|
||||
clayton.ns.cloudflare.com
|
||||
cleo.ns.cloudflare.com
|
||||
clint.ns.cloudflare.com
|
||||
cloe.ns.cloudflare.com
|
||||
clyde.ns.cloudflare.com
|
||||
coby.ns.cloudflare.com
|
||||
coco.ns.cloudflare.com
|
||||
cody.ns.cloudflare.com
|
||||
coen.ns.cloudflare.com
|
||||
coleman.ns.cloudflare.com
|
||||
colin.ns.cloudflare.com
|
||||
collins.ns.cloudflare.com
|
||||
connie.ns.cloudflare.com
|
||||
conrad.ns.cloudflare.com
|
||||
cora.ns.cloudflare.com
|
||||
coraline.ns.cloudflare.com
|
||||
cortney.ns.cloudflare.com
|
||||
cory.ns.cloudflare.com
|
||||
cosmin.ns.cloudflare.com
|
||||
courtney.ns.cloudflare.com
|
||||
craig.ns.cloudflare.com
|
||||
cris.ns.cloudflare.com
|
||||
cruz.ns.cloudflare.com
|
||||
crystal.ns.cloudflare.com
|
||||
curt.ns.cloudflare.com
|
||||
dahlia.ns.cloudflare.com
|
||||
daisy.ns.cloudflare.com
|
||||
dakota.ns.cloudflare.com
|
||||
dalary.ns.cloudflare.com
|
||||
dale.ns.cloudflare.com
|
||||
damien.ns.cloudflare.com
|
||||
damon.ns.cloudflare.com
|
||||
dan.ns.cloudflare.com
|
||||
dana.ns.cloudflare.com
|
||||
dane.ns.cloudflare.com
|
||||
danica.ns.cloudflare.com
|
||||
dante.ns.cloudflare.com
|
||||
daphne.ns.cloudflare.com
|
||||
dara.ns.cloudflare.com
|
||||
darl.ns.cloudflare.com
|
||||
darwin.ns.cloudflare.com
|
||||
dave.ns.cloudflare.com
|
||||
david.ns.cloudflare.com
|
||||
davina.ns.cloudflare.com
|
||||
dawn.ns.cloudflare.com
|
||||
dayana.ns.cloudflare.com
|
||||
dean.ns.cloudflare.com
|
||||
deb.ns.cloudflare.com
|
||||
deborah.ns.cloudflare.com
|
||||
dee.ns.cloudflare.com
|
||||
dell.ns.cloudflare.com
|
||||
demi.ns.cloudflare.com
|
||||
denver.ns.cloudflare.com
|
||||
derek.ns.cloudflare.com
|
||||
desi.ns.cloudflare.com
|
||||
destiny.ns.cloudflare.com
|
||||
dexter.ns.cloudflare.com
|
||||
diana.ns.cloudflare.com
|
||||
dilbert.ns.cloudflare.com
|
||||
dimitris.ns.cloudflare.com
|
||||
dina.ns.cloudflare.com
|
||||
dion.ns.cloudflare.com
|
||||
diva.ns.cloudflare.com
|
||||
dolly.ns.cloudflare.com
|
||||
dom.ns.cloudflare.com
|
||||
donald.ns.cloudflare.com
|
||||
donna.ns.cloudflare.com
|
||||
dora.ns.cloudflare.com
|
||||
dorthy.ns.cloudflare.com
|
||||
doug.ns.cloudflare.com
|
||||
drew.ns.cloudflare.com
|
||||
duke.ns.cloudflare.com
|
||||
dylan.ns.cloudflare.com
|
||||
earl.ns.cloudflare.com
|
||||
ed.ns.cloudflare.com
|
||||
edna.ns.cloudflare.com
|
||||
edward.ns.cloudflare.com
|
||||
elaine.ns.cloudflare.com
|
||||
eleanor.ns.cloudflare.com
|
||||
elijah.ns.cloudflare.com
|
||||
elinore.ns.cloudflare.com
|
||||
elisa.ns.cloudflare.com
|
||||
elle.ns.cloudflare.com
|
||||
elliot.ns.cloudflare.com
|
||||
elliott.ns.cloudflare.com
|
||||
elly.ns.cloudflare.com
|
||||
elma.ns.cloudflare.com
|
||||
elmo.ns.cloudflare.com
|
||||
eloise.ns.cloudflare.com
|
||||
elsa.ns.cloudflare.com
|
||||
emerie.ns.cloudflare.com
|
||||
emerson.ns.cloudflare.com
|
||||
emily.ns.cloudflare.com
|
||||
emma.ns.cloudflare.com
|
||||
eoin.ns.cloudflare.com
|
||||
eric.ns.cloudflare.com
|
||||
erin.ns.cloudflare.com
|
||||
ernest.ns.cloudflare.com
|
||||
ethan.ns.cloudflare.com
|
||||
etta.ns.cloudflare.com
|
||||
eugene.ns.cloudflare.com
|
||||
eva.ns.cloudflare.com
|
||||
evan.ns.cloudflare.com
|
||||
evelyn.ns.cloudflare.com
|
||||
ezra.ns.cloudflare.com
|
||||
fatima.ns.cloudflare.com
|
||||
fattouche.ns.cloudflare.com
|
||||
fay.ns.cloudflare.com
|
||||
faye.ns.cloudflare.com
|
||||
felicity.ns.cloudflare.com
|
||||
felipe.ns.cloudflare.com
|
||||
fiona.ns.cloudflare.com
|
||||
fonzie.ns.cloudflare.com
|
||||
foo.ns.cloudflare.com
|
||||
frank.ns.cloudflare.com
|
||||
fred.ns.cloudflare.com
|
||||
gabe.ns.cloudflare.com
|
||||
gabriel.ns.cloudflare.com
|
||||
gail.ns.cloudflare.com
|
||||
galilea.ns.cloudflare.com
|
||||
gannon.ns.cloudflare.com
|
||||
ganz.ns.cloudflare.com
|
||||
garret.ns.cloudflare.com
|
||||
gemma.ns.cloudflare.com
|
||||
gene.ns.cloudflare.com
|
||||
george.ns.cloudflare.com
|
||||
gerald.ns.cloudflare.com
|
||||
gerardo.ns.cloudflare.com
|
||||
giancarlo.ns.cloudflare.com
|
||||
gina.ns.cloudflare.com
|
||||
glen.ns.cloudflare.com
|
||||
gloria.ns.cloudflare.com
|
||||
gordon.ns.cloudflare.com
|
||||
grace.ns.cloudflare.com
|
||||
gracie.ns.cloudflare.com
|
||||
graham.ns.cloudflare.com
|
||||
grannbo.ns.cloudflare.com
|
||||
grant.ns.cloudflare.com
|
||||
greg.ns.cloudflare.com
|
||||
guss.ns.cloudflare.com
|
||||
guy.ns.cloudflare.com
|
||||
gwen.ns.cloudflare.com
|
||||
hal.ns.cloudflare.com
|
||||
hank.ns.cloudflare.com
|
||||
hans.ns.cloudflare.com
|
||||
harlee.ns.cloudflare.com
|
||||
harleigh.ns.cloudflare.com
|
||||
harley.ns.cloudflare.com
|
||||
hassan.ns.cloudflare.com
|
||||
hattie.ns.cloudflare.com
|
||||
hazel.ns.cloudflare.com
|
||||
heather.ns.cloudflare.com
|
||||
henrik.ns.cloudflare.com
|
||||
henry.ns.cloudflare.com
|
||||
hera.ns.cloudflare.com
|
||||
hope.ns.cloudflare.com
|
||||
houston.ns.cloudflare.com
|
||||
hugh.ns.cloudflare.com
|
||||
hunts.ns.cloudflare.com
|
||||
ian.ns.cloudflare.com
|
||||
ignat.ns.cloudflare.com
|
||||
igor.ns.cloudflare.com
|
||||
indie.ns.cloudflare.com
|
||||
ines.ns.cloudflare.com
|
||||
ingrid.ns.cloudflare.com
|
||||
iris.ns.cloudflare.com
|
||||
irma.ns.cloudflare.com
|
||||
isaac.ns.cloudflare.com
|
||||
isabel.ns.cloudflare.com
|
||||
ishaan.ns.cloudflare.com
|
||||
isla.ns.cloudflare.com
|
||||
itzel.ns.cloudflare.com
|
||||
ivan.ns.cloudflare.com
|
||||
ivy.ns.cloudflare.com
|
||||
jack.ns.cloudflare.com
|
||||
jacqueline.ns.cloudflare.com
|
||||
jade.ns.cloudflare.com
|
||||
jaime.ns.cloudflare.com
|
||||
jake.ns.cloudflare.com
|
||||
jakub.ns.cloudflare.com
|
||||
james.ns.cloudflare.com
|
||||
jamie.ns.cloudflare.com
|
||||
janet.ns.cloudflare.com
|
||||
jarred.ns.cloudflare.com
|
||||
jasmine.ns.cloudflare.com
|
||||
jason.ns.cloudflare.com
|
||||
javier.ns.cloudflare.com
|
||||
javon.ns.cloudflare.com
|
||||
jaxson.ns.cloudflare.com
|
||||
jay.ns.cloudflare.com
|
||||
jean.ns.cloudflare.com
|
||||
jeff.ns.cloudflare.com
|
||||
jeremy.ns.cloudflare.com
|
||||
jerome.ns.cloudflare.com
|
||||
jerry.ns.cloudflare.com
|
||||
jessica.ns.cloudflare.com
|
||||
jihoon.ns.cloudflare.com
|
||||
jill.ns.cloudflare.com
|
||||
jim.ns.cloudflare.com
|
||||
jo.ns.cloudflare.com
|
||||
joan.ns.cloudflare.com
|
||||
joaquin.ns.cloudflare.com
|
||||
jobs.ns.cloudflare.com
|
||||
jocelyn.ns.cloudflare.com
|
||||
joel.ns.cloudflare.com
|
||||
john.ns.cloudflare.com
|
||||
johnathan.ns.cloudflare.com
|
||||
jonah.ns.cloudflare.com
|
||||
joselyn.ns.cloudflare.com
|
||||
josh.ns.cloudflare.com
|
||||
journey.ns.cloudflare.com
|
||||
jule.ns.cloudflare.com
|
||||
julian.ns.cloudflare.com
|
||||
julio.ns.cloudflare.com
|
||||
junade.ns.cloudflare.com
|
||||
june.ns.cloudflare.com
|
||||
justin.ns.cloudflare.com
|
||||
kai.ns.cloudflare.com
|
||||
kami.ns.cloudflare.com
|
||||
kanye.ns.cloudflare.com
|
||||
kara.ns.cloudflare.com
|
||||
karina.ns.cloudflare.com
|
||||
karl.ns.cloudflare.com
|
||||
karsyn.ns.cloudflare.com
|
||||
kate.ns.cloudflare.com
|
||||
katelyn.ns.cloudflare.com
|
||||
kay.ns.cloudflare.com
|
||||
keanu.ns.cloudflare.com
|
||||
keenan.ns.cloudflare.com
|
||||
kehlani.ns.cloudflare.com
|
||||
keira.ns.cloudflare.com
|
||||
kellen.ns.cloudflare.com
|
||||
ken.ns.cloudflare.com
|
||||
kenia.ns.cloudflare.com
|
||||
kenneth.ns.cloudflare.com
|
||||
kevin.ns.cloudflare.com
|
||||
keyla.ns.cloudflare.com
|
||||
khloe.ns.cloudflare.com
|
||||
kia.ns.cloudflare.com
|
||||
kianchau.ns.cloudflare.com
|
||||
kiki.ns.cloudflare.com
|
||||
kim.ns.cloudflare.com
|
||||
kip.ns.cloudflare.com
|
||||
kipp.ns.cloudflare.com
|
||||
kira.ns.cloudflare.com
|
||||
kirk.ns.cloudflare.com
|
||||
koa.ns.cloudflare.com
|
||||
kobe.ns.cloudflare.com
|
||||
kolton.ns.cloudflare.com
|
||||
kristin.ns.cloudflare.com
|
||||
kurt.ns.cloudflare.com
|
||||
kyle.ns.cloudflare.com
|
||||
kyree.ns.cloudflare.com
|
||||
kyrie.ns.cloudflare.com
|
||||
lady.ns.cloudflare.com
|
||||
lakas.ns.cloudflare.com
|
||||
lana.ns.cloudflare.com
|
||||
lara.ns.cloudflare.com
|
||||
lars.ns.cloudflare.com
|
||||
laura.ns.cloudflare.com
|
||||
laylah.ns.cloudflare.com
|
||||
leah.ns.cloudflare.com
|
||||
leanna.ns.cloudflare.com
|
||||
lee.ns.cloudflare.com
|
||||
leia.ns.cloudflare.com
|
||||
leif.ns.cloudflare.com
|
||||
leland.ns.cloudflare.com
|
||||
lennon.ns.cloudflare.com
|
||||
leonard.ns.cloudflare.com
|
||||
leonidas.ns.cloudflare.com
|
||||
lex.ns.cloudflare.com
|
||||
lia.ns.cloudflare.com
|
||||
liberty.ns.cloudflare.com
|
||||
ligia.ns.cloudflare.com
|
||||
lila.ns.cloudflare.com
|
||||
lily.ns.cloudflare.com
|
||||
lilyana.ns.cloudflare.com
|
||||
lina.ns.cloudflare.com
|
||||
linda.ns.cloudflare.com
|
||||
lisa.ns.cloudflare.com
|
||||
liv.ns.cloudflare.com
|
||||
liz.ns.cloudflare.com
|
||||
lloyd.ns.cloudflare.com
|
||||
logan.ns.cloudflare.com
|
||||
lola.ns.cloudflare.com
|
||||
lorna.ns.cloudflare.com
|
||||
lou.ns.cloudflare.com
|
||||
love.ns.cloudflare.com
|
||||
luciane.ns.cloudflare.com
|
||||
lucy.ns.cloudflare.com
|
||||
luke.ns.cloudflare.com
|
||||
lynn.ns.cloudflare.com
|
||||
maciej.ns.cloudflare.com
|
||||
macy.ns.cloudflare.com
|
||||
magali.ns.cloudflare.com
|
||||
magdalena.ns.cloudflare.com
|
||||
magnolia.ns.cloudflare.com
|
||||
maisie.ns.cloudflare.com
|
||||
major.ns.cloudflare.com
|
||||
malavika.ns.cloudflare.com
|
||||
malcolm.ns.cloudflare.com
|
||||
mallory.ns.cloudflare.com
|
||||
marek.ns.cloudflare.com
|
||||
marge.ns.cloudflare.com
|
||||
maria.ns.cloudflare.com
|
||||
mariah.ns.cloudflare.com
|
||||
mario.ns.cloudflare.com
|
||||
marjory.ns.cloudflare.com
|
||||
mark.ns.cloudflare.com
|
||||
marlowe.ns.cloudflare.com
|
||||
martha.ns.cloudflare.com
|
||||
martin.ns.cloudflare.com
|
||||
marty.ns.cloudflare.com
|
||||
mary.ns.cloudflare.com
|
||||
matias.ns.cloudflare.com
|
||||
matt.ns.cloudflare.com
|
||||
matteo.ns.cloudflare.com
|
||||
max.ns.cloudflare.com
|
||||
maxim.ns.cloudflare.com
|
||||
may.ns.cloudflare.com
|
||||
maya.ns.cloudflare.com
|
||||
mcgrory.ns.cloudflare.com
|
||||
mckinley.ns.cloudflare.com
|
||||
meadow.ns.cloudflare.com
|
||||
meera.ns.cloudflare.com
|
||||
meg.ns.cloudflare.com
|
||||
megan.ns.cloudflare.com
|
||||
meilani.ns.cloudflare.com
|
||||
meiling.ns.cloudflare.com
|
||||
melany.ns.cloudflare.com
|
||||
melinda.ns.cloudflare.com
|
||||
melissa.ns.cloudflare.com
|
||||
melody.ns.cloudflare.com
|
||||
merlin.ns.cloudflare.com
|
||||
mia.ns.cloudflare.com
|
||||
micah.ns.cloudflare.com
|
||||
michelle.ns.cloudflare.com
|
||||
miguel.ns.cloudflare.com
|
||||
miki.ns.cloudflare.com
|
||||
miles.ns.cloudflare.com
|
||||
milky.ns.cloudflare.com
|
||||
mimi.ns.cloudflare.com
|
||||
mina.ns.cloudflare.com
|
||||
mira.ns.cloudflare.com
|
||||
mitch.ns.cloudflare.com
|
||||
mitchell.ns.cloudflare.com
|
||||
molly.ns.cloudflare.com
|
||||
mona.ns.cloudflare.com
|
||||
monroe.ns.cloudflare.com
|
||||
morgan.ns.cloudflare.com
|
||||
moura.ns.cloudflare.com
|
||||
mustafa.ns.cloudflare.com
|
||||
nadia.ns.cloudflare.com
|
||||
nancy.ns.cloudflare.com
|
||||
naomi.ns.cloudflare.com
|
||||
nash.ns.cloudflare.com
|
||||
nataly.ns.cloudflare.com
|
||||
natasha.ns.cloudflare.com
|
||||
ned.ns.cloudflare.com
|
||||
neil.ns.cloudflare.com
|
||||
nelly.ns.cloudflare.com
|
||||
nero.ns.cloudflare.com
|
||||
newt.ns.cloudflare.com
|
||||
nia.ns.cloudflare.com
|
||||
nick.ns.cloudflare.com
|
||||
nico.ns.cloudflare.com
|
||||
nicolas.ns.cloudflare.com
|
||||
nicole.ns.cloudflare.com
|
||||
nile.ns.cloudflare.com
|
||||
nina.ns.cloudflare.com
|
||||
nitin.ns.cloudflare.com
|
||||
noah.ns.cloudflare.com
|
||||
noel.ns.cloudflare.com
|
||||
nola.ns.cloudflare.com
|
||||
nora.ns.cloudflare.com
|
||||
norah.ns.cloudflare.com
|
||||
norm.ns.cloudflare.com
|
||||
norman.ns.cloudflare.com
|
||||
novalee.ns.cloudflare.com
|
||||
ns1.linode.com
|
||||
ns2.linode.com
|
||||
ns3.linode.com
|
||||
ns4.linode.com
|
||||
ns5.linode.com
|
||||
nucum.ns.cloudflare.com
|
||||
oaklyn.ns.cloudflare.com
|
||||
odin.ns.cloudflare.com
|
||||
olga.ns.cloudflare.com
|
||||
olivia.ns.cloudflare.com
|
||||
ollie.ns.cloudflare.com
|
||||
olof.ns.cloudflare.com
|
||||
opal.ns.cloudflare.com
|
||||
osmar.ns.cloudflare.com
|
||||
oswald.ns.cloudflare.com
|
||||
owen.ns.cloudflare.com
|
||||
pablo.ns.cloudflare.com
|
||||
paige.ns.cloudflare.com
|
||||
paloma.ns.cloudflare.com
|
||||
pam.ns.cloudflare.com
|
||||
paris.ns.cloudflare.com
|
||||
pat.ns.cloudflare.com
|
||||
patrick.ns.cloudflare.com
|
||||
patryk.ns.cloudflare.com
|
||||
paul.ns.cloudflare.com
|
||||
peaches.ns.cloudflare.com
|
||||
pearl.ns.cloudflare.com
|
||||
perla.ns.cloudflare.com
|
||||
pete.ns.cloudflare.com
|
||||
peter.ns.cloudflare.com
|
||||
peyton.ns.cloudflare.com
|
||||
phil.ns.cloudflare.com
|
||||
phoenix.ns.cloudflare.com
|
||||
piers.ns.cloudflare.com
|
||||
piotr.ns.cloudflare.com
|
||||
piper.ns.cloudflare.com
|
||||
plato.ns.cloudflare.com
|
||||
pola.ns.cloudflare.com
|
||||
poppy.ns.cloudflare.com
|
||||
porter.ns.cloudflare.com
|
||||
pranab.ns.cloudflare.com
|
||||
priscilla.ns.cloudflare.com
|
||||
rachel.ns.cloudflare.com
|
||||
raegan.ns.cloudflare.com
|
||||
rafe.ns.cloudflare.com
|
||||
raina.ns.cloudflare.com
|
||||
rajeev.ns.cloudflare.com
|
||||
ram.ns.cloudflare.com
|
||||
randall.ns.cloudflare.com
|
||||
raquel.ns.cloudflare.com
|
||||
ray.ns.cloudflare.com
|
||||
razvan.ns.cloudflare.com
|
||||
remy.ns.cloudflare.com
|
||||
rex.ns.cloudflare.com
|
||||
reza.ns.cloudflare.com
|
||||
ricardo.ns.cloudflare.com
|
||||
rick.ns.cloudflare.com
|
||||
ridge.ns.cloudflare.com
|
||||
rihana.ns.cloudflare.com
|
||||
rita.ns.cloudflare.com
|
||||
roan.ns.cloudflare.com
|
||||
rob.ns.cloudflare.com
|
||||
robin.ns.cloudflare.com
|
||||
rocco.ns.cloudflare.com
|
||||
rocky.ns.cloudflare.com
|
||||
rodney.ns.cloudflare.com
|
||||
rodrigo.ns.cloudflare.com
|
||||
rohin.ns.cloudflare.com
|
||||
roman.ns.cloudflare.com
|
||||
rosa.ns.cloudflare.com
|
||||
rosalie.ns.cloudflare.com
|
||||
rose.ns.cloudflare.com
|
||||
roxy.ns.cloudflare.com
|
||||
rudy.ns.cloudflare.com
|
||||
ruth.ns.cloudflare.com
|
||||
ryan.ns.cloudflare.com
|
||||
saanvi.ns.cloudflare.com
|
||||
sage.ns.cloudflare.com
|
||||
salvador.ns.cloudflare.com
|
||||
sam.ns.cloudflare.com
|
||||
samara.ns.cloudflare.com
|
||||
sandy.ns.cloudflare.com
|
||||
santino.ns.cloudflare.com
|
||||
sara.ns.cloudflare.com
|
||||
sarah.ns.cloudflare.com
|
||||
savanna.ns.cloudflare.com
|
||||
scott.ns.cloudflare.com
|
||||
seamus.ns.cloudflare.com
|
||||
sean.ns.cloudflare.com
|
||||
selah.ns.cloudflare.com
|
||||
serena.ns.cloudflare.com
|
||||
sergi.ns.cloudflare.com
|
||||
seth.ns.cloudflare.com
|
||||
sharon.ns.cloudflare.com
|
||||
sid.ns.cloudflare.com
|
||||
sierra.ns.cloudflare.com
|
||||
sima.ns.cloudflare.com
|
||||
simon.ns.cloudflare.com
|
||||
simone.ns.cloudflare.com
|
||||
skip.ns.cloudflare.com
|
||||
sky.ns.cloudflare.com
|
||||
sneh.ns.cloudflare.com
|
||||
sofia.ns.cloudflare.com
|
||||
sonny.ns.cloudflare.com
|
||||
sreeni.ns.cloudflare.com
|
||||
sri.ns.cloudflare.com
|
||||
stan.ns.cloudflare.com
|
||||
stanley.ns.cloudflare.com
|
||||
stella.ns.cloudflare.com
|
||||
sue.ns.cloudflare.com
|
||||
sullivan.ns.cloudflare.com
|
||||
summer.ns.cloudflare.com
|
||||
sureena.ns.cloudflare.com
|
||||
surina.ns.cloudflare.com
|
||||
susan.ns.cloudflare.com
|
||||
suzanne.ns.cloudflare.com
|
||||
sydney.ns.cloudflare.com
|
||||
syeef.ns.cloudflare.com
|
||||
tani.ns.cloudflare.com
|
||||
tanner.ns.cloudflare.com
|
||||
tara.ns.cloudflare.com
|
||||
tate.ns.cloudflare.com
|
||||
tegan.ns.cloudflare.com
|
||||
terin.ns.cloudflare.com
|
||||
terry.ns.cloudflare.com
|
||||
tess.ns.cloudflare.com
|
||||
tessa.ns.cloudflare.com
|
||||
thea.ns.cloudflare.com
|
||||
theo.ns.cloudflare.com
|
||||
thomas.ns.cloudflare.com
|
||||
thor.ns.cloudflare.com
|
||||
tia.ns.cloudflare.com
|
||||
tiffany.ns.cloudflare.com
|
||||
tim.ns.cloudflare.com
|
||||
tina.ns.cloudflare.com
|
||||
titan.ns.cloudflare.com
|
||||
toby.ns.cloudflare.com
|
||||
todd.ns.cloudflare.com
|
||||
tom.ns.cloudflare.com
|
||||
tony.ns.cloudflare.com
|
||||
tori.ns.cloudflare.com
|
||||
tosana.ns.cloudflare.com
|
||||
trace.ns.cloudflare.com
|
||||
trey.ns.cloudflare.com
|
||||
tricia.ns.cloudflare.com
|
||||
troy.ns.cloudflare.com
|
||||
ulla.ns.cloudflare.com
|
||||
ullis.ns.cloudflare.com
|
||||
uma.ns.cloudflare.com
|
||||
uriah.ns.cloudflare.com
|
||||
ursula.ns.cloudflare.com
|
||||
val.ns.cloudflare.com
|
||||
veda.ns.cloudflare.com
|
||||
venkat.ns.cloudflare.com
|
||||
venus.ns.cloudflare.com
|
||||
vera.ns.cloudflare.com
|
||||
vern.ns.cloudflare.com
|
||||
veronica.ns.cloudflare.com
|
||||
vick.ns.cloudflare.com
|
||||
vicky.ns.cloudflare.com
|
||||
vida.ns.cloudflare.com
|
||||
viddy.ns.cloudflare.com
|
||||
vin.ns.cloudflare.com
|
||||
violet.ns.cloudflare.com
|
||||
vita.ns.cloudflare.com
|
||||
wally.ns.cloudflare.com
|
||||
walt.ns.cloudflare.com
|
||||
wanda.ns.cloudflare.com
|
||||
watson.ns.cloudflare.com
|
||||
wells.ns.cloudflare.com
|
||||
wesley.ns.cloudflare.com
|
||||
west.ns.cloudflare.com
|
||||
weston.ns.cloudflare.com
|
||||
will.ns.cloudflare.com
|
||||
woz.ns.cloudflare.com
|
||||
wren.ns.cloudflare.com
|
||||
xxx.ns.cloudflare.com
|
||||
yahir.ns.cloudflare.com
|
||||
yew.ns.cloudflare.com
|
||||
yichun.ns.cloudflare.com
|
||||
yolanda.ns.cloudflare.com
|
||||
yoxall.ns.cloudflare.com
|
||||
zahir.ns.cloudflare.com
|
||||
zara.ns.cloudflare.com
|
||||
zariyah.ns.cloudflare.com
|
||||
zelda.ns.cloudflare.com
|
||||
zeus.ns.cloudflare.com
|
||||
ziggy.ns.cloudflare.com
|
||||
zita.ns.cloudflare.com
|
||||
zod.ns.cloudflare.com
|
||||
zoe.ns.cloudflare.com
|
|
@ -0,0 +1,30 @@
|
|||
betterinternet.com
|
||||
brokendnssec.net
|
||||
cloudflare-dns.com
|
||||
cloudflare-free.com
|
||||
cloudflare-ipfs.com
|
||||
cloudflare-quic.com
|
||||
cloudflare.com
|
||||
cloudflare.com.ve
|
||||
cloudflare.net
|
||||
cloudflareaccess.com
|
||||
cloudflareapi.com
|
||||
cloudflareapps.com
|
||||
cloudflarechallenge.com
|
||||
cloudflareclient.com
|
||||
cloudflareenterprise.com
|
||||
cloudflareinsights.com
|
||||
cloudflarepreview.com
|
||||
cloudflarepreviews.com
|
||||
cloudflareresolve.com
|
||||
cloudflarespeedtest.com
|
||||
cloudflaressl.com
|
||||
cloudflarestatus.com
|
||||
cloudflaresupport.com
|
||||
cloudflarewarp.com
|
||||
encryptedsni.com
|
||||
mycloudflare.com
|
||||
one.one
|
||||
trycloudflare.com
|
||||
warp.plus
|
||||
workers.dev
|
|
@ -0,0 +1,10 @@
|
|||
cflare2nge4h4yqr3574crrd7k66lil3torzbisz6uciyuzqc2h2ykyd.onion
|
||||
cflareer7qekzp3zeyqvcfktxfrmncse4ilc7trbf6bp6yzdabxuload.onion
|
||||
cflarejlah424meosswvaeqzb54rtdetr4xva6mq2bm2hfcx5isaglid.onion
|
||||
cflareki4v3lh674hq55k3n7xd4ibkwx3pnw67rr3gkpsonjmxbktxyd.onion
|
||||
cflarenuttlfuyn7imozr4atzvfbiw3ezgbdjdldmdx7srterayaozid.onion
|
||||
cflares35lvdlczhy3r6qbza5jjxbcplzvdveabhf7bsp7y4nzmn67yd.onion
|
||||
cflaresuje2rb7w2u3w43pn4luxdi6o7oatv6r2zrfb5xvsugj35d2qd.onion
|
||||
cflareub6dtu7nvs3kqmoigcjdwap2azrkx5zohb2yk7gqjkwoyotwqd.onion
|
||||
cflareusni3s7vwhq2f7gc4opsik7aa4t2ajedhzr42ez6uajaywh3qd.onion
|
||||
cflarexljc3rw355ysrkrzwapozws6nre6xsy3n4yrj7taye3uiby3ad.onion
|
|
@ -0,0 +1,675 @@
|
|||
CF:1.0.0.0-1.0.0.255
|
||||
CF:1.1.1.0-1.1.1.255
|
||||
CF:103.21.244.0-103.21.247.255
|
||||
CF:103.21.246.0-103.21.246.255
|
||||
CF:103.21.247.0-103.21.247.255
|
||||
CF:103.22.200.0-103.22.201.255
|
||||
CF:103.22.200.0-103.22.203.255
|
||||
CF:103.22.202.0-103.22.202.255
|
||||
CF:103.22.203.0-103.22.203.255
|
||||
CF:103.31.4.0-103.31.5.255
|
||||
CF:103.31.4.0-103.31.7.255
|
||||
CF:104.16.0.0-104.16.15.255
|
||||
CF:104.16.0.0-104.31.255.255
|
||||
CF:104.16.16.0-104.16.31.255
|
||||
CF:104.16.32.0-104.16.47.255
|
||||
CF:104.16.48.0-104.16.63.255
|
||||
CF:104.16.64.0-104.16.79.255
|
||||
CF:104.16.80.0-104.16.95.255
|
||||
CF:104.16.96.0-104.16.111.255
|
||||
CF:104.16.112.0-104.16.127.255
|
||||
CF:104.16.128.0-104.16.143.255
|
||||
CF:104.16.144.0-104.16.159.255
|
||||
CF:104.16.160.0-104.16.175.255
|
||||
CF:104.16.176.0-104.16.191.255
|
||||
CF:104.16.192.0-104.16.207.255
|
||||
CF:104.16.208.0-104.16.223.255
|
||||
CF:104.16.224.0-104.16.239.255
|
||||
CF:104.16.240.0-104.16.255.255
|
||||
CF:104.17.0.0-104.17.15.255
|
||||
CF:104.17.16.0-104.17.31.255
|
||||
CF:104.17.32.0-104.17.47.255
|
||||
CF:104.17.48.0-104.17.63.255
|
||||
CF:104.17.64.0-104.17.79.255
|
||||
CF:104.17.80.0-104.17.95.255
|
||||
CF:104.17.96.0-104.17.111.255
|
||||
CF:104.17.112.0-104.17.127.255
|
||||
CF:104.17.128.0-104.17.143.255
|
||||
CF:104.17.144.0-104.17.159.255
|
||||
CF:104.17.160.0-104.17.175.255
|
||||
CF:104.17.176.0-104.17.191.255
|
||||
CF:104.17.192.0-104.17.207.255
|
||||
CF:104.17.208.0-104.17.223.255
|
||||
CF:104.17.224.0-104.17.239.255
|
||||
CF:104.17.240.0-104.17.255.255
|
||||
CF:104.18.0.0-104.18.15.255
|
||||
CF:104.18.16.0-104.18.31.255
|
||||
CF:104.18.32.0-104.18.47.255
|
||||
CF:104.18.48.0-104.18.63.255
|
||||
CF:104.18.64.0-104.18.79.255
|
||||
CF:104.18.80.0-104.18.95.255
|
||||
CF:104.18.96.0-104.18.111.255
|
||||
CF:104.18.112.0-104.18.127.255
|
||||
CF:104.18.128.0-104.18.143.255
|
||||
CF:104.18.144.0-104.18.159.255
|
||||
CF:104.18.160.0-104.18.175.255
|
||||
CF:104.18.176.0-104.18.191.255
|
||||
CF:104.18.192.0-104.18.207.255
|
||||
CF:104.18.208.0-104.18.223.255
|
||||
CF:104.18.224.0-104.18.239.255
|
||||
CF:104.18.240.0-104.18.255.255
|
||||
CF:104.19.0.0-104.19.15.255
|
||||
CF:104.19.16.0-104.19.31.255
|
||||
CF:104.19.32.0-104.19.47.255
|
||||
CF:104.19.48.0-104.19.63.255
|
||||
CF:104.19.64.0-104.19.79.255
|
||||
CF:104.19.80.0-104.19.95.255
|
||||
CF:104.19.96.0-104.19.111.255
|
||||
CF:104.19.112.0-104.19.127.255
|
||||
CF:104.19.128.0-104.19.143.255
|
||||
CF:104.19.144.0-104.19.159.255
|
||||
CF:104.19.160.0-104.19.175.255
|
||||
CF:104.19.176.0-104.19.191.255
|
||||
CF:104.19.192.0-104.19.207.255
|
||||
CF:104.19.208.0-104.19.223.255
|
||||
CF:104.19.224.0-104.19.239.255
|
||||
CF:104.19.240.0-104.19.255.255
|
||||
CF:104.20.0.0-104.20.15.255
|
||||
CF:104.20.16.0-104.20.31.255
|
||||
CF:104.20.32.0-104.20.47.255
|
||||
CF:104.20.48.0-104.20.63.255
|
||||
CF:104.20.64.0-104.20.79.255
|
||||
CF:104.20.80.0-104.20.95.255
|
||||
CF:104.20.96.0-104.20.111.255
|
||||
CF:104.20.112.0-104.20.127.255
|
||||
CF:104.20.128.0-104.20.143.255
|
||||
CF:104.20.144.0-104.20.159.255
|
||||
CF:104.20.160.0-104.20.175.255
|
||||
CF:104.20.176.0-104.20.191.255
|
||||
CF:104.20.192.0-104.20.207.255
|
||||
CF:104.20.208.0-104.20.223.255
|
||||
CF:104.20.224.0-104.20.239.255
|
||||
CF:104.20.240.0-104.20.255.255
|
||||
CF:104.22.0.0-104.22.15.255
|
||||
CF:104.23.96.0-104.23.111.255
|
||||
CF:104.23.112.0-104.23.127.255
|
||||
CF:104.23.128.0-104.23.143.255
|
||||
CF:104.23.192.0-104.23.207.255
|
||||
CF:104.23.240.0-104.23.243.255
|
||||
CF:104.24.0.0-104.24.15.255
|
||||
CF:104.24.16.0-104.24.31.255
|
||||
CF:104.24.32.0-104.24.47.255
|
||||
CF:104.24.48.0-104.24.63.255
|
||||
CF:104.24.64.0-104.24.79.255
|
||||
CF:104.24.80.0-104.24.95.255
|
||||
CF:104.24.96.0-104.24.111.255
|
||||
CF:104.24.112.0-104.24.127.255
|
||||
CF:104.24.128.0-104.24.143.255
|
||||
CF:104.24.144.0-104.24.159.255
|
||||
CF:104.24.160.0-104.24.175.255
|
||||
CF:104.24.176.0-104.24.191.255
|
||||
CF:104.24.192.0-104.24.207.255
|
||||
CF:104.24.208.0-104.24.223.255
|
||||
CF:104.24.224.0-104.24.239.255
|
||||
CF:104.24.240.0-104.24.255.255
|
||||
CF:104.25.0.0-104.25.15.255
|
||||
CF:104.25.16.0-104.25.31.255
|
||||
CF:104.25.32.0-104.25.47.255
|
||||
CF:104.25.48.0-104.25.63.255
|
||||
CF:104.25.64.0-104.25.79.255
|
||||
CF:104.25.80.0-104.25.95.255
|
||||
CF:104.25.96.0-104.25.111.255
|
||||
CF:104.25.112.0-104.25.127.255
|
||||
CF:104.25.128.0-104.25.143.255
|
||||
CF:104.25.144.0-104.25.159.255
|
||||
CF:104.25.160.0-104.25.175.255
|
||||
CF:104.25.176.0-104.25.191.255
|
||||
CF:104.25.192.0-104.25.207.255
|
||||
CF:104.25.208.0-104.25.223.255
|
||||
CF:104.25.224.0-104.25.239.255
|
||||
CF:104.25.240.0-104.25.255.255
|
||||
CF:104.26.0.0-104.26.15.255
|
||||
CF:104.27.0.0-104.27.15.255
|
||||
CF:104.27.16.0-104.27.31.255
|
||||
CF:104.27.32.0-104.27.47.255
|
||||
CF:104.27.48.0-104.27.63.255
|
||||
CF:104.27.64.0-104.27.79.255
|
||||
CF:104.27.80.0-104.27.95.255
|
||||
CF:104.27.96.0-104.27.111.255
|
||||
CF:104.27.112.0-104.27.127.255
|
||||
CF:104.27.128.0-104.27.143.255
|
||||
CF:104.27.144.0-104.27.159.255
|
||||
CF:104.27.160.0-104.27.175.255
|
||||
CF:104.27.176.0-104.27.191.255
|
||||
CF:104.27.192.0-104.27.207.255
|
||||
CF:104.27.208.0-104.27.223.255
|
||||
CF:104.27.240.0-104.27.243.255
|
||||
CF:104.28.0.0-104.28.15.255
|
||||
CF:104.28.16.0-104.28.31.255
|
||||
CF:104.28.32.0-104.28.47.255
|
||||
CF:104.28.48.0-104.28.63.255
|
||||
CF:104.28.64.0-104.28.79.255
|
||||
CF:104.28.80.0-104.28.95.255
|
||||
CF:104.28.96.0-104.28.111.255
|
||||
CF:104.28.112.0-104.28.127.255
|
||||
CF:104.28.128.0-104.28.143.255
|
||||
CF:104.28.144.0-104.28.159.255
|
||||
CF:104.28.160.0-104.28.175.255
|
||||
CF:104.28.176.0-104.28.191.255
|
||||
CF:104.28.192.0-104.28.207.255
|
||||
CF:104.28.208.0-104.28.223.255
|
||||
CF:104.28.224.0-104.28.239.255
|
||||
CF:104.28.240.0-104.28.255.255
|
||||
CF:104.31.0.0-104.31.15.255
|
||||
CF:104.31.16.0-104.31.31.255
|
||||
CF:104.31.64.0-104.31.79.255
|
||||
CF:104.31.80.0-104.31.95.255
|
||||
CF:104.31.112.0-104.31.115.255
|
||||
CF:104.31.128.0-104.31.143.255
|
||||
CF:104.31.144.0-104.31.159.255
|
||||
CF:104.31.160.0-104.31.175.255
|
||||
CF:104.31.176.0-104.31.191.255
|
||||
CF:104.31.192.0-104.31.207.255
|
||||
CF:104.31.208.0-104.31.223.255
|
||||
CF:104.31.224.0-104.31.239.255
|
||||
CF:104.31.240.0-104.31.255.255
|
||||
CF:108.162.192.0-108.162.255.255
|
||||
CF:108.162.208.0-108.162.208.255
|
||||
CF:108.162.210.0-108.162.210.255
|
||||
CF:108.162.211.0-108.162.211.255
|
||||
CF:108.162.212.0-108.162.212.255
|
||||
CF:108.162.213.0-108.162.213.255
|
||||
CF:108.162.214.0-108.162.214.255
|
||||
CF:108.162.215.0-108.162.215.255
|
||||
CF:108.162.216.0-108.162.216.255
|
||||
CF:108.162.217.0-108.162.217.255
|
||||
CF:108.162.218.0-108.162.218.255
|
||||
CF:108.162.219.0-108.162.219.255
|
||||
CF:108.162.220.0-108.162.220.255
|
||||
CF:108.162.221.0-108.162.221.255
|
||||
CF:108.162.222.0-108.162.222.255
|
||||
CF:108.162.223.0-108.162.223.255
|
||||
CF:108.162.226.0-108.162.226.255
|
||||
CF:108.162.227.0-108.162.227.255
|
||||
CF:108.162.228.0-108.162.228.255
|
||||
CF:108.162.229.0-108.162.229.255
|
||||
CF:108.162.235.0-108.162.235.255
|
||||
CF:108.162.236.0-108.162.236.255
|
||||
CF:108.162.237.0-108.162.237.255
|
||||
CF:108.162.238.0-108.162.238.255
|
||||
CF:108.162.239.0-108.162.239.255
|
||||
CF:108.162.240.0-108.162.240.255
|
||||
CF:108.162.241.0-108.162.241.255
|
||||
CF:108.162.242.0-108.162.242.255
|
||||
CF:108.162.243.0-108.162.243.255
|
||||
CF:108.162.244.0-108.162.244.255
|
||||
CF:108.162.245.0-108.162.245.255
|
||||
CF:108.162.246.0-108.162.246.255
|
||||
CF:108.162.247.0-108.162.247.255
|
||||
CF:108.162.248.0-108.162.248.255
|
||||
CF:108.162.249.0-108.162.249.255
|
||||
CF:108.162.250.0-108.162.250.255
|
||||
CF:108.162.252.0-108.162.252.255
|
||||
CF:108.162.255.0-108.162.255.255
|
||||
CF:131.0.72.0-131.0.75.255
|
||||
CF:141.101.64.0-141.101.64.255
|
||||
CF:141.101.64.0-141.101.127.255
|
||||
CF:141.101.65.0-141.101.65.255
|
||||
CF:141.101.66.0-141.101.66.255
|
||||
CF:141.101.67.0-141.101.67.255
|
||||
CF:141.101.68.0-141.101.68.255
|
||||
CF:141.101.69.0-141.101.69.255
|
||||
CF:141.101.70.0-141.101.70.255
|
||||
CF:141.101.71.0-141.101.71.255
|
||||
CF:141.101.72.0-141.101.72.255
|
||||
CF:141.101.73.0-141.101.73.255
|
||||
CF:141.101.74.0-141.101.74.255
|
||||
CF:141.101.75.0-141.101.75.255
|
||||
CF:141.101.76.0-141.101.77.255
|
||||
CF:141.101.82.0-141.101.82.255
|
||||
CF:141.101.83.0-141.101.83.255
|
||||
CF:141.101.84.0-141.101.84.255
|
||||
CF:141.101.85.0-141.101.85.255
|
||||
CF:141.101.88.0-141.101.91.255
|
||||
CF:141.101.94.0-141.101.94.255
|
||||
CF:141.101.95.0-141.101.95.255
|
||||
CF:141.101.96.0-141.101.96.255
|
||||
CF:141.101.97.0-141.101.97.255
|
||||
CF:141.101.98.0-141.101.98.255
|
||||
CF:141.101.99.0-141.101.99.255
|
||||
CF:141.101.100.0-141.101.103.255
|
||||
CF:141.101.104.0-141.101.104.255
|
||||
CF:141.101.105.0-141.101.105.255
|
||||
CF:141.101.106.0-141.101.106.255
|
||||
CF:141.101.107.0-141.101.107.255
|
||||
CF:141.101.108.0-141.101.108.255
|
||||
CF:141.101.109.0-141.101.109.255
|
||||
CF:141.101.110.0-141.101.110.255
|
||||
CF:141.101.111.0-141.101.111.255
|
||||
CF:141.101.112.0-141.101.113.255
|
||||
CF:141.101.112.0-141.101.127.255
|
||||
CF:141.101.114.0-141.101.115.255
|
||||
CF:141.101.120.0-141.101.123.255
|
||||
CF:162.158.0.0-162.158.3.255
|
||||
CF:162.158.0.0-162.159.255.255
|
||||
CF:162.158.4.0-162.158.7.255
|
||||
CF:162.158.8.0-162.158.8.255
|
||||
CF:162.158.9.0-162.158.9.255
|
||||
CF:162.158.10.0-162.158.10.255
|
||||
CF:162.158.11.0-162.158.11.255
|
||||
CF:162.158.12.0-162.158.15.255
|
||||
CF:162.158.16.0-162.158.19.255
|
||||
CF:162.158.20.0-162.158.23.255
|
||||
CF:162.158.24.0-162.158.24.255
|
||||
CF:162.158.25.0-162.158.25.255
|
||||
CF:162.158.26.0-162.158.26.255
|
||||
CF:162.158.27.0-162.158.27.255
|
||||
CF:162.158.28.0-162.158.28.255
|
||||
CF:162.158.29.0-162.158.29.255
|
||||
CF:162.158.30.0-162.158.30.255
|
||||
CF:162.158.31.0-162.158.31.255
|
||||
CF:162.158.32.0-162.158.35.255
|
||||
CF:162.158.36.0-162.158.36.255
|
||||
CF:162.158.37.0-162.158.37.255
|
||||
CF:162.158.38.0-162.158.38.255
|
||||
CF:162.158.39.0-162.158.39.255
|
||||
CF:162.158.40.0-162.158.40.255
|
||||
CF:162.158.41.0-162.158.41.255
|
||||
CF:162.158.42.0-162.158.42.255
|
||||
CF:162.158.43.0-162.158.43.255
|
||||
CF:162.158.44.0-162.158.44.255
|
||||
CF:162.158.45.0-162.158.45.255
|
||||
CF:162.158.46.0-162.158.46.255
|
||||
CF:162.158.47.0-162.158.47.255
|
||||
CF:162.158.48.0-162.158.48.255
|
||||
CF:162.158.49.0-162.158.49.255
|
||||
CF:162.158.50.0-162.158.50.255
|
||||
CF:162.158.51.0-162.158.51.255
|
||||
CF:162.158.52.0-162.158.52.255
|
||||
CF:162.158.53.0-162.158.53.255
|
||||
CF:162.158.54.0-162.158.54.255
|
||||
CF:162.158.55.0-162.158.55.255
|
||||
CF:162.158.56.0-162.158.59.255
|
||||
CF:162.158.60.0-162.158.63.255
|
||||
CF:162.158.64.0-162.158.67.255
|
||||
CF:162.158.64.0-162.158.71.255
|
||||
CF:162.158.72.0-162.158.75.255
|
||||
CF:162.158.76.0-162.158.79.255
|
||||
CF:162.158.82.0-162.158.82.255
|
||||
CF:162.158.82.0-162.158.83.255
|
||||
CF:162.158.83.0-162.158.83.255
|
||||
CF:162.158.84.0-162.158.84.255
|
||||
CF:162.158.84.0-162.158.87.255
|
||||
CF:162.158.85.0-162.158.85.255
|
||||
CF:162.158.86.0-162.158.86.255
|
||||
CF:162.158.87.0-162.158.87.255
|
||||
CF:162.158.88.0-162.158.88.255
|
||||
CF:162.158.88.0-162.158.95.255
|
||||
CF:162.158.89.0-162.158.89.255
|
||||
CF:162.158.90.0-162.158.90.255
|
||||
CF:162.158.91.0-162.158.91.255
|
||||
CF:162.158.92.0-162.158.92.255
|
||||
CF:162.158.93.0-162.158.93.255
|
||||
CF:162.158.94.0-162.158.94.255
|
||||
CF:162.158.95.0-162.158.95.255
|
||||
CF:162.158.96.0-162.158.96.255
|
||||
CF:162.158.97.0-162.158.97.255
|
||||
CF:162.158.98.0-162.158.98.255
|
||||
CF:162.158.99.0-162.158.99.255
|
||||
CF:162.158.100.0-162.158.100.255
|
||||
CF:162.158.101.0-162.158.101.255
|
||||
CF:162.158.102.0-162.158.102.255
|
||||
CF:162.158.103.0-162.158.103.255
|
||||
CF:162.158.104.0-162.158.104.255
|
||||
CF:162.158.105.0-162.158.105.255
|
||||
CF:162.158.106.0-162.158.106.255
|
||||
CF:162.158.107.0-162.158.107.255
|
||||
CF:162.158.108.0-162.158.111.255
|
||||
CF:162.158.112.0-162.158.112.255
|
||||
CF:162.158.113.0-162.158.113.255
|
||||
CF:162.158.114.0-162.158.114.255
|
||||
CF:162.158.115.0-162.158.115.255
|
||||
CF:162.158.116.0-162.158.119.255
|
||||
CF:162.158.120.0-162.158.120.255
|
||||
CF:162.158.121.0-162.158.121.255
|
||||
CF:162.158.122.0-162.158.122.255
|
||||
CF:162.158.123.0-162.158.123.255
|
||||
CF:162.158.124.0-162.158.127.255
|
||||
CF:162.158.128.0-162.158.131.255
|
||||
CF:162.158.132.0-162.158.132.255
|
||||
CF:162.158.133.0-162.158.133.255
|
||||
CF:162.158.134.0-162.158.134.255
|
||||
CF:162.158.135.0-162.158.135.255
|
||||
CF:162.158.136.0-162.158.139.255
|
||||
CF:162.158.140.0-162.158.140.255
|
||||
CF:162.158.141.0-162.158.141.255
|
||||
CF:162.158.142.0-162.158.142.255
|
||||
CF:162.158.143.0-162.158.143.255
|
||||
CF:162.158.144.0-162.158.144.255
|
||||
CF:162.158.145.0-162.158.145.255
|
||||
CF:162.158.146.0-162.158.146.255
|
||||
CF:162.158.147.0-162.158.147.255
|
||||
CF:162.158.148.0-162.158.151.255
|
||||
CF:162.158.152.0-162.158.155.255
|
||||
CF:162.158.156.0-162.158.159.255
|
||||
CF:162.158.160.0-162.158.175.255
|
||||
CF:162.158.176.0-162.158.176.255
|
||||
CF:162.158.177.0-162.158.177.255
|
||||
CF:162.158.178.0-162.158.178.255
|
||||
CF:162.158.179.0-162.158.179.255
|
||||
CF:162.158.180.0-162.158.183.255
|
||||
CF:162.158.184.0-162.158.184.255
|
||||
CF:162.158.185.0-162.158.185.255
|
||||
CF:162.158.186.0-162.158.186.255
|
||||
CF:162.158.187.0-162.158.187.255
|
||||
CF:162.158.188.0-162.158.188.255
|
||||
CF:162.158.189.0-162.158.189.255
|
||||
CF:162.158.190.0-162.158.190.255
|
||||
CF:162.158.191.0-162.158.191.255
|
||||
CF:162.158.192.0-162.158.192.255
|
||||
CF:162.158.193.0-162.158.193.255
|
||||
CF:162.158.194.0-162.158.194.255
|
||||
CF:162.158.195.0-162.158.195.255
|
||||
CF:162.158.196.0-162.158.196.255
|
||||
CF:162.158.197.0-162.158.197.255
|
||||
CF:162.158.198.0-162.158.198.255
|
||||
CF:162.158.199.0-162.158.199.255
|
||||
CF:162.158.200.0-162.158.203.255
|
||||
CF:162.158.204.0-162.158.205.255
|
||||
CF:162.158.206.0-162.158.207.255
|
||||
CF:162.158.208.0-162.158.211.255
|
||||
CF:162.158.212.0-162.158.215.255
|
||||
CF:162.158.216.0-162.158.217.255
|
||||
CF:162.158.218.0-162.158.219.255
|
||||
CF:162.158.220.0-162.158.223.255
|
||||
CF:162.158.224.0-162.158.227.255
|
||||
CF:162.158.228.0-162.158.231.255
|
||||
CF:162.158.232.0-162.158.235.255
|
||||
CF:162.158.236.0-162.158.239.255
|
||||
CF:162.158.240.0-162.158.243.255
|
||||
CF:162.158.244.0-162.158.247.255
|
||||
CF:162.158.248.0-162.158.249.255
|
||||
CF:162.158.248.0-162.158.251.255
|
||||
CF:162.158.252.0-162.158.255.255
|
||||
CF:162.159.0.0-162.159.0.255
|
||||
CF:162.159.0.0-162.159.15.255
|
||||
CF:162.159.1.0-162.159.1.255
|
||||
CF:162.159.2.0-162.159.2.255
|
||||
CF:162.159.3.0-162.159.3.255
|
||||
CF:162.159.4.0-162.159.4.255
|
||||
CF:162.159.5.0-162.159.5.255
|
||||
CF:162.159.6.0-162.159.6.255
|
||||
CF:162.159.7.0-162.159.7.255
|
||||
CF:162.159.8.0-162.159.8.255
|
||||
CF:162.159.9.0-162.159.9.255
|
||||
CF:162.159.10.0-162.159.10.255
|
||||
CF:162.159.11.0-162.159.11.255
|
||||
CF:162.159.12.0-162.159.12.255
|
||||
CF:162.159.13.0-162.159.13.255
|
||||
CF:162.159.14.0-162.159.14.255
|
||||
CF:162.159.15.0-162.159.15.255
|
||||
CF:162.159.16.0-162.159.16.255
|
||||
CF:162.159.16.0-162.159.31.255
|
||||
CF:162.159.17.0-162.159.17.255
|
||||
CF:162.159.18.0-162.159.18.255
|
||||
CF:162.159.19.0-162.159.19.255
|
||||
CF:162.159.20.0-162.159.20.255
|
||||
CF:162.159.21.0-162.159.21.255
|
||||
CF:162.159.22.0-162.159.22.255
|
||||
CF:162.159.23.0-162.159.23.255
|
||||
CF:162.159.24.0-162.159.24.255
|
||||
CF:162.159.25.0-162.159.25.255
|
||||
CF:162.159.26.0-162.159.26.255
|
||||
CF:162.159.27.0-162.159.27.255
|
||||
CF:162.159.28.0-162.159.28.255
|
||||
CF:162.159.29.0-162.159.29.255
|
||||
CF:162.159.30.0-162.159.30.255
|
||||
CF:162.159.31.0-162.159.31.255
|
||||
CF:162.159.32.0-162.159.33.255
|
||||
CF:162.159.34.0-162.159.35.255
|
||||
CF:162.159.36.0-162.159.36.255
|
||||
CF:162.159.40.0-162.159.41.255
|
||||
CF:162.159.42.0-162.159.43.255
|
||||
CF:162.159.46.0-162.159.46.255
|
||||
CF:162.159.128.0-162.159.159.255
|
||||
CF:162.159.128.0-162.159.255.255
|
||||
CF:162.159.132.0-162.159.132.255
|
||||
CF:162.159.208.0-162.159.208.255
|
||||
CF:162.159.208.0-162.159.211.255
|
||||
CF:162.159.209.0-162.159.209.255
|
||||
CF:162.159.210.0-162.159.210.255
|
||||
CF:162.159.211.0-162.159.211.255
|
||||
CF:162.159.224.0-162.159.239.255
|
||||
CF:172.64.0.0-172.64.15.255
|
||||
CF:172.64.0.0-172.64.255.255
|
||||
CF:172.64.0.0-172.71.255.255
|
||||
CF:172.64.16.0-172.64.31.255
|
||||
CF:172.64.32.0-172.64.47.255
|
||||
CF:172.64.48.0-172.64.63.255
|
||||
CF:172.64.64.0-172.64.79.255
|
||||
CF:172.64.96.0-172.64.111.255
|
||||
CF:172.64.112.0-172.64.127.255
|
||||
CF:172.64.128.0-172.64.143.255
|
||||
CF:172.64.144.0-172.64.159.255
|
||||
CF:172.64.160.0-172.64.175.255
|
||||
CF:172.64.176.0-172.64.191.255
|
||||
CF:172.64.192.0-172.64.207.255
|
||||
CF:172.64.208.0-172.64.223.255
|
||||
CF:172.65.0.0-172.65.15.255
|
||||
CF:172.65.16.0-172.65.31.255
|
||||
CF:172.65.32.0-172.65.47.255
|
||||
CF:172.65.48.0-172.65.63.255
|
||||
CF:172.65.64.0-172.65.79.255
|
||||
CF:172.65.80.0-172.65.95.255
|
||||
CF:172.65.96.0-172.65.111.255
|
||||
CF:172.65.112.0-172.65.127.255
|
||||
CF:172.65.128.0-172.65.143.255
|
||||
CF:172.65.144.0-172.65.159.255
|
||||
CF:172.65.160.0-172.65.175.255
|
||||
CF:172.65.176.0-172.65.191.255
|
||||
CF:172.65.192.0-172.65.207.255
|
||||
CF:172.65.208.0-172.65.223.255
|
||||
CF:172.65.224.0-172.65.239.255
|
||||
CF:172.65.240.0-172.65.255.255
|
||||
CF:172.68.0.0-172.68.3.255
|
||||
CF:172.68.4.0-172.68.7.255
|
||||
CF:172.68.8.0-172.68.11.255
|
||||
CF:172.68.12.0-172.68.15.255
|
||||
CF:172.68.16.0-172.68.31.255
|
||||
CF:172.68.32.0-172.68.35.255
|
||||
CF:172.68.36.0-172.68.39.255
|
||||
CF:172.68.40.0-172.68.43.255
|
||||
CF:172.68.44.0-172.68.47.255
|
||||
CF:172.68.48.0-172.68.51.255
|
||||
CF:172.68.52.0-172.68.55.255
|
||||
CF:172.68.56.0-172.68.56.255
|
||||
CF:172.68.57.0-172.68.57.255
|
||||
CF:172.68.58.0-172.68.58.255
|
||||
CF:172.68.59.0-172.68.59.255
|
||||
CF:172.68.60.0-172.68.63.255
|
||||
CF:172.68.64.0-172.68.67.255
|
||||
CF:172.68.68.0-172.68.71.255
|
||||
CF:172.68.72.0-172.68.75.255
|
||||
CF:172.68.76.0-172.68.79.255
|
||||
CF:172.68.80.0-172.68.83.255
|
||||
CF:172.68.84.0-172.68.87.255
|
||||
CF:172.68.88.0-172.68.91.255
|
||||
CF:172.68.92.0-172.68.95.255
|
||||
CF:172.68.96.0-172.68.99.255
|
||||
CF:172.68.100.0-172.68.103.255
|
||||
CF:172.68.104.0-172.68.107.255
|
||||
CF:172.68.108.0-172.68.111.255
|
||||
CF:172.68.112.0-172.68.115.255
|
||||
CF:172.68.116.0-172.68.119.255
|
||||
CF:172.68.120.0-172.68.121.255
|
||||
CF:172.68.120.0-172.68.123.255
|
||||
CF:172.68.124.0-172.68.127.255
|
||||
CF:172.68.128.0-172.68.131.255
|
||||
CF:172.68.132.0-172.68.135.255
|
||||
CF:172.68.136.0-172.68.139.255
|
||||
CF:172.68.140.0-172.68.143.255
|
||||
CF:172.68.144.0-172.68.147.255
|
||||
CF:172.68.148.0-172.68.151.255
|
||||
CF:172.68.152.0-172.68.155.255
|
||||
CF:172.68.160.0-172.68.163.255
|
||||
CF:172.68.164.0-172.68.165.255
|
||||
CF:172.68.166.0-172.68.167.255
|
||||
CF:172.68.168.0-172.68.169.255
|
||||
CF:172.68.172.0-172.68.175.255
|
||||
CF:172.68.176.0-172.68.179.255
|
||||
CF:172.68.180.0-172.68.183.255
|
||||
CF:172.68.184.0-172.68.187.255
|
||||
CF:172.68.188.0-172.68.191.255
|
||||
CF:172.68.196.0-172.68.199.255
|
||||
CF:172.68.200.0-172.68.203.255
|
||||
CF:172.68.204.0-172.68.207.255
|
||||
CF:172.68.208.0-172.68.211.255
|
||||
CF:172.68.212.0-172.68.215.255
|
||||
CF:172.68.216.0-172.68.219.255
|
||||
CF:172.68.220.0-172.68.223.255
|
||||
CF:172.68.224.0-172.68.227.255
|
||||
CF:172.68.228.0-172.68.231.255
|
||||
CF:172.68.232.0-172.68.235.255
|
||||
CF:172.68.236.0-172.68.239.255
|
||||
CF:172.68.240.0-172.68.243.255
|
||||
CF:172.68.244.0-172.68.247.255
|
||||
CF:172.68.248.0-172.68.255.255
|
||||
CF:172.69.0.0-172.69.1.255
|
||||
CF:172.69.0.0-172.69.3.255
|
||||
CF:172.69.4.0-172.69.7.255
|
||||
CF:172.69.8.0-172.69.11.255
|
||||
CF:172.69.12.0-172.69.15.255
|
||||
CF:172.69.16.0-172.69.31.255
|
||||
CF:172.69.32.0-172.69.35.255
|
||||
CF:172.69.36.0-172.69.37.255
|
||||
CF:172.69.40.0-172.69.43.255
|
||||
CF:172.69.44.0-172.69.47.255
|
||||
CF:172.69.48.0-172.69.51.255
|
||||
CF:172.69.52.0-172.69.55.255
|
||||
CF:172.69.56.0-172.69.59.255
|
||||
CF:172.69.60.0-172.69.63.255
|
||||
CF:172.69.64.0-172.69.71.255
|
||||
CF:172.69.72.0-172.69.75.255
|
||||
CF:172.69.76.0-172.69.79.255
|
||||
CF:172.69.80.0-172.69.83.255
|
||||
CF:172.69.84.0-172.69.87.255
|
||||
CF:172.69.88.0-172.69.91.255
|
||||
CF:172.69.92.0-172.69.95.255
|
||||
CF:172.69.96.0-172.69.99.255
|
||||
CF:172.69.100.0-172.69.103.255
|
||||
CF:172.69.104.0-172.69.107.255
|
||||
CF:172.69.108.0-172.69.111.255
|
||||
CF:172.69.112.0-172.69.115.255
|
||||
CF:172.69.116.0-172.69.119.255
|
||||
CF:172.69.120.0-172.69.123.255
|
||||
CF:172.69.124.0-172.69.127.255
|
||||
CF:172.69.128.0-172.69.131.255
|
||||
CF:172.69.132.0-172.69.135.255
|
||||
CF:172.69.136.0-172.69.139.255
|
||||
CF:172.69.140.0-172.69.143.255
|
||||
CF:172.69.144.0-172.69.147.255
|
||||
CF:172.69.148.0-172.69.151.255
|
||||
CF:172.69.152.0-172.69.155.255
|
||||
CF:172.69.156.0-172.69.159.255
|
||||
CF:172.69.160.0-172.69.163.255
|
||||
CF:172.69.164.0-172.69.167.255
|
||||
CF:172.69.168.0-172.69.171.255
|
||||
CF:172.69.172.0-172.69.175.255
|
||||
CF:172.69.176.0-172.69.179.255
|
||||
CF:172.69.180.0-172.69.183.255
|
||||
CF:172.69.184.0-172.69.187.255
|
||||
CF:172.69.188.0-172.69.191.255
|
||||
CF:172.69.192.0-172.69.195.255
|
||||
CF:172.69.196.0-172.69.199.255
|
||||
CF:172.69.200.0-172.69.203.255
|
||||
CF:172.69.204.0-172.69.207.255
|
||||
CF:172.69.208.0-172.69.211.255
|
||||
CF:172.69.212.0-172.69.215.255
|
||||
CF:172.69.216.0-172.69.219.255
|
||||
CF:172.69.220.0-172.69.223.255
|
||||
CF:172.69.224.0-172.69.225.255
|
||||
CF:172.69.224.0-172.69.227.255
|
||||
CF:172.69.226.0-172.69.227.255
|
||||
CF:172.69.228.0-172.69.231.255
|
||||
CF:172.69.232.0-172.69.235.255
|
||||
CF:172.69.236.0-172.69.239.255
|
||||
CF:172.69.240.0-172.69.243.255
|
||||
CF:172.69.244.0-172.69.245.255
|
||||
CF:172.69.244.0-172.69.247.255
|
||||
CF:172.69.246.0-172.69.247.255
|
||||
CF:172.69.248.0-172.69.251.255
|
||||
CF:172.69.252.0-172.69.255.255
|
||||
CF:173.245.48.0-173.245.48.255
|
||||
CF:173.245.48.0-173.245.63.255
|
||||
CF:173.245.52.0-173.245.52.255
|
||||
CF:173.245.54.0-173.245.54.255
|
||||
CF:173.245.56.0-173.245.56.255
|
||||
CF:173.245.58.0-173.245.58.255
|
||||
CF:173.245.59.0-173.245.59.255
|
||||
CF:173.245.60.0-173.245.61.255
|
||||
CF:173.245.62.0-173.245.62.255
|
||||
CF:173.245.63.0-173.245.63.255
|
||||
CF:185.122.0.0-185.122.0.255
|
||||
CF:188.114.96.0-188.114.96.255
|
||||
CF:188.114.96.0-188.114.111.255
|
||||
CF:188.114.97.0-188.114.97.255
|
||||
CF:188.114.98.0-188.114.98.255
|
||||
CF:188.114.99.0-188.114.99.255
|
||||
CF:188.114.100.0-188.114.100.255
|
||||
CF:188.114.101.0-188.114.101.255
|
||||
CF:188.114.102.0-188.114.102.255
|
||||
CF:188.114.103.0-188.114.103.255
|
||||
CF:188.114.104.0-188.114.104.255
|
||||
CF:188.114.106.0-188.114.107.255
|
||||
CF:188.114.108.0-188.114.108.255
|
||||
CF:188.114.109.0-188.114.109.255
|
||||
CF:188.114.110.0-188.114.110.255
|
||||
CF:188.114.111.0-188.114.111.255
|
||||
CF:190.93.240.0-190.93.255.255
|
||||
CF:190.93.244.0-190.93.247.255
|
||||
CF:197.234.240.0-197.234.240.255
|
||||
CF:197.234.240.0-197.234.243.255
|
||||
CF:197.234.241.0-197.234.241.255
|
||||
CF:197.234.242.0-197.234.242.255
|
||||
CF:197.234.243.0-197.234.243.255
|
||||
CF:198.41.128.0-198.41.128.255
|
||||
CF:198.41.128.0-198.41.255.255
|
||||
CF:198.41.129.0-198.41.129.255
|
||||
CF:198.41.130.0-198.41.130.255
|
||||
CF:198.41.132.0-198.41.135.255
|
||||
CF:198.41.136.0-198.41.139.255
|
||||
CF:198.41.144.0-198.41.144.255
|
||||
CF:198.41.144.0-198.41.147.255
|
||||
CF:198.41.148.0-198.41.148.255
|
||||
CF:198.41.148.0-198.41.151.255
|
||||
CF:198.41.152.0-198.41.155.255
|
||||
CF:198.41.192.0-198.41.199.255
|
||||
CF:198.41.192.0-198.41.223.255
|
||||
CF:198.41.200.0-198.41.207.255
|
||||
CF:198.41.208.0-198.41.209.255
|
||||
CF:198.41.212.0-198.41.212.255
|
||||
CF:198.41.213.0-198.41.213.255
|
||||
CF:198.41.214.0-198.41.215.255
|
||||
CF:198.41.216.0-198.41.216.255
|
||||
CF:198.41.220.0-198.41.221.255
|
||||
CF:198.41.222.0-198.41.222.255
|
||||
CF:198.41.223.0-198.41.223.255
|
||||
CF:198.41.224.0-198.41.227.255
|
||||
CF:198.41.228.0-198.41.228.255
|
||||
CF:198.41.229.0-198.41.229.255
|
||||
CF:198.41.230.0-198.41.230.255
|
||||
CF:198.41.231.0-198.41.231.255
|
||||
CF:198.41.232.0-198.41.232.255
|
||||
CF:198.41.233.0-198.41.233.255
|
||||
CF:198.41.234.0-198.41.234.255
|
||||
CF:198.41.235.0-198.41.235.255
|
||||
CF:198.41.236.0-198.41.239.255
|
||||
CF:198.41.240.0-198.41.240.255
|
||||
CF:198.41.241.0-198.41.241.255
|
||||
CF:198.41.242.0-198.41.242.255
|
||||
CF:198.41.243.0-198.41.243.255
|
||||
CF:198.41.246.0-198.41.247.255
|
||||
CF:198.41.248.0-198.41.249.255
|
||||
CF:198.41.250.0-198.41.250.255
|
||||
CF:198.41.252.0-198.41.252.255
|
||||
CF:199.27.132.0-199.27.132.255
|
|
@ -0,0 +1,7 @@
|
|||
# Cloudflare users
|
||||
|
||||
They are helping corporate censorship and mass surveillance.
|
||||
|
||||
![](../image/chinaphone.jpg)
|
||||
|
||||
See [instructions.md](../instructions.md) for file purpose and format specifications.
|
|
@ -0,0 +1,3 @@
|
|||
# Cloudflare users domain list
|
||||
|
||||
See [instructions.md](../../instructions.md) for file purpose and format specifications.
|
|
@ -0,0 +1,4 @@
|
|||
8ch.net https://new.blog.cloudflare.com/terminating-service-for-8chan/
|
||||
linux.pizza https://social.linux.pizza/@admin/102189393483894910
|
||||
privacytools.io It took 3 years to convince him to move off Cloudflare.
|
||||
shkspr.mobi https://shkspr.mobi/blog/2019/11/can-you-trust-cloudflare-with-your-personal-data/
|
|
@ -0,0 +1,31 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
# Globalist: manage a global repo via decentral git instances
|
||||
# you may peer with any number of other Globalist onions
|
||||
|
||||
# Think onionshare, but with permanent onion addresses, P2P and DVCS
|
||||
|
||||
# Python2/3. Dependencies:
|
||||
# - stem (torsocks pip install stem / via distro)
|
||||
# a recent version (>= 1.5.0) is needed for auth
|
||||
# - git must be installed
|
||||
# - torsocks must be installed
|
||||
# - tor must be up and running and the ControlPort open
|
||||
|
||||
# Use scenario:
|
||||
# a) Run Tor.
|
||||
# b) Run the server in the background and schedule a job for pulling from peers.
|
||||
# it is a git server that listens on <your-identifier>.onion:9418
|
||||
# it's to be expected that peers uptime will intersect with yours
|
||||
# only a fraction of the time.
|
||||
# c) Globalist.py creates a git, which you may use to push and pull your own changes.
|
||||
|
||||
# Bugs:
|
||||
# FIXME: clean up hidservauth entries on stop
|
||||
|
||||
import globalist
|
||||
import sys
|
||||
|
||||
if __name__=='__main__':
|
||||
globalist.main(args=sys.argv[1:])
|
|
@ -0,0 +1,4 @@
|
|||
version 0.0.6.2
|
||||
- HidServAuth entries are never cleaned up
|
||||
- ux: -X does not disable authentication
|
||||
|
|
@ -0,0 +1,674 @@
|
|||
GNU GENERAL PUBLIC LICENSE
|
||||
Version 3, 29 June 2007
|
||||
|
||||
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||
Everyone is permitted to copy and distribute verbatim copies
|
||||
of this license document, but changing it is not allowed.
|
||||
|
||||
Preamble
|
||||
|
||||
The GNU General Public License is a free, copyleft license for
|
||||
software and other kinds of works.
|
||||
|
||||
The licenses for most software and other practical works are designed
|
||||
to take away your freedom to share and change the works. By contrast,
|
||||
the GNU General Public License is intended to guarantee your freedom to
|
||||
share and change all versions of a program--to make sure it remains free
|
||||
software for all its users. We, the Free Software Foundation, use the
|
||||
GNU General Public License for most of our software; it applies also to
|
||||
any other work released this way by its authors. You can apply it to
|
||||
your programs, too.
|
||||
|
||||
When we speak of free software, we are referring to freedom, not
|
||||
price. Our General Public Licenses are designed to make sure that you
|
||||
have the freedom to distribute copies of free software (and charge for
|
||||
them if you wish), that you receive source code or can get it if you
|
||||
want it, that you can change the software or use pieces of it in new
|
||||
free programs, and that you know you can do these things.
|
||||
|
||||
To protect your rights, we need to prevent others from denying you
|
||||
these rights or asking you to surrender the rights. Therefore, you have
|
||||
certain responsibilities if you distribute copies of the software, or if
|
||||
you modify it: responsibilities to respect the freedom of others.
|
||||
|
||||
For example, if you distribute copies of such a program, whether
|
||||
gratis or for a fee, you must pass on to the recipients the same
|
||||
freedoms that you received. You must make sure that they, too, receive
|
||||
or can get the source code. And you must show them these terms so they
|
||||
know their rights.
|
||||
|
||||
Developers that use the GNU GPL protect your rights with two steps:
|
||||
(1) assert copyright on the software, and (2) offer you this License
|
||||
giving you legal permission to copy, distribute and/or modify it.
|
||||
|
||||
For the developers' and authors' protection, the GPL clearly explains
|
||||
that there is no warranty for this free software. For both users' and
|
||||
authors' sake, the GPL requires that modified versions be marked as
|
||||
changed, so that their problems will not be attributed erroneously to
|
||||
authors of previous versions.
|
||||
|
||||
Some devices are designed to deny users access to install or run
|
||||
modified versions of the software inside them, although the manufacturer
|
||||
can do so. This is fundamentally incompatible with the aim of
|
||||
protecting users' freedom to change the software. The systematic
|
||||
pattern of such abuse occurs in the area of products for individuals to
|
||||
use, which is precisely where it is most unacceptable. Therefore, we
|
||||
have designed this version of the GPL to prohibit the practice for those
|
||||
products. If such problems arise substantially in other domains, we
|
||||
stand ready to extend this provision to those domains in future versions
|
||||
of the GPL, as needed to protect the freedom of users.
|
||||
|
||||
Finally, every program is threatened constantly by software patents.
|
||||
States should not allow patents to restrict development and use of
|
||||
software on general-purpose computers, but in those that do, we wish to
|
||||
avoid the special danger that patents applied to a free program could
|
||||
make it effectively proprietary. To prevent this, the GPL assures that
|
||||
patents cannot be used to render the program non-free.
|
||||
|
||||
The precise terms and conditions for copying, distribution and
|
||||
modification follow.
|
||||
|
||||
TERMS AND CONDITIONS
|
||||
|
||||
0. Definitions.
|
||||
|
||||
"This License" refers to version 3 of the GNU General Public License.
|
||||
|
||||
"Copyright" also means copyright-like laws that apply to other kinds of
|
||||
works, such as semiconductor masks.
|
||||
|
||||
"The Program" refers to any copyrightable work licensed under this
|
||||
License. Each licensee is addressed as "you". "Licensees" and
|
||||
"recipients" may be individuals or organizations.
|
||||
|
||||
To "modify" a work means to copy from or adapt all or part of the work
|
||||
in a fashion requiring copyright permission, other than the making of an
|
||||
exact copy. The resulting work is called a "modified version" of the
|
||||
earlier work or a work "based on" the earlier work.
|
||||
|
||||
A "covered work" means either the unmodified Program or a work based
|
||||
on the Program.
|
||||
|
||||
To "propagate" a work means to do anything with it that, without
|
||||
permission, would make you directly or secondarily liable for
|
||||
infringement under applicable copyright law, except executing it on a
|
||||
computer or modifying a private copy. Propagation includes copying,
|
||||
distribution (with or without modification), making available to the
|
||||
public, and in some countries other activities as well.
|
||||
|
||||
To "convey" a work means any kind of propagation that enables other
|
||||
parties to make or receive copies. Mere interaction with a user through
|
||||
a computer network, with no transfer of a copy, is not conveying.
|
||||
|
||||
An interactive user interface displays "Appropriate Legal Notices"
|
||||
to the extent that it includes a convenient and prominently visible
|
||||
feature that (1) displays an appropriate copyright notice, and (2)
|
||||
tells the user that there is no warranty for the work (except to the
|
||||
extent that warranties are provided), that licensees may convey the
|
||||
work under this License, and how to view a copy of this License. If
|
||||
the interface presents a list of user commands or options, such as a
|
||||
menu, a prominent item in the list meets this criterion.
|
||||
|
||||
1. Source Code.
|
||||
|
||||
The "source code" for a work means the preferred form of the work
|
||||
for making modifications to it. "Object code" means any non-source
|
||||
form of a work.
|
||||
|
||||
A "Standard Interface" means an interface that either is an official
|
||||
standard defined by a recognized standards body, or, in the case of
|
||||
interfaces specified for a particular programming language, one that
|
||||
is widely used among developers working in that language.
|
||||
|
||||
The "System Libraries" of an executable work include anything, other
|
||||
than the work as a whole, that (a) is included in the normal form of
|
||||
packaging a Major Component, but which is not part of that Major
|
||||
Component, and (b) serves only to enable use of the work with that
|
||||
Major Component, or to implement a Standard Interface for which an
|
||||
implementation is available to the public in source code form. A
|
||||
"Major Component", in this context, means a major essential component
|
||||
(kernel, window system, and so on) of the specific operating system
|
||||
(if any) on which the executable work runs, or a compiler used to
|
||||
produce the work, or an object code interpreter used to run it.
|
||||
|
||||
The "Corresponding Source" for a work in object code form means all
|
||||
the source code needed to generate, install, and (for an executable
|
||||
work) run the object code and to modify the work, including scripts to
|
||||
control those activities. However, it does not include the work's
|
||||
System Libraries, or general-purpose tools or generally available free
|
||||
programs which are used unmodified in performing those activities but
|
||||
which are not part of the work. For example, Corresponding Source
|
||||
includes interface definition files associated with source files for
|
||||
the work, and the source code for shared libraries and dynamically
|
||||
linked subprograms that the work is specifically designed to require,
|
||||
such as by intimate data communication or control flow between those
|
||||
subprograms and other parts of the work.
|
||||
|
||||
The Corresponding Source need not include anything that users
|
||||
can regenerate automatically from other parts of the Corresponding
|
||||
Source.
|
||||
|
||||
The Corresponding Source for a work in source code form is that
|
||||
same work.
|
||||
|
||||
2. Basic Permissions.
|
||||
|
||||
All rights granted under this License are granted for the term of
|
||||
copyright on the Program, and are irrevocable provided the stated
|
||||
conditions are met. This License explicitly affirms your unlimited
|
||||
permission to run the unmodified Program. The output from running a
|
||||
covered work is covered by this License only if the output, given its
|
||||
content, constitutes a covered work. This License acknowledges your
|
||||
rights of fair use or other equivalent, as provided by copyright law.
|
||||
|
||||
You may make, run and propagate covered works that you do not
|
||||
convey, without conditions so long as your license otherwise remains
|
||||
in force. You may convey covered works to others for the sole purpose
|
||||
of having them make modifications exclusively for you, or provide you
|
||||
with facilities for running those works, provided that you comply with
|
||||
the terms of this License in conveying all material for which you do
|
||||
not control copyright. Those thus making or running the covered works
|
||||
for you must do so exclusively on your behalf, under your direction
|
||||
and control, on terms that prohibit them from making any copies of
|
||||
your copyrighted material outside their relationship with you.
|
||||
|
||||
Conveying under any other circumstances is permitted solely under
|
||||
the conditions stated below. Sublicensing is not allowed; section 10
|
||||
makes it unnecessary.
|
||||
|
||||
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||
|
||||
No covered work shall be deemed part of an effective technological
|
||||
measure under any applicable law fulfilling obligations under article
|
||||
11 of the WIPO copyright treaty adopted on 20 December 1996, or
|
||||
similar laws prohibiting or restricting circumvention of such
|
||||
measures.
|
||||
|
||||
When you convey a covered work, you waive any legal power to forbid
|
||||
circumvention of technological measures to the extent such circumvention
|
||||
is effected by exercising rights under this License with respect to
|
||||
the covered work, and you disclaim any intention to limit operation or
|
||||
modification of the work as a means of enforcing, against the work's
|
||||
users, your or third parties' legal rights to forbid circumvention of
|
||||
technological measures.
|
||||
|
||||
4. Conveying Verbatim Copies.
|
||||
|
||||
You may convey verbatim copies of the Program's source code as you
|
||||
receive it, in any medium, provided that you conspicuously and
|
||||
appropriately publish on each copy an appropriate copyright notice;
|
||||
keep intact all notices stating that this License and any
|
||||
non-permissive terms added in accord with section 7 apply to the code;
|
||||
keep intact all notices of the absence of any warranty; and give all
|
||||
recipients a copy of this License along with the Program.
|
||||
|
||||
You may charge any price or no price for each copy that you convey,
|
||||
and you may offer support or warranty protection for a fee.
|
||||
|
||||
5. Conveying Modified Source Versions.
|
||||
|
||||
You may convey a work based on the Program, or the modifications to
|
||||
produce it from the Program, in the form of source code under the
|
||||
terms of section 4, provided that you also meet all of these conditions:
|
||||
|
||||
a) The work must carry prominent notices stating that you modified
|
||||
it, and giving a relevant date.
|
||||
|
||||
b) The work must carry prominent notices stating that it is
|
||||
released under this License and any conditions added under section
|
||||
7. This requirement modifies the requirement in section 4 to
|
||||
"keep intact all notices".
|
||||
|
||||
c) You must license the entire work, as a whole, under this
|
||||
License to anyone who comes into possession of a copy. This
|
||||
License will therefore apply, along with any applicable section 7
|
||||
additional terms, to the whole of the work, and all its parts,
|
||||
regardless of how they are packaged. This License gives no
|
||||
permission to license the work in any other way, but it does not
|
||||
invalidate such permission if you have separately received it.
|
||||
|
||||
d) If the work has interactive user interfaces, each must display
|
||||
Appropriate Legal Notices; however, if the Program has interactive
|
||||
interfaces that do not display Appropriate Legal Notices, your
|
||||
work need not make them do so.
|
||||
|
||||
A compilation of a covered work with other separate and independent
|
||||
works, which are not by their nature extensions of the covered work,
|
||||
and which are not combined with it such as to form a larger program,
|
||||
in or on a volume of a storage or distribution medium, is called an
|
||||
"aggregate" if the compilation and its resulting copyright are not
|
||||
used to limit the access or legal rights of the compilation's users
|
||||
beyond what the individual works permit. Inclusion of a covered work
|
||||
in an aggregate does not cause this License to apply to the other
|
||||
parts of the aggregate.
|
||||
|
||||
6. Conveying Non-Source Forms.
|
||||
|
||||
You may convey a covered work in object code form under the terms
|
||||
of sections 4 and 5, provided that you also convey the
|
||||
machine-readable Corresponding Source under the terms of this License,
|
||||
in one of these ways:
|
||||
|
||||
a) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by the
|
||||
Corresponding Source fixed on a durable physical medium
|
||||
customarily used for software interchange.
|
||||
|
||||
b) Convey the object code in, or embodied in, a physical product
|
||||
(including a physical distribution medium), accompanied by a
|
||||
written offer, valid for at least three years and valid for as
|
||||
long as you offer spare parts or customer support for that product
|
||||
model, to give anyone who possesses the object code either (1) a
|
||||
copy of the Corresponding Source for all the software in the
|
||||
product that is covered by this License, on a durable physical
|
||||
medium customarily used for software interchange, for a price no
|
||||
more than your reasonable cost of physically performing this
|
||||
conveying of source, or (2) access to copy the
|
||||
Corresponding Source from a network server at no charge.
|
||||
|
||||
c) Convey individual copies of the object code with a copy of the
|
||||
written offer to provide the Corresponding Source. This
|
||||
alternative is allowed only occasionally and noncommercially, and
|
||||
only if you received the object code with such an offer, in accord
|
||||
with subsection 6b.
|
||||
|
||||
d) Convey the object code by offering access from a designated
|
||||
place (gratis or for a charge), and offer equivalent access to the
|
||||
Corresponding Source in the same way through the same place at no
|
||||
further charge. You need not require recipients to copy the
|
||||
Corresponding Source along with the object code. If the place to
|
||||
copy the object code is a network server, the Corresponding Source
|
||||
may be on a different server (operated by you or a third party)
|
||||
that supports equivalent copying facilities, provided you maintain
|
||||
clear directions next to the object code saying where to find the
|
||||
Corresponding Source. Regardless of what server hosts the
|
||||
Corresponding Source, you remain obligated to ensure that it is
|
||||
available for as long as needed to satisfy these requirements.
|
||||
|
||||
e) Convey the object code using peer-to-peer transmission, provided
|
||||
you inform other peers where the object code and Corresponding
|
||||
Source of the work are being offered to the general public at no
|
||||
charge under subsection 6d.
|
||||
|
||||
A separable portion of the object code, whose source code is excluded
|
||||
from the Corresponding Source as a System Library, need not be
|
||||
included in conveying the object code work.
|
||||
|
||||
A "User Product" is either (1) a "consumer product", which means any
|
||||
tangible personal property which is normally used for personal, family,
|
||||
or household purposes, or (2) anything designed or sold for incorporation
|
||||
into a dwelling. In determining whether a product is a consumer product,
|
||||
doubtful cases shall be resolved in favor of coverage. For a particular
|
||||
product received by a particular user, "normally used" refers to a
|
||||
typical or common use of that class of product, regardless of the status
|
||||
of the particular user or of the way in which the particular user
|
||||
actually uses, or expects or is expected to use, the product. A product
|
||||
is a consumer product regardless of whether the product has substantial
|
||||
commercial, industrial or non-consumer uses, unless such uses represent
|
||||
the only significant mode of use of the product.
|
||||
|
||||
"Installation Information" for a User Product means any methods,
|
||||
procedures, authorization keys, or other information required to install
|
||||
and execute modified versions of a covered work in that User Product from
|
||||
a modified version of its Corresponding Source. The information must
|
||||
suffice to ensure that the continued functioning of the modified object
|
||||
code is in no case prevented or interfered with solely because
|
||||
modification has been made.
|
||||
|
||||
If you convey an object code work under this section in, or with, or
|
||||
specifically for use in, a User Product, and the conveying occurs as
|
||||
part of a transaction in which the right of possession and use of the
|
||||
User Product is transferred to the recipient in perpetuity or for a
|
||||
fixed term (regardless of how the transaction is characterized), the
|
||||
Corresponding Source conveyed under this section must be accompanied
|
||||
by the Installation Information. But this requirement does not apply
|
||||
if neither you nor any third party retains the ability to install
|
||||
modified object code on the User Product (for example, the work has
|
||||
been installed in ROM).
|
||||
|
||||
The requirement to provide Installation Information does not include a
|
||||
requirement to continue to provide support service, warranty, or updates
|
||||
for a work that has been modified or installed by the recipient, or for
|
||||
the User Product in which it has been modified or installed. Access to a
|
||||
network may be denied when the modification itself materially and
|
||||
adversely affects the operation of the network or violates the rules and
|
||||
protocols for communication across the network.
|
||||
|
||||
Corresponding Source conveyed, and Installation Information provided,
|
||||
in accord with this section must be in a format that is publicly
|
||||
documented (and with an implementation available to the public in
|
||||
source code form), and must require no special password or key for
|
||||
unpacking, reading or copying.
|
||||
|
||||
7. Additional Terms.
|
||||
|
||||
"Additional permissions" are terms that supplement the terms of this
|
||||
License by making exceptions from one or more of its conditions.
|
||||
Additional permissions that are applicable to the entire Program shall
|
||||
be treated as though they were included in this License, to the extent
|
||||
that they are valid under applicable law. If additional permissions
|
||||
apply only to part of the Program, that part may be used separately
|
||||
under those permissions, but the entire Program remains governed by
|
||||
this License without regard to the additional permissions.
|
||||
|
||||
When you convey a copy of a covered work, you may at your option
|
||||
remove any additional permissions from that copy, or from any part of
|
||||
it. (Additional permissions may be written to require their own
|
||||
removal in certain cases when you modify the work.) You may place
|
||||
additional permissions on material, added by you to a covered work,
|
||||
for which you have or can give appropriate copyright permission.
|
||||
|
||||
Notwithstanding any other provision of this License, for material you
|
||||
add to a covered work, you may (if authorized by the copyright holders of
|
||||
that material) supplement the terms of this License with terms:
|
||||
|
||||
a) Disclaiming warranty or limiting liability differently from the
|
||||
terms of sections 15 and 16 of this License; or
|
||||
|
||||
b) Requiring preservation of specified reasonable legal notices or
|
||||
author attributions in that material or in the Appropriate Legal
|
||||
Notices displayed by works containing it; or
|
||||
|
||||
c) Prohibiting misrepresentation of the origin of that material, or
|
||||
requiring that modified versions of such material be marked in
|
||||
reasonable ways as different from the original version; or
|
||||
|
||||
d) Limiting the use for publicity purposes of names of licensors or
|
||||
authors of the material; or
|
||||
|
||||
e) Declining to grant rights under trademark law for use of some
|
||||
trade names, trademarks, or service marks; or
|
||||
|
||||
f) Requiring indemnification of licensors and authors of that
|
||||
material by anyone who conveys the material (or modified versions of
|
||||
it) with contractual assumptions of liability to the recipient, for
|
||||
any liability that these contractual assumptions directly impose on
|
||||
those licensors and authors.
|
||||
|
||||
All other non-permissive additional terms are considered "further
|
||||
restrictions" within the meaning of section 10. If the Program as you
|
||||
received it, or any part of it, contains a notice stating that it is
|
||||
governed by this License along with a term that is a further
|
||||
restriction, you may remove that term. If a license document contains
|
||||
a further restriction but permits relicensing or conveying under this
|
||||
License, you may add to a covered work material governed by the terms
|
||||
of that license document, provided that the further restriction does
|
||||
not survive such relicensing or conveying.
|
||||
|
||||
If you add terms to a covered work in accord with this section, you
|
||||
must place, in the relevant source files, a statement of the
|
||||
additional terms that apply to those files, or a notice indicating
|
||||
where to find the applicable terms.
|
||||
|
||||
Additional terms, permissive or non-permissive, may be stated in the
|
||||
form of a separately written license, or stated as exceptions;
|
||||
the above requirements apply either way.
|
||||
|
||||
8. Termination.
|
||||
|
||||
You may not propagate or modify a covered work except as expressly
|
||||
provided under this License. Any attempt otherwise to propagate or
|
||||
modify it is void, and will automatically terminate your rights under
|
||||
this License (including any patent licenses granted under the third
|
||||
paragraph of section 11).
|
||||
|
||||
However, if you cease all violation of this License, then your
|
||||
license from a particular copyright holder is reinstated (a)
|
||||
provisionally, unless and until the copyright holder explicitly and
|
||||
finally terminates your license, and (b) permanently, if the copyright
|
||||
holder fails to notify you of the violation by some reasonable means
|
||||
prior to 60 days after the cessation.
|
||||
|
||||
Moreover, your license from a particular copyright holder is
|
||||
reinstated permanently if the copyright holder notifies you of the
|
||||
violation by some reasonable means, this is the first time you have
|
||||
received notice of violation of this License (for any work) from that
|
||||
copyright holder, and you cure the violation prior to 30 days after
|
||||
your receipt of the notice.
|
||||
|
||||
Termination of your rights under this section does not terminate the
|
||||
licenses of parties who have received copies or rights from you under
|
||||
this License. If your rights have been terminated and not permanently
|
||||
reinstated, you do not qualify to receive new licenses for the same
|
||||
material under section 10.
|
||||
|
||||
9. Acceptance Not Required for Having Copies.
|
||||
|
||||
You are not required to accept this License in order to receive or
|
||||
run a copy of the Program. Ancillary propagation of a covered work
|
||||
occurring solely as a consequence of using peer-to-peer transmission
|
||||
to receive a copy likewise does not require acceptance. However,
|
||||
nothing other than this License grants you permission to propagate or
|
||||
modify any covered work. These actions infringe copyright if you do
|
||||
not accept this License. Therefore, by modifying or propagating a
|
||||
covered work, you indicate your acceptance of this License to do so.
|
||||
|
||||
10. Automatic Licensing of Downstream Recipients.
|
||||
|
||||
Each time you convey a covered work, the recipient automatically
|
||||
receives a license from the original licensors, to run, modify and
|
||||
propagate that work, subject to this License. You are not responsible
|
||||
for enforcing compliance by third parties with this License.
|
||||
|
||||
An "entity transaction" is a transaction transferring control of an
|
||||
organization, or substantially all assets of one, or subdividing an
|
||||
organization, or merging organizations. If propagation of a covered
|
||||
work results from an entity transaction, each party to that
|
||||
transaction who receives a copy of the work also receives whatever
|
||||
licenses to the work the party's predecessor in interest had or could
|
||||
give under the previous paragraph, plus a right to possession of the
|
||||
Corresponding Source of the work from the predecessor in interest, if
|
||||
the predecessor has it or can get it with reasonable efforts.
|
||||
|
||||
You may not impose any further restrictions on the exercise of the
|
||||
rights granted or affirmed under this License. For example, you may
|
||||
not impose a license fee, royalty, or other charge for exercise of
|
||||
rights granted under this License, and you may not initiate litigation
|
||||
(including a cross-claim or counterclaim in a lawsuit) alleging that
|
||||
any patent claim is infringed by making, using, selling, offering for
|
||||
sale, or importing the Program or any portion of it.
|
||||
|
||||
11. Patents.
|
||||
|
||||
A "contributor" is a copyright holder who authorizes use under this
|
||||
License of the Program or a work on which the Program is based. The
|
||||
work thus licensed is called the contributor's "contributor version".
|
||||
|
||||
A contributor's "essential patent claims" are all patent claims
|
||||
owned or controlled by the contributor, whether already acquired or
|
||||
hereafter acquired, that would be infringed by some manner, permitted
|
||||
by this License, of making, using, or selling its contributor version,
|
||||
but do not include claims that would be infringed only as a
|
||||
consequence of further modification of the contributor version. For
|
||||
purposes of this definition, "control" includes the right to grant
|
||||
patent sublicenses in a manner consistent with the requirements of
|
||||
this License.
|
||||
|
||||
Each contributor grants you a non-exclusive, worldwide, royalty-free
|
||||
patent license under the contributor's essential patent claims, to
|
||||
make, use, sell, offer for sale, import and otherwise run, modify and
|
||||
propagate the contents of its contributor version.
|
||||
|
||||
In the following three paragraphs, a "patent license" is any express
|
||||
agreement or commitment, however denominated, not to enforce a patent
|
||||
(such as an express permission to practice a patent or covenant not to
|
||||
sue for patent infringement). To "grant" such a patent license to a
|
||||
party means to make such an agreement or commitment not to enforce a
|
||||
patent against the party.
|
||||
|
||||
If you convey a covered work, knowingly relying on a patent license,
|
||||
and the Corresponding Source of the work is not available for anyone
|
||||
to copy, free of charge and under the terms of this License, through a
|
||||
publicly available network server or other readily accessible means,
|
||||
then you must either (1) cause the Corresponding Source to be so
|
||||
available, or (2) arrange to deprive yourself of the benefit of the
|
||||
patent license for this particular work, or (3) arrange, in a manner
|
||||
consistent with the requirements of this License, to extend the patent
|
||||
license to downstream recipients. "Knowingly relying" means you have
|
||||
actual knowledge that, but for the patent license, your conveying the
|
||||
covered work in a country, or your recipient's use of the covered work
|
||||
in a country, would infringe one or more identifiable patents in that
|
||||
country that you have reason to believe are valid.
|
||||
|
||||
If, pursuant to or in connection with a single transaction or
|
||||
arrangement, you convey, or propagate by procuring conveyance of, a
|
||||
covered work, and grant a patent license to some of the parties
|
||||
receiving the covered work authorizing them to use, propagate, modify
|
||||
or convey a specific copy of the covered work, then the patent license
|
||||
you grant is automatically extended to all recipients of the covered
|
||||
work and works based on it.
|
||||
|
||||
A patent license is "discriminatory" if it does not include within
|
||||
the scope of its coverage, prohibits the exercise of, or is
|
||||
conditioned on the non-exercise of one or more of the rights that are
|
||||
specifically granted under this License. You may not convey a covered
|
||||
work if you are a party to an arrangement with a third party that is
|
||||
in the business of distributing software, under which you make payment
|
||||
to the third party based on the extent of your activity of conveying
|
||||
the work, and under which the third party grants, to any of the
|
||||
parties who would receive the covered work from you, a discriminatory
|
||||
patent license (a) in connection with copies of the covered work
|
||||
conveyed by you (or copies made from those copies), or (b) primarily
|
||||
for and in connection with specific products or compilations that
|
||||
contain the covered work, unless you entered into that arrangement,
|
||||
or that patent license was granted, prior to 28 March 2007.
|
||||
|
||||
Nothing in this License shall be construed as excluding or limiting
|
||||
any implied license or other defenses to infringement that may
|
||||
otherwise be available to you under applicable patent law.
|
||||
|
||||
12. No Surrender of Others' Freedom.
|
||||
|
||||
If conditions are imposed on you (whether by court order, agreement or
|
||||
otherwise) that contradict the conditions of this License, they do not
|
||||
excuse you from the conditions of this License. If you cannot convey a
|
||||
covered work so as to satisfy simultaneously your obligations under this
|
||||
License and any other pertinent obligations, then as a consequence you may
|
||||
not convey it at all. For example, if you agree to terms that obligate you
|
||||
to collect a royalty for further conveying from those to whom you convey
|
||||
the Program, the only way you could satisfy both those terms and this
|
||||
License would be to refrain entirely from conveying the Program.
|
||||
|
||||
13. Use with the GNU Affero General Public License.
|
||||
|
||||
Notwithstanding any other provision of this License, you have
|
||||
permission to link or combine any covered work with a work licensed
|
||||
under version 3 of the GNU Affero General Public License into a single
|
||||
combined work, and to convey the resulting work. The terms of this
|
||||
License will continue to apply to the part which is the covered work,
|
||||
but the special requirements of the GNU Affero General Public License,
|
||||
section 13, concerning interaction through a network will apply to the
|
||||
combination as such.
|
||||
|
||||
14. Revised Versions of this License.
|
||||
|
||||
The Free Software Foundation may publish revised and/or new versions of
|
||||
the GNU General Public License from time to time. Such new versions will
|
||||
be similar in spirit to the present version, but may differ in detail to
|
||||
address new problems or concerns.
|
||||
|
||||
Each version is given a distinguishing version number. If the
|
||||
Program specifies that a certain numbered version of the GNU General
|
||||
Public License "or any later version" applies to it, you have the
|
||||
option of following the terms and conditions either of that numbered
|
||||
version or of any later version published by the Free Software
|
||||
Foundation. If the Program does not specify a version number of the
|
||||
GNU General Public License, you may choose any version ever published
|
||||
by the Free Software Foundation.
|
||||
|
||||
If the Program specifies that a proxy can decide which future
|
||||
versions of the GNU General Public License can be used, that proxy's
|
||||
public statement of acceptance of a version permanently authorizes you
|
||||
to choose that version for the Program.
|
||||
|
||||
Later license versions may give you additional or different
|
||||
permissions. However, no additional obligations are imposed on any
|
||||
author or copyright holder as a result of your choosing to follow a
|
||||
later version.
|
||||
|
||||
15. Disclaimer of Warranty.
|
||||
|
||||
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY
|
||||
APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT
|
||||
HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY
|
||||
OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO,
|
||||
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
|
||||
PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM
|
||||
IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF
|
||||
ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||
|
||||
16. Limitation of Liability.
|
||||
|
||||
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING
|
||||
WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS
|
||||
THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY
|
||||
GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE
|
||||
USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF
|
||||
DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD
|
||||
PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS),
|
||||
EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
|
||||
SUCH DAMAGES.
|
||||
|
||||
17. Interpretation of Sections 15 and 16.
|
||||
|
||||
If the disclaimer of warranty and limitation of liability provided
|
||||
above cannot be given local legal effect according to their terms,
|
||||
reviewing courts shall apply local law that most closely approximates
|
||||
an absolute waiver of all civil liability in connection with the
|
||||
Program, unless a warranty or assumption of liability accompanies a
|
||||
copy of the Program in return for a fee.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
How to Apply These Terms to Your New Programs
|
||||
|
||||
If you develop a new program, and you want it to be of the greatest
|
||||
possible use to the public, the best way to achieve this is to make it
|
||||
free software which everyone can redistribute and change under these terms.
|
||||
|
||||
To do so, attach the following notices to the program. It is safest
|
||||
to attach them to the start of each source file to most effectively
|
||||
state the exclusion of warranty; and each file should have at least
|
||||
the "copyright" line and a pointer to where the full notice is found.
|
||||
|
||||
{one line to give the program's name and a brief idea of what it does.}
|
||||
Copyright (C) {year} {name of author}
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
You should have received a copy of the GNU General Public License
|
||||
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||
|
||||
Also add information on how to contact you by electronic and paper mail.
|
||||
|
||||
If the program does terminal interaction, make it output a short
|
||||
notice like this when it starts in an interactive mode:
|
||||
|
||||
{project} Copyright (C) {year} {fullname}
|
||||
This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'.
|
||||
This is free software, and you are welcome to redistribute it
|
||||
under certain conditions; type `show c' for details.
|
||||
|
||||
The hypothetical commands `show w' and `show c' should show the appropriate
|
||||
parts of the General Public License. Of course, your program's commands
|
||||
might be different; for a GUI interface, you would use an "about box".
|
||||
|
||||
You should also get your employer (if you work as a programmer) or school,
|
||||
if any, to sign a "copyright disclaimer" for the program, if necessary.
|
||||
For more information on this, and how to apply and follow the GNU GPL, see
|
||||
<http://www.gnu.org/licenses/>.
|
||||
|
||||
The GNU General Public License does not permit incorporating your program
|
||||
into proprietary programs. If your program is a subroutine library, you
|
||||
may consider it more useful to permit linking proprietary applications with
|
||||
the library. If this is what you want to do, use the GNU Lesser General
|
||||
Public License instead of this License. But first, please read
|
||||
<http://www.gnu.org/philosophy/why-not-lgpl.html>.
|
|
@ -0,0 +1,64 @@
|
|||
# Globalist
|
||||
Globalist provides distributed sharing of repositories without the need of central instances (like GitHub).
|
||||
|
||||
This is an attempt to ease the distribution of git repos, to overcome the risk of a central points of failure.
|
||||
|
||||
Globalist stands for "Global List" and aims at replacing any EtherPads of more than transient value.
|
||||
|
||||
It is also meant to evolve into an experimental distributed asynchronous wiki facility.
|
||||
|
||||
Nodes can come and go, and network topology only depends on the peers entries in the nodes' config files. Changes that are merged by one's peers propagate by diffusion.
|
||||
|
||||
The official repository can be found at https://codeberg.org/crimeflare/cloudflare-tor
|
||||
|
||||
## Usage
|
||||
|
||||
To use Globalist.py python3 is needed. Either run it from globalist directory with `python3 Globalist.py` or or install it as described below.
|
||||
|
||||
Per default an open tor ControlPort at 9151 without authentication is expected. You can choose another port with `-C`.
|
||||
For a list of option see `--help`.
|
||||
|
||||
### Create repository
|
||||
|
||||
Make a new directory and put this in the file ./repo.cfg (when creating a new repository instead of cloning from a peer, the list or indeed the repo.cfg file can remain empty)
|
||||
|
||||
```
|
||||
[network]
|
||||
peers = <comma-separated list of onion domain names, with or without the suffix .onion>
|
||||
```
|
||||
|
||||
For a public repository, no authentication is needed (option -X). In case authentication is used, prepend the secret as follows: somebody:secret@peeroniondomainname.onion
|
||||
|
||||
For each shared repo, Globalist will create one .onion service. Note that it is possible to use either bare repos or not-bare repos.
|
||||
|
||||
### Clone a repository
|
||||
|
||||
To clone a bare repo:
|
||||
|
||||
```
|
||||
Globalist.py -bc ...
|
||||
```
|
||||
|
||||
To pull once from a bare repo:
|
||||
|
||||
```
|
||||
Globalist.py -bp
|
||||
```
|
||||
|
||||
## To install locally
|
||||
|
||||
```
|
||||
./setup.py install --user
|
||||
```
|
||||
|
||||
or
|
||||
|
||||
```
|
||||
torsocks pip3 install -v -e .
|
||||
```
|
||||
|
||||
## To do
|
||||
|
||||
set default commit messages
|
||||
support signed commits
|
||||
push?
|
|
@ -0,0 +1,478 @@
|
|||
#!/usr/bin/env python3
|
||||
# -*- coding: utf-8 -*-
|
||||
|
||||
__version__ = "0.0.6.2"
|
||||
|
||||
try:
|
||||
import ConfigParser as cp
|
||||
except:
|
||||
import configparser as cp # python3
|
||||
import optparse as op
|
||||
import re
|
||||
import os
|
||||
import sys
|
||||
import json
|
||||
import subprocess
|
||||
|
||||
import stem
|
||||
from stem.control import Controller
|
||||
|
||||
# Usage:
|
||||
#
|
||||
# Make a directory.
|
||||
#
|
||||
# Put a configuration file repo.cfg listing some peers. Done.
|
||||
#
|
||||
# Initialize:
|
||||
# Either a) (git init repo/) ->
|
||||
# $ python Globalist.py -i
|
||||
# or b) (torsocks git clone git://example7abcdefgh.onion) ->
|
||||
# $ python Globalist.py -c
|
||||
#
|
||||
# Have fun:
|
||||
# Run server
|
||||
# $ python Globalist.py
|
||||
# Pull from peers once
|
||||
# $ python Globalist.py -p
|
||||
# Periodically pull, don't serve
|
||||
# $ python Globalist.py -pP 1800
|
||||
# Periodically pull and also serve
|
||||
# $ python Globalist.py -P 1800
|
||||
#
|
||||
# That's it.
|
||||
|
||||
# One can simply check in a list of onions for open peering
|
||||
# as PEERS.txt ...
|
||||
|
||||
# A word of CAUTION: anyone can commit anything
|
||||
# and there's no mechanism for permanently blacklisting
|
||||
# malicious peers (although one can simply remove them
|
||||
# as they crop up and roll back their changes).
|
||||
#
|
||||
# A future version of Globalist.py should introduce
|
||||
# signed commits + reputation system, when the need arises.
|
||||
|
||||
# [network]
|
||||
# peers = example7abcdefgh.onion, example8abcdefgh.onion
|
||||
# (possibly prefixed with somebody:authkey@ ...)
|
||||
|
||||
# when using -b (bare), merge remote changes locally after
|
||||
# git pull origin remote/origin/master.
|
||||
|
||||
DEFAULT_CONTROLPORT = 9151
|
||||
|
||||
STATUS = {'peers': None, 'socksport': None}
|
||||
|
||||
OPTIONS = None
|
||||
|
||||
def git(command):
|
||||
# print (command)
|
||||
p = subprocess.Popen(["git"] + command)
|
||||
return p
|
||||
|
||||
def make_exportable(path):
|
||||
subprocess.Popen(["touch", os.path.abspath(os.path.join(path, "git-daemon-export-ok")) ]).wait()
|
||||
|
||||
def run_server(config, localport = 9418):
|
||||
print ("Running git server on %s.onion" % config.get('onion', 'hostname'))
|
||||
try:
|
||||
authkey = config.get('onion', 'clientauth')
|
||||
if authkey:
|
||||
print ("Client auth is %s" % authkey)
|
||||
except (KeyError, cp.NoOptionError) as e:
|
||||
print ("No client auth")
|
||||
print ("Git server local port is %d" % localport)
|
||||
print ("You can now hand out this onion to prospective peers.")
|
||||
print ("It will be re-used anytime Globalist starts in this directory.")
|
||||
|
||||
what = "repo"
|
||||
|
||||
if OPTIONS.o_bare:
|
||||
make_exportable("repo.git")
|
||||
what += ".git"
|
||||
else:
|
||||
make_exportable(os.path.join("repo",".git"))
|
||||
|
||||
gitdaemon = git(["daemon", "--base-path=%s" % os.path.abspath("."),
|
||||
"--reuseaddr", "--verbose",
|
||||
# there could be a global setting enabling write access??
|
||||
"--disable=receive-pack",
|
||||
"--listen=127.0.0.1", "--port=%d" % localport,
|
||||
os.path.abspath(what)])
|
||||
output = gitdaemon.communicate()[0]
|
||||
print (output)
|
||||
# then background this process
|
||||
|
||||
def makeonion(controller, config, options):
|
||||
# stem docs say: provide the password here if you set one:
|
||||
controller.authenticate()
|
||||
# todo catch UnreadableCookieFile(
|
||||
|
||||
onion = None
|
||||
|
||||
extra_kwargs = {}
|
||||
|
||||
if config.has_section('onion'):
|
||||
print ("Attempting to use saved onion identity")
|
||||
(keytype,key) = config.get('onion', 'key').split(':',1)
|
||||
|
||||
if options.o_auth:
|
||||
try:
|
||||
print ("Attempting to use saved clientauth")
|
||||
extra_kwargs['basic_auth'] =\
|
||||
dict([config.get('onion', 'clientauth').split(':',1)])
|
||||
except (KeyError, cp.NoOptionError) as e:
|
||||
print ("No client auth present, generating one")
|
||||
extra_kwargs['basic_auth'] = {'somebody': None}
|
||||
else:
|
||||
print ("Not using clientauth.")
|
||||
|
||||
onion = controller.create_ephemeral_hidden_service(**extra_kwargs, ports={9418: options.a_localport}, discard_key=True, await_publication=options.o_ap, key_type=keytype, key_content=key)
|
||||
|
||||
else:
|
||||
print ("I'm afraid we don't have an identity yet, creating one")
|
||||
|
||||
if options.o_auth:
|
||||
extra_kwargs['basic_auth'] = {'somebody': None}
|
||||
|
||||
onion = controller.create_ephemeral_hidden_service(**extra_kwargs, ports={9418: options.a_localport}, discard_key=False, await_publication=options.o_ap)
|
||||
|
||||
# print (onion)
|
||||
|
||||
print ("Tor controller says Onion OK")
|
||||
|
||||
if not onion.is_ok():
|
||||
raise Exception('Failed to publish onion.')
|
||||
else:
|
||||
# perhaps avoid overwriting when already present?
|
||||
for line in onion:
|
||||
if line != "OK":
|
||||
k, v = line.split('=', 1)
|
||||
# we only request the key if the service is new
|
||||
if k == "PrivateKey":
|
||||
try:
|
||||
config.add_section('onion')
|
||||
except cp.DuplicateSectionError as e:
|
||||
pass
|
||||
config.set('onion', 'key', v)
|
||||
if k == "ServiceID":
|
||||
try:
|
||||
config.add_section('onion')
|
||||
except cp.DuplicateSectionError as e:
|
||||
pass
|
||||
config.set('onion', 'hostname', v)
|
||||
if k == "ClientAuth":
|
||||
try:
|
||||
config.add_section('onion')
|
||||
except cp.DuplicateSectionError as e:
|
||||
pass
|
||||
config.set('onion', 'clientauth', v)
|
||||
config.write(open('repo.cfg', 'w'))
|
||||
|
||||
|
||||
def set_client_authentications(ls):
|
||||
global OPTIONS
|
||||
options = OPTIONS
|
||||
|
||||
controller = Controller.from_port(port = options.a_controlport)
|
||||
controller.authenticate()
|
||||
# is there no sane way to _append_ a multi-config option in Tor????
|
||||
# control protocol badly misdesigned, nobody thought of concurrent access???!?
|
||||
controller.set_caching(False)
|
||||
|
||||
# except it doesn't work, the 650 message never arrives. why?
|
||||
# controller.add_event_listener(my_confchanged_listener, EventType.CONF_CHANGED)
|
||||
# SETEVENTS conf_changed
|
||||
|
||||
hsa = controller.get_conf_map('hidservauth')
|
||||
|
||||
for authpair in ls:
|
||||
if authpair['auth'] and len(authpair['auth']):
|
||||
hsa['hidservauth'].append('%s.onion %s' % (authpair['onion'], authpair['auth']))
|
||||
|
||||
hsa['hidservauth'] = list(set(hsa['hidservauth']))
|
||||
|
||||
controller.set_conf('hidservauth', hsa['hidservauth'])
|
||||
controller.close()
|
||||
|
||||
|
||||
def getpeers(config):
|
||||
if STATUS['peers']:
|
||||
return STATUS['peers']
|
||||
|
||||
if config.has_section('network'):
|
||||
peerslist = config.get('network', 'peers').split(',')
|
||||
peers = []
|
||||
authpairs = []
|
||||
|
||||
for peerentry in peerslist:
|
||||
|
||||
# extract what looks like an onion identifier
|
||||
try:
|
||||
authpair = re.findall('(?:(somebody:[A-Za-z0-9+/]{22})@)?([a-z2-8]{16})', peerentry)[0]
|
||||
|
||||
userpass = authpair[0].split(":",1)
|
||||
if not userpass or not len(userpass)==2:
|
||||
userpass = (None, None)
|
||||
|
||||
authpairs += [{'auth':userpass[1],
|
||||
'user':userpass[0], # somebody
|
||||
'onion':authpair[1]}]
|
||||
peers += [authpair[1]]
|
||||
|
||||
except Exception as e:
|
||||
print (e)
|
||||
|
||||
set_client_authentications(authpairs)
|
||||
|
||||
STATUS['peers'] = peers
|
||||
|
||||
return peers
|
||||
|
||||
else:
|
||||
STATUS['peers'] = []
|
||||
|
||||
return []
|
||||
|
||||
def clone(config):
|
||||
peers = getpeers(config)
|
||||
|
||||
# FIXME: when the first fails, we should move on to the next..
|
||||
|
||||
what = "git://%s.onion/repo" % peers[0]
|
||||
where = "repo"
|
||||
how = []
|
||||
|
||||
if OPTIONS.o_bare:
|
||||
what += ".git"
|
||||
where += ".git"
|
||||
how = ["--bare", "--mirror"]
|
||||
|
||||
cloneproc = subprocess.Popen(["torsocks", "-P", str(STATUS['socksport']), "git", "clone"] + how + [what, where])
|
||||
if cloneproc.wait() != 0:
|
||||
print ("Error cloning, exiting.")
|
||||
return -1
|
||||
else:
|
||||
make_exportable(where)
|
||||
|
||||
# Make a local editable repo
|
||||
try:
|
||||
git(["clone", "repo", "repo.git"]).wait()
|
||||
except:
|
||||
print ("Failed to export repository, try to remove 'repo.git'.")
|
||||
|
||||
processes = []
|
||||
for peer in peers[1:]:
|
||||
processes.append([peer, subprocess.Popen(["torsocks", "-P", STATUS['socksport'], "git", "-C", os.path.abspath("repo"), "pull", "git://%s.onion/repo" % peer])])
|
||||
for (peer,proc) in processes:
|
||||
if proc.wait() != 0:
|
||||
print ("Error with %s" % peer)
|
||||
|
||||
def pull(config):
|
||||
peers = getpeers(config)
|
||||
|
||||
print ("Pulling from %s" % peers)
|
||||
|
||||
processes = []
|
||||
for peer in peers:
|
||||
processes.append([peer, subprocess.Popen(["torsocks", "-P", STATUS['socksport'], "git", "-C", os.path.abspath("repo"), "pull", "git://%s.onion/repo" % peer])])
|
||||
for (peer,proc) in processes:
|
||||
if proc.wait() != 0:
|
||||
print ("Error with %s" % peer)
|
||||
|
||||
def fetch(config):
|
||||
peers = getpeers(config)
|
||||
print ("Fetching from %s" % peers)
|
||||
processes = []
|
||||
for peer in peers:
|
||||
processes.append([peer, subprocess.Popen(["torsocks", "-P", STATUS['socksport'], "git", "-C", os.path.abspath("repo.git"), "fetch", "git://%s.onion/repo.git" % peer, '+refs/heads/*:refs/remotes/origin/*'])])
|
||||
|
||||
for (peer,proc) in processes:
|
||||
if proc.wait() != 0:
|
||||
print ("Error with %s" % peer)
|
||||
|
||||
def init(config):
|
||||
global OPTIONS # not needed for read access btw
|
||||
options = OPTIONS
|
||||
|
||||
print ("Initializing ...")
|
||||
|
||||
if options.o_bare:
|
||||
git(["init", "repo.git", "--bare"]).wait()
|
||||
# Make a local editable repo
|
||||
git(["clone", "repo.git", "repo"]).wait()
|
||||
|
||||
else:
|
||||
git(["init", "repo"]).wait()
|
||||
|
||||
print ("Initialized")
|
||||
|
||||
def main(args=[]):
|
||||
# OptionParser is capable of printing a helpscreen
|
||||
opt = op.OptionParser()
|
||||
|
||||
opt.add_option("-V", "--version", dest="o_version", action="store_true",
|
||||
default=False, help="print version number")
|
||||
|
||||
opt.add_option("-i", "--init", dest="o_init", action="store_true",
|
||||
default=False, help="make new empty repo")
|
||||
|
||||
opt.add_option("-b", "--bare", dest="o_bare", action="store_true",
|
||||
default=False, help="use bare repos and fetch, not pull")
|
||||
|
||||
opt.add_option("-c", "--clone", dest="o_clone", action="store_true",
|
||||
default=False, help="clone repo from 1st peer")
|
||||
|
||||
opt.add_option("-p", "--pull", dest="o_pull", action="store_true",
|
||||
default=False, help="pull / fetch from peers and don't serve")
|
||||
|
||||
opt.add_option("-P", "--periodically-pull", dest="a_pull", action="store",
|
||||
type="int", default=None, metavar="PERIOD",
|
||||
help="pull / fetch from peers every n seconds")
|
||||
|
||||
opt.add_option("-L", "--local", dest="a_localport", action="store", type="int",
|
||||
default=9418, metavar="PORT", help="local port for git daemon")
|
||||
|
||||
opt.add_option("-C", "--control-port", dest="a_controlport", action="store", type="int",
|
||||
default=9151, metavar="PORT", help="Tor controlport")
|
||||
|
||||
# opt.add_option("-CP", "--control-password", dest="a_controlpassword", action="store", type="int",
|
||||
# default="", help="Tor Control Password")
|
||||
|
||||
# opt.add_option("-CC", "--control-cookie", dest="a_controlcookie", action="store", type="int",
|
||||
# default="", help="Tor Control Cookie")
|
||||
|
||||
opt.add_option("-a", "--await", dest="o_ap", action="store_true",
|
||||
default=False, help="await publication of .onion in DHT before proceeding")
|
||||
|
||||
opt.add_option("-x", "--auth", action="store_true", default=True,
|
||||
dest="o_auth", help="enable authentication (private)")
|
||||
|
||||
opt.add_option("-X", "--no-auth", action="store_false", default=True,
|
||||
dest="o_auth", help="disable authentication (not private)")
|
||||
|
||||
(options, args) = opt.parse_args(args)
|
||||
|
||||
global OPTIONS
|
||||
OPTIONS = options
|
||||
|
||||
if options.o_version:
|
||||
print (__version__)
|
||||
return 0
|
||||
|
||||
if options.o_auth and stem.__version__ < '1.5.0':
|
||||
sys.stderr.write ("stem version >=1.5.0 required for auth\n")
|
||||
return 1
|
||||
|
||||
if not options.a_controlport:
|
||||
options.a_controlport = DEFAULT_CONTROLPORT
|
||||
|
||||
# Extract socksport via c.get_conf and use this (-P in torsocks)
|
||||
# TODO implement authentication token / cookie
|
||||
controller = Controller.from_port(port = options.a_controlport)
|
||||
controller.authenticate()
|
||||
if controller.get_conf('SocksPort'):
|
||||
STATUS['socksport'] = controller.get_conf('SocksPort').split(" ",1)[0]
|
||||
else:
|
||||
STATUS['socksport'] = 9050
|
||||
controller.close()
|
||||
|
||||
config = cp.ConfigParser()
|
||||
cfgfile = None
|
||||
try:
|
||||
cfgfile = open('repo.cfg')
|
||||
except FileNotFoundError as e:
|
||||
print("Trying to make file repo.cfg")
|
||||
try:
|
||||
os.mknod("repo.cfg")
|
||||
os.chmod("repo.cfg", 0o600)
|
||||
cfgfile = open('repo.cfg')
|
||||
except Exception as e:
|
||||
print (e)
|
||||
return 1
|
||||
|
||||
config.readfp(cfgfile)
|
||||
|
||||
try:
|
||||
os.stat("repo.git")
|
||||
if not options.o_bare:
|
||||
print ("repo.git exists, setting -b implicitly")
|
||||
# TODO -B to override
|
||||
options.o_bare = True
|
||||
|
||||
except FileNotFoundError as e:
|
||||
if not options.o_init and not options.o_clone and options.o_bare:
|
||||
print ("./repo.git/ does not exist, try -ib or -cb")
|
||||
return 1
|
||||
|
||||
try:
|
||||
os.stat("repo")
|
||||
except FileNotFoundError as e:
|
||||
if not options.o_init and not options.o_clone and not options.o_bare:
|
||||
print("./repo/ does not exist, try -i or -c")
|
||||
return 1
|
||||
|
||||
except Exception as e:
|
||||
print (e)
|
||||
return 1
|
||||
|
||||
if options.o_init:
|
||||
init(config)
|
||||
|
||||
peers = getpeers(config)
|
||||
|
||||
if options.o_clone:
|
||||
if not len(peers):
|
||||
print ("No peers, can't clone. Please enter a peer in repo.cfg")
|
||||
clone(config)
|
||||
return 1
|
||||
|
||||
threads = []
|
||||
|
||||
if options.a_pull:
|
||||
if not len(peers):
|
||||
print ("No peers, not starting pulling task.")
|
||||
|
||||
else:
|
||||
import threading
|
||||
from datetime import timedelta as td
|
||||
from datetime import datetime
|
||||
|
||||
class T:
|
||||
def __init__(self):
|
||||
self.last = datetime.now()
|
||||
|
||||
def run(self):
|
||||
if options.o_bare:
|
||||
fetch(config)
|
||||
else:
|
||||
pull(config)
|
||||
threading.Timer(options.a_pull, T.run, args=(self,)).start()
|
||||
|
||||
task = T()
|
||||
|
||||
t = threading.Thread(target=T.run, args=(task,))
|
||||
t . setDaemon(True)
|
||||
threads.append(t)
|
||||
t.start()
|
||||
|
||||
# It's either pull(once) or serve. It's no problem running pull from
|
||||
# another console while the server is up. It's no problem specifying
|
||||
# periodic pull with either.
|
||||
|
||||
if options.o_pull and not options.a_pull:
|
||||
if options.o_bare:
|
||||
fetch(config)
|
||||
else:
|
||||
pull(config)
|
||||
|
||||
elif not options.o_pull:
|
||||
controller = Controller.from_port(port = options.a_controlport)
|
||||
makeonion(controller, config, options)
|
||||
run_server(config, localport = options.a_localport)
|
||||
controller.close()
|
||||
|
||||
for t in threads:
|
||||
t.join()
|
||||
|
||||
# TODO: should only generate a clientauth on a previously unauthenticated repo if requested by command line option
|
|
@ -0,0 +1,17 @@
|
|||
#!/usr/bin/env python3
|
||||
|
||||
from distutils.core import setup
|
||||
|
||||
setup(
|
||||
name='Globalist',
|
||||
version='0.0.6.2',
|
||||
description='Globalist distributed git onions',
|
||||
author='fnordomat',
|
||||
# author_email='',
|
||||
url='https://github.com/fnordomat/Globalist',
|
||||
packages=['globalist'],
|
||||
scripts=['Globalist.py'],
|
||||
install_requires=['stem>=1.5.0'],
|
||||
license='GPLv3'
|
||||
)
|
||||
|
After Width: | Height: | Size: 13 KiB |
After Width: | Height: | Size: 35 KiB |
After Width: | Height: | Size: 33 KiB |
After Width: | Height: | Size: 14 KiB |
After Width: | Height: | Size: 11 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 78 KiB |
After Width: | Height: | Size: 2.8 MiB |
After Width: | Height: | Size: 58 KiB |
After Width: | Height: | Size: 88 KiB |
After Width: | Height: | Size: 51 KiB |
After Width: | Height: | Size: 156 KiB |
After Width: | Height: | Size: 32 KiB |
After Width: | Height: | Size: 123 KiB |
After Width: | Height: | Size: 66 KiB |
After Width: | Height: | Size: 186 KiB |
After Width: | Height: | Size: 121 KiB |
After Width: | Height: | Size: 76 KiB |
After Width: | Height: | Size: 29 KiB |
After Width: | Height: | Size: 21 KiB |
After Width: | Height: | Size: 68 KiB |
After Width: | Height: | Size: 120 KiB |
After Width: | Height: | Size: 164 KiB |
After Width: | Height: | Size: 52 KiB |
After Width: | Height: | Size: 77 KiB |
After Width: | Height: | Size: 80 KiB |
After Width: | Height: | Size: 85 KiB |
After Width: | Height: | Size: 23 KiB |
After Width: | Height: | Size: 30 KiB |
After Width: | Height: | Size: 49 KiB |
After Width: | Height: | Size: 45 KiB |
After Width: | Height: | Size: 107 KiB |
After Width: | Height: | Size: 19 KiB |
After Width: | Height: | Size: 75 KiB |