Importing IP2Proxy data into CouchDB and querying with PHP

The aim of this guide is to demonstrate how to import IP2Proxy data (PX11) in CSV form into CouchDB and then query the data in a PHP web page. First of all, you will need to download the IP2Proxy PX11 CSV file.Download commercial version at https://ip2location.com/download?code=PX11 Extract out the IP2PROXY-IP-PROXYTYPE-COUNTRY-REGION-CITY-ISP-DOMAIN-USAGETYPE-ASN-LASTSEEN-THREAT-RESIDENTIAL-PROVIDER.CSV […]

Importing IP2Proxy data into DynamoDB and querying with PHP

The aim of this guide is to demonstrate how to import IP2Proxy data (PX11) in CSV form into DynamoDB and then query the data in a PHP web page. First of all, you will need to download the IP2Proxy PX11 CSV file.Download commercial version at https://ip2location.com/download?code=PX11 Extract out the IP2PROXY-IP-PROXYTYPE-COUNTRY-REGION-CITY-ISP-DOMAIN-USAGETYPE-ASN-LASTSEEN-THREAT-RESIDENTIAL-PROVIDER.CSV […]

Using IP2Location Library in Drupal

This tutorial shows you about how to deploy IP2Location Library into Drupal 8 or 9, and use it with the IP2Location BIN database. Step1: Navigate to the root folder of your existing Drupal project. Step 2: Install IP2Location library using Composer.composer require ip2location/ip2location-php Step 3: Download the free IP2Location LITE […]

Using IP2Proxy Library in Drupal

This tutorial shows you about how to deploy IP2Proxy Library into Drupal 8 and 9, and use it with the IP2Proxy BIN database. Step 1: Navigate to the root folder of your existing Drupal project. Step 2: Install IP2Proxy library using Composer.composer require ip2location/ip2proxy-php Step 3: Download the free IP2Proxy […]

IP blocking: Quick guide to protect your network or website

Networks or websites have to deal with spikes in traffic on occasion. Sometimes, it means you’ve got a boom in your website visitors. That’s great for your revenue. Having said that, network or server admins have to be alert for malicious traffic from hackers or bots. By utilizing IP blocking […]

Setup SSH login notification with IP geolocation

Server admins commonly use SSH to login to Linux servers. They will disable login via password due to the ease of brute force attacks these days. The recommended practice is to only allow login to the servers using private/public keys. It is also good to setup SSH notification with IP […]

IPv4 Address 2022 Infographics

Introduction An IP address is an unique address associated with a specific computer or network host. IP addresses are managed by the Internet Assigned Numbers Authority (IANA) and its regional registries to various organizations worldwide. IPv4 address uses a 32-bit address scheme. It serves as location addressing, network interface identification […]

Traceroute command and how to read a traceroute

On operating systems like Windows or Linux, there is an invaluable tool called the traceroute command (on Windows, the equivalent command is called tracert). This command-line tool enables system administrators or network engineers to troubleshoot common networking issues. Administrators use traceroute to probe for bottlenecks whenever a user complains that […]