TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

IPv4 Turf War

147 pointsby mogeryover 2 years ago

18 comments

clayloamover 2 years ago
Hey I made this!! Happy to see it getting attention. Feel free to ask me anything!
评论 #32794672 未加载
评论 #32795428 未加载
hackmiesterover 2 years ago
I have been wasting so much time claiming up to 11 networks over the past week. All for you lot to steal all but 2 of them from me in as many hours. Give me a break. :)
评论 #32799907 未加载
Rasboraover 2 years ago
I had an almost identical idea to this website a while ago but never acted on it, props to the dev.<p>Here is how you win the IPv4 games, in order of most to least effective:<p>1) Have a large online following that is willing to visit your claim link or a page where you can embed an iframe &#x2F; img &#x2F; etc that points to your claim link.<p>2) Pay to use someone else&#x27;s (consensual) botnet by paying a residential proxy service, this is the approach I just used and it cost me a few dollars for access to a massive amount of distributed IPv4 space.<p>3) Abuse cloud &#x2F; serverless offerings as far as they will go, unlikely to win more than a few blocks this way.<p>4) Own IPv4 space.<p>Other less ethical approaches: possibly exploit the system by sending a XFF header the developer forgot to block (probably just checking socket address so unlikely to work here), spin up a Vultr VPS in the same DC and probe for a way to connect with a local address, hijack BGP space, run your own botnet, I&#x27;m reminded of an old exploit in WordPress XMLRPC...<p>From what I can see the current rankings are just me and mike fighting for the same proxy space (the vote goes to the most recent visit per IP), and everyone else falls into buckets 3 &amp; 4.
评论 #32796167 未加载
评论 #32798860 未加载
评论 #32797000 未加载
评论 #32796949 未加载
thunderbongover 2 years ago
And it&#x27;s running on a redbean [0] server!<p>[0]: <a href="https:&#x2F;&#x2F;redbean.dev" rel="nofollow">https:&#x2F;&#x2F;redbean.dev</a>
cmeacham98over 2 years ago
Cool idea, but please get an HTTPS cert - they&#x27;re free!
评论 #32794664 未加载
评论 #32797188 未加载
rowinover 2 years ago
I managed to claim 64 out of 256 blocks using proxies from Bright Data[0] and PacketStream[1]. I claimed 49616 IP addresses within those 64 blocks. Unfortunately, the website doesn&#x27;t tell you how many IP addresses someone claimed in total. Cool project!<p>[0] <a href="https:&#x2F;&#x2F;brightdata.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;brightdata.com&#x2F;</a> [1] <a href="https:&#x2F;&#x2F;packetstream.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;packetstream.io&#x2F;</a>
评论 #32801574 未加载
iancarrollover 2 years ago
Had some fun with this. I used fireprox[0] to grab a ton of AWS IPs, and some proxy vendors for some other random ranges. Sadly my ASN has only &#x2F;24s in disparate ranges so it wouldn’t make a dent for most of them.<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;ustayready&#x2F;fireprox" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;ustayready&#x2F;fireprox</a>
r3trohack3rover 2 years ago
I feel like this is a good time to plug Bot Net as a Service vendors like <a href="https:&#x2F;&#x2F;brightdata.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;brightdata.com&#x2F;</a>
评论 #32796331 未加载
tranxenover 2 years ago
I have hard time understanding how mikedamm@twitter claimed so many &#x2F;8.
评论 #32796394 未加载
BonoboIOover 2 years ago
This is really funny idea.<p>In this thread there is a comment wich talks about using AWS API Gateways for scraping. What are other great ways to get many different ips for scraping? Beside residential proxies.
bhaneyover 2 years ago
I would love to see what kind of mess this turns into when applied to IPv6
playingalongover 2 years ago
So some of them are public cloud, e.g. 3&#x2F;8. And you can ran serverless there. Other option is to use some open proxy servers.<p>What other options do people have?
评论 #32795200 未加载
评论 #32795934 未加载
评论 #32794822 未加载
zamadatixover 2 years ago
<a href="https:&#x2F;&#x2F;youtu.be&#x2F;bT8CRi9k4bo" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;bT8CRi9k4bo</a><p>I like the test claim from localhost :).
评论 #32796136 未加载
PaoloBarboliniover 2 years ago
This is harder than i thought
bigcheesegsover 2 years ago
Very surprised 17net only has 1.
评论 #32803822 未加载
raggiover 2 years ago
I considered testing out whether spoofing was blocked on Vultrs network, but too lazy.
评论 #32795886 未加载
PaoloBarboliniover 2 years ago
Tonight I discovered I could create 128 m2.micros from my AWS account no questions asked. Very very worrying. Much happier with Hetzner with an initial limit of 25.
评论 #32796091 未加载
blahgeekover 2 years ago
This got me wondering that, in practice, how hard would it be to spoof source IP in the internet? I assume it requires some controls on an Tier-1 ISP network (so that the the spoofed package would not be filtered by upstream)?<p>Though apparently it doesn’t help in this case because it’s HTTP&#x2F;TCP which requires a handshake
评论 #32796247 未加载