"Measured" the feasibility of obtaining a real IP from a visitor via stun Bypass proxy

Source: Internet
Author: User

Foreword: Recently the specialized course has the work, has chosen the IP tracking and the anti-tracking this question, thus, has this article.

First, look at the concept of STUN . STUN (simple traversal of the UDP over Nats,nat) is a network protocol that allows clients located on a NAT (or multiple NAT) to find their own public address, find out what type of NAT they are in and NAT Internet-side port that is bound to a local port. This information is used to establish UDP traffic between two hosts that are at the same time behind the NAT router. The protocol is defined by RFC 3489.

Firefox and Chrome support WEBRTC can request to the stun server, return to the internal and external network IP, different from XMLHttpRequest request, stun request developer tools in the Web request to see the Firefox and Chrome support WEBRTC can request to stun server, return internal and external network IP, different from XMLHttpRequest request,Stun Request developer Tool not to see the network request!

Often play the black small partner, thought hangs the VPN or the agent is safe? Be careful to check the water meter, haha. Let me do the actual test of the above two separately.

GitHub link to test code: Https://github.com/diafygi/webrtc-ips

Test URL: http://p2j.cn/tools/ip.html (it is recommended not to use IE test, of course, can also be tested in the console)

First look at Google's goagent agent open test results ... OK, the local and external network IP is acquired

650) this.width=650; "title=" realip.jpg "style=" Float:none "src=" http://s3.51cto.com/wyfs02/M00/5B/95/ Wkiom1umjeetkt-raaufnqf9--m563.jpg "alt=" Wkiom1umjeetkt-raaufnqf9--m563.jpg "/>

# #本文出自: http://zerosecurity.blog.51cto.com##

Then look at the effect of using the VPN, the internal and external network IP and VPN IP are all obtained ...

650) this.width=650; "title=" realip2.jpg "style=" Float:none "src=" http://s3.51cto.com/wyfs02/M02/5B/8F/ Wkiol1umjxtrfxdlaarrn_z8tj4549.jpg "alt=" Wkiol1umjxtrfxdlaarrn_z8tj4549.jpg "/>

So ... You know 650) this.width=650; "src=" Http://img.baidu.com/hi/jx2/j_0042.gif "alt=" J_0042.gif "/>

and send another GitHub. Related code: https://github.com/natevw/ipcalf/

This article is from the "Nocturnal Person" blog, so be sure to keep this source http://zerosecurity.blog.51cto.com/9913090/1622674

"Measured" the feasibility of obtaining a real IP from a visitor via stun Bypass proxy

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.