Help
RSS
API
Feed
Maltego
Contact
Domain > insecure.cl
×
Welcome!
Right click nodes and scroll the mouse to navigate the graph.
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2013-09-23
108.162.198.185
(
ClassC
)
2018-07-04
192.185.13.234
(
ClassC
)
2024-09-10
104.21.60.97
(
ClassC
)
Port 80
HTTP/1.1 301 Moved PermanentlyDate: Tue, 10 Sep 2024 01:04:16 GMTContent-Type: text/htmlContent-Length: 167Connection: keep-aliveCache-Control: max-age3600Expires: Tue, 10 Sep 2024 02:04:16 GMTLocation: https://insecure.cl/Report-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?sLE9PYAaF%2Fb4gtkvq95s6iV17i3hBqYqTUpIDrBqq0Abfaj72LZkiVELET4Ng6BQvlZ6v5UqtjPuylp2TqlIQrnu6FA9PTHIg6fg89CFHb0zB35fg0gUu%2BM%2FwjrbNFw%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8c0b80c4696c284c-SEAalt-svc: h3:443; ma86400 html>head>title>301 Moved Permanently/title>/head>body>center>h1>301 Moved Permanently/h1>/center>hr>center>cloudflare/center>/body>/html>
Port 443
HTTP/1.1 200 OKDate: Tue, 10 Sep 2024 01:04:16 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveVary: Accept-EncodingCF-Cache-Status: DYNAMICReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?swNbM1pPplznj9t94znzU0WYZODQI0L8mY%2FKP4hRFBstM2osn5duA7xzl49xdZbI7kDpT99Af61UhwkjTYsBBqQ0invDtHb2HrgqNTa7QHZqqSUxD2aa4XptlVuntqQ%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Server: cloudflareCF-RAY: 8c0b80c4ed449b5f-SEAalt-svc: h3:443; ma86400 html>head>title>insecure/title>meta charsetutf-8>style>td {font-family:Verdana; font-size:12; text-align:justify; color:555c62}a {font-weight:bold; text-decoration:none; color:7d8994}h2 {color:66809a}h4 {font-size:11; color:223344}pre {color:7d8994; text-align:left;}.l {font-family:Tahoma; font-size:10; color:203040}/style>body bgcolor030303 topmargin0>center>br>table aligncenter bgcolor030303 width615>tr>td bgcolor030303>pre>h1>insecure/h1> __ __________ __| |h2>mullvad proxmox 7.x setup/h2>h4>2024-02-12 14:26:25.402460/h4> In /etc/pve/lxc/{{ VMID }}.conf add: lxc.mount.entry: /dev/net dev/net none bind,createdir lxc.mount.entry: /tmp/net-cls-v1 tmp/net-cls-v1 none bind,createdir HOST: script/root/pepare-mullvad-lxc.sh servicenamepepare-mullvad-lxc cat > $script <<EOF #!/usr/bin/env bash chown 100000:100000 /dev/net/tun mkdir -p /tmp/net-cls-v1 mount -t cgroup -o net_cls none /tmp/net-cls-v1 chown -R 100000:100000 /tmp/net-cls-v1 EOF chmod +x $script cat > /etc/systemd/system/$servicename.service <<EOF Service ExecStart$script Install WantedBydefault.target EOF systemctl enable $servicename systemctl start $servicename CT: iptables -t nat -A POSTROUTING -o wg-mullvad -j MASQUERADE iptables -A FORWARD -m state --state ESTABLISHED,RELATED -j ACCEPT sysctl -w net.ipv4.ip_forward1 echo 1 > /proc/sys/net/ipv4/ip_forward mullvad lan set allow mullvad lockdown-mode set on mullvad relay set tunnel-protocol wireguard mullvad relay set location {{ country }} mullvad connect|__ __________ __|--- .:: eof ::. --- __ __________ __| |h2>angel/h2>h4>2023-10-29 23:35:12.647865/h4> .. . ...........:. :.:..:^ .^.:.......... .7~^~~ .. ..::..::::^^!! .:. .^?Y~~.. .. . ..... ::7~. . ... . ........^.... ...^: ...... ...^: :: ..:~J55PY??:...... . . ....... .:..~~^:.:^^:. ..:^~:. ..... .. .^!~. ^. .^!~: 7^ .~:~. ^Y: !!J 5~ !Y~ :5. : ...^. . . .JY !! .!5 :JY~^^ .. . ::~. YY. J~ ~^?~ :5P7!&BYJ. ::7JYY7 ?! 7. .~ : :#5:Y@5. ... :^^B@G7. 7^. . ... ~. ~.^ .&5~JB~ .. P5G@&! ~~:..5~. ..:.. 7: .BP7 77^. . ~~^YJ?:G^!:.!. . .::.. 7: ^&&#?.!:.^. . .^.Y&G!.. ..:.~. ..... ?: ~#&&&P~~.~::. .. !&@5.:. ..^:. : .:. .!: J&&&#BB&Y.~~. .?B@&#!.:. .^~~^.:. : : ^~. 5&@&&&#@B :PBGJ!^^7YB&@@&&&7.:. .:::^:. ^:^. .. ..: ^#&&@&#&5 .~5&PB&&B&&#&&#@?:.: ..... .!:..^ ^ ...^ ~&&@@@7~. Y?#@@&&B&##B@7. ^ .^ ..:... . :. ^ :^ ^&@&57 .. .~&@5#7?&&&&^. ^ .^ ~~. .~ .. ^: .G?^ .. . .G?!~.&@@G: ! ~ .~:. . . .!^:~.^ . .. ....^^ . .:P&&7 ~!?7 ..:~ . :~^.~: ..7:: . .. .....:. YJ J^ J7: ... .^.~~. .:~^:.^ .?: . .. . :.::^^. ^: .7 :!^~::...... .:~~. ~:.: .:~7~:..: ..:..^...^7.. ^..! :?:^~?: ..:^... ..7!~. ....:. :^.. . . ^. ..:^. ... ~^~ .. . .... : :^... :::^ . .: !.^. .. .: ^ .! . : : ^~. :! . . .^ .. .:. :~ ^ .: . .^ : . : : ::. .. ::.:. :: |__ __________ __|--- .:: eof ::. --- __ __________ __| |h2>route client subnet to other VPN clients (openvpn!)/h2>h4>2023-06-08 04:27:10.307919/h4> Given this scenario: _______ _________ _________ _________ | | | | | | | | | LAN |- - - -| CLIENT1 || VPN SRV || CLIENT2 | |_______| |_________| |_________| |_________| 192.168.1.0/24 192.168.1.100 X.X.X.X 1.3.3.10 | 1.3.3.7 1.3.3.1 _________ _|_ | | |pho| | CLIENT3 | |ne | |_________| |___| 1.3.3.11 192.168.1.110 : VPN traffic - : Client-only LAN Traffic I wanted to route client1 subnet (LAN) to other VPN clients (client2, client3). ...so... 1. Set client config dir on VPN server /etc/openvpn/server.conf > ... > client-config-dir /etc/openvpn/client > ... 2. Set static IP and OVPN internal route for that specific peer. /etc/openvpn/client1 > ifconfig-push 1.3.3.7 255.255.255.0 ## VPN Static IP > iroute 192.168.1.0 255.255.255.0 ## OpenVPN internal route via client 3. Set server route, allow traffic between clients and push route to clients /etc/openvpn/server.conf > ... > route 192.168.1.0 255.255.255.0 > client-to-client > push "route 192.168.1.0 255.255.255.0" > ... 4. Enable ip forwarding on VPN *client* box Linux: $ sysctl -w net.ipv4.ip_forward1 or $ echo 1 > /proc/sys/net/ipv4/ip_forward Windows: "Try to go to the registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters. If not already there, create a new REG_DWORD value named IPEnableRouter. Set IPEnableRouter to 1 and reboot. Packet forward should now be enabled. To add static routes use the route command." - https://serverfault.com/a/929086 5. Route client's subnet devices through VPN client box, pick one (or more): - pfsense - openWRT - set VPN client box as gateway (manual or DHCP server) - add custom routes on subnet devices: C:\Users\egoist> route ADD 1.3.3.0 mask 255.255.255.0 192.168.1.100 or yuki@nostalgia:~# ip route add 1.3.3.0/24 via 192.168.1.100 dev eth0 (you know, so packets get back to the vpn client and phone can see vpn stuff) My friend (client2) was able to ping my iPhone (client1's LAN), which was using my computer (client1) as gateway. |__ __________ __|--- .:: eof ::. ---end. a href/cdn-cgi/l/email-protection class__cf_email__ data-cfemailb2d1d7d4d1f2c0dbc1d7c7c29cdcd7c6>email protected/a>/pre>/table>script data-cfasyncfalse src/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js>/script>/body>/html>
Subdomains
Date
Domain
IP
www.insecure.cl
2013-09-24
108.162.198.185
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]