
Research
/Security News
60 Malicious Ruby Gems Used in Targeted Credential Theft Campaign
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Get ip info & manage the hosts files.
$ npm i -g ip2
# or
$ sudo npm i -g ip2
$ ip2 -h # print help
$ ip2 -lis # ip & system info
$ ip2 qq.com # get dns information
$ ip2 8.8.8.8 # get ip geo location
$ ip2 ls # list hosts
$ ip2 cat # print hosts content
$ sudo ip2 add google.txt # add hosts file to system
$ sudo ip2 use google # use the hosts file
$ ip2 24 # 255.255.255.0
$ ip2 127.0.0.1 # ipv4 to long
$ ip2 2130706433 # long to ipv4
$ ip2 '! 255.255.255.0' # 0.0.0.255
$ ip2 '192.168.1.134 or 0.0.0.255' # 192.168.1.255
$ ip2 '192.168.1.134 mask 255.255.255.0' # 192.168.1.0
$ ip2 '192.168.1.134 subnet 255.255.255.192' # subnet information
$ ip2 192.168.1.134/26 # CIDR subnet, same as previous
NOTICE: The sudo is must be used when you operating the hosts file.
Usage: ip2 [options] [command]
Commands:
ls [dir] list hosts
cat [hosts] print hosts contents
add <file> add custom hosts to system
use <hosts> change system hosts to custom hosts
rm <hosts> delete one custom hosts file
reload reload used hosts
reset reset hosts
init init hosts
* ip utilities
help help & example
Options:
-h, --help output usage information
-V, --version output the version number
-v, --version get version number
-f, --force overwrite file
-l, --local get local ip
-s, --system get system info
-i, --internet get internet ip info
-c, --chinese output geo ip in chinese
See MANUAL for details.
See the CHANGELOG.
Copyright (c) 2015 Mark Zhan.
This project is available under the MIT license. See LICENSE for details.
FAQs
Get ip info & manage the hosts files
We found that ip2 demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
/Security News
A RubyGems malware campaign used 60 malicious packages posing as automation tools to steal credentials from social media and marketing tool users.
Security News
The CNA Scorecard ranks CVE issuers by data completeness, revealing major gaps in patch info and software identifiers across thousands of vulnerabilities.
Research
/Security News
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn’t whitelisted.