Camimi Morales

Camimi Morales


What is scanner IP address?

What is scanner IP addressStarting with the launch of the IP2Proxy Proxy Detection PX9 database, the threat field data was added. This threat field contains the type of threat posed by the IP address. One of the possible threat classifications is the SCANNER threat type.

What is the SCANNER threat type?

As the word suggests, the threat posed by that IP address (a.k.a. scanner IP address) stems from the network or server scanning activity originating from that IP. Security scanning or network scanning is a form of penetration testing done by security researchers or hackers using a tool such as Nmap.

The goal of such testing is to determine if there is any unsecured network port which could be compromised in a hacking attack. It can also be used to determine if an outdated program is running on that server. For example, an outdated version of the Apache web server will contain unpatched bugs or vulnerabilities which can manipulated to steal data or infect the system with malware.

How to mitigate scanning threats?

Usually, the person or organization doing the scanning will attempt to determine which network ports are open to the public. They will attempt to connect to a range of ports and see if they get any response when they transmit some data to the targeted ports. If there is any form of response, they’ll know there is a program or service listening in on that port.

When the port is one that is commonly associated with a particular service such as mail server or web server, then the next step would be to determine the version of such services running. With that info, the list of vulnerabilities for that particular version can be compromised for malicious purposes.

The easiest way to mitigate such threats would be to shutdown any unused services and protect the ports with a firewall. In addition, the server administrator should also keep the operating system and other services fully patched at all times.

What about my active services?

If you are providing services such as mail server or web server, then you don’t have the option to shut them down. But there is another protective measure you can employ, which is to screen the incoming connection’s IP address against the IP2Proxy PX9 database. When you see the threat type is SCANNER, you can choose to block or drop the connection immediately.

The benefit of using the IP2Proxy PX9 database is that normal users will still be able to access your running services. Only those IP addresses that are marked as SCANNER will be denied access.


There are people who are trying to penetrate servers on a daily basis. As a server administrator, it would be foolish to think that you won’t be next on their hit list. Incorporating the IP2Proxy PX9 database as part of your day-to-day security measures will ease your worry and keep your server safe.

IP2Proxy Proxy Detection PX9:


What is GEEK

Buddha Community

I am Developer


Laravel 8 Get Country, City Address From IP Address

How to get country name from IP address in Laravel 8 app. In this tutorial, i will show you How to get country city state zip code metro code from IP address in Laravel 8 app.

How to get location(county,city address) information from ip address in Laravel

  • Step 1 - Install Laravel 8 App
  • Step 2 - Connecting App to Database
  • Step 3 - Install "stevebauman/location"
  • Step 4 - Add Routes
  • Step 5 - Create Controller By Command
  • Step 6 - Start Development Server

#get location from ip address in laravel #laravel address from ip address #laravel get country city from ip address #laravel get user country by ip #laravel geoip to address

Nat  Grady

Nat Grady


Restrict User Access From IP Address in Laravel 9

In this article, we will see how to restrict user access from IP addresses in laravel 9. Here, we will learn how to block IP addresses in laravel 7, laravel 8, and laravel 9. Sometimes we are required to restrict or block users using IP addresses or block from selected countries at that time you can create a blocklist of IP addresses or only allow a whitelist of IP addresses.

We use middleware to restrict or block the user's IP address in laravel 7, laravel 8, and laravel 9.

So, let's see the laravel 9 restrict user access using IP address, laravel 9 block countries, laravel 9 block IP address, and laravel restrict IP address.

Step 1: Install Laravel 9 Application

In this step, we will install the laravel 9 application using the following command.

composer create-project laravel/laravel laravel_9_IP_Address


Step 2: Create Middleware

Now, we will create a BlockIPAddressMiddleware file using the following command.

php artisan make:middleware BlockIPAddressMiddleware

Now, open the app/Http/Middleware/BlockIPAddressMiddleware.php file and update the below code.

namespace App\Http\Middleware;
use Closure;
use Illuminate\Http\Request;
class BlockIPAddressMiddleware
    public $blockIPs = ['Block-IP-1', 'Block-IP-2', 'Block-IP-3'];
     * Handle an incoming request.
     * @param  \Illuminate\Http\Request  $request
     * @param  \Closure(\Illuminate\Http\Request): (\Illuminate\Http\Response|\Illuminate\Http\RedirectResponse)  $next
     * @return \Illuminate\Http\Response|\Illuminate\Http\RedirectResponse
    public function handle(Request $request, Closure $next)
        if (in_array($request->ip(), $this->blockIPs)) {
            abort(403, "You are restricted to access the site.");
        return $next($request);

Read Also: Laravel 9 Group Column Chart Using Highcharts


Step 3: Register Middleware

In this step, we will register the middleware file to the kernel.php file. So, add the following code to that file.


namespace App\Http;
use Illuminate\Foundation\Http\Kernel as HttpKernel;
class Kernel extends HttpKernel
     * The application's route middleware.
     * These middleware may be assigned to groups or used individually.
     * @var array
    protected $routeMiddleware = [
        'blockIPAddress' => \App\Http\Middleware\BlockIPAddressMiddleware::class,


Step 4: Use Middleware

Now, we will use the BlockIPAddressMiddleware in the route file. So, update the web.php file.


use Illuminate\Support\Facades\Route;
use App\Http\Controllers\UserController;  
use App\Http\Controllers\PostController;
| Web Routes
| Here is where you can register web routes for your application. These
| routes are loaded by the RouteServiceProvider within a group which
| contains the "web" middleware group. Now create something great!
Route::middleware(['blockIPAddress'])->group(function () {
    Route::resource('users', UserController::class);
    Route::resource('post', PostController::class);


Step 5: Run Laravel Application

Now, run the laravel 9 restrict user access from the IP address using the following command.

php artisan serve




You might also like:

Original article source at:

#laravel #address #ip 

Trystan  Doyle

Trystan Doyle


Django IP Address Lookup | What Is My IP Address

In this Django video we are going to learn about Django IP Address Lookup, so for this purpose we are going to use ipapi library. Django IP Address Lookup | …

#django #address

Mertie  Feil

Mertie Feil


Python IP Lookup Application with Flask | Whats is My IP Address

In this Python video we are going to learn about IP Lookup Application with Flask, so for creating IP Lookup Application with Flask we are going to use ipapi library. Python IP Lookup Application with Flask | Whats is My IP Address

#python #ip address

Understanding IP addresses


Ever wondered how with just an IP address your data travels across the world with n number of networks and hosts in between to get confused with?

Computer network works on IP address but we seldom see ourselves typing the IP address in our browser because for us it is comparatively harder to remember numbers than names.

DNS Overhead

So, when we type our browser, our ISP (internet service provider) provides us with a service called DNS (domain name service) which helps in converting a domain name to an IP address.

This is called DNS overhead because we wanted to reach Google and not the DNS but we had to in order to get the IP address.

This happens for the first time and then the browser caches the IP address for some time until expired.

Octets and Classes

Each IP address has a size of 32 bits and comes with a network ID and a host ID to which it has to travel.

For better readability, it is represented divided into 4 octets of 8 bits each and converted to decimal number.


Below is how we represent an IP address, here we took an example of IP address:

The IP address is divided into different classes based on the placing of 1 and 0.

#computer-science #computer-networking #networking #devops #ip-address