honestly extremely valuable even if it's just accessing the files on local devices. the amount of tomfoolery needed to transfer files from my phone to my pc is ridiculous.
It took some time to learn and set up, but now i have scripts on my phone that synchronize the entirity of my music library between PC and phone (so i can download new wherever and have it everywhere) If you are interested: First I've set up ssh (basic security & QOL like token authentication) Then i've download rsync program (it is a command line tool) to both phone and computer (on the phone i use termux as a terminal emulator) Then I've chosen a folder to be synced and wrote the simple bash script to just copy files to/from remote host And that's it!
you can just install a file manager(I use RS) to open a connection and transfer files on your/from your pc onto your phone, very useful when I don't feel like plugging my phone in :)
for anyone who thinks this is somehow a serious guide on how to pull IPs from discord, sorry you got baited however, this is a very good tutorial on how to use angry ip scanner which is a very good tool that is used in a lot of IT professions
Try network chuck, Jon Hammond and Dave bombal. Those guys will get you through your later assignments, especially with any networking bits. Good luck my dude
This. Back when I was taking my basic networking classes, my professor assigned an nmap lab to scan a network for ports… well we all did our university & the IT department contacted us & basically told them our professor told us to & didn’t warn about the dangers… he didn’t get fired but the higher ups from other universities got really pissed off lol
@@zerobyte536 it sort’ve is depending on circumstances and what your scanning. We’re still in cowboy era and the laws aren’t clear enough on what’s going on but as long as you’re authorised EU, UK and US law are all happy for scanning
Normally your ISP router has every port blocked so you are safe you need to enable port forwarding and add a port to be vulnerable but if you don't have servers or anything you are safe.
Normally your ISP router has every port blocked so you are safe you need to enable port forwarding and add a port to be vulnerable but if you don't have servers or anything you are safe.
A character from the game Deltarune. Based off of other people's conversations, I can conclude that a very large portion if not all of the community likes Ralsei to some extent.
just a side note: you will most likely wanna bump up the max threads to around 200. it usually hits the default max of 100 which makes it take wayyyyyy longer, especially if you're looking for a lotta ports, but it also usually peaks at around 190. so you'll wanna do that if you value your time (and/or if your computer will allow it) anyway, awesome vid! thanks for making this
I like that shit, "Just skip the tutorial because I'm here to teach you" definitely was a big refresher and learned some more too. Thanks Bro Rock on 🤘
Remember, everyone, in case he forgot to mention - This is for educational purposes only in the subject of Ethical Hacking, the content creator does not promote using this for any unethical means Or at least, I sure hope not
i want to learn this because some bitch threatened my sister in law and my four year old nephew through a borrowed email and the law is doing nothing because it doesn't specifically mention it's a death threat.
Would hacking a scammer or other malicious persons be consider unethical? I know plenty of politicians, judges, cops and insurance companies that could do with a good kick in the balls through the web.
not what i expected, being that you can dox anyone easily in 5 seconds, but this is still an amazing tutorial showing a great tool for IT and such ty ❤️
@@MaxTheCool-c8yIt's not an ip grabber.... That's a networking software that is used by a lot of people working in IT, it honestly isn't even close to a real ip grabber.
Man I wish I could use this to get people's public ips. It genuinely scares the shit outta people to see their public ip in dms even though it's not even a threat. I just wanna scare trollers with a bigger troll
@@car8740 what are you talking about? You're scanning public IPs, you're not even a threat to people who might be in your lobby... Why would anyone be scared?
Normally to make your ip accesible from the outer network, you should ask your provider for a "white-ip". All these ips that you showed here are opened for a reason
this is nonsense..... if you are assigned an ip address by your ISP (majority of them do this dynamically) you can open whatever ports you want. It is risky opening ports to services and using a reverse proxy like nginx is recommended. Cloudflared (not cloudflare but a service provided by them) is another good option for a public hosted proxy without port forwarding.
love it when script kiddies make a tutorial on a useless software, us attackers use nmap (way better cli tool) allows for vulnerability scanning, udp/tcp scanning, ping probing, and whatever, also SMB shares in almost every pc are locked to authorized users so dont think you can just load up peoples smb shares, same with most ftp servers, also nmap will give you a preview on the services running, ex webserver, index page title, version of OS, general fingerprinting, another thing it is terrible offsec to browse to a webpage if you dont know what the hell it is, another thing and this one is EXTREMELY IMPORTANT, doing all this stuff this kid did is illegal, you cannot start attacking anything you dont own without a proper legal contract in place giving you permissions, these will also outline hosts you are not allowed to access or have partial access to that means you dont try to login to random ftp, http, ssh servers or smb shares, plus this kids approach of trial and error shows lack of experience as good offsec calls for guarantee a specific exploit/login/anything can be achieved, doing all these trial and error creates loads of logs and can put a target on your back, using the methods in this video will get you caught by any blue team worth its grain of salt
Man, you sound full of yourself. Tone the ego down before you get in the workfield, you're going to find yourself a lot of enemies going about it like this. - you know basically all port scanners can handle TCP and UDP, right? They're just different transmission protocols. - why are you mentioning ping probing as an nmap upside when he probe-pings in the vid? - some SMB shares and FTP servers allow anonymous auth. And as said in the vid, bruteforcing can be an option. Though with more sophisticated attacks, just knowing that port exists open is useful, because with either creds or access to the machine, you could use it as a pivot or C2 exfiltration method. - why the hell does offsec matter here? He isn't in a pentesting or darknet engagement, so what if the web service retrieves his public IP? Browsing most webpages in this day and age is relatively safe as long as you don't give it permissions or download anything or fall for phishes. - this was the funniest point. Illegal? Most of this wasn't illegal at all. Reconnaissance and port scanning is just juggling public information, he literally pulled the IPs from a website. Trying anonymous FTP/SMB logins might be considered illegal, but a single attempt isn't going to get the FBI on you, kid. Contracts aren't needed for miscellaneous recon that doesn't hinder or bombard the service's server load. - pentesting engagements will put restraints on access, because most happen within a private network with a company-owned DNS and the likes, so the various accessible hardpoints can be sensitive yet easily accessible to the pentester. Also, these engagements are usually more like focused/specialised tests, so a company can decide to block certain entry points to focus on a particular area of their security just because. I'd like to remind you once again; this RUclipsr isn't doing an engagement. - bruteforcing is loud on the logs, but its still a viable approach. Not the most sophisticated by all means, but brute forcing using a custom wordlist is more successful than waiting for a zero-day to fall out the sky for you. Don't get me wrong, this guy isn't the brightest tool in the shed with what he was doing, but trial and error isn't the key issue here. Its probably the fact he misspelt anonymous on that FTP login, heh. Sure nmap's better and some of what you say may be true. But you definitely don't know all your stuff, buddy. Worst of all, you don't know your etiquette. Drop the "script kiddie" insults if you don't have the experience to back yourself up. It's a dog-eat-dog world out here if you end up on the darknet, where people will take advantage of that loud mouth of yours or punish it. And if you're considering being a pentester, your employer sure as hell won't want to see this on your media when you make a resume for them. Safe to say whichever path you tread, politeness is appreciated, friend. Don't forget that. And also, definitely don't act like you know everything you speak about. You'll soon find out, there won't be a damn moment in your life where you ever will. You're always missing some little detail. Nor am I fully qualified yet myself, you know. We're all on the same climb, how bout we make it easier for each other, eh?
Hahahahha man i just rolled on the floor when you kept speaking about the ports and the protocols so casualy. And fck, this programm is an amizing tool!
This guy has no clue what he is talking about , and this video is useless because the chance you will find a random IP with an open port where you can pull anything from is near zero. He probably thinks buying a VPN will hide you from authorities in any way.
@@undefinedchannel9916 If you buy a VPN from a big company and don't set up a custom proxy server, it doesn't provide any protection against authorities.
public IPs wont show you an exact adress or anything. ISPs own the public IP and then create their own subnet and assign a client an IP from there. so you wont get exact locations but you will get close
depends. most ISPs allocate you a public address so you can do your own NAT/PAT (the private ip thing where you need to port forward). COX is an ISP that does not allocate a public address and assigns you a private address so if you need a service forwarded you have to deal with Double NAT and work with them directly
i think nmap will most likely be preferable in all situations lol. the first thing i thought when i saw this was it’s just a GUI version of nmap which isn’t necessarily a bad thing
some decent explanations but port scanning public IP ranges has no correlation with "pulling IPs" from people using client-to-server services like discord or whatever
protect yourself on games: ruclips.net/video/--PgOsir8Do/видео.html
bro just leaked his ip
@@YapDoIIartemporary IP
ip grabber
what if I wanna grab specific ips from social media (instagram to be specific)
ima smash yo
The dead-inside voice, no joy whatsoever, typical programmer. Perfection.
as a programmer,
yeah
@@real_e same
You described me 😂
as a programmer
yeah
same
i'm pretty sure i speak in a perfect key
We making it into prison with this one!! 🗣🔥
no this is legal and you really cant do anything with ips lol
@@wilsonvfxyou can actually do quite a lot with ips, assuming you’re decent at social engineering.
@@mile.9768 yeah, getting wrong the country where you live and a useless expensive not working ddos attack?
yeah its surely dangerous
@@F6347_VR ddos r free lmfao
@@pastafanofficial where at bro zimbabwe?
As an IT student, this video helped me get to top of my class in networks lessons
how oh wait threats
no it didn't
you do not even know how internet work
@@Niksonkhow do you know, they barely even said anything 💀
sooo you study in a kindergarden?
honestly extremely valuable even if it's just accessing the files on local devices. the amount of tomfoolery needed to transfer files from my phone to my pc is ridiculous.
Wow! a magic survival fan!!!
@@19hanyell11the lobby theme is better than half the game ngl
It took some time to learn and set up, but now i have scripts on my phone that synchronize the entirity of my music library between PC and phone (so i can download new wherever and have it everywhere)
If you are interested:
First I've set up ssh (basic security & QOL like token authentication)
Then i've download rsync program (it is a command line tool) to both phone and computer (on the phone i use termux as a terminal emulator)
Then I've chosen a folder to be synced and wrote the simple bash script to just copy files to/from remote host
And that's it!
you can just install a file manager(I use RS) to open a connection and transfer files on your/from your pc onto your phone, very useful when I don't feel like plugging my phone in :)
what? just use a normal phone charger and plug it into the pc, it can transfer files both ways like this
STEP: 1 watches video
STEP 2: buys botnet or nightmarestresser
STEP 3: boot myself to test
Step 4 : on phone to replace router XD
2900 likes no comment?
@AidenPearce-aaa still doesn't explain the likes
@AidenPearce-aaa oh ok
bro shut up you bot
Idiot@AidenPearce-aaa
for anyone who thinks this is somehow a serious guide on how to pull IPs from discord, sorry you got baited
however, this is a very good tutorial on how to use angry ip scanner which is a very good tool that is used in a lot of IT professions
did you find that pfp from mrunivers?
@@savageontkl is that a website?
or you just use nmap
@@brecht1043 a overkill for most applications, and using it on windows is a horrible experience. I do use nmap on my Mac though so there’s that
Yeah this is just basically automated nmap.
35 seconds in and I can already say this guy is humorous and gets to the point, loved the video!
im taking Cybersecurity classes in college and your videos are really fun to learn.
Try network chuck, Jon Hammond and Dave bombal. Those guys will get you through your later assignments, especially with any networking bits. Good luck my dude
@@rhyejam can i contact with you brother?
Dear FBI:
I was recommended this video. I did not look for this, I saw it, and was curious as to what he had to say.
Very good video, short and straight to the point. Very informative, keep on the good work ❤
I said "I literally don't need this" and then watched this and was like "oh crap this actually will help me improve my security", thanks man!
I’d like to just take this moment to welcome everyone to the FBI watchlist😂😂
Your comment has officially reached 200 likes
@@GabrielSomeone234 yours officially has one
So many people on a sketchy search binge 😭
We making it on the watchlist with this one 🗣🔥
fbi's watchlist
Wow! As a Rainbow Six Siege player this helped me a lot! Now no one is ever in my lobbies for some reason (Totally not me)
Worth to note: port-scanning public IPs can be against school/work WiFi rules, or even against laws
This. Back when I was taking my basic networking classes, my professor assigned an nmap lab to scan a network for ports… well we all did our university & the IT department contacted us & basically told them our professor told us to & didn’t warn about the dangers… he didn’t get fired but the higher ups from other universities got really pissed off lol
☠️@@astraea7136
Against rules or regulations, yes, but port scanning is not against the law. At least in the USA.
Always get written authority before doing anything on a network that isn’t yours. Cover your booty
@@zerobyte536 it sort’ve is depending on circumstances and what your scanning. We’re still in cowboy era and the laws aren’t clear enough on what’s going on but as long as you’re authorised EU, UK and US law are all happy for scanning
Would love to see a vid going in depth on what ports are vulnerable and how to close them and which ports are okay to have open on local IPs vs public
Normally your ISP router has every port blocked so you are safe you need to enable port forwarding and add a port to be vulnerable but if you don't have servers or anything you are safe.
Normally your ISP router has every port blocked so you are safe you need to enable port forwarding and add a port to be vulnerable but if you don't have servers or anything you are safe.
When hitting a home connection surprisingly you can hit it on any number port and it will go offline
@@SIKCk513 Yes, but your ports are still closet and it only works on really slow and old routers it also depends on the ISP network.
@@SloudPL yeah just saying AT&T spectrum etc never had a problem
Nice to see you growing soo fast
thx 🙏
I'm subbing, because this was really calm, simple, and explanatory too
ralsei pfp in the wild?!?!
@@RalseiTheReal ohh yoo I never see pfps like you around!!
who is ralsei
A character from the game Deltarune. Based off of other people's conversations, I can conclude that a very large portion if not all of the community likes Ralsei to some extent.
@@ThatOneGamer295 ok
0:19 you are a legend, love you man, you won me for life. You trully showed you know what are you doing.
Then the scan of his network shows there are at least two mac's in his house.
FINALLY A TUTORIAL THAT ACTUALLY WORKS!
hes getting ur ip
@@4xmo and?
learn the basics skid
how@@infidon9229
@@infidon9229 well, how does one learn the basics
this video is hella informative, thank you for showing me this info ebola man ❤
just a side note: you will most likely wanna bump up the max threads to around 200. it usually hits the default max of 100 which makes it take wayyyyyy longer, especially if you're looking for a lotta ports, but it also usually peaks at around 190. so you'll wanna do that if you value your time (and/or if your computer will allow it)
anyway, awesome vid! thanks for making this
blud what are you yapping about?🥱💀
@@GH0STI3THE1< room temp IQ
I like that shit, "Just skip the tutorial because I'm here to teach you" definitely was a big refresher and learned some more too. Thanks Bro Rock on 🤘
Bro, I have an exam tomorrow and YT algorithm showed me this dude... I can't stop myself watching videos😢
Remember, everyone, in case he forgot to mention - This is for educational purposes only in the subject of Ethical Hacking, the content creator does not promote using this for any unethical means
Or at least, I sure hope not
i want to learn this because some bitch threatened my sister in law and my four year old nephew through a borrowed email and the law is doing nothing because it doesn't specifically mention it's a death threat.
Would hacking a scammer or other malicious persons be consider unethical? I know plenty of politicians, judges, cops and insurance companies that could do with a good kick in the balls through the web.
This video randomly popped up on my home page and i decided to click on it, i just found my new favorite channel.
For anyone trying this remember some systems can log all of these connections coming in
i am having a vpn 24/7 after watching this. tysm
Finally a non-time robbing / non-stumbling straight to the point tutorial! Greetings from Germany
This is how I used to win all my gta 5 battles back in the day
We getting swatted with this one🗣️🗣️🔥🔥💯💯
I appreciate your videos, man. They have been useful on several different occasions.
This channel is criminally underrated, take my sub man!
this is skid content
@@infidon9229 🤓☝
@infidon9229 and im guessing you're a real hacker then not a script kiddie
@@infidon9229 skid content or not, it's pretty entertaining and funny
@@infidon9229 hardly, if you dont know how to actually use this information you cant do anything with it. But why would a skid know that anyway
this actually helped me pass my networking exam
Dude you're one of the coolest guys, keep up the good work i hope you will make more videos!
I'm gonna check your channel from time to time while learning code and cybersecurity. This is fun.
POV: me wanted to watch some mrbeast. so i type mr beast. and that appears the frist vid: ”How To PULL IPs!”
Very good video, short and straight to the point. Very informative, keep on the good work ❤
now i can steal you ip ❤️❤️❤️😁😁😁
@@_WalterWhite nah you cant pull specific ip's by this, that can only be done by grabifiers. As he said
at first i thought this was a troll vid but this is really good
i dindnt understand a single thing
programming yibber yabber its fine
Me either but still watched it all 😂
not what i expected, being that you can dox anyone easily in 5 seconds, but this is still an amazing tutorial showing a great tool for IT and such
ty ❤️
wait tho how do you do it?
How?
This guy has the best illeg- I mean educating videos on RUclips
just used angry ip in my network security class but you made this so much more enjoyable to watch
We making it to the naughty list with this one! 🔥🔥💯
dude just doxxed everybody in his house including his vacuum cleaner
Me with a vacuum clener that you need to use manually :ok
We meeting the kid who leaked GTA 6 with this tutorial 🔥🙌
This video is awesome! im so sorry to see that amount of likes is higher than subscribers one
dude the words "Educational Purposes Only" is the only thing keeping this alive
keep up the good work man
Your not the man we asked for but you are the hero we needed
my 4th period teacher is gonna be giving me A's from now on
LMAOO
blackmailing but also nah I doubt that
hacking into the school lan and changing the grades
@@angelopevepes you do realize that doing that with ip scanning isn't possible?
@@bendythecommander i didn't mention ip scanning
To the person reading this: Even though I don’t know you, I wish you the best of what life has to offer
How does bro have 1.9 million subs
I thought I was able to surprise my friend xD
Great lesson, thanks!
educational purpose only 😈
Yo can you help? I have 2 laptops, one of which is within the IP range angryip is scanning. But, it isn't being detected.
@@atharvasrivastava4534windows has an option to be discoverable with pings, if your pc has that enabled then angry ip wont detect it
@@ebolaman_ so the setting has to be on? doesn't seem very effective then, or is it normally discoverable and this is an exception
@@ebolaman_ The laptop is also very old, and cant support windows 11, so probably that is also a reason. I'll see if it can detect windows 11 laptops
@@atharvasrivastava4534 the laptops age shouldn't make a difference, just make sure its discoverable in settings
bro doesnt know what hes doing 🔥🔥🔥
He prob know more than ya lol
@@Lord_common_sense alr so he should know that mass scanning public ip's can get you to go to prison for quite a while, just saying.
guys calm down. its just a public ip grabber.
@@MaxTheCool-c8yIt's not an ip grabber.... That's a networking software that is used by a lot of people working in IT, it honestly isn't even close to a real ip grabber.
@@creammandolol no. Even if it was illegal you wouldn't go to prison lmao. Watching too many movies
Makes the job look too easy tbh. Really good tut, great way of explaining simply. Shows your level of comprehension.
💀
LOL that is definitively a way of winning an argument
YOU'R VIDEOS ARE ON POINT MY GUY KEEP UP THE GREAT WORK YOUNG "SUDO SU"
We gonna have the 8 year olds sweatin wit dis one 😈🔥‼️
Imagine that this guy programmed AngryIP and captured your IP addresses.
bro is fluent in yapinese
yeah he would have access to your ip, doesn’t mean anything though
@@theeyenzier8190 wdym
Wait no fucking way this is not ironic
Lmao some 13 year old probably clicked this thinking he can win every single argument on discord after watching this video
This channel is a gold mine wtf
Man I wish I could use this to get people's public ips. It genuinely scares the shit outta people to see their public ip in dms even though it's not even a threat. I just wanna scare trollers with a bigger troll
Having someone’s IP can 100% be a threat. Literally most wifi routers can’t even handle a free stresser
@@cadencrash7925 a public ip as far as I'm aware only reveals the city you're in, not your precise location. correct me if I'm wrong though
great video! where did you learn all of this?
i know everything
@@ebolaman_ bruh just answer
@@lactrose5593 magic
@@lactrose5593he knows everything
learn networking
at 0:18 you say "Whoever uses that" and then at 1:43 you can see "Anas Macbook pro"... Intresting
😂
This video has been recommended to me like 15 times and now that I've finally watched it, I want my 5 minutes back
Same, i Remember seeing this being recommended 4 mins after the video was posted.
Nvm, i think it was the pull ips from games
Bro why am I getting recommended this 😭
Yes, this is how literally every single server in the world works. This is not "pulling ips to win an argument"
scares the shit out of people on csgo imma keep doing it
@@car8740 what are you talking about? You're scanning public IPs, you're not even a threat to people who might be in your lobby... Why would anyone be scared?
@@altaccount648 bro thinks children know anything about networking 💀
oh no bros gonna find out what city im in and my isp @@car8740
@@altaccount648 Most people are not that tech-savvy, they see that and it scares them for a second.
W vid as always
thank u 💪
Normally to make your ip accesible from the outer network, you should ask your provider for a "white-ip". All these ips that you showed here are opened for a reason
this is nonsense..... if you are assigned an ip address by your ISP (majority of them do this dynamically) you can open whatever ports you want. It is risky opening ports to services and using a reverse proxy like nginx is recommended. Cloudflared (not cloudflare but a service provided by them) is another good option for a public hosted proxy without port forwarding.
@@ifonlycrolson9753 One day i used to host a minecraft server from my laptop, i used port forwarding and i also asked a provider for a white-ip...
If the FBI sees this on my search history I'm only gonna use it to prank my friends
Finally a straight / non time robing / no dumb stumbling tutorial! Excuse my bad english
I'd love if you made a video on wireshark fr explaining what is does and what capturing "packets" basically is
This is just how to win an argument
love it when script kiddies make a tutorial on a useless software, us attackers use nmap (way better cli tool) allows for vulnerability scanning, udp/tcp scanning, ping probing, and whatever, also SMB shares in almost every pc are locked to authorized users so dont think you can just load up peoples smb shares, same with most ftp servers, also nmap will give you a preview on the services running, ex webserver, index page title, version of OS, general fingerprinting, another thing it is terrible offsec to browse to a webpage if you dont know what the hell it is, another thing and this one is EXTREMELY IMPORTANT, doing all this stuff this kid did is illegal, you cannot start attacking anything you dont own without a proper legal contract in place giving you permissions, these will also outline hosts you are not allowed to access or have partial access to that means you dont try to login to random ftp, http, ssh servers or smb shares, plus this kids approach of trial and error shows lack of experience as good offsec calls for guarantee a specific exploit/login/anything can be achieved, doing all these trial and error creates loads of logs and can put a target on your back, using the methods in this video will get you caught by any blue team worth its grain of salt
damn fucking straight at least someone said it lol
dont worry. its not like as if they learned how to satellite track, hack into peoples devices or Hack a whole frickin nuclear to launch.
I know you are trying to be serious but, i couldnt take this comment seriously.
Man, you sound full of yourself. Tone the ego down before you get in the workfield, you're going to find yourself a lot of enemies going about it like this.
- you know basically all port scanners can handle TCP and UDP, right? They're just different transmission protocols.
- why are you mentioning ping probing as an nmap upside when he probe-pings in the vid?
- some SMB shares and FTP servers allow anonymous auth. And as said in the vid, bruteforcing can be an option. Though with more sophisticated attacks, just knowing that port exists open is useful, because with either creds or access to the machine, you could use it as a pivot or C2 exfiltration method.
- why the hell does offsec matter here? He isn't in a pentesting or darknet engagement, so what if the web service retrieves his public IP? Browsing most webpages in this day and age is relatively safe as long as you don't give it permissions or download anything or fall for phishes.
- this was the funniest point. Illegal? Most of this wasn't illegal at all. Reconnaissance and port scanning is just juggling public information, he literally pulled the IPs from a website. Trying anonymous FTP/SMB logins might be considered illegal, but a single attempt isn't going to get the FBI on you, kid. Contracts aren't needed for miscellaneous recon that doesn't hinder or bombard the service's server load.
- pentesting engagements will put restraints on access, because most happen within a private network with a company-owned DNS and the likes, so the various accessible hardpoints can be sensitive yet easily accessible to the pentester. Also, these engagements are usually more like focused/specialised tests, so a company can decide to block certain entry points to focus on a particular area of their security just because. I'd like to remind you once again; this RUclipsr isn't doing an engagement.
- bruteforcing is loud on the logs, but its still a viable approach. Not the most sophisticated by all means, but brute forcing using a custom wordlist is more successful than waiting for a zero-day to fall out the sky for you. Don't get me wrong, this guy isn't the brightest tool in the shed with what he was doing, but trial and error isn't the key issue here. Its probably the fact he misspelt anonymous on that FTP login, heh.
Sure nmap's better and some of what you say may be true. But you definitely don't know all your stuff, buddy. Worst of all, you don't know your etiquette. Drop the "script kiddie" insults if you don't have the experience to back yourself up. It's a dog-eat-dog world out here if you end up on the darknet, where people will take advantage of that loud mouth of yours or punish it. And if you're considering being a pentester, your employer sure as hell won't want to see this on your media when you make a resume for them.
Safe to say whichever path you tread, politeness is appreciated, friend. Don't forget that. And also, definitely don't act like you know everything you speak about. You'll soon find out, there won't be a damn moment in your life where you ever will. You're always missing some little detail. Nor am I fully qualified yet myself, you know. We're all on the same climb, how bout we make it easier for each other, eh?
@@HelloworldXY32 You sound full of yourself.
Hahahahha man i just rolled on the floor when you kept speaking about the ports and the protocols so casualy. And fck, this programm is an amizing tool!
Mans left me with more questions than answers
i have no interest in pulling ips i only wanted to hear ebola's enthousiastic voice
This guy has no clue what he is talking about , and this video is useless because the chance you will find a random IP with an open port where you can pull anything from is near zero. He probably thinks buying a VPN will hide you from authorities in any way.
real
It will to a certain extent.
@@undefinedchannel9916 If you buy a VPN from a big company and don't set up a custom proxy server, it doesn't provide any protection against authorities.
How to get your ip leaked in a basic tutorial that swears ur trolling kids in discord:
W music choice in the beginning hit me with nostalgia
Congratulations! You are now on the government’s special fun list for special fun people!
Time to troll my freinds 😈😈😈
Your so scary
W
Lol
Some of my friends that i can’t hack time to get payback
Octosniff better
Kinda clickbait ngl. At the start of the video you were talking about arguments and how to pull someone specific's IP. But alright.
vid on that coming soon
public IPs wont show you an exact adress or anything. ISPs own the public IP and then create their own subnet and assign a client an IP from there. so you wont get exact locations but you will get close
depends. most ISPs allocate you a public address so you can do your own NAT/PAT (the private ip thing where you need to port forward). COX is an ISP that does not allocate a public address and assigns you a private address so if you need a service forwarded you have to deal with Double NAT and work with them directly
@@ifonlycrolson9753 good point
Nice video! Needs a part 2 on how to use this to win an argument online lol
bro idk why but i just love your voice
I’m just curious, if someone is arguing with you online in a different country or so, how do you know wich IP is theirs?
AngryIP vs Nmap? Nmap looks preferable here, especially with scripts like checking if anon FTP is enabled for us.
A vpn wont save you.
Close your ports
Uh ? He never talked about vpn LMFAO@@lokomen9
threatening ass reply
@@lokomen9 as if you knew what you're saying
i think nmap will most likely be preferable in all situations lol. the first thing i thought when i saw this was it’s just a GUI version of nmap which isn’t necessarily a bad thing
try not to attract skids challenge(impossible)
I misread this for pullups and I ended up watching this. Thanks babe I learnt 2 new skills
Person on the internet: ur bad me: *pulls their IP like I do push doors*
You know it's real when someone named ebola man post about grabbing ips 💀 (no hate)
some decent explanations but port scanning public IP ranges has no correlation with "pulling IPs" from people using client-to-server services like discord or whatever
ruclips.net/video/--PgOsir8Do/видео.htmlsi=efKF-mAXwBvstQsZ
Are there any downsides to closing all your router ports?
I'm 3 seconds in and I know it's going to be a banger
I love your videos not only do you provide great information but you do so hilariously I love it PLEASE keep making content!!!!!!!
bro u said apple is shit but u have imac and iphone in your network XD