Anonymous ID: c2f93b March 1, 2024, 9:23 p.m. No.20503671   🗄️.is 🔗kun   >>3677 >>3686 >>3695 >>3702 >>3723 >>3729 >>3828

>>20503642

Not an IT guy, just a linux enthusiast who has a basic grasp of the command line. The guy who was spamming the IP lookup is the same guy who is spamming the vatican and "muhjoo" badjacketing bullshit. Last night, he edited the output to North Korea instead of Russia, and when he was called out for his BS, he pretended he was just testing everybody. He hops IP's half a dozen times a thread.

Anonymous ID: c2f93b March 1, 2024, 9:37 p.m. No.20503751   🗄️.is 🔗kun

>>20503677

If you aren't using a vpn, your ISP can see that you are connecting to 8kun.top, and the datacenter that hosts the server that you are connecting to can see your public IP. There is an 8kun server in the US @ 135.148.43.6. Whatever one you are connected to can be checked via running from the command prompt via "ping 8kun.top" then you put the ip address into "curl https://ipinfo.io/<ip-goes-here>" curl is pre-installed on macos and windows.

When you connect to a website, you connect to an IP address. The name of the website is associated to an address via a DNS (domain name service). Typically, DNS is provided by your local isp, but you can have locally determined domain names handled on a host machine or router if you choose, as well as connect to a third party DNS server, which is a common choice for things like parental controls. In my view, it is safer to use a russian server as a civillian. The US server in new york is very likely to be a honeypot. I do not know if this server would be able to see the public IP's of those connecting to the russian server.