{"id":22991,"date":"2022-03-21T09:28:34","date_gmt":"2022-03-21T09:28:34","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=22991"},"modified":"2022-03-21T09:28:38","modified_gmt":"2022-03-21T09:28:38","slug":"sentrypeer","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/","title":{"rendered":"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses And Phone Numbers Collected"},"content":{"rendered":"\n<p><strong>SentryPeer<\/strong> is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address they came from and number they tried to call. Those details are then used to block them at the service providers network and the next time a user\/customer tries to call a collected number, it&#8217;s blocked.<\/p>\n\n\n\n<p>Traditionally this data is shipped to a central place, so you don&#8217;t own the data you&#8217;ve collected. This project is all about Peer to Peer sharing of that data. The user owning the data and various Service Provider \/ Network Provider related feeds of the data is the key bit for me. I&#8217;m sick of all the services out there that keep it and sell it. If you&#8217;ve collected it, you should have the choice to keep it and\/or opt in to share it with other SentryPeer community members via p2p methods.<\/p>\n\n\n\n<p>The sharing part&#8230;you only get other users&#8217; data if you&nbsp;share yours. That&#8217;s the key. It could be used (the sharing of data logic\/feature) in many projects too if I get it right.<\/p>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Screenshots<\/h3>\n\n\n\n<p>Here&#8217;s a mockup of the web UI which is subject to change.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEjNoYsTMEwuC_5RVH-ksGIFF1STQM5VH2hlAfgOCnIXcGu8bLrJ_4vjXXhEm6Ld7tixdkS0koFcJa88Dw6rMGgj-0J1pFKcvGE8UblQzTTXkl70aGspXxWCTO7Gz3e5HEXKx08IBsBGXHK0euvV45TsLzMsFVHYbdzSKhYiEWjO8zejh6oFlC75s_JL=s1427\" alt=\"\" \/><\/figure>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\">Goals<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>&nbsp;All code&nbsp;Free\/Libre and Open Source Software<\/li><li>&nbsp;FAST<\/li><li>&nbsp;User&nbsp;<em>owns their<\/em>&nbsp;data<\/li><li>&nbsp;User can submit their own data if they want to &#8211;&nbsp;<em>opt out<\/em>&nbsp;(default is to submit data)<\/li><li>&nbsp;User gets other users&#8217; data (Tit for tat?)&nbsp;<strong>ONLY IF<\/strong>&nbsp;they opt in to submit their data to the pool (DHT? &#8211; need to do a&nbsp;PoC)<\/li><li>&nbsp;Embedded Distributed Hash Table (DHT) node using&nbsp;OpenDHT&nbsp;(<code><strong>-p<\/strong><\/code>&nbsp;cli option)<\/li><li>&nbsp;Peer to Peer&nbsp;<strong>sharing<\/strong>&nbsp;of collected bad_actors using&nbsp;OpenDHT&nbsp;(default on)<\/li><li>&nbsp;Peer to Peer data replication to&nbsp;<strong>receive<\/strong>&nbsp;collected bad_actors using&nbsp;OpenDHT&nbsp;(default on)<\/li><li>&nbsp;Multithreaded<\/li><li>&nbsp;UDP transport<\/li><li>&nbsp;TCP transport<\/li><li>&nbsp;TLS transport<\/li><li>&nbsp;JSON logging&nbsp;to a file<\/li><li>&nbsp;Data is max 7(?) days old as useless otherwise<\/li><li>&nbsp;SIP mode can be disabled. This allows you to run SentryPeer in API mode or DHT mode only etc. i.e. not as a honeypot, but as a node in the SentryPeer community or to just serve replicated data<\/li><li>&nbsp;SIP responsive mode can be enabled to collect data &#8211; cli \/ env flag<\/li><li>&nbsp;<strong>Local<\/strong>&nbsp;data copy for&nbsp;<strong>fast access<\/strong>&nbsp;&#8211; cli \/ env db location flag<\/li><li>&nbsp;<strong>Local<\/strong>&nbsp;API for&nbsp;<strong>fast access<\/strong>&nbsp;&#8211; cli \/ env flag<\/li><li>&nbsp;<strong>Local<\/strong>&nbsp;Web GUI for&nbsp;<strong>fast access<\/strong>&nbsp;&#8211; cli \/ env flag<\/li><li>&nbsp;Query API for IP addresses of bad actors<\/li><li>&nbsp;Query API for IPSET of bad actors<\/li><li>&nbsp;Query API for a particular IP address of a bad actor<\/li><li>&nbsp;Query API for attempted phone numbers called by bad actors<\/li><li>&nbsp;Query API for an attempted phone number called by a bad actor<\/li><li>&nbsp;Fail2Ban&nbsp;support via&nbsp;<code><strong>syslo<\/strong>g<\/code>&nbsp;as per&nbsp;feature request<\/li><li>&nbsp;Local&nbsp;sqlite&nbsp;database &#8211; feature \/ cli flag<\/li><li>&nbsp;Analytics &#8211; opt in<\/li><li>&nbsp;SDKs\/libs for external access &#8211;&nbsp;CGRateS&nbsp;to start with or our own firewall with nftables<\/li><li>&nbsp;Small binary size for IoT usage<\/li><li>&nbsp;Cross-platform<\/li><li>&nbsp;Firewall options to use distributed data in real time &#8211;&nbsp;DHT?<\/li><li>&nbsp;Container on&nbsp;Docker Hub for latest build<\/li><li>&nbsp;BGP agent to peer with for blackholing collected IP addresses (similar to&nbsp;Team Cymru Bogon Router Server Project)<\/li><li>&nbsp;SIP agent to return 404 or default destination for SIP redirects<\/li><\/ul>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#design\"><\/a>Design<\/h3>\n\n\n\n<p>TBD \ud83d\ude42<\/p>\n\n\n\n<p>I started this because I wanted to do&nbsp;C network programming&nbsp;as all the projects I use daily are in C like&nbsp;PostgreSQL,&nbsp;OpenLDAP,&nbsp;FreeSWITCH,&nbsp;OpenSIPS,&nbsp;Asterisk&nbsp;etc. See&nbsp;Episode 414: Jens Gustedt on Modern C&nbsp;for why&nbsp;C&nbsp;is a good choice. For those interested, see my full podcast show list (https:\/\/www.se-radio.net\/team\/gavin-henry\/) for&nbsp;Software Engineering Radio<\/p>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#talks\"><\/a>Talks<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li>TADSummit 2021 &#8211;&nbsp;https:\/\/blog.tadsummit.com\/2021\/11\/17\/sentrypeer\/<\/li><li>CommCon 2021 &#8211;&nbsp;https:\/\/2021.commcon.xyz\/talks\/sentrypeer-a-distributed-peer-to-peer-list-of-bad-ip-addresses-and-phone-numbers-collected-via-a-sip-honeypot<\/li><\/ul>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#docker\"><\/a>Docker<\/h3>\n\n\n\n<p>You can run the latest version of SentryPeer with&nbsp;Docker. The latest version is available from&nbsp;Docker Hub. Or build yourself:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo docker build -t sentrypeer .<br>sudo docker run -d -p 5060:5060 -p 8082:8082 sentrypeer:latest<\/strong><\/p>\n\n\n\n<p>Then you can check at&nbsp;<code><strong>http:\/\/localhost:8082\/ip-addresses<\/strong><\/code>&nbsp;and&nbsp;<code><strong>http:\/\/localhost:5060\/health-check<\/strong><\/code>&nbsp;to see if it&#8217;s running.<\/p>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#environment-variables\"><\/a>Environment Variables<\/h4>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>ENV SENTRYPEER_DB_FILE=\/my\/location\/sentrypeer.db<br>ENV SENTRYPEER_API=1<br>ENV SENTRYPEER_WEB_GUI=1<br>ENV SENTRYPEER_SIP_RESPONSIVE=1<br>ENV SENTRYPEER_SIP_DISABLE=1<br>ENV SENTRYPEER_SYSLOG=1<br>ENV SENTRYPEER_PEER_TO_PEER=1<br>ENV SENTRYPEER_JSON_LOG=1<br>ENV SENTRYPEER_JSON_LOG_FILE=\/my\/location\/sentrypeer_json.log<br>ENV SENTRYPEER_VERBOSE=1<br>ENV SENTRYPEER_DEBUG=1<\/strong><\/p>\n\n\n\n<p>Either set these in the Dockerfile or in your&nbsp;<code><strong>Dockerfile.env<\/strong><\/code>&nbsp;file or docker run command.<\/p>\n\n\n\n<h3 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#installation\"><\/a>Installation<\/h3>\n\n\n\n<p>Debian or Fedora packages are always available from the release page for the current version of SentryPeer:<\/p>\n\n\n\n<p>https:\/\/github.com\/SentryPeer\/SentryPeer\/releases<\/p>\n\n\n\n<h4 class=\"has-text-align-center has-vivid-green-cyan-background-color has-background wp-block-heading\"><a href=\"https:\/\/github.com\/SentryPeer\/SentryPeer#ubuntu-package\"><\/a>Ubuntu Package<\/h4>\n\n\n\n<p>You can install SentryPeer from&nbsp;our Ubuntu PPD&nbsp;which is currently for Ubuntu 20 LTS (Focal Fossa):<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo add-apt-repository ppa:gavinhenry\/sentrypeer<br>sudo apt-get update<\/strong><\/p>\n\n\n\n<p>This PPA can be added to your system manually by copying the lines below and adding them to your system&#8217;s software sources:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>deb https:\/\/ppa.launchpadcontent.net\/gavinhenry\/sentrypeer\/ubuntu focal main<br>deb-src https:\/\/ppa.launchpadcontent.net\/gavinhenry\/sentrypeer\/ubuntu focal main<\/strong><\/p>\n\n\n\n<h4 class=\"has-light-green-cyan-background-color has-background wp-block-heading\">Building from source<\/h4>\n\n\n\n<p>You have two options for installation from source. CMake or autotools. Autotools is recommended at the moment. A release is an autotools build.<\/p>\n\n\n\n<p>If you are a Fedora user, you can install this via&nbsp;Fedora copr:<\/p>\n\n\n\n<p>https:\/\/copr.fedorainfracloud.org\/coprs\/ghenry\/SentryPeer\/<\/p>\n\n\n\n<p>If you are going to build from this repository, you will need to have the following installed:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><code>git<\/code>,&nbsp;<code>autoconf<\/code>,&nbsp;<code>automake<\/code><\/strong>&nbsp;and&nbsp;<code><strong>autoconf-archive<\/strong><\/code>&nbsp;(Debian\/Ubuntu)<\/li><li><code><strong>libosip2-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>libosip2-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>libsqlite3-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>sqlite-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>uuid-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>libuuid-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>libmicrohttpd-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>libmicrohttpd-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>libjansson-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>jansson-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>libpcre2-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>pcre2-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><code><strong>libcurl-dev<\/strong><\/code>&nbsp;(Debian\/Ubuntu) or&nbsp;<code><strong>libcurl-devel<\/strong><\/code>&nbsp;(Fedora)<\/li><li><strong><code>libcmocka-dev<\/code>&nbsp;<\/strong>(Debian\/Ubuntu) or&nbsp;<code><strong>libcmocka-devel<\/strong><\/code>&nbsp;(Fedora) &#8211; for unit tests<\/li><\/ul>\n\n\n\n<p>Debian\/Ubuntu:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo apt-get install git build-essential autoconf-archive autoconf automake libosip2-dev libsqlite3-dev \\<br>libcmocka-dev uuid-dev libcurl-dev libpcre2-dev libjansson-dev libmicrohttpd-dev<\/strong><\/p>\n\n\n\n<p>Fedora:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>sudo dnf install git autoconf automake autoconf-archive libosip2-devel libsqlite3-devel libcmocka-devel \\<br>libuuid-devel libmicrohttpd-devel jansson-devel libcurl-devel pcre2-devel<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-16018d1d wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/SentryPeer\/SentryPeer\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address they came from and number they tried to call. Those details are then used to block them at the service providers network and the next time a user\/customer tries to call a collected number, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":23032,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[4900,4899,4898],"class_list":["post-22991","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-ip-addresses","tag-peer-to-peer-2","tag-sentrypeer"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses<\/title>\n<meta name=\"description\" content=\"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses\" \/>\n<meta property=\"og:description\" content=\"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-21T09:28:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-21T09:28:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses And Phone Numbers Collected\",\"datePublished\":\"2022-03-21T09:28:34+00:00\",\"dateModified\":\"2022-03-21T09:28:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\"},\"wordCount\":1111,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\",\"keywords\":[\"IP Addresses\",\"Peer To Peer\",\"SentryPeer\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\",\"name\":\"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\",\"datePublished\":\"2022-03-21T09:28:34+00:00\",\"dateModified\":\"2022-03-21T09:28:38+00:00\",\"description\":\"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage\",\"url\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\",\"contentUrl\":\"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728\",\"width\":\"728\",\"height\":\"380\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses","description":"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/","og_locale":"en_US","og_type":"article","og_title":"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses","og_description":"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.","og_url":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2022-03-21T09:28:34+00:00","article_modified_time":"2022-03-21T09:28:38+00:00","og_image":[{"url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses And Phone Numbers Collected","datePublished":"2022-03-21T09:28:34+00:00","dateModified":"2022-03-21T09:28:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/"},"wordCount":1111,"commentCount":0,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","keywords":["IP Addresses","Peer To Peer","SentryPeer"],"articleSection":["Kali Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kalilinuxtutorials.com\/sentrypeer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/","url":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/","name":"SentryPeer : A Distributed Peer To Peer List Of Bad Actor IP Addresses","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage"},"thumbnailUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","datePublished":"2022-03-21T09:28:34+00:00","dateModified":"2022-03-21T09:28:38+00:00","description":"SentryPeer is basically a fraud detection tool. It lets bad actors try to make phone calls and saves the IP address.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/sentrypeer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/sentrypeer\/#primaryimage","url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","contentUrl":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","width":"728","height":"380"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/blogger.googleusercontent.com\/img\/a\/AVvXsEhfWQkl5jLyIOSQO63wbBRH3wXDpUTrZWwAgfNpuBfJZMZCzPfZM13Wi5mmX7m4iagmQBC1PMCOwTu2lknHX8QdVB1o4SQqx7D5AkFBBpQYMNDtF1LL6WQQ_8C4HdVNZ84NnjxA2EtcIuty6LCackfiA1qu6TjYQ_R9e7ADuJr9WSL8jyPWxA-VcCoX=s728","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":11690,"url":"https:\/\/kalilinuxtutorials.com\/wave-share\/","url_meta":{"origin":22991,"position":0},"title":"Wave-Share : Serverless, Peer-To-Peer, Local File Sharing Through Sound","author":"R K","date":"October 26, 2020","format":false,"excerpt":"A proof-of-concept for WebRTC signaling using sound. Works with all devices that have microphone + speakers. Runs in the browser. Nearby devices negotiate the WebRTC connection by exchanging the necessary Session Description Protocol (SDP) data via a sequence of audio tones. Upon successful negotiation, a local WebRTC connection is established\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/d30QDrKyQkg\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":11578,"url":"https:\/\/kalilinuxtutorials.com\/the-importance-of-using-a-vpn-while-torrenting\/","url_meta":{"origin":22991,"position":1},"title":"The Importance of Using a VPN While Torrenting","author":"Balaji N","date":"September 25, 2020","format":false,"excerpt":"Torrenting is today\u2019s leading way to share files over the Internet. In the past, friends and family shared physical CDs, checking out the music, DVDs, and games they\u2019ve collected. These days, however, a majority of multimedia releases are accessed in digital form. In other cases, a release might exist in\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36312,"url":"https:\/\/kalilinuxtutorials.com\/rust-libp2p\/","url_meta":{"origin":22991,"position":2},"title":"rust-libp2p : The Backbone Of Peer-to-Peer Networking In Rust","author":"Varshini","date":"February 11, 2025","format":false,"excerpt":"The rust-libp2p repository is the central hub for developing the Rust implementation of the libp2p networking stack, a modular and extensible framework for building peer-to-peer (P2P) applications. It is widely used in distributed systems such as Ethereum, IPFS, and Filecoin. Below is an overview of its functionality and structure. Core\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/rust-libp2p-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34635,"url":"https:\/\/kalilinuxtutorials.com\/wireguard-obfuscator\/","url_meta":{"origin":22991,"position":3},"title":"WireGuard Obfuscator &#8211; Enhancing Privacy By Concealing VPN Traffic","author":"Varshini","date":"August 29, 2024","format":false,"excerpt":"This is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else. It does this by wrapping WireGuard packets in a layer of obfuscation using a simple XOR cipher. Usefull for bypassing DPI (Deep Packet Inspection) firewalls,\u2026","rel":"","context":"In &quot;VPN&quot;","block_context":{"text":"VPN","link":"https:\/\/kalilinuxtutorials.com\/category\/vpn\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgIdBLfriHdsXOiPCctZrBfVjaJaVRSwMJM99I4rgOjWp_1GRFcWH3Y1pIZV2BzvpDFN13NtILsnq7dGwYECQF4ikpxvBU_tCusECJ1_Xd3r9cx8FYet-ogx9uUYGUeGfvMSX8wyv8sJv5Wbc65gBx0_RZgfzapJWd_vUpTAVB4ZEYqxFSPbwTMlJGouJ-a\/s16000\/WireGuard%20Obfuscator.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":25795,"url":"https:\/\/kalilinuxtutorials.com\/how-crypto-can-be-manipulated-fake-identities-in-a-peer-to-peer-model\/","url_meta":{"origin":22991,"position":4},"title":"How Crypto Can Be Manipulated: Fake Identities in a Peer-to-Peer Model","author":"Kaladmin","date":"June 15, 2022","format":false,"excerpt":"Depending on who you ask, cryptocurrency is either a fantastic new era of financial regulation or a confusing mess of gobbledygook. The reality is that it\u2019s both - and its peer-to-peer architecture represents a world-first in currency valuation and control. Sybil attacks occur across all peer-based platforms. It describes the\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9oywJHZmYZoLM8yoUsVQ2Bsu1LuyO3mc3CytWjD8LditcAiDEYxPg-Z3YZPX-ZSqY4iGSqSON3cGul4GhKgclIC6M7Cc1YF3yqWXTtKJECOdivr_5BJohb8mMqI1ayNqyI9AHSWIkZacQm9oqOAEv0Y-8DtNUNWhJkaW1VzMYhbpVWRm1qcRwZB_Vvw\/s16000\/fake%20identities.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9oywJHZmYZoLM8yoUsVQ2Bsu1LuyO3mc3CytWjD8LditcAiDEYxPg-Z3YZPX-ZSqY4iGSqSON3cGul4GhKgclIC6M7Cc1YF3yqWXTtKJECOdivr_5BJohb8mMqI1ayNqyI9AHSWIkZacQm9oqOAEv0Y-8DtNUNWhJkaW1VzMYhbpVWRm1qcRwZB_Vvw\/s16000\/fake%20identities.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9oywJHZmYZoLM8yoUsVQ2Bsu1LuyO3mc3CytWjD8LditcAiDEYxPg-Z3YZPX-ZSqY4iGSqSON3cGul4GhKgclIC6M7Cc1YF3yqWXTtKJECOdivr_5BJohb8mMqI1ayNqyI9AHSWIkZacQm9oqOAEv0Y-8DtNUNWhJkaW1VzMYhbpVWRm1qcRwZB_Vvw\/s16000\/fake%20identities.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9oywJHZmYZoLM8yoUsVQ2Bsu1LuyO3mc3CytWjD8LditcAiDEYxPg-Z3YZPX-ZSqY4iGSqSON3cGul4GhKgclIC6M7Cc1YF3yqWXTtKJECOdivr_5BJohb8mMqI1ayNqyI9AHSWIkZacQm9oqOAEv0Y-8DtNUNWhJkaW1VzMYhbpVWRm1qcRwZB_Vvw\/s16000\/fake%20identities.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEi9oywJHZmYZoLM8yoUsVQ2Bsu1LuyO3mc3CytWjD8LditcAiDEYxPg-Z3YZPX-ZSqY4iGSqSON3cGul4GhKgclIC6M7Cc1YF3yqWXTtKJECOdivr_5BJohb8mMqI1ayNqyI9AHSWIkZacQm9oqOAEv0Y-8DtNUNWhJkaW1VzMYhbpVWRm1qcRwZB_Vvw\/s16000\/fake%20identities.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":31222,"url":"https:\/\/kalilinuxtutorials.com\/exploring-tunneling-solutions\/","url_meta":{"origin":22991,"position":5},"title":"Exploring Tunneling Solutions &#8211; A Comprehensive Guide For Self-Hosters And Developers","author":"Varshini","date":"November 8, 2023","format":false,"excerpt":"The purpose of this list is to track and compare tunneling solutions. This is primarily targeted toward self-hosters and developers who want to do things like exposing a local webserver via a public domain name, with automatic HTTPS, even if behind a NAT or other restricted network. The Dream Researcher\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOyM9_3mlJ92pCRXjwPY7dfEAkXrlQ3q5_ot8G1MmF-3pcPGvMYaVhkOiX0c6qLfFIyYGmVJq8Hh0JBCGUd8QcKAWDWSqUIG_XRM4hhc5wY_6ItzHp0yTIfCjysVv-xYhyT4z75NYn4CD1KG2oLf7b6LbgZn6ybo82eW_euQwHo8icFDx09kYXeq6f8g\/s16000\/Dream.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOyM9_3mlJ92pCRXjwPY7dfEAkXrlQ3q5_ot8G1MmF-3pcPGvMYaVhkOiX0c6qLfFIyYGmVJq8Hh0JBCGUd8QcKAWDWSqUIG_XRM4hhc5wY_6ItzHp0yTIfCjysVv-xYhyT4z75NYn4CD1KG2oLf7b6LbgZn6ybo82eW_euQwHo8icFDx09kYXeq6f8g\/s16000\/Dream.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOyM9_3mlJ92pCRXjwPY7dfEAkXrlQ3q5_ot8G1MmF-3pcPGvMYaVhkOiX0c6qLfFIyYGmVJq8Hh0JBCGUd8QcKAWDWSqUIG_XRM4hhc5wY_6ItzHp0yTIfCjysVv-xYhyT4z75NYn4CD1KG2oLf7b6LbgZn6ybo82eW_euQwHo8icFDx09kYXeq6f8g\/s16000\/Dream.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjOyM9_3mlJ92pCRXjwPY7dfEAkXrlQ3q5_ot8G1MmF-3pcPGvMYaVhkOiX0c6qLfFIyYGmVJq8Hh0JBCGUd8QcKAWDWSqUIG_XRM4hhc5wY_6ItzHp0yTIfCjysVv-xYhyT4z75NYn4CD1KG2oLf7b6LbgZn6ybo82eW_euQwHo8icFDx09kYXeq6f8g\/s16000\/Dream.webp?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=22991"}],"version-history":[{"count":12,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22991\/revisions"}],"predecessor-version":[{"id":23201,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/22991\/revisions\/23201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/23032"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=22991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=22991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=22991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}