Ranking Alexa Global: # 3,922,268
Server:nginx/1.10.3 (Ubuntu...
X-Powered-By:PHP/7.1.11
The main IP address: 51.15.213.54,Your server United Kingdom,London ISP:UK Government Department for Work and Pensions TLD:net CountryCode:GB
The description :toggle navigation http error 418 – i’m a teapot puyb's blog accueil cv about contact a vendre juil 04 2018 création de i skate paris avec les amis du puc roller, nous avons décidé de quitter se dernie...
This report updates in 25-Aug-2018
Created Date: | 2001-05-11 |
Changed Date: | 2016-08-25 |
Expires Date: | 2024-05-11 |
Geo IP provides you such as latitude, longitude and ISP (Internet Service Provider) etc. informations. Our GeoIP service found where is host puyb.net. Currently, hosted in United Kingdom and its service provider is UK Government Department for Work and Pensions .
Latitude: | 51.508529663086 |
Longitude: | -0.12574000656605 |
Country: | United Kingdom (GB) |
City: | London |
Region: | England |
ISP: | UK Government Department for Work and Pensions |
HTTP Header information is a part of HTTP protocol that a user's browser sends to called nginx/1.10.3 (Ubuntu) containing the details of what the browser wants and will accept back from the web server.
X-Powered-By: | PHP/7.1.11 |
Transfer-Encoding: | chunked |
Content-Encoding: | gzip |
Server: | nginx/1.10.3 (Ubuntu) |
Connection: | keep-alive |
Link: | |
Date: | Fri, 24 Aug 2018 18:52:32 GMT |
Content-Type: | text/html; charset=UTF-8 |
soa: | nsa.bookmyname.com. hostmaster.bookmyname.com. 1534088811 43200 3600 604800 3600 |
txt: | "v=spf1 a mx a:zap.puyb.net ?all" |
ns: | nsb.bookmyname.com. nsc.bookmyname.com. nsa.bookmyname.com. |
ipv4: | IP:51.15.213.54 ASN:12876 OWNER:AS12876, FR Country:FR |
mx: | MX preference = 10, mail exchanger = zap.puyb.net. |
toggle navigation http error 418 – i’m a teapot puyb's blog accueil cv about contact a vendre juil 04 2018 création de i skate paris avec les amis du puc roller, nous avons décidé de quitter se dernier pour créer un nouveau club : i skate paris vous pouvez consulter notre projet sur ce lien grace a ce nouveau club, nous allons pouvoir enfin nous lancer librement dans des projets roller intéressant et continuer les 6h de paris. faire un commentaire fév 10 2018 home server (re)installation yesterday, after a power outage, the ssd inside my home server fried… as usual, i realised how many things were not backed up after the fact… that’s ironic when you know that one of the purpose of this machine was backuping my stuff ! the roles of the servers are : internet gateway wireless access point storage server media player web server (for websites without critical importance, like tests sites, etc) torrents in this article (and the next ones), i’ll describe the setup of the new server. hardware : the server is a pc stuffed with many hard drives, 2 ethernet card and a wifi card, hooked up to a tv. the system is a standard arch linux on a ssd. the data hard drives are configured as a btrfs volume in raid1. one nic is plugged into my isp fibre adapter, the other one is plugged into my local network. network configuration i used systemd-networkd to configure my network, hostapd for the wireless access point and dnsmasq for the dhcp/dns. shell pacman -s bridge-utils hostapd openssh fail2ban dnsmasq 1 pacman - s bridge - utils hostapd openssh fail2ban dnsmasq first, renaming the interfaces : /etc/systemd/network/10-lan.link /etc/systemd/network/10-lan.link ini [match] macaddress=74:d4:35:e8:b3:0e [link] name=lan 1 2 3 4 5 [match] macaddress = 74 : d4 : 35 : e8 : b3 : 0e [link] name = lan /etc/systemd/network/10-wan.link ini [match] macaddress=74:d4:35:e8:b3:0c [link] name=wan 1 2 3 4 5 [match] macaddress = 74 : d4 : 35 : e8 : b3 : 0c [link] name = wan /etc/systemd/network/10-wlan0.link ini [match] macaddress=80:86:f2:5f:a9:a1 [link] name=wlan0 1 2 3 4 5 [match] macaddress = 80 : 86 : f2 : 5f : a9 : a1 [link] name = wlan0 then i’ve created a new bridge interface. this interface will connect the wired and wireless lan into one network. /etc/systemd/network/20-br0.netdev ini [netdev] name=br0 kind=bridge 1 2 3 [netdev] name = br0 kind = bridge i’ve added the wired lan network to the bridge. the wireless lan network will be added by hostapd. /etc/systemd/network/20-lan.network ini [match] name=lan [network] bridge=br0 1 2 3 4 5 [match] name = lan [network] bridge = br0 i ‘ve configured the lan network to a staic ip /etc/systemd/network/30-br0.network ini [match] name=br0 [network] address=192.168.42.254/24 dns=80.80.80.80 #dns=8.8.8.8 1 2 3 4 5 6 7 [match] name = br0 [network] address = 192.168.42.254 / 24 dns = 80.80.80.80 # dns = 8.8.8.8 then i’ve setup the wan network as a dhcp. my internet provider (sfr) require a vendor class starting by neufbox*. i also added ipforward=yes (this used to be done through sysctl or /proc). this command just activate the routing functionality inside the linux kernel. it could be added to any interface. /etc/systemd/network/30-wan.network ini [match] name=wan [network] #ipmasquerade=yes ipforward=yes dhcp=yes [dhcp] vendorclassidentifier=neufbox-bypassedneufbox-directconnectiontoftth-puyb@puyb.net 1 2 3 4 5 6 7 8 9 10 [match] name = wan [network] # ipmasquerade = yes ipforward = yes dhcp = yes [dhcp] vendorclassidentifier = neufbox - bypassedneufbox - directconnectiontoftth - puyb @ puyb . net then i’ve implement my firewall rules : /etc/iptables/iptables.rules # generated by iptables-save v1.6.1 on sat feb 10 18:41:10 2018 *filter :input drop [0:0] :forward accept [506:47311] :output accept [27428:4233911] :tcp - [0:0] :udp - [0:0] -a input -m conntrack --ctstate related,established -j accept -a input -i lo -j accept -a input -m conntrack --ctstate invalid -j drop -a input -p icmp -m icmp --icmp-type 8 -m conntrack --ctstate new -j accept -a input -p udp -m conntrack --ctstate new -j udp -a input -p tcp -m tcp --tcp-flags fin,syn,rst,ack syn -m conntrack --ctstate new -j tcp -a input -p udp -j reject --reject-with icmp-port-unreachable -a input -p tcp -j reject --reject-with tcp-reset -a input -j reject --reject-with icmp-proto-unreachable -a forward -m conntrack --ctstate related,established -j accept -a tcp -p tcp -m tcp --dport 22 -j accept -a tcp -s 192.168.42.0/24 -p tcp -j accept -a udp -s 192.168.42.0/24 -p udp -j accept -a udp -i br0 -p udp -m udp --dport 67 -j accept commit # completed on sat feb 10 18:41:10 2018 # generated by iptables-save v1.6.1 on sat feb 10 18:41:10 2018 *nat :prerouting accept [12773:981683] :input accept [507:45818] :output accept [7126:640794] :postrouting accept [7886:703974] -a postrouting -s 192.168.42.0/24 -o wan -j masquerade commit # completed on sat feb 10 18:41:10 2018 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 # generated by iptables-save v1.6.1 on sat feb 10 18:41:10 2018 * filter : input drop [ 0 : 0 ] : forward accept [ 506 : 47311 ] : output accept [ 27428 : 4233911 ] : tcp - [ 0 : 0 ] : udp - [ 0 : 0 ] - a input - m conntrack -- ctstate related , established - j accept - a input - i lo - j accept - a input - m conntrack -- ctstate invalid - j drop - a input - p icmp - m icmp -- icmp - type 8 - m conntrack -- ctstate new - j accept - a input - p udp - m conntrack -- ctstate new - j udp - a input - p tcp - m tcp -- tcp - flags fin , syn , rst , ack syn - m conntrack -- ctstate new - j tcp - a input - p udp - j reject -- reject - with icmp - port - unreachable - a input - p tcp - j reject -- reject - with tcp - reset - a input - j reject -- reject - with icmp - proto - unreachable - a forward - m conntrack -- ctstate related , established - j accept - a tcp - p tcp - m tcp -- dport 22 - j accept - a tcp - s 192.168.42.0 / 24 - p tcp - j accept - a udp - s 192.168.42.0 / 24 - p udp - j accept - a udp - i br0 - p udp - m udp -- dport 67 - j accept commit # completed on sat feb 10 18:41:10 2018 # generated by iptables-save v1.6.1 on sat feb 10 18:41:10 2018 * nat : prerouting accept [ 12773 : 981683 ] : input accept [ 507 : 45818 ] : output accept [ 7126 : 640794 ] : postrouting accept [ 7886 : 703974 ] - a postrouting - s 192.168.42.0 / 24 - o wan - j masquerade commit # completed on sat feb 10 18:41:10 2018 wireless access point: /etc/hostapd/hostapd.conf ini interface=wlan0 bridge=br0 ssid=puyb.net driver=nl80211 country_code=fr hw_mode=g channel=7 max_num_sta=50 wme_enabled=1 ieee80211n=1 ht_capab=[ht40+][short-gi-40][dsss_cck-40] wpa=2 auth_algs=1 rsn_pairwise=ccmp wpa_key_mgmt=wpa-psk wpa_passphrase=replaceme logger_stdout=-1 logger_stdout_level=2 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 interface = wlan0 bridge = br0 ssid = puyb . net driver = nl80211 country_code = fr hw_mode = g channel = 7 max_num_sta = 50 wme_enabled = 1 ieee80211n = 1 ht_capab = [ht40+] [short-gi-40] [dsss_cck-40] wpa = 2 auth_algs = 1 rsn_pairwise = ccmp wpa_key_mgmt = wpa - psk wpa_passphrase = replaceme logger_stdout = - 1 logger_stdout_level = 2 then the dhcp server / dns cache: /etc/dnsmasq.conf ini interface=br0 dhcp-range=192.168.42.1,192.168.42.150,12h 1 2 interface = br0 dhcp - range = 192.168.42.1 , 192.168.42.150 , 12h then i’ve enabled all service: shell systemctl enable --now systemd-networkd systemd-resolved systemctl enable --now iptables systemctl enable --now sshd fail2ban systemctl enable --now dnsmasq systemctl enable --now hostapd 1 2 3 4 5 systemctl enable -- now systemd - networkd systemd - resolved systemctl enable -- now iptables systemctl enable -- now sshd fail2ban systemctl enable -- now dnsmasq systemctl enable -- now hostapd that’s it for the network part. stay tuned for the rest of the config ! faire un commentaire oct 02 2016 utiliser la fibre orange en dhcp ce matin, mon router ne pouvait plus se connecter à internet. il
https://puyb.net/2007/01/
https://puyb.net/2013/03/xkcd-stacksort/
https://puyb.net/2006/01/
https://puyb.net/2008/04/
http://puyb.net/wp-content/uploads/2013/04/13040027.jpg
http://puyb.net/wp-content/uploads/2013/04/13040019.jpg
https://puyb.net/2011/03/
https://puyb.net/2013/04/
https://puyb.net/2013/03/
https://puyb.net/2006/09/
https://puyb.net/2010/03/
https://puyb.net/2016/10/utiliser-la-fibre-orange-en-dhcp/
https://puyb.net/2009/12/
https://puyb.net/2013/03/remplacer-google-reader/#respond
https://puyb.net/2015/05/devdocs-un-site-pour-toutes-les-docs-de-dev/#comments
Whois is a protocol that is access to registering information. You can reach when the website was registered, when it will be expire, what is contact details of the site with the following informations. In a nutshell, it includes these informations;
Domain Name: puyb.net
Registry Domain ID: 70755573_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.bookmyname.com
Registrar URL: http://www.bookmyname.com
Updated Date: 2015-01-15T20:28:52.0Z
Creation Date: 2001-05-11T23:57:33.0Z
Registrar Registration Expiration Date: 2024-05-11T23:57:33.0Z
Registrar: ONLINE SAS
Registrar IANA ID: 74
Registrar Abuse Contact Email: [email protected]
Registrar Abuse Contact Phone: +33.184130099
Reseller:
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: PUYBAREAU STEPHANE
Registrant Organization: Puybareau Stephane
Registrant Street: Puybareau stephane ([email protected]), 270 Route de Dieppe
Registrant City: 270 ROUTE DE DIEPPE, N/A
Registrant State/Province:
Registrant Postal Code: 76960
Registrant Country: FR
Registrant Phone: +1.1
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: [email protected]
Registry Admin ID:
Admin Name: GUILLAUME PATTE
Admin Organization: UNIMATRIX
Admin Street: 81 RUE D ELBEUF
Admin City: ROUEN
Admin State/Province:
Admin Postal Code: 76100
Admin Country: FR
Admin Phone: +33.873178989
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: [email protected]
Registry Tech ID:
Tech Name: GUILLAUME PATTE
Tech Organization: UNIMATRIX
Tech Street: 81 RUE D ELBEUF
Tech City: ROUEN
Tech State/Province:
Tech Postal Code: 76100
Tech Country: FR
Tech Phone: +33.873178989
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: [email protected]
Name Server: ns1.p3xlabs.com
Name Server: ns-slave.free.org
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2017-06-24T18:44:22.0Z <<<
For more information on Whois status codes, please visit
https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en
For support or more information about this domain name please contact
http://www.unimatrix.fr
%% Whois
%%
%% NOTICE: Access to this information is provided to assist persons
%% in determining the contents of a domain name registration record in
%% our database. The data in this record is provided for informational
%% purposes only.
%% You agree that you will use this data only for lawful purposes and
%% that, under no circumstances will you use this data to: (a) allow,
%% enable, or otherwise support the transmission by e-mail, telephone, or
%% facsimile of mass unsolicited, commercial advertising or solicitations
%% to entities other than the data recipient's own existing customers;
%% or (b) enable high volume, automated, electronic processes that
%% send queries or data to the systems of Registry Operator or any
%% ICANN-Accredited Registrar, except as reasonably necessary to register
%% domain names or modify existing registrations.
%% All rights reserved. These terms can be modify at any time.
%% By submitting this query, you agree to abide by this policy.
REGISTRAR ONLINE SAS
REFERRER http://www.bookmyname.com
SERVERS
SERVER net.whois-servers.net
ARGS domain =puyb.net
PORT 43
SERVER whois.bookmyname.com
ARGS puyb.net
PORT 43
TYPE domain
DOMAIN
NAME puyb.net
NSERVER
NS-SLAVE.FREE.ORG 88.191.249.137
NS1.P3XLABS.COM 62.210.217.177
STATUS
clientTransferProhibited https://icann.org/epp#clientTransferProhibited
CHANGED 2016-08-25
CREATED 2001-05-11
EXPIRES 2024-05-11
REGISTERED yes
The following list shows you to spelling mistakes possible of the internet users for the website searched .