Showing 254 open source projects for "ips"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Earn up to 16% annual interest with Nexo. Icon
    Earn up to 16% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    AWS VPC Terraform module

    AWS VPC Terraform module

    Terraform module which creates VPC resources on AWS

    Terraform module which creates VPC resources on AWS. By default this module will provision new Elastic IPs for the VPC's NAT Gateways. This means that when creating a new VPC, new IPs are allocated, and when that VPC is destroyed those IPs are released. Sometimes it is handy to keep the same IPs even after the VPC is destroyed and re-created. To that end, it is possible to assign existing IPs to the NAT Gateways. This prevents the destruction of the VPC from releasing those IPs, while making it possible that a re-created VPC uses the same IPs. ...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    XIU2/CloudflareSpeedTest

    XIU2/CloudflareSpeedTest

    "Preferred IP" Test Cloudflare CDN latency and speed

    "Preferred IP" Test Cloudflare CDN latency and speed, get the fastest IP (IPv4 / IPv6)! In addition, other CDN / website IPs are also supported. Many foreign websites are using Cloudflare CDN, but the IPs assigned to visitors from mainland China are not friendly (high latency, high packet loss, and slow speed). Although Cloudflare discloses all IP segments , it would be exhausting to find the one that suits you among so many IPs, so this software came into existence. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    EdgeVPN

    EdgeVPN

    The immutable, decentralized, statically built p2p VPN

    Fully Decentralized. Immutable. Portable. Easy to use Statically compiled VPN and a reverse proxy over p2p. EdgeVPN uses libp2p to build private decentralized networks that can be accessed via shared secrets.
    Downloads: 63 This Week
    Last Update:
    See Project
  • 4
    Docker tools

    Docker tools

    Useful tools when you are running your project inside docker container

    Running a DNS service for docker containers always messes with the DNS settings of your workstation. Especially if these DNS/discovery services themselves run inside docker containers on an active development workstation. Resolving DNS issues is not an easy task. Contrary to that the hosts file is simple. The script first removes all existing entries of all the hostnames of containers created by docker-compose. Configure the environment variables in your .env file. That way it can be used by...
    Downloads: 5 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 5
    SELKS

    SELKS

    A Suricata based IDS/IPS/NSM distro

    SELKS is a free and open source Debian-based IDS/IPS/Network Security Monitoring platform released under GPLv3 from Stamus Networks. SELKS can be installed via docker-compose on any Linux or Windows OS. Once installed it is ready to use out of the box solution. SELKS ISOs are also available for air-gapped environments or bare metal or VM installation. SELKS is a showcase of what Suricata IDS/IPS/NSM can do and the network protocol monitoring logs and alerts it produces. ...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6
    CrowdSec

    CrowdSec

    Firewall able to analyze visitor behavior & provide adapted response

    ...Crowdsec shouldn't, and didn't crash any production so far we know, but some features might be missing or undergo evolutions. IP Blocklists are limited to very-safe-to-ban IPs only (~5% of the global database so far, will grow soon). A modern behavior detection system, written in Go. It stacks on Fail2ban's philosophy, but uses Grok patterns & YAML grammar to analyse logs, a modern decoupled approach (detect here, remedy there) for Cloud/Containers/VM based infrastructures. Once detected you can remedy threats with various bouncers (block, 403, Captchas, etc.) and blocked IPs are shared among all users to further improve their security. ...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 7
    Hellzerg Optimizer

    Hellzerg Optimizer

    The finest Windows Optimizer

    Advanced configuration utility that helps you restore your privacy and increase your security. Optimizer is recommended after a fresh, clean installation of Windows to achieve maximum privacy and security. Depending on your version of Windows, Optimizer will also allow you to perform some specific tweaks.
    Downloads: 160 This Week
    Last Update:
    See Project
  • 8
    Weron

    Weron

    Overlay networks based on WebRTC.

    ...Weron allows developers to create scalable mesh or point-to-point networks for applications like remote desktop, Kubernetes access, or collaborative tools—all without requiring public IPs or complicated port forwarding.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    theHarvester

    theHarvester

    E-mails, subdomains and names

    ...Use it for open source intelligence (OSINT) gathering to help determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs and URLs using multiple public data sources.
    Downloads: 45 This Week
    Last Update:
    See Project
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 10
    cloudflare-speed-cli

    cloudflare-speed-cli

    CLI for internet speed test via cloudflare

    ...The tool also stores historical test results and can export measured data as structured JSON for scripting, logging, or integration with automation tools. Users can bind tests to specific network interfaces or source IPs, making it flexible for complex networking environments or servers with multiple network paths. In addition to TUI mode, it supports headless text or JSON output for pipelines and monitoring systems.
    Downloads: 9 This Week
    Last Update:
    See Project
  • 11
    Lokinet

    Lokinet

    Lokinet is an anonymous, decentralized and IP based overlay network

    ...Nobody can shut it down. Nobody can spy on you. Lokinet traffic is onion-routed. Your browsing is private, secure, and anonymous. Lokinet hides your IP. Lokinet hides the IPs you connect to. Your location and identity are unknown.
    Downloads: 20 This Week
    Last Update:
    See Project
  • 12
    NetBird

    NetBird

    Connect your devices into a secure WireGuard-based overlay network

    ...Every machine in the network runs NetBird Agent (or Client) that manages WireGuard. Every agent connects to Management Service that holds network state, manages peer IPs, and distributes network updates to agents (peers). NetBird agent uses WebRTC ICE implemented in pion/ice library to discover connection candidates when establishing a peer-to-peer connection between machines.
    Downloads: 100 This Week
    Last Update:
    See Project
  • 13
    Sippts

    Sippts

    Set of tools to audit SIP based VoIP Systems

    ...Sippts is a set of tools to audit VoIP servers and devices using SIP protocol. Sipscan is a fast scanner for SIP services that uses multithread. Sipscan can check several IPs and port ranges and it can work over UDP or TCP. Sipexten identifies extensions on a SIP server. Also tells you if the extension line requires authentication or not. Sipexten can check several IPs and port ranges.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    ImHex

    ImHex

    A Hex Editor for Reverse Engineers, Programmers

    ImHex is a Hex Editor, a tool to display, decode and analyze binary data to reverse engineer their format, extract informations or patch values in them. What makes ImHex special is that it has many advanced features that can often only be found in paid applications. Such features are a completely custom binary template and pattern language to decode and highlight structures in the data, a graphical node-based data processor to pre-process values before they're displayed, a disassembler,...
    Downloads: 56 This Week
    Last Update:
    See Project
  • 15
    ngx_waf

    ngx_waf

    Handy, High performance, ModSecurity compatible Nginx firewall module

    Handy, High-performance Nginx firewall module. Such as black and white list of IPs or IP range, uri black and white list, and request body black list, etc. Directives and rules are easy to write and readable. The IP detection is a constant-time operation. Most of the remaining inspections use caching to improve performance. Compatible with ModSecurity's rules, you can use OWASP ModSecurity Core Rule Set. Supports verifying Google, Bing, Baidu and Yandex crawlers and allowing them automatically to avoid false positives. ...
    Downloads: 9 This Week
    Last Update:
    See Project
  • 16
    Narrowlink

    Narrowlink

    A self-hosted solution to enable secure connectivity between devices

    Narrowlink is a zero-config tunneling and reverse proxy solution that enables secure access to services behind firewalls or NATs without exposing public IPs. Unlike traditional tools like ngrok, Narrowlink is peer-to-peer and privacy-focused, using WireGuard and WebRTC to establish direct encrypted tunnels between peers. It is designed to make exposing local services simple, fast, and secure with no need for port forwarding or cloud relays. Narrowlink is ideal for developers, self-hosters, and remote teams looking for frictionless, encrypted connectivity.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    X-osint

    X-osint

    Open source OSINT tool for gathering data on emails, phones, and IPs

    X-osint is an open source intelligence framework designed to collect and analyze publicly available information from multiple sources. It focuses on gathering useful and credible data about entities such as phone numbers, email addresses, and IP addresses using a range of automated OSINT techniques. It provides investigators and researchers with a centralized interface for running information-gathering tasks that would normally require multiple separate tools. X-osint can also perform...
    Downloads: 37 This Week
    Last Update:
    See Project
  • 18
    OpenSnitch

    OpenSnitch

    OpenSnitch is a GNU/Linux port of the Little Snitch firewall

    ...When you open the GUI, you'll see all the connections and processes that the daemon has intercepted. Double click on a row to view the details of a process, rule, host or user. Once you know which are the common processes, IPs and hosts that your machine is connecting to, you can start creating permanent rules (Duration: always) to deny or allow them. You can also convert temporary rules to permanent by right-clicking on a temporary rule or by double-clicking on it, and then edit it. By default OpenSnitch UI listens on a local Unix socket in /tmp/osui.sock.
    Downloads: 31 This Week
    Last Update:
    See Project
  • 19
    GitHub520

    GitHub520

    Community-maintained approach to improving access to GitHub services

    ...The repository provides a regularly updated list of domain-to-IP entries meant to be appended to a system’s hosts file so certain GitHub endpoints resolve faster or more reliably. It includes scripts or guidance to automate updates, reducing the need for manual lookups when IPs change. The project’s goal is pragmatic: improve developer productivity by mitigating timeouts and slow asset retrieval during cloning, package installs, or browsing. It is intended for users who understand the implications of hosts modifications and want a reversible, client-side tweak. While simple in concept, it has become a widely referenced workaround for network constraints affecting developer workflows.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 20
    streetmerchant

    streetmerchant

    The world's easiest, most powerful stock checker

    ...Some basic understanding how a terminal, git, and or Node.js is a bonus, but that does not limit you to getting streetmerchant running! There is a lot of undefined behavior with using streetmerchant in the cloud. Some sites may block IPs from your cloud provider. It is possible that a VPN will help circumvent these problems.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 21
    Kohaku

    Kohaku

    Privacy-first tooling for the Ethereum ecosystem

    ...It comprises an SDK of privacy primitives, a reference wallet implementation (browser extension), and a collaboration platform for existing wallet teams to adopt composable privacy building blocks. The project recognizes that privacy leaks in Ethereum go beyond just on-chain visibility — they include RPC endpoints exposing IPs, address reuse across dApps, and metadata captured by analytics or monitoring systems. Kohaku addresses privacy holistically: from local light-client verification (to reduce reliance on centralized RPCs) to per-dApp account isolation (so one user session cannot be correlated across services). It also integrates with existing privacy protocols (e.g., shielded transaction pools) and envisions long-term capabilities like post-quantum signatures, hardware wallet hooks, and minimal-trust data queries (TEE/ORAM or PIR).
    Downloads: 10 This Week
    Last Update:
    See Project
  • 22
    NSmartProxy

    NSmartProxy

    NSmartProxy is an open source reverse proxy tool

    NSmartProxy is a reverse proxy system that enables external access to devices or applications behind NAT/firewalls without requiring public IPs or router configuration. It’s designed to work with desktop and server apps, and includes a centralized SmartNode server that helps initiate and maintain tunnel connections. This makes it ideal for remote access to local services or self-hosted applications. NSmartProxy supports both TCP and UDP protocols, making it versatile for a wide range of network needs.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Prometheus Redis Metrics Exporter

    Prometheus Redis Metrics Exporter

    Prometheus Exporter for Redis Metrics. Supports Redis 2.x, 3.x, 4.x, 5

    Prometheus exporter for Redis metrics. Supports Redis 2.x, 3.x, 4.x, 5.x, 6.x, and 7.x. To have instances in the drop-down as human readable names rather than IPs, it is suggested to use instance relabelling. The Prometheus docs have a very informative article on how multi-target exporters are intended to work. Run the exporter with the command line flag --redis.addr= so it won't try to access the local instance every time the /metrics endpoint is scraped. If authentication is needed for the Redis instances then you can set the password via the --redis.password command line option of the exporter (this means you can currently only use one password across the instances you try to scrape this way. ...
    Downloads: 8 This Week
    Last Update:
    See Project
  • 24
    ADAMANT Messenger Progressive Web App

    ADAMANT Messenger Progressive Web App

    ADAMANT decentralized Messenger, progressive web application

    ...Users take full responsibility for their content, messages, media, and goals and intentions of using the messenger. Privacy is the main concept of ADAMANT, neither phone numbers nor emails are required. Apps have no access to the contact list or geotags, IPs are hidden from chatters and paranoids can use Tor app. All the messages are encrypted with the Diffie-Hellman Curve25519, Salsa20, Poly1305 algorithms and signed by SHA-256 + Ed25519 EdDSA. Private keys are never transferred to the network.
    Downloads: 12 This Week
    Last Update:
    See Project
  • 25
    Fail2Ban

    Fail2Ban

    Daemon to ban hosts that cause multiple authentication errors

    Fail2Ban scans log files and bans IPs that show the malicious signs -- too many password failures, seeking for exploits, etc. Generally Fail2Ban is then used to update firewall rules to reject the IP addresses for a specified amount of time, although any arbitrary other action (e.g. sending an email) could also be configured. Out of the box Fail2Ban comes with filters for various services (apache, courier, ssh, etc).
    Downloads: 7 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • 5
  • Next
MongoDB Logo MongoDB