DataTables filter by ip address

DataTables filter by ip address

I had to make a custom filter for ip address which accepted cidr notation (e.g /24). While there was the function to sort by ip at the time when i was doing it, a filter by ip address that accepted cidr or subnet masks function didn’t seem to have been implemented. I couldn’t find any publicly available solution online either, so i took some time to implement it. The solution is in php but can be easily ported to javascript/html if you wish

To get it to work on your own code, you will have to modify the 2 variables

var ipColNum = 0; // column number of your ip address

var tableId = “#results”; // table id that you want to attach datatables to

<script src=""></script>

<link rel='stylesheet' type='text/css' href='//'/>
<script type='text/javascript' src='//'></script>

<table id="results">
      <th>Ip Address</th>
      <td>abc country</td>
      <td>xyz country</td>
      <td>john country</td>
      <td>sally country</td>

    var table = null;
    var ipColNum = 0; // set the column number for the ip address
    var tableId = "#results";
    function getIpRangeFromAddressAndNetmask(str) {
      var part = str.split("/"); // part[0] = base address, part[1] = netmask
      var ipaddress = part[0].split('.');
      var netmaskblocks = ["0","0","0","0"];
      if(!/\d+\.\d+\.\d+\.\d+/.test(part[1])) {
        // part[1] has to be between 0 and 32
        netmaskblocks = ("1".repeat(parseInt(part[1], 10)) + "0".repeat(32-parseInt(part[1], 10))).match(/.{1,8}/g);
        netmaskblocks = { return parseInt(el, 2); });
      } else {
        netmaskblocks = part[1].split('.').map(function(el) { return parseInt(el, 10) });
      var invertedNetmaskblocks = { return el ^ 255; });
      var baseAddress =, idx) { return block & netmaskblocks[idx]; });
      var broadcastaddress =, idx) { return block | invertedNetmaskblocks[idx]; });
      return [baseAddress.join('.'), broadcastaddress.join('.')];

  function ip2long(IP) {
    var i = 0;
    IP = IP.match( /^([1-9]\d*|0[0-7]*|0x[\da-f]+)(?:\.([1-9]\d*|0[0-7]*|0x[\da-f]+))?(?:\.([1-9]\d*|0[0-7]*|0x[\da-f]+))?(?:\.([1-9]\d*|0[0-7]*|0x[\da-f]+))?$/i );
    if (!IP) { return false; }
    IP[0] = 0;
    for (i = 1; i < 5; i += 1) {
      IP[0] += !!((IP[i] || '').length);
      IP[i] = parseInt(IP[i]) || 0;
    IP.push(256, 256, 256, 256);
    IP[4 + IP[0]] *= Math.pow(256, 4 - IP[0]);
    if (IP[1] >= IP[5] || IP[2] >= IP[6] || IP[3] >= IP[7] || IP[4] >= IP[8]) { return false; }
    return IP[1] * (IP[0] === 1 || 16777216) + IP[2] * (IP[0] <= 2 || 65536) + IP[3] * (IP[0] <= 3 || 256) + IP[4] * 1;

var ipFilter = function(searchValue) {
        function( settings, data, dataIndex ) {
            console.log("srchValue" + searchValue);
            var ipRange = searchValue;
            var colIpAddr = data[0]; // use data for the age column
     				var range = getIpRangeFromAddressAndNetmask(ipRange);
            var min = ip2long(range[0]);
            var max = ip2long(range[1]);

            //console.log("min : " + min + " max : " + max);
            //console.log("chk : " + colIpAddr);

            var longIpAddr = ip2long(colIpAddr);
            if( longIpAddr >= min && longIpAddr <= max ) {
                return true;
            return false;



$(document).ready( function () {
    table = $(tableId).DataTable({
        responsive: true

    if( !table ) {
        console.log("Failed to initialize DataTable()");
    } else {
        // Change filter algorithm when cidr notation detected
        $('.dataTables_filter input').unbind().keyup(function() 
            var value = $(this).val();
            if (value.length==0) {

            // Must have the format 
            // Does not match any string without a '/<number>' at the back.
            if( /^([0-9]{1,3}\.){3}[0-9]{1,3}(\/([0-9]|[1-2][0-9]|3[0-2]))$/.test(value) ) {
                // We need to reset the table first, otherwise our filter won't work 
                // probably because it detects e.g ->, ,, The earlier 2 has to results.
            } else {
} );



See it in action over at the JsFiddle : here or below .You can test it out by putting a search value of “” or any others of your choice

Enjoyed the content ? Share it with your friends !

How to secure your android app

How to secure your android app using android code obfuscation

A common android obfuscation tool that comes with Android Studio is ProGuard. Its free and simple to use. No code is needed on the developer’s part as the output is obfuscated during the build process. Basically this tool is able to do simple obfuscation such as name mangling – changing of package, method and variable names. There are limits to what it can obfuscate though, such as being unable to obfuscate third-party library references as it will very likely break that functionality if it does so.

There are also other obfuscation tools, some that are commercial also. Just google around and you can find others that suits you (if ProGuard doesn’t)

Note : ProGuard is turned off by default.

Enjoyed the content ? Share it with your friends !

Analysis on VestaCP exploit

Analysis on VestaCP exploit

The first report of exploit was on April 07, 2018 2:56 pm on VestaCP’s official forum. The hackers seems to have gotten access to the server 2-3 weeks before and let their malware – which was a XorDDos variant, stay dormant till April 7. The hackers used the compromised systems to launch a Ddos attack to the ip below : – ISP : Beijing Faster Internet Technology Co.,Ltd

It is crucial that you take down any servers that have VestaCP running immediately and do the following

– Check for the presence of malware

 Go to your /etc/cron.hourly folder and check for a file called

– Run an antivirus scan (clamav can pick this malware up)
– Reinstall if necessary

From the looks of it, nobody knows how the actual attackers compromised the systems and what expoit they have used to gain entry. Although the VestaCP team has patched a few security loopholes, it can’t be confirmed that those were the same entrypoint used by the hackers. Hence, it still poses a huge risk to continue using VestaCP.  It is recommended that if you need to manage your web server again, you should
1. Lockdown your server to specific ip address
2. Look to other control panels, if possible, commercial ones like CPanel as they have dedicated security review and response team.

Also, follow these threads to get updates on the current status of VestaCP

Enjoyed the content ? Share it with your friends !

Python pingsweep script

Python pingsweep script

This python pingsweep script basically does a ping sweep over a specified ip range (with cidr notation) and generates the output in a .txt file . it should work on both python2+ and python3+

Output will give the following fields

  • ip address
  • reverse nslookup for domain name
  • get title of website if any
  • get http code

It currently is only able to do /24 scans (256 ips).If i have time in the future i will work on it to accept any ip range, and hopefully make it multi-threaded so that scans don’t take too low.

The code may be outdated. So best to refer to github link below

# ping sweep
# firstly, we ping to see if the server at ip is alive
# secondly, we test to see if it responds to http request(80)

import subprocess
import os
import urllib.request
import socket

def log_ping(file_name, msg):
    with open(file_name, "a") as ipFile:
        ipFile.write(msg + "\n")

def http_ping(ip):
        response = urllib.request.urlopen("http://" + ip).getcode()
        return response
        return 0
def rdns_lookup(ip):
        return socket.gethostbyaddr(ip)
    except socket.error:
        return "<couldnt get domain name>"
def get_html_title(ip):
    webpage = urllib.request.urlopen("http://" + ip).read()
    html = str(webpage)
    if "<title>" in html: #sometimes the document doesnt have a title tag
        title = html.split('<title>')[1].split('</title>')[0]
        return title
    return "<cant parse title>"
ip = input("Enter a /24 in the format e.g 10.21.32. : ")	
if ip.count('.') != 3:
    input("IP Format is wrong. Please restart and try again ")
file_name = ip + "0.txt"
log_ping(file_name, "The format is as follow - <ip address>, <active>, <http response code>, <html title>")
with open(os.devnull, "wb") as limbo:
    for n in range(0, 256):
        scan_ip = ip + str(n) 
        result=subprocess.Popen(["ping", "-n", "1", "-w", "200", scan_ip],
        stdout=limbo, stderr=limbo).wait()
        if result:
            msg = scan_ip + " inactive"
            log_ping(file_name, msg)
            response = http_ping(scan_ip)
            title = ""
            if response == 200:
                title = get_html_title(scan_ip)
            domain = rdns_lookup(scan_ip)
            msg = scan_ip + "({0})".format(domain) + " active, " + str(response) + " , " + title
            log_ping(file_name, msg)

Github link : here



Enjoyed the content ? Share it with your friends !

5 Tips to keep your android device safe

5 Tips to keep your android device safe

  1. Install security software (aka Anti-virus)
    Installing them will help to ward off malicious apps or links which could lead to your android device being compromised. Of course, this alone is not enough. There are many factors that lead to a device being compromised.
  2. Install updates and apply patches
    Do you often get system update notifications but sweep them off because they take too long and are too noisy? Don’t do that anymore. System updates are very important as they usually contain fixes to various security flaws.
  3. Secure settings and configuration
    Ensure that your android device has the right settings that is secure – that your device does not allow apps from unknown sources to be installed. This means apps can only be installed from the official play store app and not third party app stores.

      • Ensure that Settings > Security > Unknown Sources is unchecked
      • Ensure that Settings > Security > Verify Apps is checked (some device may not have this option)

      It is important that you do not make exceptions, even if its a one-off thing, to the settings as that one time is all it takes for a malicious app to take over your device !

  4. Review app permissions
    Never rush to download and install the app. Look at what permissions it requires and think about it logically. For example, would a note-taking app require permission to be able to use your phone’s camera or send sms? Highly unlikely. That makes the app very suspicious and should be a signal to not proceed installing the app.
    Besides, there are usually many alternatives available, you just got to find the right one.
  5. See the statistics
    Two key indicators I use are the number of downloads and reviews
    Number of downloads
    More downloads means that more user have already used the app. Should the app be malicious, there is a higher chance that someone would have already experienced it and reported it.
    Look at the reviews and see what other people say about the app. Some keywords to look out for are “App crash”, “make my phone hot”, “extremely slow”. Look also at the number of reviews that have these keywords of course. A high number of reviews of such kind may be a good indicator that something is wrong with the app. So don’t bother with the app. Besides what’s the point of using an app that crash, makes your phone hot, or is so slow that its unusable?


These 5 points are probably a good start to keeping your device secure. Ultimately, you are responsible for keeping your device safe, so take the necessary steps and precautions to do so. Stay safe !

Enjoyed the content ? Share it with your friends !