<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Henning</title>
    <description>The latest articles on DEV Community by Henning (@mutebefehl).</description>
    <link>https://dev.to/mutebefehl</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3898204%2Fa8c9198d-cf5e-46b3-9d50-f45cb17c737e.jpeg</url>
      <title>DEV Community: Henning</title>
      <link>https://dev.to/mutebefehl</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/mutebefehl"/>
    <language>en</language>
    <item>
      <title>NetSight - free network tool for developers and sysadmins</title>
      <dc:creator>Henning</dc:creator>
      <pubDate>Sun, 26 Apr 2026 15:38:47 +0000</pubDate>
      <link>https://dev.to/mutebefehl/netsight-free-network-tool-for-developers-and-sysadmins-l71</link>
      <guid>https://dev.to/mutebefehl/netsight-free-network-tool-for-developers-and-sysadmins-l71</guid>
      <description>&lt;p&gt;There are many IP lookup sites, but few offer exactly the features I’m looking for. They only show the location (usually very inaccurately) and nothing else.&lt;/p&gt;

&lt;p&gt;I built &lt;strong&gt;NetSight&lt;/strong&gt; to be the opposite. One toolbox, twelve tools, no accounts, no ads, no tracking of what you look up. Runs on a single Cloudflare Worker.&lt;/p&gt;

&lt;p&gt;Try it: &lt;strong&gt;&lt;a href="https://netsight.mutebefehl.de" rel="noopener noreferrer"&gt;netsight.mutebefehl.de&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdm6mc6eoxxo37rsshxyr.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fdm6mc6eoxxo37rsshxyr.png" alt="NetSight home" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What it does
&lt;/h2&gt;

&lt;p&gt;Type any IP, hostname or URL into the search bar. The result aggregates eight intel sources in parallel:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Geolocation (city, country, ASN, ISP)&lt;/li&gt;
&lt;li&gt;Reverse DNS and FCrDNS&lt;/li&gt;
&lt;li&gt;AbuseIPDB confidence and report count&lt;/li&gt;
&lt;li&gt;Scamalytics fraud score&lt;/li&gt;
&lt;li&gt;VirusTotal scanner verdicts&lt;/li&gt;
&lt;li&gt;URLhaus malware listings&lt;/li&gt;
&lt;li&gt;about 30 DNSBLs&lt;/li&gt;
&lt;li&gt;Shodan (open ports, known CVEs)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Each result paints into its own card the moment it arrives, so the page is interactive in under a second even when one upstream is slow.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fylrazcpomwcfzhxdsqbv.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fylrazcpomwcfzhxdsqbv.png" alt="IP lookup for 8.8.8.8" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  What makes it different
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Anycast-aware.&lt;/strong&gt; Most IP tools tell you Quad9 (9.9.9.9) is in California. It is not. The operator is a Swiss foundation in Zurich; the geolocated country is just the nearest POP. NetSight shows the operator HQ separately and labels the row with an anycast chip. Same handling for Cloudflare 1.1.1.1, OpenDNS, AdGuard, Yandex.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Server-side rendered for every IP route.&lt;/strong&gt; Type netsight.mutebefehl.de/8.8.8.8 and you get a full HTML report immediately, not a skeleton-loading page. SEO-clean: only IPs with real ownership get indexed, private and bogon IPs are auto-tagged noindex.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;3. Our own honeypot data feeds the reputation signal.&lt;/strong&gt; This is the part nobody talks about in the free-IP-tool space. We run a dedicated honeypot infrastructure (SSH, VNC, HTTP, Modbus, S7) that records unsolicited connection attempts. The resulting database of attacker IPs is one of the inputs to our reputation scoring. When you see a suspicious badge on an IP report, there is a non-zero chance that IP just spent a week brute-forcing our fake water-treatment plant.&lt;/p&gt;

&lt;p&gt;A curated subset is also published as a public blocklist on GitHub. Bring your own SIEM.&lt;/p&gt;

&lt;h2&gt;
  
  
  The full toolbox
&lt;/h2&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpqyqt06io87iz2fz0ar8.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fpqyqt06io87iz2fz0ar8.png" alt="All tools" width="800" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Tool&lt;/th&gt;
&lt;th&gt;What it does&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;IP Lookup&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Geolocation, ISP, ASN, abuse, ports, CVEs - all sources in one report&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;DNS Lookup&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;A, AAAA, MX, NS, TXT, SOA, CNAME, CAA, SRV plus propagation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;WHOIS / RDAP&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Registrar, dates, nameservers, status&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Subdomain Finder&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Certificate Transparency and AlienVault OTX&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;CVE Search&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;CVSS, EPSS exploit-likelihood, CISA KEV flagging&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Safe Browser&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;URL preview with shortener / IP-logger / typosquat detection&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Mail Check&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;MX, SPF, DKIM, DMARC, Null-MX detection&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Common Ports&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Quick reference&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Password Strength&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Entropy and crack-time, fully client-side&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;Speed Test&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Throughput against globally distributed edges&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;API&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;Public REST API, free tier without signup&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;Please feel free to email me directly at &lt;a href="mailto:hey@mutebefehl.de"&gt;hey@mutebefehl.de&lt;/a&gt; with any questions or feedback. &lt;/p&gt;

&lt;p&gt;Try it for free. I'd love to hear your feedback! &lt;/p&gt;

</description>
      <category>webdev</category>
      <category>networking</category>
      <category>sysadmin</category>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
