diff --git a/README.md b/README.md index 2b949eb2..632e96ba 100644 --- a/README.md +++ b/README.md @@ -48,8 +48,10 @@ A MSVC example output from `c:\> ahost msdn.com` showing all the addresses of `m The above `Mountain View/California` is Google's well-known location. Many thanks to IP2Location [**[3]**](#footnotes) for their data-bases. -* *ASN* information (Autonomous System Number) from **[IPFire](https://location.ipfire.org)**. - Many thanks to IPFire [**[4]**](#footnotes) for their data-bases. +* *ASN* information (Autonomous System Number) from **[IPFire](https://location.ipfire.org)**.
+ The screen-shot above shows Google has ASN 15169 (for their DNS server-address `8.8.8.8`).
+ More details for that ASN at **[DNSlytics](https://dnslytics.com/bgp/as15169)**.
+ Many thanks to the IPFire developers [**[4]**](#footnotes) for their data-bases. * *Domain Name System-based Blackhole List* (**[DNSBL](https://en.wikipedia.org/wiki/DNSBL)**) support: with the help of @@ -62,7 +64,8 @@ A MSVC example output from `c:\> ahost msdn.com` showing all the addresses of `m controlled by `recv_delay = 0` in [`wsock_trace`](https://github.com/gvanem/wsock-trace/blob/master/wsock_trace#L66) config-file. -* *Firewall* activity; report activity causing events from the *Window Filtering Platform* (the *Internet Connection Firewall*; ICF). See below. +* *Firewall* activity; report activity causing events from the *Window Filtering Platform* (the *Internet Connection Firewall*; ICF). + See [below](https://github.com/gvanem/wsock-trace#firewall-monitor). * **[LuaJIT](https://github.com/LuaJIT/LuaJIT.git)** script support is very preliminary at the moment. The idea is that `.lua` scripts could change the @@ -311,7 +314,7 @@ Together with `[DNSBL], enable = 1` it shows remote addresses in **[SpamHaus](ht In this case the **[address](https://blackhat.directory/ip/176.119.4.53)** `176.119.4.56` in *Ukraine / Donetsk* is *very* active giving a Firewall event approximately every 5 minutes. -A good test of the `firewall.c` features is to open your WiFi FireWall and start a remote +A good test of the `firewall.c` features is to open up your router (create a DMZ) and start a remote **[port-scan](http://www.whatsmyip.org/port-scanner/server/)** while `firewall_test.exe` is running. You'll see a lot of **DROP**-events like: ``` diff --git a/screenshot_ahost-msdn-com.png b/screenshot_ahost-msdn-com.png index d32ed693..7947893f 100644 Binary files a/screenshot_ahost-msdn-com.png and b/screenshot_ahost-msdn-com.png differ