Learn the basics
Use the introductory posts on IPs, DNS, ASN, and CGNAT when you want the plain-English explanation before digging into raw outputs.
The fastest way to get value from this section is to combine articles with the tools. Start with a concept guide when you need context, then jump into a live check once you know what signal you want to verify. For example, if you are troubleshooting a VPN, read the privacy or leak guide first, then run DNS and WebRTC checks. If you are working through network ownership or mail troubleshooting, pair the articles with WHOIS, ASN, reverse DNS, and blacklist tools so the learning immediately turns into action.
Use the introductory posts on IPs, DNS, ASN, and CGNAT when you want the plain-English explanation before digging into raw outputs.
Most articles link directly to the tool that proves the point, so you can move from theory to real diagnostics in one session.
When a result is ambiguous, continue into the related guides and follow-up checks instead of relying on one page or one metric.
What Tor is, how onion routing works, and why Tor exit nodes can be flagged by websites.
Read ArticleUnderstand what WHOIS is used for, what it can show, and how it differs from a typical IP lookup.
Read ArticleLearn the real techniques hackers use - from phishing to malware to social engineering - and how to protect yourself.
Read ArticleLearn what the dark web actually is, how it works, what's really on it, and separate fact from fiction.
Read ArticleLearn what firewalls are, how they protect your network, different types, and how to configure them for security.
Read ArticleComprehensive guide to protecting yourself online with password management, 2FA, safe browsing, and more.
Read Article