Walter.Net.Networking
2024.10.28.1335
Prefix Reserved
See the version list below for details.
dotnet add package Walter.Net.Networking --version 2024.10.28.1335
NuGet\Install-Package Walter.Net.Networking -Version 2024.10.28.1335
<PackageReference Include="Walter.Net.Networking" Version="2024.10.28.1335" />
paket add Walter.Net.Networking --version 2024.10.28.1335
#r "nuget: Walter.Net.Networking, 2024.10.28.1335"
// Install Walter.Net.Networking as a Cake Addin #addin nuget:?package=Walter.Net.Networking&version=2024.10.28.1335 // Install Walter.Net.Networking as a Cake Tool #tool nuget:?package=Walter.Net.Networking&version=2024.10.28.1335
About this package
This is an internal NuGet package with business objects used by several ASP-WAF products and provides networking utilities and data mining for resolving this package will do
- Lightning fast DNS operations
- ISP Whois Lookups
- Tracing, 4.Tracking
- Wake on Lan
and much more
Read all about it using the on-line documentation at https://firewallapi.asp-waf.com/?topic=html/N-Walter.Net.Networking.htm
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net5.0 was computed. net5.0-windows was computed. net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 is compatible. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 is compatible. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
.NET Core | netcoreapp2.0 was computed. netcoreapp2.1 was computed. netcoreapp2.2 was computed. netcoreapp3.0 was computed. netcoreapp3.1 was computed. |
.NET Standard | netstandard2.0 is compatible. netstandard2.1 is compatible. |
.NET Framework | net461 was computed. net462 was computed. net463 was computed. net47 was computed. net471 was computed. net472 was computed. net48 was computed. net481 was computed. |
MonoAndroid | monoandroid was computed. |
MonoMac | monomac was computed. |
MonoTouch | monotouch was computed. |
Tizen | tizen40 was computed. tizen60 was computed. |
Xamarin.iOS | xamarinios was computed. |
Xamarin.Mac | xamarinmac was computed. |
Xamarin.TVOS | xamarintvos was computed. |
Xamarin.WatchOS | xamarinwatchos was computed. |
-
.NETStandard 2.0
- System.Runtime.Caching (>= 8.0.1)
- Walter.BOM (>= 2024.10.28.1335)
-
.NETStandard 2.1
- System.Runtime.Caching (>= 8.0.1)
- Walter.BOM (>= 2024.10.28.1335)
-
net6.0
- System.Runtime.Caching (>= 8.0.1)
- Walter.BOM (>= 2024.10.28.1335)
-
net7.0
- System.Runtime.Caching (>= 8.0.1)
- Walter.BOM (>= 2024.10.28.1335)
-
net8.0
- System.Runtime.Caching (>= 8.0.1)
- Walter.BOM (>= 2024.10.28.1335)
NuGet packages (3)
Showing the top 3 NuGet packages that depend on Walter.Net.Networking:
Package | Downloads |
---|---|
Walter.Net.LookWhosTalking
Provide insight into the communication between the server hosting the website and the outside world and allows the users to observe communication and look for irrational or known malicious interaction. The static class that exposes this functionality can be found at Walter.Net.LookWhosTalking.WhosTalking Documentation available at https://firewallapi.asp-waf.com/?topic=html/N-Walter.Net.LookWhosTalking.htm |
|
Walter.Web.FireWall
Enhance .NET applications with a robust firewall, designed as middleware and IActionFilter, protecting against CVE attacks, web scraping, and phishing. Configurable via annotations and a rule engine services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }); Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in applications. You can view the firewall in action using https://www.asp-waf.com/Firewall You can get started with the firewall using the samples shown in https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as the on line documentation at https://firewallapi.asp-waf.com/ |
|
Walter.Net.HoneyPot
A robust discovery service for detecting and recording malicious port access, enhancing network security through active monitoring. |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2024.10.28.1605 | 257 | 10/28/2024 |
2024.10.28.1335 | 241 | 10/28/2024 |
2024.10.19.1525 | 242 | 10/20/2024 |
2024.10.18.1315 | 268 | 10/18/2024 |
2024.9.27.1406 | 273 | 9/27/2024 |
2024.9.17.1417 | 297 | 9/17/2024 |
2024.9.12.1923 | 351 | 9/12/2024 |
2024.9.6.1352 | 371 | 9/7/2024 |
2024.9.1.1159 | 354 | 9/1/2024 |
2024.8.26.1150 | 383 | 8/26/2024 |
2024.8.19.1411 | 371 | 8/19/2024 |
2024.8.17.1000 | 366 | 8/17/2024 |
2024.8.12.1622 | 366 | 8/13/2024 |
2024.8.5.1010 | 315 | 8/5/2024 |
2024.8.1.1545 | 385 | 8/16/2024 |
2024.7.28.629 | 172 | 7/28/2024 |
2024.7.26.1512 | 199 | 7/26/2024 |
2024.7.26.828 | 180 | 7/26/2024 |
2024.7.11.1604 | 321 | 7/11/2024 |
2024.7.9.1520 | 330 | 7/9/2024 |
2024.7.4.1425 | 360 | 7/4/2024 |
2024.7.3.1249 | 329 | 7/3/2024 |
2024.7.2.1536 | 357 | 7/2/2024 |
2024.6.28.953 | 340 | 6/28/2024 |
2024.6.6.1320 | 195 | 6/8/2024 |
2024.5.15.1634 | 146 | 5/15/2024 |
2024.5.14.829 | 88 | 5/14/2024 |
2024.5.8.1005 | 133 | 5/8/2024 |
2024.4.4.2102 | 140 | 4/4/2024 |
2023.11.13.1117 | 1,500 | 11/13/2023 |
2023.10.26.1502 | 1,403 | 10/29/2023 |
2023.10.12.1926 | 1,494 | 10/12/2023 |
2023.9.14.812 | 1,607 | 9/14/2023 |
2023.9.7.1748 | 1,647 | 9/7/2023 |
2023.9.7.1241 | 1,617 | 9/7/2023 |
2023.9.6.1001 | 1,598 | 9/6/2023 |
2023.9.5.1246 | 1,599 | 9/5/2023 |
2023.9.5.1032 | 1,599 | 9/5/2023 |
2023.8.31.1522 | 1,626 | 8/31/2023 |
2023.8.29.1040 | 1,637 | 8/29/2023 |
2023.8.17.901 | 1,723 | 8/17/2023 |
2023.8.9.1314 | 1,795 | 8/9/2023 |
2023.8.2.750 | 1,842 | 8/2/2023 |
2023.7.12.830 | 1,830 | 7/12/2023 |
2023.7.5.1419 | 1,929 | 7/6/2023 |
2023.6.14.1628 | 2,012 | 6/14/2023 |
2023.6.11.1304 | 2,082 | 6/11/2023 |
2023.5.30.1640 | 2,032 | 5/30/2023 |
2023.5.4.1552 | 2,175 | 5/4/2023 |
2023.5.1.1524 | 2,110 | 5/1/2023 |
2023.4.29.910 | 2,348 | 4/29/2023 |
2023.4.12.1236 | 2,356 | 4/12/2023 |
2023.3.22.1456 | 2,511 | 3/22/2023 |
2023.3.14.1356 | 2,587 | 3/14/2023 |
2023.3.1.810 | 2,650 | 3/1/2023 |
2023.2.25.11857 | 2,668 | 2/25/2023 |
2023.2.22.27 | 2,664 | 2/22/2023 |
2023.2.15.1413 | 2,732 | 2/15/2023 |
2023.2.11.1628 | 2,773 | 2/11/2023 |
2023.1.11.534 | 2,961 | 1/11/2023 |
2022.12.30.711 | 2,998 | 12/30/2022 |
2022.12.16.1536 | 896 | 12/16/2022 |
2022.12.15.1241 | 904 | 12/16/2022 |
2022.12.15.1108 | 3,146 | 12/15/2022 |
2022.12.14.648 | 3,170 | 12/14/2022 |
2022.11.27.1059 | 3,189 | 11/27/2022 |
2022.11.21.338 | 3,212 | 11/21/2022 |
2022.11.14.1819 | 3,340 | 11/14/2022 |
2022.11.13.917 | 3,333 | 11/13/2022 |
2022.11.7.1632 | 937 | 11/13/2022 |
2022.10.31.740 | 6,590 | 11/1/2022 |
2022.10.15.652 | 7,223 | 10/15/2022 |
2022.10.1.810 | 7,649 | 10/1/2022 |
2022.9.26.1444 | 7,559 | 9/26/2022 |
2022.9.14.1508 | 7,740 | 9/14/2022 |
2022.9.14.809 | 7,837 | 9/14/2022 |
2022.9.8.1009 | 7,968 | 9/8/2022 |
2022.8.20.1007 | 7,846 | 8/20/2022 |
2022.8.1.1 | 7,984 | 7/31/2022 |
2022.7.1300 | 8,259 | 7/1/2022 |
2022.7.31.1016 | 8,057 | 7/31/2022 |
2022.7.15.841 | 8,111 | 7/15/2022 |
2022.6.21.647 | 8,138 | 6/21/2022 |
2022.5.18.638 | 8,122 | 5/19/2022 |
2022.5.16.853 | 8,211 | 5/19/2022 |
2022.5.16.816 | 8,187 | 5/16/2022 |
2022.5.4.1010 | 8,168 | 5/4/2022 |
2022.4.10.947 | 8,694 | 4/10/2022 |
2022.4.10.925 | 8,665 | 4/10/2022 |
2022.4.10.828 | 8,684 | 4/10/2022 |
2022.4.1.1545 | 8,875 | 4/1/2022 |
2022.3.31.823 | 7,648 | 3/31/2022 |
2022.3.26.1103 | 8,887 | 3/26/2022 |
2022.3.26.820 | 8,548 | 3/26/2022 |
2022.3.25.840 | 7,876 | 3/26/2022 |
2022.3.24.1701 | 1,812 | 3/25/2022 |
2022.2.16.1131 | 8,997 | 2/17/2022 |
2022.2.16.834 | 8,838 | 2/17/2022 |
2022.2.15.824 | 2,805 | 2/17/2022 |
2022.2.11.1452 | 2,926 | 2/17/2022 |
2022.2.11.931 | 2,327 | 2/17/2022 |
2022.2.5.1114 | 9,191 | 2/5/2022 |
2022.1.17.1158 | 9,003 | 1/17/2022 |
2022.1.10.1505 | 9,188 | 1/10/2022 |
2022.1.10.537 | 8,916 | 1/10/2022 |
2022.1.5.1139 | 8,550 | 1/8/2022 |
2021.12.28.1452 | 9,617 | 12/28/2021 |
2021.12.16.812 | 9,220 | 12/16/2021 |
2021.11.23.1528 | 15,386 | 11/24/2021 |
2021.11.21.925 | 15,471 | 11/22/2021 |
2021.11.19.1503 | 1,353 | 11/22/2021 |
2021.11.19.847 | 10,183 | 11/19/2021 |
2021.11.18.1824 | 9,820 | 11/16/2021 |
2021.11.10.852 | 10,569 | 11/10/2021 |
2021.11.9.2021 | 10,147 | 11/9/2021 |
2021.11.8.2109 | 7,730 | 11/9/2021 |
2021.11.8.1612 | 8,342 | 11/8/2021 |
2021.11.7.1021 | 8,490 | 11/8/2021 |
2021.11.3.1612 | 8,669 | 11/4/2021 |
2021.11.1.1102 | 7,188 | 11/1/2021 |
2021.10.25.1206 | 8,809 | 10/25/2021 |
2021.10.23.1310 | 8,641 | 10/25/2021 |
2021.10.19.1522 | 8,654 | 10/19/2021 |
2021.10.16.1325 | 8,673 | 10/18/2021 |
2021.10.9.1119 | 274 | 10/9/2024 |
2021.10.6.1546 | 8,617 | 10/6/2021 |
2021.10.5.1450 | 8,795 | 10/5/2021 |
2021.10.4.1155 | 8,841 | 10/5/2021 |
2021.10.4.807 | 1,522 | 10/5/2021 |
2021.10.1.753 | 8,797 | 10/1/2021 |
2021.9.27.1005 | 8,220 | 9/28/2021 |
2021.9.26.1913 | 8,894 | 9/26/2021 |
2021.9.19.1015 | 8,553 | 9/19/2021 |
2021.9.17.1702 | 5,405 | 9/17/2021 |
2021.9.17.1449 | 11,489 | 9/17/2021 |
2021.9.13.1600 | 6,717 | 9/13/2021 |
2021.9.12.1100 | 5,059 | 9/13/2021 |
2021.9.11.2004 | 8,095 | 9/11/2021 |
2021.9.9.1110 | 8,682 | 9/9/2021 |
2021.9.7.1901 | 8,732 | 9/8/2021 |
2021.9.7.1121 | 8,969 | 9/7/2021 |
2021.9.7.927 | 1,481 | 9/7/2021 |
2021.9.6.1518 | 8,332 | 9/7/2021 |
2021.9.4.1124 | 8,735 | 9/4/2021 |
2021.9.2.708 | 8,418 | 9/4/2021 |
2021.9.0.1259 | 8,395 | 9/2/2021 |
2021.8.2200 | 7,825 | 8/23/2021 |
2021.8.2100 | 8,700 | 8/23/2021 |
2021.8.22.900 | 8,947 | 8/22/2021 |
2021.8.18.1500 | 8,919 | 8/18/2021 |
2021.8.18.930 | 8,767 | 8/18/2021 |
2021.8.14.1600 | 8,783 | 8/16/2021 |
2021.8.14.829 | 4,398 | 8/14/2021 |
2021.8.9.1105 | 8,736 | 8/9/2021 |
2021.8.8.1612 | 8,558 | 8/8/2021 |
2021.8.8.1138 | 7,615 | 8/8/2021 |
2021.8.6.1044 | 8,532 | 8/6/2021 |
2021.8.4.1355 | 9,040 | 8/5/2021 |
2021.7.30.2118 | 9,008 | 7/31/2021 |
2021.7.27.926 | 8,938 | 7/28/2021 |
2021.7.26.1737 | 459 | 7/28/2021 |
2021.7.23.931 | 9,195 | 7/26/2021 |
2021.7.22.1456 | 8,689 | 7/23/2021 |
2021.7.15.1547 | 8,684 | 7/15/2021 |
2021.7.13.812 | 8,635 | 7/13/2021 |
2021.7.9.736 | 557 | 7/10/2021 |
2021.7.8.1527 | 8,922 | 7/10/2021 |
2021.7.5.1649 | 7,878 | 7/5/2021 |
2021.6.29.1453 | 9,024 | 6/30/2021 |
2021.6.26.1753 | 9,390 | 6/27/2021 |
2021.6.25.1849 | 9,056 | 6/25/2021 |
2021.6.24.1518 | 8,946 | 6/24/2021 |
2021.6.20.729 | 9,317 | 6/20/2021 |
2021.6.15.2006 | 8,596 | 6/15/2021 |
2021.6.14.2025 | 9,066 | 6/15/2021 |
2021.6.13.2035 | 9,362 | 6/14/2021 |
2021.6.12.1154 | 8,700 | 6/13/2021 |
2021.6.9.1120 | 9,038 | 6/9/2021 |
2021.6.7.2103 | 1,536 | 6/7/2021 |
2021.6.3.1509 | 8,699 | 6/3/2021 |
2021.5.31.1533 | 8,977 | 5/31/2021 |
2021.5.31.1415 | 9,016 | 5/31/2021 |
2021.5.25.1732 | 7,788 | 5/25/2021 |
2021.5.24.1128 | 8,614 | 5/24/2021 |
2021.5.24.1019 | 8,411 | 5/24/2021 |
2021.5.12.1054 | 8,472 | 5/12/2021 |
2021.5.12.637 | 6,726 | 5/12/2021 |
2021.5.10.1442 | 7,854 | 5/11/2021 |
2021.5.8.1226 | 8,374 | 5/8/2021 |
2021.5.6.2037 | 7,394 | 5/6/2021 |
2021.5.5.1901 | 8,506 | 5/6/2021 |
2021.5.3.1621 | 8,707 | 5/4/2021 |
2021.5.1.905 | 8,945 | 5/1/2021 |
2021.4.28.1511 | 8,693 | 4/28/2021 |
2021.4.20.1520 | 9,311 | 4/21/2021 |
2021.4.16.738 | 8,896 | 4/21/2021 |
2021.4.14.1216 | 9,018 | 4/16/2021 |
2021.4.9.1538 | 8,782 | 4/13/2021 |
2021.4.8.947 | 8,939 | 4/13/2021 |
2021.4.6.1235 | 8,936 | 4/6/2021 |
2021.4.5.1653 | 8,651 | 4/5/2021 |
2021.4.1.913 | 8,873 | 4/1/2021 |
2021.3.31.2003 | 8,728 | 4/1/2021 |
2021.3.18.1622 | 9,233 | 3/18/2021 |
2021.3.3.1259 | 7,893 | 3/3/2021 |
2021.3.2.1415 | 15,135 | 3/2/2021 |
2021.3.1.1 | 8,155 | 2/27/2021 |
2021.3.1 | 7,780 | 2/27/2021 |
2021.2.23.6 | 7,087 | 2/23/2021 |
2021.2.21.1 | 8,335 | 2/21/2021 |
2021.2.20.1 | 7,828 | 2/20/2021 |
2021.2.19.2 | 7,536 | 2/19/2021 |
2021.2.18.6 | 6,576 | 2/19/2021 |
2021.2.17.1 | 7,679 | 2/17/2021 |
2021.2.16.1 | 8,028 | 2/16/2021 |
2021.2.15.3 | 7,950 | 2/15/2021 |
2021.2.15.1 | 7,985 | 2/14/2021 |
2021.2.14.3 | 7,435 | 2/14/2021 |
2021.2.12.6 | 7,788 | 2/12/2021 |
2021.2.12.2 | 7,986 | 2/12/2021 |
2021.2.11.1 | 6,306 | 2/11/2021 |
2021.2.10.1 | 7,441 | 2/10/2021 |
2021.2.8.1 | 7,837 | 2/9/2021 |
2021.2.7.1 | 14,682 | 2/6/2021 |
2020.12.27.6 | 8,079 | 12/27/2020 |
2020.12.27.1 | 7,479 | 12/27/2020 |
2020.12.26.7 | 7,233 | 12/27/2020 |
2020.12.26.5 | 8,041 | 12/27/2020 |
2020.12.26.3 | 8,025 | 12/27/2020 |
2020.12.19.1 | 7,909 | 12/19/2020 |
2020.12.16.1 | 7,366 | 12/16/2020 |
2020.12.15.1 | 8,109 | 12/15/2020 |
2020.12.14.5 | 13,373 | 12/14/2020 |
2020.12.14.4 | 7,363 | 12/14/2020 |
2020.12.14.3 | 7,180 | 12/14/2020 |
2020.12.5 | 6,120 | 12/5/2020 |
2020.12.4.1 | 12,980 | 12/4/2020 |
2020.12.4 | 6,094 | 12/4/2020 |
2020.12.2.3 | 18,589 | 12/2/2020 |
2020.12.1 | 8,515 | 12/1/2020 |
2020.11.28 | 7,851 | 11/28/2020 |
2020.11.27.2 | 7,331 | 11/27/2020 |
2020.11.25.1 | 12,060 | 11/25/2020 |
2020.11.22.3 | 7,541 | 11/23/2020 |
2020.11.20.1 | 7,056 | 11/21/2020 |
2020.11.19.3 | 7,073 | 11/19/2020 |
2020.11.18.1 | 13,284 | 11/18/2020 |
2020.11.15.1 | 19,460 | 11/15/2020 |
2020.11.11.1 | 32,451 | 11/11/2020 |
2020.11.8.1 | 7,089 | 11/8/2020 |
2020.11.5.1 | 12,470 | 11/5/2020 |
2020.11.3.1 | 7,011 | 11/3/2020 |
2020.10.30.1 | 22,982 | 11/1/2020 |
2020.10.15.3 | 6,920 | 10/15/2020 |
2020.10.15.2 | 6,696 | 10/15/2020 |
2020.10.14.1 | 6,736 | 10/14/2020 |
2020.10.13.1 | 6,777 | 10/13/2020 |
2020.10.12.2 | 6,882 | 10/12/2020 |
2020.10.12.1 | 6,748 | 10/12/2020 |
2020.10.10.1 | 6,830 | 10/10/2020 |
2020.10.9.6 | 6,388 | 10/9/2020 |
2020.10.9.5 | 903 | 10/9/2020 |
2020.10.9.2 | 870 | 10/9/2020 |
2020.10.9.1 | 6,377 | 10/9/2020 |
2020.10.8.1 | 6,488 | 10/8/2020 |
2020.10.6.8 | 6,348 | 10/7/2020 |
2020.10.6.7 | 907 | 10/7/2020 |
2020.10.6.6 | 6,432 | 10/7/2020 |
2020.10.6.5 | 6,393 | 10/7/2020 |
2020.10.6.4 | 6,492 | 10/7/2020 |
2020.10.6.3 | 6,401 | 10/7/2020 |
2020.10.6.1 | 11,953 | 10/7/2020 |
2020.10.5.1 | 6,877 | 10/6/2020 |
2020.10.1.3 | 6,290 | 10/1/2020 |
2020.10.1.2 | 6,050 | 10/1/2020 |
2020.10.1.1 | 5,987 | 10/1/2020 |
2020.9.29.10 | 6,068 | 9/29/2020 |
2020.9.29.9 | 6,184 | 9/29/2020 |
2020.9.28.1 | 11,052 | 9/28/2020 |
2020.9.25.1 | 6,297 | 9/26/2020 |
2020.9.24.2 | 6,005 | 9/24/2020 |
2020.9.24 | 6,242 | 9/24/2020 |
2020.9.23.2 | 6,025 | 9/23/2020 |
2020.9.22.1 | 6,057 | 9/22/2020 |
2020.9.21.1 | 6,572 | 9/21/2020 |
2020.9.17.2 | 5,977 | 9/17/2020 |
2020.9.16 | 6,572 | 9/16/2020 |
2020.9.14 | 4,115 | 9/14/2020 |
2020.9.9.2 | 4,896 | 9/9/2020 |
2020.9.8.1 | 5,172 | 9/8/2020 |
2020.9.8 | 3,544 | 9/8/2020 |
2020.9.6.5 | 4,915 | 9/6/2020 |
2020.9.6.2 | 1,153 | 9/6/2020 |
2020.9.4.2 | 4,824 | 9/4/2020 |
2020.9.4 | 5,418 | 9/4/2020 |
2020.9.3.1 | 5,101 | 9/3/2020 |
Major releases that add functionality other than optimization and minor bug fixing
4 September
- update Scope to include more exotic Lan address range detections
26 August 2024
- update WHOIS/DNS lookup to allow for resolving malicious DNS servers without crashing
17 November 2023
- Integrate .Net 8
12 October 2023
- Build using SDK-7.0.402 and SDK-6.0.415
- Update Package references
14 September 2023
- SDK 7.0.401/SDK 6.0.414
- Update to new NuGet Packages
7 September 2023
- update IPaddres and Mac address ignoring all ip addresses that are broadcast addresses
6 September 2023
- Add ReservedIpAddressType enum and GetReservedIpAddressType extention for ip4 and ipv6
5 September 2023
- Update LocalNetwork.GetAllMacAddressesAndIpPairs and LocalNetwork.TryGetMacFromIp methods
31 August 2023
- Change path name for LokkWhoisTalking data to accept IPV6 IP addresses
12 July 2023
- Update to SDK SP 6.0.412. and 7.0.306
- Update package references
14 June 2023
- Update due to SDK Update 7.0.304, and 6.0.410
6 June 2023
- Fix bug in network sokepe method and add DMZ option via assignment LocalNetwork.DmzRange = "192.168.2.0/24";
5 May 2023
- Update due to new Obfuscation tool update
12 April 2023
- Update to a new .net 7.0.5 SDK release
14 Mar 2023
- Update NuGet package refferences
22 Feb 2023
- Axel Imani Release (Go live)
15 February 2023
- Update to .net 6.0.406 and 7.0.3
11 January 2023
- update to 7.0.2, 6.0.13 SDK and build tools for 17.4.4
16 December 2022
- Add feature to include local ports used by TcpProcessHistoricRecord
14 December 2022
- Update to .Net SDK 3.1.426, 6.0.404 and 7.0.101
7 December 2022
- re-enable support for .net standard 2.1
21 November 2022
- Update to integrate the .net 7.0 cypher package release
- Update package references
14 November 2022
- Update NuGet Packages
6 November 2022
- Add support for .Net 7
15 November 2022
- Update NuGet package references
1 October 2022
- Update build with new SDK
- Update code sign certificates
14 September 2022
- Update to include new package 6.0.X and Microsoft CVE-2022-38013
02 September 2022
- Please make sure to update servers using this packages due to a security bug in .net
> System.Security.Cryptography.Xml 4.5.0 Moderate https://github.com/advisories/GHSA-2m65-m22p-9wjw
> System.Text.Encodings.Web 4.5.0 Critical https://github.com/advisories/GHSA-ghhp-997w-qr28
15 June 2022
- Update to support .net 6.0.7 and 3.1.27
- Update package references
21 June 2022
- Update package references
4 May 2022
- Update NuGet References
- Update API definitions
15 March 2022
- update to 6.0.3
5 March 2022
- Update Networking discovery API
- updated the LocalNetwork class added LAN and added
a) GetMuticast
b) TryGetLan
c) GetLan()
d) TryGetMacFromIp
e) GetMacFromIp
16 December 2021
- Update to .Net SDK update 14 December for .NET CORE 3.1.416, and .NET 5.0.404 and 6.0.101
21 November 2021
- Add support for network ranges with only one IP Networks with a single IP address
17 November 2021
- Add support for json serialization of the INetwork interface via INetworkJsonConverter
9 November 2021
- Fix package dependency on vulnerable packages from Microsoft by upgrading vulnerable packages
8 November 2021
- Update to .Net NuGet packages .NET 6.0.0, .NET 5.0.403 and core 3.1.415
11 October 2021
- CodeSign the binaries as well as the NuGet package for executing in a trust-platform
1 October 2021
- Update known abuse email address for amazon as it is not included in ICAN data
19 September
- Update NuGet packages release for .Net 5.0.10
8 Aug 2021
- update to .NET 6.0 SDK (v6.0.100-preview.6)
- Update WHOIS parsing for Asia-pacific(APAC) based Internet service provider
31 June 2021
- Add .Net 6.0 binaries to the NuGet package
- Update WHOIS parsing for Latin American based Internet service provider
15 June 2021
- Update to .Net Core 3.1.17 and .Net 5.0.8 SDK
07 June 2021
- Change properties Lat and Lng of TraceEntry to double and Latitude and Longitude to degrees
- Add DNS Name as well as full dns name of IP address in trade entry
03 July 2021
- Resolve DNS queries if querying LocalHost to the machine name
22 June 2021
- Add additional counters to WHOIS object
11 Jun 2021
- Add Tracert to IPAddress as extension method
09 June 2021
- Update to .Net SDK 5.0.301 and 3.1.410
07 June 2021
- Update NuGet Package references
31 May 2021
- Update to more efficiently extract WHOIS data for more possible attackers
- Detect ARP communications
31 May 2021
- Update WHOIS retrieval
25 May 2021
- Add meta data counters to WHOIS IP range
- Change storage for WHOIS allowing to roll-up IP ranges for ISP with several IP range blocks
- Add source URL to WHOIS object(s)
12 April 2021
- Update to new code base after .net security violation fix
04 April 2021
- Add Reputation to WHOIS interface
05 April 2021
- Update DNS resolving framework
- Extend INetwork interface of TCP name-space
22 March 2021
- Performance update
05 March 2021
- Update package reference
12 February 2021
- Framework extension changes
- Update package references
25 January 2021
- Update extension methods
- Update package references
02 January 2021
- Extend IPAddress with IsLoopBack() and DnsHostName()
- Add support for IPV6 with LocalNetwork.LocalIPAddresses()
- Updated terms and conditions to REL. 2021.01.02
29 December 2020
- Extend IWhois interface
23 December 2020
- Extend IWhois interface
19-20 December 2020
- Update package references
14 December 2020
- Update package references
- Update WHOIS interface improve country discovery
- Update DnsEntry add country for DNS entry
11 December 2020
- Update WHOIS query engine to query IP address requester and not IP address of reverse DNS of the ISP or Data center
- Compile with Language version 9.0
- Change IP address comparer of WHOIS entry to match only address not address registration dates to avoid the users assuming duplicate data
05 December 2020
- Update possible null reference warning by compiler on DNS Query response record.
04 December 2020
-Update package references
02 December 2020
- Update logging message generated when resolving issues for reverse DNS entries on IP addresses
01 December 2020
- Extend IWhois interface
22 November 2020
- Update compiler hints improving .net Core 3.1 and .Net 5.0 compiled binaries
11 November 2020
- Update packages and support .Net 5.0
08 November 2020
- Update signatures and NuGet package references
14 October 2020
- Update to .net core 3.1.4
2020.10.06.8
1. Updated DNS to deal with DNS server that return not a ARPA name but a IP address
2020.10.05.1
1. Update NuGet Package References
2. Update EULA
2020.09.24.0
1 update domain parser and provide test value of all steps.
2020.09.23.1
1 Add extension to URL to generate domain validation report.
2 Add extension to Validate if a url is a sub domain of another url or url list
Documentation at: https://firewallapi.asp-waf.com/?topic=html/Methods.T-Walter.Net.Networking.TopLevelDomainQuery.DomainParser.htm
3 Add Network extension methods on URI:
https://firewallapi.asp-waf.com/?topic=html/Overload-Walter.Net.Networking.NetworkExtensionMethods.GetDomainReport.htm
2020.09.15.0
- Add method LocalNetwork.CanPing(hostNameOrIpAddress)
Documentation at https://firewallapi.asp-waf.com/?topic=html/M-Walter.Net.Networking.LocalNetwork.CanPing.htm
- Add static method DnsManager.TryQueryHostEntry
Documentation at https://firewallapi.asp-waf.com/?topic=html/M-Walter.Net.Networking.DnsManager.TryQueryHostEntry.htm
- Updated documentation
2020.09.04 update documentation and references
2020.08.26 update documentation
2020.08.20 pick-up IMemoryCashing if available
2020.08.15 Get scoped network segments for LocalNetwork class
2020.08.12 update to .net core 3.1.7
2020.08.18 framework signatures