178

I know that a lot of VPN users have it as a homepage to their browser, that is why I wanted to publish this warning.

You can replace it with:

top 50 comments
sorted by: hot top new old
[-] Una@europe.pub 43 points 1 week ago
[-] MIDItheKID@lemmy.world 3 points 1 week ago

Glad somebody else posted it. Glad it still exists. Some of the internet is still hilarious and amazing.

[-] bamboo@lemmy.blahaj.zone 23 points 1 week ago

There is also ifconfig.me which works amazingly on the command like with curl ifconfig.me

[-] eco_game@discuss.tchncs.de 3 points 1 week ago

The same works with ipinfo.io, it's what I usually use.

load more comments (1 replies)
load more comments (5 replies)
[-] AverageEarthling@feddit.online 20 points 1 week ago
[-] smiletolerantly@awful.systems 4 points 1 week ago

This is the one true answer.

Just an IP, nothing else. And easily curlable.

[-] mysticpickle@lemmy.ca 19 points 1 week ago
[-] Alvaro@lemmy.blahaj.zone 14 points 1 week ago* (last edited 1 week ago)
[-] sik0fewl@piefed.ca 1 points 1 week ago
load more comments (2 replies)
[-] heydo@lemmy.world 7 points 1 week ago

Is it malicious code hosted on the website? Or are they saying that visiting that site is an indicator of compromise because they've malware commonly visiting that site?

[-] asqapro@reddthat.com 8 points 1 week ago* (last edited 1 week ago)

Looks like the domain registration expired, according to https://lookup.icann.org/en/lookup

Fortinet marked the website as "malicious", but it doesn't seem to give an explanation as to why it's been given that classification (looked up here: https://www.fortiguard.com/webfilter)

Kasperky wanted an account (and possibly a subscription) to look up the website and I'm not going to give them any of my information so I'm not sure if they gave an explanation as to why the website is flagged.

Visiting https://thisismyip.com/ as of now just redirects to a Namecheap landing page so I doubt there's any actual malware on the website. I think Fortinet and Kaspersky preemptively marked it for when a malicious actor picks up the name and starts hosting actual viruses.

load more comments (1 replies)
[-] TheChargedCreeper864@lemmy.ml 6 points 1 week ago

I have DuckDuckGo set as my default search engine, so I just search for "ip" and Bob's your uncle

[-] Raptor_007@lemmy.world 5 points 1 week ago* (last edited 1 week ago)
load more comments (2 replies)

There's also https://ip4.me/, nice and simple ipv4 test.

(it also does other IP lookups via https://ip6.me/, https://ip6only.me/, https://whatismyv6.com/)

[-] mumblerfish@lemmy.world 5 points 1 week ago

I always use check.torproject.org. If I'm not on Tor, it gives me my IP, if I am on Tor it verifies that. Good for both.

[-] attero@discuss.tchncs.de 5 points 1 week ago
[-] JigglySackles@lemmy.world 4 points 1 week ago
[-] Davel23@fedia.io 3 points 1 week ago
[-] MaskedNybbles@piefed.social 3 points 1 week ago* (last edited 1 week ago)
#!/usr/bin/sh  
dig -4 +short @resolver2.opendns.com myip.opendns.com  
#!/usr/bin/pwsh  
Resolve-DnsName -Server resolver2.opendns.com -Name myip.opendns.com -Type A | % { echo $_.IPAddress }  

There should be an IPv6 resolver, but I don't remember and am currently unable to test. My PowerShell skills are also effectively non-existent.

[-] Danitos@reddthat.com 3 points 1 week ago

A simpler and easy to memorize alternative:

curl ifconfig.me
[-] digdilem@lemmy.ml 3 points 1 week ago

That still relies on an external website, whereas dig uses just DNS

[-] MaskedNybbles@piefed.social 1 points 1 week ago* (last edited 1 week ago)

I saw it used in another comment, and am already aware of the use of curl for such a task, but choose to query DNS services instead—especially in scripts.

load more comments (3 replies)
load more comments (4 replies)
[-] kmirl@lemmy.world 3 points 1 week ago

For us Linux users (BTW), this wtfismyip script just dumps a text string. Just save it to /usr/local/bin or some other location in your path and make it executable, and install the lynx text www browser if you don't have it installed already.

There are a lot of ways to do this, but this works and I'm lazy...

root@tux:~# cat $(which wtfismyip)
#!/bin/bash

printf "%s\n" "Your fucking IP address is $(lynx -dump -nolist http://wtfismyip.com/text)."
root@tux:~# wtfismyip
Your fucking IP address is 13.107.226.41.
[-] aesthelete@lemmy.world 2 points 1 week ago

I wrote my own. It's one of the easiest possible services to write.

[-] Strawberry@lemmy.blahaj.zone 2 points 1 week ago

ip.me also works well in the terminal with curl. The default response is plaintext

[-] binom@lemmy.world 2 points 1 week ago* (last edited 1 week ago)
[-] trk@aussie.zone 2 points 1 week ago* (last edited 1 week ago)

I use thiscomputer.info

It's just text. It shows a bit more than just your IP. And it's easy to remember.

[-] Luci@lemmy.ca 2 points 1 week ago

I’ve been using ifconfig.me for a while, you can curl it on the command line

[-] hushable@lemmy.world 2 points 1 week ago

I've been using wgetip.com for over a decade now

[-] Semi_Hemi_Demigod@lemmy.world 2 points 1 week ago

curl ifconfig.me

Not sure about Linux, but on a Mac you can put it on your clipboard with

curl ifconfig.me | pbcopy

[-] victorz@lemmy.world 2 points 1 week ago

xh ifconfig.me | wl-copy

👍

[-] victorz@lemmy.world 2 points 1 week ago

Oookay, I guess it detects the user agent and only sends the IP number when it detects curl. Using xh did not work as intended.

[-] forestbeasts@pawb.social 2 points 1 week ago

Huh. Is it going by user-agent or something? Weird.

Our own tiny one goes by the Accept header. If xh sets that to text/html you'll get an HTML webpage though.

[-] victorz@lemmy.world 2 points 1 week ago

Some sites go by that, some go by user agent. I believe xh can fake it's user agent, if I'm not mistaken.

A good compromise would be to go by known user agents, but also heed the accept header. 👍

[-] limonfiesta@lemmy.world 2 points 1 week ago

dnsleaktest.com

ipleak.net

Check your IP and your DNS, all in one.

You can just search ip on ddg and it'll show you

[-] alt_xa_23@lemmy.world 2 points 1 week ago

IP chicken is another option

[-] forestbeasts@pawb.social 2 points 1 week ago

We have a little one, in case it's useful. https://ip.brightfur.net/ Super simple. Works with curl too (autodetects whether to give you plain text or an HTML webpage).

It's like 20 lines of PHP and most of that's HTML.

-- Frost

[-] hexagonwin@lemmy.today 2 points 1 week ago

i usually use icanhazip.com, seems to work well enough

[-] irelephant@lemmy.dbzer0.com 1 points 1 week ago
load more comments
view more: next ›
this post was submitted on 10 Apr 2026
178 points (95.9% liked)

You Should Know

45467 readers
670 users here now

YSK - for all the things that can make your life easier!

The rules for posting and commenting, besides the rules defined here for lemmy.world, are as follows:

Rules (interactive)


Rule 1- All posts must begin with YSK.

All posts must begin with YSK. If you're a Mastodon user, then include YSK after @youshouldknow. This is a community to share tips and tricks that will help you improve your life.



Rule 2- Your post body text must include the reason "Why" YSK:

**In your post's text body, you must include the reason "Why" YSK: It’s helpful for readability, and informs readers about the importance of the content. **



Rule 3- Do not seek mental, medical and professional help here.

Do not seek mental, medical and professional help here. Breaking this rule will not get you or your post removed, but it will put you at risk, and possibly in danger.



Rule 4- No self promotion or upvote-farming of any kind.

That's it.



Rule 5- No baiting or sealioning or promoting an agenda.

Posts and comments which, instead of being of an innocuous nature, are specifically intended (based on reports and in the opinion of our crack moderation team) to bait users into ideological wars on charged political topics will be removed and the authors warned - or banned - depending on severity.



Rule 6- Regarding non-YSK posts.

Provided it is about the community itself, you may post non-YSK posts using the [META] tag on your post title.



Rule 7- You can't harass or disturb other members.

If you harass or discriminate against any individual member, you will be removed.

If you are a member, sympathizer or a resemblant of a movement that is known to largely hate, mock, discriminate against, and/or want to take lives of a group of people and you were provably vocal about your hate, then you will be banned on sight.

For further explanation, clarification and feedback about this rule, you may follow this link.



Rule 8- All comments should try to stay relevant to their parent content.



Rule 9- Reposts from other platforms are not allowed.

Let everyone have their own content.



Rule 10- The majority of bots aren't allowed to participate here.

Unless included in our Whitelist for Bots, your bot will not be allowed to participate in this community. To have your bot whitelisted, please contact the moderators for a short review.



Rule 11- Posts must actually be true: Disiniformation, trolling, and being misleading will not be tolerated. Repeated or egregious attempts will earn you a ban. This also applies to filing reports: If you continually file false reports YOU WILL BE BANNED! We can see who reports what, and shenanigans will not be tolerated. We are not here to ban people who said something you don't like.

If you file a report, include what specific rule is being violated and how.



Partnered Communities:

You can view our partnered communities list by following this link. To partner with our community and be included, you are free to message the moderators or comment on a pinned post.

Community Moderation

For inquiry on becoming a moderator of this community, you may comment on the pinned post of the time, or simply shoot a message to the current moderators.

Credits

Our icon(masterpiece) was made by @clen15!

founded 2 years ago
MODERATORS