Jump to content
Sign in to follow this  
NOP-X4

Stop Internet Download Manager From Calling Home Easy Way

Recommended Posts

NOP-X4

-: Stop Internet Download Manager From Calling Home Easy Way :-


Internet Download Manager (IDM) has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. IDM increases download speeds by up to 5 times, resumes and schedules downloads. But it is not a free software so you have to buy it after 30 days of trial period. Here I am going to tell you how to Stop Internet Download Manager From Calling Home With CIDR IP Block Method. So you do not need of any crack/patch etc.

 

------------------------------------------------------------------------------------------------------------------------------
-: This Tutorial is For Educational Purpose Only :-

[ If You Like This Software, Support The Developers and Buy Internet Download Manager ]

https://secure.internetdownloadmanager.com/buy_idm.html

------------------------------------------------------------------------------------------------------------------------------

 

1. Download and Install Internet Download Manager From Here:

http://mirror2.internetdownloadmanager.com/commerce/2odlksMSLPFNW84503ksu99vnwud/idman628build15f.exe

OR

http://internetdownloadmanager.com/getlatestversion.html

2. Turn off The Internet.

3. Register with any IDM serial key.

4. Block all the IP Addresses listed below with your Firewall. :)

 

-----------------------------------------------------------------------------------------------------
-: List of IP Addresses To Be Blocked with Your Firewall :-
-----------------------------------------------------------------------------------------------------
 

Spoiler

 

---------------------------- 

184.173.149.184/30

----------------------------

184.173.188.104/30

----------------------------

50.22.78.28/30

----------------------------

50.97.41.96/29

----------------------------

169.55.0.224/30

----------------------------

169.55.40.5/28

----------------------------

185.80.221.18/28

----------------------------

31.78.22.50/28

----------------------------

 

 

-: List of IP Addresses Without CIDR Format :-

Spoiler

184.173.149.184
184.173.149.185
184.173.149.186
184.173.149.187
-------------------
184.173.188.104
184.173.188.105
184.173.188.106
184.173.188.107
-------------------
50.22.78.28
50.22.78.29
50.22.78.30
50.22.78.31
-------------------
50.97.41.96
50.97.41.97
50.97.41.98
50.97.41.99
50.97.41.100
50.97.41.101
50.97.41.102
50.97.41.103
-------------------
169.55.0.224
169.55.0.225
169.55.0.226
169.55.0.227
-------------------
169.55.40.0
169.55.40.1
169.55.40.2
169.55.40.3
169.55.40.4
169.55.40.5
169.55.40.6
169.55.40.7
169.55.40.8
169.55.40.9
169.55.40.10
169.55.40.11
169.55.40.12
169.55.40.13
169.55.40.14
169.55.40.15
-------------------
185.80.221.16
185.80.221.17
185.80.221.18
185.80.221.19
185.80.221.20
185.80.221.21
185.80.221.22
185.80.221.23
185.80.221.24
185.80.221.25
185.80.221.26
185.80.221.27
185.80.221.28
185.80.221.29
185.80.221.30
185.80.221.31
-------------------

31.78.22.49
31.78.22.50
31.78.22.51
31.78.22.52
31.78.22.53
31.78.22.54
31.78.22.55
31.78.22.56
31.78.22.57
31.78.22.58
31.78.22.59
31.78.22.60
31.78.22.61
31.78.22.62

-------------------

 

-----------------------------------------------------------------------------------------------------
-: For Windows Firewall :-
-----------------------------------------------------------------------------------------------------

 

  • IDM can easily Be Blocked Form Calling Home with Windows Firewall By Using IDM-Easy.Way.
  • As the name suggests IDM.EasyWay is a small App by Me which blockes all The IP Addresses listed above without any Fuss.
  • You can download IDM.EasyWay Here:

 

:)   IDM-Easy.Way.v.1.2.rar   :)

Site: https://www.upload.ee

Sharecode[?]: *SNIP*

VirusTotal: https://www.virustotal.com/file/67d8fedb48bfa3289c3a9ecbb879edfbda016eb581c4c64af7e5f6d4e984d0ac/analysis/  [0/56]

 

Name	: IDM-Easy.Way.v1.2.rar
Size	: 4 KB
MD5	: 8B3EF8908FF9E26A5F854560E9E9F1EB
SHA-1	: 2E2D6976A11949E45865727C302755DE86689E48
SHA-256	: 67D8FEDB48BFA3289C3A9ECBB879EDFBDA016EB581C4C64AF7E5F6D4E984D0AC

 

Edited by NOP-X4
Updated Links for IDM 6.28 build 15 and Added New IP(s)

Share this post


Link to post
Share on other sites
exodius

Why only 4 IPs? Does it safe to add only 4?

Share this post


Link to post
Share on other sites
NOP-X4

Why only 4 IPs? Does it safe to add only 4?

These 4 IPs are actually IP ranges which contains 20 IPs.

I am using this method and never get any nag till date.

Share this post


Link to post
Share on other sites
vitorio

For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014?

Share this post


Link to post
Share on other sites
NOP-X4

For now is only available to kaspersky or can also be available to other antivirus, in my case I use NIS 2014?

Well, This method can be used with any antivirus/firewall if it supports IPs in CIDR format.

I never used NIS so I do not whether it supports CIDR or not may be some other user who are using NIS can help you.

Share this post


Link to post
Share on other sites
Karamjit

this is the method once steven36 proposed. nothing new. i have been using this for 3 months

Share this post


Link to post
Share on other sites
NOP-X4

this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Share this post


Link to post
Share on other sites
Karamjit

this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea.

Share this post


Link to post
Share on other sites
NOP-X4

Ha ha, but I rarely visited this forum for one year or more and a thread related to this kind of stuff was already started so I think there is no need of it, but as the Mr. Perfectionist (OP of that thread) removed tutorial, I started this thread with CIDR method. B)

Share this post


Link to post
Share on other sites
exodius

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Share this post


Link to post
Share on other sites
NOP-X4

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

Edited by NOP-X4

Share this post


Link to post
Share on other sites
exodius

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Share this post


Link to post
Share on other sites
NOP-X4

Adding 4 IPs is very easy as compared to 23 IPs, and this method can be used with any antivirus/firewall if it supports IPs in CIDR format.

Share this post


Link to post
Share on other sites
pokenguyen

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

You can use this to convert to IP range:

http://www.ipaddressguide.com/cidr

Share this post


Link to post
Share on other sites
Dukun Cabul

In other words
184.173.149.184/30 = IP range (184.173.149.184 - 184.173.149.187)
184.173.188.104/30 = IP range (184.173.188.104 - 184.173.188.107)
50.22.78.28/30 = IP range (50.22.78.28 - 50.22.78.31)
50.97.41.96/29 = IP range (50.97.41.96 - 50.97.41.103)

You can always do this with all AV as long as there is IP range field ;)

Share this post


Link to post
Share on other sites
sirri
CIDR Blocks

The ability to group blocks of addresses into a single routing network is the hallmark of CIDR, and the prefix standard used for interpreting IP addresses makes this possible. CIDR blocks share the first part of the bit sequence that comprises the binary representation of the IP address, and blocks are identified using the same decimal-dot CIDR notation system that is used for IPv4 addresses. For example, 10.10.1.16/32 is an address prefix with 32 bits, which is the highest number of bits allowed in IPv4. Addresses with identical prefixes and the same number of bits always belong to the same block. In addition, larger blocks can be easily distinguished from smaller blocks by the length of the prefix. Short prefixes allow for more addresses while large prefixes identify small blocks.

CIDR notation is also used for the newer IPv6 standard, and the syntax is the same. The only difference is that IPv6 addresses may contain up to 128 bits instead of the 32-bit maximum of IPv4. Even though IPv6 addresses may be up to 128 bits in length, it is important to note that subnets on MAC layer networks always use 64-bit host identifiers.

The assignment of CIDR blocks is handled by the Internet Assigned Numbers Authority (IANA). One of the duties of the IANA is to issue large blocks of IP addresses to regional Internet registries (RIRs). These blocks are used for large geographical areas, such as Europe, North America, Africa and Australia. It is then the duty of each RIR to create smaller, but still quite large, blocks of IP addresses to be assigned to local Internet registries (LIRs). Depending on the organization of regional and local registries, blocks may be subdivided further until they are assigned to end users. The size of blocks assigned to end users is dependent on how many individual addresses will be required by each user. Most end users receive their blocks from a single Internet service provider (ISP), but organizations that make use of multiple ISPs must obtain provider-independent blocks directly from an LIR or RIR.

* For routed subnets bigger than /31 or /32, two reserved addresses need to be subtracted from the number of available host addresses: the largest address, which is used as the broadcast address, and the smallest address, which is used to identify the network itself. In addition, any border router of a subnet typically uses a dedicated address.

Better explain,right ? Go HERE

Edited by sirri

Share this post


Link to post
Share on other sites
hackerz14

Blocking the 23 IP's with WFC is working just fine. I don't see any reason to switch to this method.

how can I block using Windows Firewall Control?

Share this post


Link to post
Share on other sites
vitorio

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

Seems this trick does not work with eset smart security :(

2015_04_23_184934.png

Have you added the IPs with /29 and /30 as they are given above?

Choose address range and then see.

I can't add that, eset bult-in firewall does not support CIDR IP, i can't add "/" sign.

You can use this to convert to IP range:

http://www.ipaddressguide.com/cidr

Great site link. Thanks. Edited by vitorio

Share this post


Link to post
Share on other sites
NOP-X4

Everything explained here. B)

CIDR (Wikipedia)

Share this post


Link to post
Share on other sites
Michael*

This format is also supported by windows commands netsh advfirewall

Edited by Michael*

Share this post


Link to post
Share on other sites
exodius

What is the mean of this :

and updates from IDM servers.

I can't connect it to IDM server bro.

Share this post


Link to post
Share on other sites
steven36

atm...there 're so many better methods. but anyway. good job. keep it up

You're right I don't use IP blocking anymore my self even..but its good to know if its ever needed ..Its just to much of a hassle to worry with are they going add new ips and having to clean blacklist from the registry . There a much easier better way were you don't have worry with none of this anymore .

Share this post


Link to post
Share on other sites
NOP-X4
What is the mean of this :
and updates from IDM servers.

I can't connect it to IDM server bro.

Means you can download update files from IDM servers. :unsure: [not from the IDM built-in update feature]

http://mirror2.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exehttp://mirror3.internetdownloadmanager.com/updates/dfghrtv3465773FRJD843dedhx250dlAsb/idmupdt.exe

Share this post


Link to post
Share on other sites
steven36

this is the method once steven36 proposed. nothing new. i have been using this for 3 months

I am using this method since October 2012 and I do not know when stveven36 proposed this method.

Ya may be. but i heard this from steven36........so you are doing this from Oct 2012 and report this now. don't you think you are very early to report this here? by the way nice idea.

comodo-icon-32.png

I didn't patent it lol . I found it out about at appznet in like 2008 . I blocked ips overall in Comodo 3.0 and it worked fine . Blocked IPS in 2014 and 2015 and it still worked . But blocking IPs is not fool proof . All they have to do is update ips and there protection and it can cause a bunch of headaches if what has changed is not made public in time . Perfect example was build 10 a few weeks ago of this . If you use this method you better stay on your toes . Blocking in ranges may be more effective as long as they don't update ips outside those ranges . ;)

Edited by steven36

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this  

  • Recently Browsing   0 members

    No registered users viewing this page.

×
×
  • Create New...