roycewilliams / FollowTheEULA-snapshot

Python program to check for servers bypassing the Mojang domain ban

Repository from Github https://github.comroycewilliams/FollowTheEULA-snapshotRepository from Github https://github.comroycewilliams/FollowTheEULA-snapshot

Follow The EULA

A python 2.7 program to check for servers bypassing the Mojang domain ban

Programmed By: Reecepbcups - August 25th 2018

This program is used to gather Minecraft server EULA block bypasses and output into a text file. This is usually done by using a ddns.net domain to work around the main domain to the server IP. (Main IP -> New.ddns.net -> Server IP Address) This programs aims to stop this with a more automated way of finding these bypasses and provides an easy output into a txt file.

How to Run

  1. Run main(), which will call the outputToFile(), ab_all_blocked_Servers(), and check() functions
  2. IPs in the Bypassed_Ips.txt file need to be blocked as they are bypassing using the DNS work around :)

What You Need installed

You Will need to have: Python 2.x.x request, json, pprint modules (Sudo pip install request, json, pprint)

About

Python program to check for servers bypassing the Mojang domain ban


Languages

Language:Python 100.0%