0
0
mirror of https://codeberg.org/crimeflare/cloudflare-tor synced 2024-12-24 00:20:41 +00:00

Update 'instructions.md'

This commit is contained in:
csrftoken 2019-08-23 13:42:03 +02:00
parent aa9c0e3f53
commit 9933896977

View File

@ -32,7 +32,7 @@ There are many ways to detect it:
- [These add-ons](what-to-do.md) will help your Cloudflare collection.
- Visit a website via Tor or VPN, and you will be greeted by "Attention Required! Cloudflare" webpage.
- Use "[Is MITM?](http://searxes.nmqnkngye4ct7bgss4bmv5ca3wpa55yugvxen5kz2bbq67lwy6ps54yd.onion/collab/sxes/tool_ismitm.php)" webpage.
- Use "[Is MITM?](https://searxes.eu.org/collab/sxes/tool_ismitm.php)" webpage.
- Dig "[NS record](https://www.digwebinterface.com/?hostnames=emsisoft.com&type=NS&ns=resolver&useresolver=8.8.4.4&nameservers=)" of the domain.
```
@ -75,7 +75,7 @@ IMPORTANT: Please add only "Base Domain"
... to /split/cloudflare_e.txt
```
Type B: Use "[Is MITM?](https://searxes.eu.org/collab/sxes/tool_ismitm.php)" webpage.
Type B: Use "[Is MITM?](https://searxes.eu.org/collab/sxes/tool_ismitm.php)" webpage. Just scan the FQDN.
3) If the website *no longer using Cloudflare*, *remove* it from /split/ list and *add* to "[ex_cloudflare_users.txt](cloudflare_users/ex_cloudflare_users.txt)".