Back to Course

Cyber Rangers

0% Complete
0/0 Steps
  1. course overview

    Syllabus | Cyber Rangers
  2. Zoom Links
    1 Topic
  3. Module 1: Welcome to the Cyber Squad
    Morphing into a Cyber Ranger
    3 Topics
  4. Whatโ€™s in the Digital World?
    3 Topics
  5. Cyber Threats: Meet the Villains
    3 Topics
  6. The Cyber Defense Arsenal
    3 Topics
  7. The Art of the Hack
    3 Topics
  8. CTF: The First Mission
    2 Topics
  9. Red Ranger โ€“ Network Defender (Sessions 7-10)
    The Power of Firewalls
    3 Topics
  10. DDoS Attacks: When Too Much is Too Bad
    3 Topics
  11. Wi-Fi Security: Is Your Home Network Safe?
    3 Topics
  12. CTF Challenge โ€“ Network Defense
  13. Blue Ranger โ€“ Cryptography Expert (Sessions 11-14)
    2048 Game - Understanding Code Logic
    3 Topics
  14. The Secret Language of Codes
    3 Topics
  15. Modern Encryption: How Does It Work?
    3 Topics
  16. Breaking the Code: Ethical Decryption
    3 Topics
  17. CTF Challenge โ€“ Cryptography
  18. Yellow Ranger โ€“ Ethical Hacker (Sessions 15-18)
    Hacking for Good: The Role of Ethical Hackers
    4 Topics
  19. Social Engineering: Trick or Treat?
    3 Topics
  20. Web App Hacking: Finding Weak Spots
    4 Topics
  21. Cross Site Scripting
    4 Topics
  22. Green Ranger โ€“ Breaking the code
    Cookies and Data
    4 Topics
  23. CTF Challenge โ€“ Javascript
  24. Module 3: Cyber Crisis Simulations
    Incident Response: Save the Cityโ€™s Power Grid!
    3 Topics
  25. Incident Response : Cyber Atack Unfolds
    3 Topics
  26. Incident Response - Defend the Powergrid
    3 Topics
  27. Incident Response : Lessons learned and report writing
    3 Topics
  28. Understanding Data Breaches
    4 Topics
  29. Looking for clues in a breach
    3 Topics
  30. Data Breach Mystery: Find the Insider
  31. Ransomware Attack: Pay or Fight?
    2 Topics
  32. Module 4: The Cyber Rangers Final Battle
    Mega CTF Tournament
  33. Cyber Ranger Graduation
  34. Where to Next? Exploring Cybersecurity Careers
  35. Optional Content & Enrichment (10 Extra Sessions)
    Geographical Mapping
  36. Red Team vs. Blue Team
  37. Advanced Forensics
  38. OSINT Challenges
  39. Spy Games
  40. Lockpicking 101 (Virtual)
  41. Defusing a Virtual Bomb
  42. AI in Cybersecurity
  43. Create Your Own CTF Challenge
  44. Internet of Things (IoT) Hacking
  45. Cyber Rangers Hall of Fame
Lesson Progress
0% Complete

Lesson: Whatโ€™s in a Digital World?
Focus: IP Lookup & WHOIS Investigation
Tools: Browser-based, no installation needed
Time: ~25โ€“30 minutes
Goal: Learn how to trace digital identities using IP and domain lookup tools.


๐ŸŽฏ Lab Objectives

By the end of this lab, students will:

  • Understand what an IP address is and how it relates to websites
  • Use public lookup tools to find information about an IP or domain
  • Read WHOIS records to identify the owner, registrar, and technical details
  • Reflect on how digital traces are stored and revealed online

๐ŸŒ Step 1: What Is an IP Address?

๐Ÿ’ฌ IP = Internet Protocol address โ€” a unique number assigned to every device on the internet.

๐Ÿ‘‰ Go to this website to see your own IP address:
๐Ÿ”— https://whatismyipaddress.com

๐Ÿ–Š Write down your IP (v4 or v6), location, and ISP provider.


๐Ÿ” Step 2: Investigate a Website (Using IP Lookup)

You will now investigate the digital footprint of a real website.

Website to analyze:
๐Ÿ•ต๏ธ https://cyber-school.co.il

  1. Open: https://iplocation.net
  2. Type the domain above and press search
  3. View the server IP and its location

๐Ÿ“ Answer:

  • What is the IP address of the site?
  • Where is the server located?
  • What hosting company or cloud service is used?

๐Ÿงพ Step 3: Run a WHOIS Lookup

WHOIS is a public record system that stores ownership details for websites and domains.

  1. Go to: https://who.is
  2. Enter: cyber-school.co.il
  3. Scroll through the WHOIS record

๐Ÿ“ Answer:

  • Who is the registrar?
  • When was the domain created?
  • When does it expire?
  • Is the contact info public or hidden?

โš ๏ธ Bonus Task (Advanced)

Try looking up another domain:
openai.com or google.com

Find and compare:

  • Server country
  • Hosting provider
  • WHOIS privacy settings

๐Ÿ’ก Reflection Questions

  1. What surprised you about what was publicly available?
  2. Why do some domains hide their WHOIS info?
  3. How could this data be useful to cybersecurity professionals?
  4. What does this teach you about your own digital identity?

๐Ÿ›ก๏ธ Cyber Safety Reminder

  • IP and domain lookup tools are legal and public โ€” but use them ethically.
  • Just because something is visible online doesnโ€™t mean you should misuse it.