Please help to make working localhost ip

Hi
I have :

No LSB modules are available.
Distributor ID: Debian
Description: Parrot Security 6.3 (lorikeet)
Release: 6.3
Codename: lory
Firefox 128.10.0esr

Any localhost ip not working. I need to access to localhost ip of my router for configuring it. From any web browser I can’ t access to any localhost ip.
I need to use zoneminder for connectint a Kerui NVR with security cameras.

I start running: sudo systemctl start apache2

When I run http://localhost/127.0.0.1
I get:

“Not Found
The requested URL was not found on this server.
Apache/2.4.62 (Debian) Server at localhost Port 80”

If I write localhost authomatically appear http://localhost:9999/ and
Firefox can’t establish a connection to the server at localhost:9999.

Pluged the NVR to the wired network, ip do not appear but it is detected with wireshark.

Please could you tell me what I need to do?
I’m not an expertise.

Thanks in advance for your help.

Here you have info I got:

less /etc/hosts

Host addresses

127.0.0.1 localhost
127.0.1.1 parrot
::1 localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters

Others

/etc/hosts (END)

$sudo iptables -L
[sudo] password for dmks:
Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination

ifconfig | grep inet
bash: ifconfig: command not found

$sudo ifconfig | grep inet
inet6 fdeb:446c:912d:8da:: prefixlen 64 scopeid 0x0
inet6 fe80::e206:3f25:3769:6e5f prefixlen 64 scopeid 0x20
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
inet 10.2.0.2 netmask 255.255.255.255 destination 10.2.0.2
inet6 2a07:b944::2:2 prefixlen 128 scopeid 0x0
inet6 fe80::c19c:2da8:ac19:d9b6 prefixlen 64 scopeid 0x20
inet 192.168.103.217 netmask 255.255.255.0 broadcast 192.168.103.255
inet6 fe80::58ac:f0a4:c6be:548d prefixlen 64 scopeid 0x20

$sudo ifconfig -a

enp0s31f6: flags=4099<UP,BROADCAST,MULTICAST> mtu 1500
ether c8:5b:76:aa:bc:76 txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 0 bytes 0 (0.0 B)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0
device interrupt 16 memory 0xf1300000-f1320000

ipv6leakintrf0: flags=195<UP,BROADCAST,RUNNING,NOARP> mtu 1500
inet6 fdeb:446c:912d:8da:: prefixlen 64 scopeid 0x0
inet6 fe80::e206:3f25:3769:6e5f prefixlen 64 scopeid 0x20
ether c6:62:d4:47:f5:8b txqueuelen 1000 (Ethernet)
RX packets 0 bytes 0 (0.0 B)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 36 bytes 3096 (3.0 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

lo: flags=73<UP,LOOPBACK,RUNNING> mtu 65536
inet 127.0.0.1 netmask 255.0.0.0
inet6 ::1 prefixlen 128 scopeid 0x10
loop txqueuelen 1000 (Local Loopback)
RX packets 818 bytes 73212 (71.4 KiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 818 bytes 73212 (71.4 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

proton0: flags=209<UP,POINTOPOINT,RUNNING,NOARP> mtu 1420
inet 10.2.0.2 netmask 255.255.255.255 destination 10.2.0.2
inet6 2a07:b944::2:2 prefixlen 128 scopeid 0x0
inet6 fe80::c19c:2da8:ac19:d9b6 prefixlen 64 scopeid 0x20
unspec 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00 txqueuelen 1000 (UNSPEC)
RX packets 5382 bytes 5248504 (5.0 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 3921 bytes 733080 (715.8 KiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

wlp3s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.103.217 netmask 255.255.255.0 broadcast 192.168.103.255
inet6 fe80::58ac:f0a4:c6be:548d prefixlen 64 scopeid 0x20
ether 34:f3:9a:19:6d:92 txqueuelen 1000 (Ethernet)
RX packets 44886 bytes 54253514 (51.7 MiB)
RX errors 0 dropped 0 overruns 0 frame 0
TX packets 30082 bytes 7742866 (7.3 MiB)
TX errors 0 dropped 0 overruns 0 carrier 0 collisions 0

ip address show

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 scope host lo
valid_lft forever preferred_lft forever
inet6 ::1/128 scope host noprefixroute
valid_lft forever preferred_lft forever
2: enp0s31f6: <NO-CARRIER,BROADCAST,MULTICAST,UP> mtu 1500 qdisc fq_codel state DOWN group default qlen 1000
link/ether c8:5b:76:aa:bc:76 brd ff:ff:ff:ff:ff:ff
3: wlp3s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000
link/ether 34:f3:9a:19:6d:92 brd ff:ff:ff:ff:ff:ff
inet 192.168.103.217/24 brd 192.168.103.255 scope global dynamic noprefixroute wlp3s0
valid_lft 1928sec preferred_lft 1928sec
inet6 fe80::58ac:f0a4:c6be:548d/64 scope link noprefixroute
valid_lft forever preferred_lft forever
6: ipv6leakintrf0: <BROADCAST,NOARP,UP,LOWER_UP> mtu 1500 qdisc noqueue state UNKNOWN group default qlen 1000
link/ether c6:62:d4:47:f5:8b brd ff:ff:ff:ff:ff:ff
inet6 fdeb:446c:912d:8da::/64 scope global noprefixroute
valid_lft forever preferred_lft forever
inet6 fe80::e206:3f25:3769:6e5f/64 scope link noprefixroute
valid_lft forever preferred_lft forever
8: proton0: <POINTOPOINT,NOARP,UP,LOWER_UP> mtu 1420 qdisc noqueue state UNKNOWN group default qlen 1000
link/none
inet 10.2.0.2/32 scope global noprefixroute proton0
valid_lft forever preferred_lft forever
inet6 2a07:b944::2:2/128 scope global noprefixroute
valid_lft forever preferred_lft forever
inet6 fe80::c19c:2da8:ac19:d9b6/64 scope link noprefixroute
valid_lft forever preferred_lft forever

Wireshark is capurin the NVR ip

Frame 1575: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface any, id 0
Section number: 1
Interface id: 0 (any)
Interface name: any
Encapsulation type: Linux cooked-mode capture v1 (25)
Arrival Time: May 22, 2025 15:59:29.614704377 CEST
[Time shift for this packet: 0.000000000 seconds]
Epoch Time: 1747922369.614704377 seconds
[Time delta from previous captured frame: 0.163479291 seconds]
[Time delta from previous displayed frame: 0.163479291 seconds]
[Time since reference or first frame: 142.518463049 seconds]
Frame Number: 1575
Frame Length: 62 bytes (496 bits)
Capture Length: 62 bytes (496 bits)
[Frame is marked: False]
[Frame is ignored: False]
[Protocols in frame: sll:ethertype:arp]
[Coloring Rule Name: ARP]
[Coloring Rule String: arp]
Linux cooked capture v1
Packet type: Broadcast (1)
Link-layer address type: Ethernet (1)
Link-layer address length: 6
Source: It-Facto_4f:8b:66 (00:13:00:4f:8b:66)
Unused: 0000
Protocol: ARP (0x0806)
Padding: 00000000000000000000000000000000
Trailer: 0000
Address Resolution Protocol (request)
Hardware type: Ethernet (1)
Protocol type: IPv4 (0x0800)
Hardware size: 6
Protocol size: 4
Opcode: request (1)
Sender MAC address: It-Facto_4f:8b:66 (00:13:00:4f:8b:66)
Sender IP address: 192.168.1.152
Target MAC address: 00:00:00_00:00:00 (00:00:00:00:00:00)
Target IP address: 192.168.1.1

  • Parrot version in use (if you are not aware of it, open terminal and type cat /etc/os-release | grep VERSION):

  • Anonsurf running? (yes/no)

  • Logs/Terminal output (use pastebin or similar services):

  • Screenshots:

127.0.0.1 is a loopback address, it is used when your running a service on the computer, and need to connect to it, like a local database for example. It is not reachable from outside of your own computer!

Your router uses a private IP address space, for a home router this is typically the 192.168.0.0 to 192.168.255.255 IP range

The 192.168.255.255 IP is the broadcast address, and the router itself will typically be on the IP 192.168.0.0 or 192.168.0.1 or 192.168.1.1 so it is those IP addresses you would put in web browser search bar to get access to the router management console.

It looks like your wifi adapter has been given the address;

wlp3s0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 192.168.103.217 netmask 255.255.255.0 broadcast 192.168.103.255

so its on a subnet, which means your router may be on a different IP address than default…

that address plus this one;

proton0: flags=209<UP,POINTOPOINT,RUNNING,NOARP> mtu 1420
inet 10.2.0.2 netmask 255.255.255.255 destination 10.2.0.2

which looks like a VPN (proton) would lead one to assume this is not your network to try and configure!

Far better to state what your trying to achieve, this is a hackers distro and learning is what we are about. Are you trying to get around filtering for example?

1 Like

Use a VPS with WireGuard.
Avoid VPN’s unless Mullvad to an extent.
Encrypt DNS with a DNSCrypt.Toml and ProxyDNS.Toml as daemon’s from OS and in router 9.9.9.9
Make that encryption recursive and Bounding.
I should had to just boot up previous version of Parrot, but 13788 errors 277 infected files and 7 potential RootKits … while I’m certified as network manager does not come from me but those upgrades mirrors.
Know that whatever you do unless your VPN changes it or your Virtual thingie to another number then .1, 2, 3 , 0r 38 depending the VPN making it 10.0.0.1/18 all Tor or Onion is 127.0.0.1 as previous said your loopback by default. So better encrypt it.