@karma4,
Benieuwd wat de toekomst van deze scan site(s) zal zijn binnen het nieuwe GDPR regime?
https://www.islegitsite.com/check of
http://www.scamfoo.com/Dit is ook een hele andere manier om te checken
http://dns-record-viewer.online-domain-tools.com/Goed om te gebruiken in combinatie met de Shodan extensie in de browser - even een voorbeeld:
https://www.shodan.io/host/52.2.58.67 -> http://ec2-52-2-58-67.compute-1.amazonaws.com/
PTR - pdns1.ultradns.net x4.amazonaws.org x2.amazonaws.com x1.amazonaws.com x3.amazonaws.org
Nog een andere insteek is er mogelijk.
Hier onderzocht ik een fout optredend na een PTR verzoek om 165.38.101.151.in-addr.arpa , kennelijk trad er een name error op. Ik gebruikte Nir Sofer's tooltje DNSQuery Sniffer op de harde schijf van mijn comp.
Tijdens het zoeken stuitte ik op deze online interface::
url] https://www.digwebinterface.com/?hostnames=165.38.101.151.in-addr.arpa&type=Reverse&ns=resolver&useresolver=8.8.4.4&nameservers= [/url] *
Niet veel om vast te kunnen stellen via
https://toolbar.netcraft.com/site_report?url=165.38.101.151.in-addr.arpaOok leuk speelgoed voor Tech-IT specialisten en website veiligheidsonderzoekers. .
We checkten ook hier en vonden de reden van de foutmeding via de: DNSsy Report Results
Results for 165.38.101.151.in-addr.arpa
Test Results Status
Checking domain format: Hostname looks good. Pass
Checking for parent nameservers: Found 6 parent nameservers. Pass
Checking for parent glue: Found glue from root nameservers to parent nameservers. Info
NS records at parent nameserver: Your NS records at your parent nameserver are:
Provided by e.in-addr-servers.arpa -> pri.authdns.ripe.net Info
Nameservers listed at parent: No nameservers found at parent nameserver. Fail
Nog een tooltje voor mee algemeen netwerk gebruik [ur]: http://www.subnet-calculator.com/cidr.php [/url]
Zo blijven we bezig en leren we tijdens het bezig zijn,
* Over de interface:
Usage: dig [@global-server] [domain] [q-type] [q-class] {q-opt}
{global-d-opt} host [@local-server] {local-d-opt}
[ host [@local-server] {local-d-opt} [...]]
Where: domain is in the Domain Name System
q-class is one of (in,hs,ch,...) [default: in]
q-type is one of (a,any,mx,ns,soa,hinfo,axfr,txt,...) [default:a]
(Use ixfr=version for type ixfr)
q-opt is one of:
-x dot-notation (shortcut for reverse lookups)
-i (use IP6.INT for IPv6 reverse lookups)
-f filename (batch mode)
-b address[#port] (bind to source address/port)
-p port (specify port number)
-q name (specify query name)
-t type (specify query type)
-c class (specify query class)
-k keyfile (specify tsig key file)
-y [hmac:]name:key (specify named base64 tsig key)
-4 (use IPv4 query transport only)
-6 (use IPv6 query transport only)
-m (enable memory usage debugging)
d-opt is of the form +keyword[=value], where keyword is:
+[no]vc (TCP mode)
+[no]tcp (TCP mode, alternate syntax)
+time=### (Set query timeout) [5]
+tries=### (Set number of UDP attempts) [3]
+retry=### (Set number of UDP retries) [2]
+domain=### (Set default domainname)
+bufsize=### (Set EDNS0 Max UDP packet size)
+ndots=### (Set NDOTS value)
+edns=### (Set EDNS version)
+[no]search (Set whether to use searchlist)
+[no]showsearch (Search with intermediate results)
+[no]defname (Ditto)
+[no]recurse (Recursive mode)
+[no]ignore (Don't revert to TCP for TC responses.)
+[no]fail (Don't try next server on SERVFAIL)
+[no]besteffort (Try to parse even illegal messages)
+[no]aaonly (Set AA flag in query (+[no]aaflag))
+[no]adflag (Set AD flag in query)
+[no]cdflag (Set CD flag in query)
+[no]cl (Control display of class in records)
+[no]cmd (Control display of command line)
+[no]comments (Control display of comment lines)
+[no]question (Control display of question)
+[no]answer (Control display of answer)
+[no]authority (Control display of authority)
+[no]additional (Control display of additional)
+[no]stats (Control display of statistics)
+[no]short (Disable everything except short
form of answer)
+[no]ttlid (Control display of ttls in records)
+[no]all (Set or clear all display flags)
+[no]qr (Print question before sending)
+[no]nssearch (Search all authoritative nameservers)
+[no]identify (ID responders in short answers)
+[no]trace (Trace delegation down from root)
+[no]dnssec (Request DNSSEC records)
+[no]nsid (Request Name Server ID)
+[no]sigchase (Chase DNSSEC signatures)
+trusted-key=#### (Trusted Key when chasing DNSSEC sigs)
+[no]topdown (Do DNSSEC validation top down mode)
+[no]multiline (Print records in an expanded format)
+[no]onesoa (AXFR prints only one soa record)
global d-opts and servers (before host name) affect all queries.
local d-opts and servers (after host name) affect only that lookup.
-h (print help and exit)
-v (print version and exit)
luntrus