可怕的mjj 大佬有话说 :
正常访问一个域名的过程中可以拿到name server吗
想扫描域名顺便拿到name server
感谢大佬
萌主 大佬有话说 :
随便查 whois不就有了
可怕的mjj 大佬有话说 :
萌主 大佬有话说 : 2023-8-3 11:17
随便查 whois不就有了
有些后缀一天查询10个哈
吃和远方 大佬有话说 :
去查询解析的网站 查解析
可怕的mjj 大佬有话说 :
吃和远方 大佬有话说 : 2023-8-3 11:28
去查询解析的网站 查解析
500万哈..
吃和远方 大佬有话说 :
可怕的mjj 大佬有话说 : 2023-8-3 11:36
500万哈..
what?
拿到 name server 啥意思 ,你要搬回家 ? 😮
ismile 大佬有话说 :
我接了
conease 大佬有话说 :
nslookup -type=ns google.com
hardwar 大佬有话说 :
这个意思吗yc022t
# dig +trace ip.sb
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.13 <<>> +trace ip.sb
;; global options: +cmd
. 517536 IN NS a.root-servers.net.
. 517536 IN NS b.root-servers.net.
. 517536 IN NS c.root-servers.net.
. 517536 IN NS d.root-servers.net.
. 517536 IN NS e.root-servers.net.
. 517536 IN NS f.root-servers.net.
. 517536 IN NS g.root-servers.net.
. 517536 IN NS h.root-servers.net.
. 517536 IN NS i.root-servers.net.
. 517536 IN NS j.root-servers.net.
. 517536 IN NS k.root-servers.net.
. 517536 IN NS l.root-servers.net.
. 517536 IN NS m.root-servers.net.
. 517536 IN RRSIG NS 8 0 518400 20230816050000 20230803040000 11019 . roGtxojJS/hIGs4FPqLm3Lxvt1thCmL+lSYIjIg2HOd9b3tLP2UTPGUo A7W4JLv5oRQAT9RV6rFUkMS9ndRV0erODq6quTgkN2KOJojPPK1XBfjk 0f9OhZwoyXYz77X/pd7/rQG1dRQl4/nV+UBDNrSnUjRh+Lw20ivT80GY VEPj3sBlTsoNaSDg3V18koVkROsUNP8B2noj8IPlMPMUoHFCtj20gR/4 h6eJxJw7Pcs5uNKRopXLpMptSBKH5qjC6gSGj8ycUrAwX2Ut1yn3h1+Q nrd/vb/W88h5Cw7jDz4CkaIQ4smBtt/eL9qE+Q5B/MpKun0viDsuIO9k ydhrEQ==
;; Received 1097 bytes from 1.1.1.1#53(1.1.1.1) in 0 ms
sb. 172800 IN NS ns1.anycastdns.cz.
sb. 172800 IN NS ns2.anycastdns.cz.
sb. 172800 IN NS pch.nic.sb.
sb. 86400 IN DS 17635 8 2 27F59686A15B09DC8293FAC9C31E5BE51ABF214E1E9CD5B21CBE50F0 F311C780
sb. 86400 IN RRSIG DS 8 1 86400 20230816050000 20230803040000 11019 . P4GHm522AIIADAbVIK0ksw3COsN6/KuOsirEAY1nbNtvcAgw7ZDLV29A 9aLSR/xV7bLkUUXOQix/SGTuqL+uB9bGuq/m4rIbTfwl8OonLxQP126V rQhrxZcgguBcFVXQZkcnG1LHNQTwx1qgj430eUywU+YwWMiC/hd1t144 yl/4JaKxz1x7qUXruHxqY3EXAaA8sV8gWDt731R7MVyPL4HXHxhM9RtE /LhRAXlP3DTE3gSB+3RSeRFdSlOa8PhbNERwKUfADEA2OzYgkr9KL1mg jXH+oZnAm6BBzzRNMVW3opbkfNDgk8o/yrgDvIT3tDMk2uIxHVmz3B6+ ky3viQ==
;; Received 544 bytes from 199.7.91.13#53(d.root-servers.net) in 0 ms
ip.sb. 86400 IN NS a.dns.sb.
ip.sb. 86400 IN NS b.dns.sb.
ip.sb. 86400 IN DS 6726 13 2 478D9F42DF60DB443D80980A8DF8207C7EBA5D8524180F676977B4E9 C54DEF33
ip.sb. 86400 IN RRSIG DS 8 2 86400 20230818180000 20230801180000 19614 sb. C2d5hVTXT0VbehZ6fbcRBPoW3vHsXVThSpSwdCb3q6BlsJ6wKlC/nlWM 06XhMXKzAe8tPbBt3SO3Kc8OqisjScEyBqNMUhMVUIqBj6ZeU1CQlkSN nvslaIwfRPVgT9jwThuCkotgrjiTZaJSJvICwOTsVp6aCtwqriH/26tB CPT7lNvPJVZZXIqwc1+JCbWMDvuxorexLqNja6v/iGnryelKEC9AryoL ebKSEjdaiCveUFM0lCCeQn7PliMoEhvsMHLnLk8fOMKyepSlrRdXxc4g HJn64S//UxVbBBQEts5sI51zBSZ4LRgFxj2wFv3cG8dm63m/QymvO6lI uhAFmQ==
;; Received 496 bytes from 2a00:fea0:dead::beef#53(ns1.anycastdns.cz) in 166 ms
ip.sb. 600 IN A 172.67.75.172
ip.sb. 600 IN A 104.26.12.31
ip.sb. 600 IN A 104.26.13.31
ip.sb. 600 IN RRSIG A 13 2 600 20230817000000 20230727000000 10506 ip.sb. L0BvtYSQDQYK8qKDSoP7k7N0aOga6s+FX5+puAiNqXN2S9R8+32uxk0w 7Oukiu6DOMiakcN8UxLP1ACjFg+ceA==
;; Received 183 bytes from 2a0d:2900:b::99:132#53(b.dns.sb) in 4 ms
# dig ip.sb @ns1.anycastdns.cz
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.13 <<>> ip.sb @ns1.anycastdns.cz
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 23697
;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 3, ADDITIONAL: 5
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1480
;; QUESTION SECTION:
;ip.sb. IN A
;; AUTHORITY SECTION:
ip.sb. 86400 IN NS a.dns.sb.
ip.sb. 86400 IN NS b.dns.sb.
ip.sb. 86400 IN DS 6726 13 2 478D9F42DF60DB443D80980A8DF8207C7EBA5D8524180F676977B4E9 C54DEF33
;; ADDITIONAL SECTION:
a.dns.sb. 86400 IN A 188.244.98.132
b.dns.sb. 86400 IN A 188.244.99.132
a.dns.sb. 86400 IN AAAA 2a0d:2900:a::98:132
b.dns.sb. 86400 IN AAAA 2a0d:2900:b::99:132
;; Query time: 165 msec
;; SERVER: 2a00:fea0:dead::beef#53(2a00:fea0:dead::beef)
;; WHEN: Thu Aug 03 16:28:56 CST 2023
;; MSG SIZErcvd: 206
# dig invalid.sb @ns1.anycastdns.cz
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.13 <<>> invalid.sb @ns1.anycastdns.cz
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48729
;; flags: qr aa rd; QUERY: 1, ANSWER: 0, AUTHORITY: 4, ADDITIONAL: 1
;; WARNING: recursion requested but not available
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1480
;; QUESTION SECTION:
;invalid.sb. IN A
;; AUTHORITY SECTION:
qjc3cgk3pohjub12volnsn8cdscee7pp.sb. 86400 IN NSEC3 1 1 10 2D703071 QRPJQQ8AJ41M6HF8BPHJG5C00V0EDH68 NS DS RRSIG
ujsap1vj0s4l4sj6krls86501028kni6.sb. 86400 IN NSEC3 1 1 10 2D703071 UTD35C8LBF0PKFH3NG75HG1S31FDC2SG NS SOA TXT RRSIG DNSKEY NSEC3PARAM
ivsmmpu8h5gvhamgiq8uj30pah8k4245.sb. 86400 IN NSEC3 1 1 10 2D703071 J8KH45BT9JTIQLFAQSRF1J81A55T58H8 NS DS RRSIG
sb. 86400 IN SOA dns1.telekom.net.sb. dns.telekom.net.sb. 2023080306 480 300 259200 86400
;; Query time: 349 msec
;; SERVER: 2a00:fea0:dead::beef#53(2a00:fea0:dead::beef)
;; WHEN: Thu Aug 03 16:29:12 CST 2023
;; MSG SIZErcvd: 346
榆木 大佬有话说 :
whois.ip.sy 查询 时候自带