BASH.WS# run
  • whois
  • host
  • dig
  • nslookup
  • ping
  • traceroute
  • geoiplookup
Show command arguments 7 refs to 176.137.12.49
% This is the RIPE Database query service. % The objects are in RPSL format. % % The RIPE Database is subject to Terms and Conditions. % See http://www.ripe.net/db/support/db-terms-conditions.pdf % Note: this output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '176.136.0.0 - 176.138.255.255' % Abuse contact for '176.136.0.0 - 176.138.255.255' is 'abuse@bouyguestelecom.fr' inetnum: 176.136.0.0 - 176.138.255.255 netname: BOUYGTEL-ISP-WIRELINE descr: Pool for Broadband DSL customers country: FR admin-c: NOCB1-RIPE tech-c: NOCB1-RIPE status: ASSIGNED PA mnt-by: BYTEL-MNT mnt-lower: BYTEL-MNT mnt-routes: BYTEL-MNT created: 2016-03-02T11:24:15Z last-modified: 2016-03-02T11:24:15Z source: RIPE role: Network Operation Centre Bouygues Telecom FAI remarks: Bouygues Telecom ISP address: Bouygues Telecom address: 13-15 avenue du Marechal Juin address: 92366 Meudon-la-Foret cedex address: France abuse-mailbox: MBX_ABUSE@bouyguestelecom.fr admin-c: BP5856-RIPE admin-c: FB15531-RIPE tech-c: FB15531-RIPE tech-c: BP5856-RIPE nic-hdl: NOCB1-RIPE mnt-by: BYTEL-MNT created: 2008-07-10T13:46:14Z last-modified: 2019-05-07T09:35:18Z source: RIPE # Filtered % Information related to '176.128.0.0/10AS12844' route: 176.128.0.0/10 descr: BOUYGUES Telecom Autonomous System origin: AS12844 mnt-by: BYTEL-MNT created: 2011-07-11T13:22:53Z last-modified: 2011-07-11T13:22:53Z source: RIPE % This query was served by the RIPE Database Query Service version 1.98 (HEREFORD)
No results found, please run it to get the result.
Cached: 2020.12.16 06:15:04/ 3 years 10 months ago
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7 <<>> 176.137.12.49 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14658 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;176.137.12.49. IN A ;; AUTHORITY SECTION: . 86372 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020121600 1800 900 604800 86400 ;; Query time: 4 msec ;; SERVER: 8.8.8.8#53(8.8.8.8) ;; WHEN: Wed Dec 16 06:15:04 CET 2020 ;; MSG SIZE rcvd: 117
Cached: 2020.12.16 00:52:46/ 3 years 10 months ago
49.12.137.176.in-addr.arpa name = ken66-h04-176-137-12-49.dsl.sta.abo.bbox.fr. Authoritative answers can be found from:
Cached: 2020.12.16 06:15:45/ 3 years 10 months ago
PING 176.137.12.49 (176.137.12.49) 56(84) bytes of data. From 212.194.170.39 icmp_seq=1 Destination Host Unreachable --- 176.137.12.49 ping statistics --- 3 packets transmitted, 0 received, +1 errors, 100% packet loss, time 1999ms pipe 3
No results found, please run it to get the result.
No results found, please run it to get the result.
Cached: 2020.12.16 06:15:04/ 3 years 10 months ago
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7 <<>> 176.137.12.49 ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14658 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;176.137.12.49. IN A ;; AUTHORITY SECTION: . 86372 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2020121600 1800 900 604800 86400 ;; Query time: 4 msec ;; SERVER: 8.8.8.8#53(8.8.8.8) ;; WHEN: Wed Dec 16 06:15:04 CET 2020 ;; MSG SIZE rcvd: 117

Share URL

Embed

Copy