BASH.WS#
run
- whois
- host
- dig
- nslookup
- ping
- traceroute
- geoiplookup
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf
% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.
% Information related to '217.224.0.0 - 217.237.161.47'
% Abuse contact for '217.224.0.0 - 217.237.161.47' is 'abuse@telekom.de'
inetnum: 217.224.0.0 - 217.237.161.47
netname: DTAG-DIAL15
descr: Deutsche Telekom AG
org: ORG-DTAG1-RIPE
country: DE
admin-c: DTIP
tech-c: DTST
status: ASSIGNED PA
mnt-by: DTAG-NIC
created: 2002-01-08T09:31:25Z
last-modified: 2014-06-18T06:18:01Z
source: RIPE
organisation: ORG-DTAG1-RIPE
org-name: Deutsche Telekom AG
org-type: OTHER
address: Group Information Security, SDA/Abuse
address: Deutsche Telekom Allee 9
address: DE 64295 Darmstadt
remarks: abuse contact in case of Spam,
hack attacks, illegal activity,
violation, scans, probes, etc.
mnt-ref: DTAG-NIC
mnt-by: DTAG-NIC
abuse-c: DTAG4-RIPE
created: 2014-06-17T11:47:04Z
last-modified: 2021-02-22T13:35:19Z
source: RIPE # Filtered
person: DTAG Global IP-Addressing
address: Deutsche Telekom AG
address: Darmstadt, Germany
phone: +49 180 2 33 1000
nic-hdl: DTIP
mnt-by: DTAG-NIC
created: 2003-01-29T10:22:59Z
last-modified: 2019-05-14T12:55:19Z
source: RIPE # Filtered
person: Security Team
address: Deutsche Telekom AG
address: Darmstadt, Germany
phone: +49 180 2 33 1000
nic-hdl: DTST
mnt-by: DTAG-NIC
created: 2003-01-29T10:31:11Z
last-modified: 2019-05-14T12:56:39Z
source: RIPE # Filtered
% Information related to '217.224.0.0/11AS3320'
route: 217.224.0.0/11
descr: Deutsche Telekom AG, Internet service provider
origin: AS3320
member-of: AS3320:RS-PA-TELEKOM
mnt-by: DTAG-RR
created: 1970-01-01T00:00:00Z
last-modified: 2004-06-15T17:32:54Z
source: RIPE
% This query was served by the RIPE Database Query Service version 1.106.1 (BUSA)
No results found, please run it to get the result.
Cached: 2023.04.30 21:39:02/ 1 year 6 months ago
Confirmed: 2023.05.05 16:13:05/ 1 year 6 months ago
; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.9 <<>> Confirmed: 2023.05.05 16:13:05/ 1 year 6 months ago
No results found, please run it to get the result.
Cached: 2023.04.30 21:39:02/ 1 year 6 months ago
Confirmed: 2023.05.22 18:42:42/ 1 year 5 months ago
PING Confirmed: 2023.05.22 18:42:42/ 1 year 5 months ago
No results found, please run it to get the result.
No results found, please run it to get the result.
Cached: 2023.04.30 21:39:02/ 1 year 6 months ago; <<>> DiG 9.11.4-P2-RedHat-9.11.4-26.P2.el7_9.9 <<>>
Confirmed: 2023.05.05 16:13:05/ 1 year 6 months ago217.237.149.164;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22552 ;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1 ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 512 ;; QUESTION SECTION: ;217.237.149.164. IN A ;; AUTHORITY SECTION: . 86400 IN SOAa.root-servers.net.nstld.verisign-grs.com. 2023043001 1800 900 604800 86400 ;; Query time: 8 msec ;; SERVER:8.8.8.8#53(8.8.8.8) ;; WHEN: Mon May 01 04:55:39 UTC 2023 ;; MSG SIZE rcvd: 119