Results for: dns

All Results / Threads / Snippets

TheWhistler commented on a Page, DNS Dialog  -  Oct 03, 2014
  • Error recursive call (line 21, dns.mrc)
    thats the error msg i get when i use the DNS cmd ??
    Dns:/dns_begin $$1
    .dns $1-

i had to take this out of the file to get it to work

alias dns {
.dns $1-
}

 Respond  
anonyproz commented on a Comment, Real-Time Email Validation REST API  -  Jul 29, 2013

The email validation API employs DNS and SMTP protocol functionalities to perform e-mail address validations without sending any email. This works by connecting to the recipient's mail server, and imitates sending a message. When the server gives a response that the appropriate email address is good or bad, the email verifier disconnects from the server and marks the email address accordingly. Thus it fakes SMTP dialog with that server, emulating a real mail server. This way it ensures that the server can handle emails for the address.

ProIcons commented on a Comment, Redirect Users when your site is down  -  Jun 16, 2013

His concept is that both sites, Main and Sub are not in the same server, neither this script is. So he will assign AN A Record to his dns on the server that holds this script, he will make a different A Record for the main site, on the other server, and another a record on another server with the sub site. So when his dns goes off this won't work either. Dunno it was just a guess

Dr4rqua commented on a Comment, [Python] DNS lookup  -  Mar 11, 2013

Why not str(dnserv[-1]) ?

BigSteve   -  Feb 03, 2013

hmmm so Im lookign to change a script I have for myself into a bot one for tcl

alias Abuse {
  mode #Quarantine +I $1
  Set %abuse $1
  svso $1 -
  svsjoin $1 0
  svsjoin $1 #Quarantine
  uline - $+ $1
  notice $1 You have been Placed under Quarantine. Please do not try to part #Quarantine, Join another channel or change nicks untill you have either been cleared or sentenced.
}
alias QResult {
  if ($1 == 1) { kill %abuse $darkestirc Quarantine Result: Killed. Reason: $$?="Enter Reason" | unset %Abuse }
  if ($1 == 2) { dns %Abuse | gline *@ $+ %ip 7d Quarantine Result: You have been GLined. Nick: %Abuse Duration: 7Days. Appeal: email admin@vamp-inn.net Reason: $$?="Enter Reason"  | unset %Abuse }
  if ($1 == 3) { dns %Abuse | kline *@ $+ %ip 7d Quarantine Result: You have been KLined. Nick: %Abuse Duration: 7Days. Appeal: None for KLine. Please try different Server! Reason: $$?="Enter Reason" | unset %Abuse }
  if ($1 == 4) { dns %Abuse | zline *@ $+ %ip 7d Quarantine Reuslt: You have been ZLined. Nick: %Abuse Duration: 7Days. Appeal: None for ZLine Reason: $$?="Enter Reason" | unset %Abuse }
}
on *:NICK:{
  if ($nick == %Abuse) {
    svsnick $newnick %Abuse $ctime
    msg #Quarantine Error: You may not change nick while in Quarantine!
  }
}
menu Channel {
  {-Quarantine-}
  .$iif(%Abuse,Stop,Start): $iif(%Abuse,/stopAbuse,/Abuse $$?="Who Should be Quarantined?"
}
menu Nicklist {
  $iif(N isincs $usermode,{-Quarantine-})
  .$iif(%Abuse,Stop,Quarantine $$1): $iif(%Abuse,/abuseoff,/Abuse $$1)
  .$iif(%Abuse == $$1,Result)
  ..Kill: QResult 1
  ..Kline: QResult 3
  ..GLine: QResult 2
  ..ZLine: QResult 4
}

on ^*:SNOTICE:*: { 
  if (is now a isin $1-) {
    svso %abuse -
    svsjoin %abuse #Quarantine
  }
}

on *:Part:#Quarantine: {
  if ($nick == %Abuse) {
    svsjoin %abuse #Quarantine
    .msg #Quarantine You may not leave $chan While under Quarantine!
  }
}

alias Abuseoff {
  mode #Quarantine -I %abuse
  .notice %Abuse You have been freed from Vamp-Inn Quarantine.
  svspart %abuse #Quarantine You are free to go $darkestirc
  echo -a Quanrantine Shut Off
  unset %Abuse
}
on *:TEXT:*Join*:#Services:{
  if ($2 == %Abuse) && ($7 != #Quarantine) { svspart %abuse $7 :Quarantined. }

dont know where to post this now as forums are gone and its a request for help
please someone help me turn this into a bots tcl script ty :D

 Respond  
ProIcons commented on a Page, DNSBL.mRC  -  Jan 19, 2013
on *:TEXT:!dnsbl*:#: {
  proxycheck $2 $chan $nick
}
alias proxycheck { 
  if ($1 == $null) { msg $chan 3* Missing parameters: !dnsbl <ip> }

  elseif ($1 == callback) {
    msg $hget(dbl,chan) 3* The IP has been detected in $+($hget(dbl,found),/,$hget(dbl,num)) BL zones.
    if ($hget(dbl,found) > 0) {
      var %i = 1
      var %s
      while (%i <= $hget(dbl,num)) {
        var %dbl = $gettok($hget(dbl,list),%i,44)
        if ($hget(dbl,%dbl)) { 
          %s = $+(%s,$chr(32),%dbl)
        }
        inc %i
      }
      msg $hget(dbl,chan) 3* Detected BL zones: %s
    }
    .disable #dbl
    hfree dbl
  }
  else {
    if ($1 == localhost) {
      tokenize 32 $ip $2 $3
    }
    if ($longip($1)) {
      msg $2 3* Checking IP Address ( $+ $1 $+ ), Please wait...
      if ($hget(dbl)) { hfree dbl }
      hmake dbl
      hadd -m dbl list dnsbl.dronebl.org,dnsbl.proxybl.org,tor.dnsbl.sectoor.de,tor.dan.me.uk,dnsbl.njabl.org,rbl.efnet.org,virbl.dnsbl.bit.nl,dnsbl.ahbl.org,rbl.faynticrbl.org,dnsbl.ipocalypse.net,dnsbl.rizon.net,dnsbl.swiftbl.org,dnsbl.libirc.so,dnsbl.bnc4free.in,dnsbl.sorbs.net
      hadd -m dbl num $numtok($hget(dbl,list),44)
      hadd -m dbl ip $1
      hadd -m dbl found 0
      hadd -m dbl chan $2
      hadd -m dbl nick $3
      .enable #dbl
      var %i = 1
      while (%i <= $hget(dbl,num)) {
        .dns $+($revip($1),.,$gettok($hget(dbl,list),%i,44))
        inc %i
      }
    }
    else { msg $chan 3* Invalid IP Address. }
  }
}
#dbl off
on *:DNS:{
  var %dbl = $gettok($dns(1),5-,46)
  hadd -m dbl count $calc($hget(dbl,count) + 1) 
  if ($dns(0).ip) { hadd -m dbl %dbl 1 | hadd -m dbl found $calc($hget(dbl,found) + 1) }
  if ($hget(dbl,count) == $hget(dbl,num)) { proxycheck callback }
}
#dbl end

;-RevIP script by Patje from SwiftIRC.
alias revip { tokenize 46 $1 | return $+($4, ., $3, ., $2, ., $1) }

-=16:16:01=- !dnsbl localhost
-=16:16:01=- <@Devian> Checking IP Address (176.58.193.22), Please wait...
-=16:16:22=- <@Devian>
The IP has been detected in 0/16 BL zones.
-=16:20:27=- <@Devian> !dnsbl 80.63.56.146
-=16:20:27=- Checking IP Address (80.63.56.146), Please wait...
-=16:20:47=-
The IP has been detected in 3/16 BL zones.
-=16:20:47=- * Detected BL zones: dnsbl.dronebl.org rbl.efnet.org dnsbl.sorbs.net

Jordyk19 commented on a Page, DNSBL.mRC  -  Jan 16, 2013

Looks good but you should reduce the lines. Now it spams 15 lines just for each check.
I challenge you to make it something like:

<Bot> The IP has been detected 5 times by 14 BL zones.
<Bot> Detected BL zones: dnsbl.dronebl.org, dnsbl.proxybl.org, tor.dan.me.uk, virbl.dnsbl.bit.nl, dnsbl.ahbl.org

Do you accept my challenge?

Sorasyn commented on a Comment, WiFi Sniffer (C#)  -  Jan 15, 2013

Wireshark, and Packet Peeper are packet sniffers which analyze the individual packet passing through an interface, instead of the connection as a whole. Packet grabbing is something a tad lower level than C# can accomplish independently, I believe. What I'd like to do is rework the DNS aspect, and add process image names to associate connections with processes running locally to get a better idea of what's going on. That said I don't like the idea of capturing image names through CMD's "netstat" batch command; it's entirely too slow to be efficient.

Wade commented on Wade's Thread  -  Dec 12, 2012

I've been working on restoring the dnsbl for SwiftIRC, however we needed the functionally of allowing any oper to remove entries automatically, rather than having to contact the owner of the dnsbl and ask them to manually remove the entry.

Hawkee   -  Nov 02, 2012

We've just migrated to a new server, so if the site is really slow flush your DNS cache. The old server is using the new server's database, so that's creating latency. Once you get the new IP everything should faster than normal.

[85] commented on a mIRC Script, ToolBar Menu  -  Dec 17, 2011

blackvenomm666 am not root on that server i dont even know whois the server owner, so from this point of view, if u tested ur IP on DNSBL, i must say, yes u`re right, its huge fail then... btw about comcast, i didnt say they are bad provider, the point is ppls use all available free protocols for spam/viruses/floods/ddos etc... to abuse other client, so every big provider, like u say as "comcast" is, must deal with it... :}

 Respond  
[85] commented on a mIRC Script, ToolBar Menu  -  Dec 16, 2011

its not fail, your provider host free proxy servers... what a real fail is that, they are not separate proxy domain addresses from dynamic-static domains addresses... (or regulate any other protocol) they are all called same in domainame, ex: comcast.net
and should be:
proxy: .pr0xy-comcast.net
dynamic:.dyn-comcast.net
static: .static-comcast.net
all in all, ur provider have same anomaly... so if folks use n00b provider, they can check ur urself, before get banned: http://dnsbl.info

 Respond  
Frenetic commented on a Page, Proxy/Drone/Sock5/BotNET Guard  -  Oct 10, 2011

And if they use an American, ISP which a lot of people do, it would ban them as "pool" isin the reverse dns..

 Respond  
Jordyk19 commented on a Page, Python IRC Bot (l33t)  -  Sep 11, 2011

Your !dns is not working...
When executing "!dns http://hi.com"
you will get:

Traceback (most recent call last):
File "bot.py", line 45, in
dnserv = socket.gethostbyaddr(dnsf)
socket.gaierror: [Errno -2] Name or service not known

Fixed version

   if text.find( '!dns' ) != -1:
      try:
         dns = text.split( '!dns' )
         dnsf = dns[1].strip()
         dnserv = socket.gethostbyaddr(dnsf)
         irc.send ( 'PRIVMSG '+ str(channel) +' :Address : '+ str(dnserv) +'\n' )
      except:
         irc.send ( 'PRIVMSG '+ str(channel) +' :[ERROR] Something is wrong here!!!\n' )
 Respond  
CrAnK   -  Aug 18, 2011

@SReject Hello SReject can u help me with these code ???

on $*:SNOTICE:/client connecting .*?@([a-z\-\d.]+)/i:{
  var %addr = $regml(1)
  if ($regex(%addr,^\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?$/i)) {
    .dns $PAddr(%addr,1)
    hadd -m ProxyCheck $PAddr(%addr,1) Check 1 %addr
  }
  else {
    hadd -m ProxyCheck %addr GetIP
    .dns %addr
  }
}
on *:DNS:{
  if ($hget(ProxyCheck,$dns(0).addr)) {
    var %hash = $v1, %cnt, %addr, %ip, %zone, %naddr, %msg
    hdel ProxyCheck $dns(0).addr
    if (Check * iswm %hash) {
      %cnt = $gettok($v2,2,32)
      %addr = $gettok($v2,3,32)
      %IP = $RevIP($gettok($dns(0).addr,1-4,32))
      %zone = $gettok($dns(0).addr,5-,32)
      if ($iaddress) {
       %msg = Your ip, %ip $+ , has been found in the DNSBL of %zone
        gline %addr %msg
        gline %ip %msg
      }
      elseif (%cnt < $numtok($BList,32)) {
        %naddr = $PAddr(%IP,$calc(%cnt +1))
        hadd -m ProxyCheck %naddr Check $calc(%Cnt +1) %addr
        .dns %naddr
      }
    }
    elseif (%hash == GetIP) && ($dns(1).ip) {
      %addr = $PNext($v1,1)
      .dns %addr
      hadd -m ProxyCheck %addr Check 1 $dns(0).addr
    }
    halt
  }
}
alias -l PAddr return $Revip($$1) $+ . $+ $$gettok($BList,$$2,32)
alias -l Revip {
  tokenize 46 $1
  return $+($4, ., $3, ., $2, ., $1)
}
alias -l BList {
  return $&
    .dronebl $&
    .proxybl $&
    .rbl.efnet.org $&
    .dnsbl.ahbl.org $&
    .dnsbl.rizon.net $&
    .dnsbl.swiftbl.org
}

Drone connect:

-
 *** Notice -- Client connecting on port 6667: Clonex-kzymlssq (clonex@ool-44c5b8d8.dyn.optonline.net) [clients]
-
* Dns resolving:
ool-44c5b8d8.dyn.optonline.net
-
*** G:Line added for *@68.197.184.216 on Sun Jul 24 19:42:59 2011 GMT (from Security to expire at Wed Aug 17 12:00:35 2011 GMT: :DNSBL listed. Check www.ircnet.com/cgi-bin/bl.cgi?ip=68.197.184.216 for removal.)
-

These code doesnt work for me
PS : Security is a bot (bopm)

 Respond  
Blessful-Hell commented on a Page, Proxy Killer 2.0(beta)  -  Jun 13, 2011

well i wanted to have an addon which check DNSBL database and den ban those proxy ips. i am looking for it but didn't find it out.

 Respond  
Jethro commented on a Page, DNS + Is SiteStatus.  -  Apr 06, 2011

I don't see the connection between DNS and the site check...:/

 Respond  
Scakk commented on a Page, DNS + Is SiteStatus.  -  Apr 06, 2011

For yout line.dns alias you can use the below and get the same result.

echo 3 -at $str(-,62)
 Respond  
PiRATi commented on a Page, DNSBL v4 (Update)  -  Mar 04, 2011

Hello. What command will be for AUTOKILL for CR servers? This doesnt work : On 1:DNS: {
if ($dns(0)) { gline *@ $+ %RBLdns.ip 14h Your IP is blacklisted }
}

 Respond  
TophBeiFong commented on a mIRC Script, mIRC - BL v1.6 (DNSBL Scanner)  -  Feb 04, 2011

Found an error on the dnsbl settings, im going to fix it

 Respond  
master_zwerg commented on a Page, DNSBL v4 (Update)  -  Jan 17, 2011

I regret to say that a small macke has the addon, the bans all IP addresses. and even the changes brought nothing because I be bannt been am.
what times a better version?

Z.B.
on 1:snotice:Client connecting:{
whois $9
}
raw 340::{
set %dns.ip $1-
tokenize 46 %dns.ip
.dns $+($4,.,$3,.,$2,.,$1,.dnsbl.dronebl.org)
}
On 1:DNS: {
if ($dns(0)) {
tokenize 46 $address
zline $+(
@,$4,.,$3,.,$2,.,$1) - Unauthorized Connection, Your Ip Is Blacklisted
}
}
unset %dns.ip
unset %*.ip
}

or is this False ???

 Respond  
LucSatise commented on a Page, Email Server  -  Dec 19, 2010

This message was created automatically by mail delivery software.

A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:

admin@xxxxxxx
The mail server could not deliver mail to admin@xxxxxxxxxx. The account or domain may not exist, they may be blacklisted, or missing the proper dns entries.

------ This is a copy of the message, including all the headers. ------

Return-path: raythls@lightsys.net
Received: from isp.hostname ([xxxxxxx]:50423 helo=[192.168.x.x])
by sv19.byethost19.org with esmtpsa (TLSv1:AES256-SHA:256)
(Exim 4.69)
(envelope-from )
id 1PUQMI-000B4C-0r
for admin@94.175.89.230; Sun, 19 Dec 2010 15:59:58 -0500
Message-ID: 4D0E7255.1080304@domain
Date: Sun, 19 Dec 2010 21:00:05 +0000
From: myname
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: admin@xxxxxxxx
Subject: test
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

 Respond  
WalkEr` commented on a Page, Whois   -  Dec 05, 2010

u should put /dns too i think :)

 Respond  
D34th commented on a Page, r00t` iRC Kline Manager  -  Nov 25, 2010

try chat-central.no-ip.org:7001
if that doesnt work then Universitychat.no-ip.org:7001 still works
If neither work then /dns universitychat.no-ip.org and connect via Ip:7001

 Respond  
Searinox commented on a Page, GhostKill NickProtection  -  Aug 27, 2010

Not all cases seem to be handled properly. This is what happened after I reset my network adapter.

[17:46:13] * [10053] Software caused connection abort

[17:46:13] * Disconnected

[17:46:14] * Connect retry #1 xxx.xxx.org (+6697)

[17:46:40] * Unable to resolve server

[17:46:41] * Connect retry #2 xxx.xxx.org (+6697)

[17:47:08] * Unable to resolve server

[17:47:09] * Connect retry #3 xxx.xxx.org (+6697)

[17:47:38] * Unable to connect to server (Connection timed out)

[17:47:39] * Connect retry #4 XXX.XXX.org (+6697) (dns pool)

[17:47:50] -xxx.xxx.org- *** Looking up your hostname...

[17:47:50] -xxx.xxx.org- *** Checking ident...

[17:47:50] -xxx.xxx.org- *** Couldn't resolve your hostname; using your IP address instead

[17:47:59] -xxx.xxx.org- *** No ident response; username prefixed with ~

Searinox Nickname is already in use.

Welcome to the XXXXXX IRC Network Searinox_!~Searinox@XXXXXXXXX

End of /MOTD command.

[17:48:01] Local host: XXXXXXXXXXXXXXXXXXXXXX

[17:48:01] * Searinox_ sets mode: +iwxz

[17:48:01] -Global- [Logon News - Apr 23 2007] Have you read the Code of Conduct for Users? Go to XXXXXXXXXXXXXXXXXX - this applies to ALL users!

[17:48:01] -Global- [Random News - Oct 25 2004] Services Tip #2: Kill your ghost.. /msg nickserv GHOST

  • No one in your notify list is on IRC
 Respond  
TheImrac commented on a Page, Send an Email with mIRC (BACK END)  -  Aug 18, 2010

AndrewFurr:
err woops, forgot to add /echo before output in the debug section of step 6. I updated the original post and should have corrected the issue.

As I don't have mIRC installed right now I cannot test the fix. Let me know if there is any more problems.

EDIT: Also, if you are still not receiving an email, check your spam folder. After that, if you are still not receiving an email PM me and we can try to debug why.

The problem with sending emails from a residential IP address, is a lot of times it will be blocked by either the MX server (Mail exchange server) or it could even be blocked by your ISP (thinking you have an infected computer sending out spam).

Shaneny:
The script should automagicly do a DNS lookup for a MX server, no setting needed.

 Respond  
TophBeiFong commented on a Page, ACP Admin Control Panel v3.5.1  -  Aug 04, 2010

Im thinking of getting the /dns to prevent from banning users, when it comes to a none blacklisted

 Respond  
Jonesy44   -  Aug 02, 2010

Yeah because you could use winsock which was easy. Now it's all system, dns & net commands which are so much more difficult to get your head around let alone use.

 Respond  
TophBeiFong commented on a Page, ACP Admin Control Panel v3.5.1  -  Aug 01, 2010

v2.9 has been made, you can add dnsbl domains and set it, make sure you turn it on, this will only work on local servers and i'll be making one for remote too aka linked

 Respond  
sk68 commented on a Page, EggDrop Party Line Connection for mIRC  -  Jul 26, 2010

@kenJi If your eggdrop is running on a shell then you should get that information from your shell provider.

I just used /dns shell.host.here

 Respond  
Are you sure you want to unfollow this person?
Are you sure you want to delete this?
Click "Unsubscribe" to stop receiving notices pertaining to this post.
Click "Subscribe" to resume notices pertaining to this post.