The email validation API employs DNS and SMTP protocol functionalities to perform e-mail address validations without sending any email. This works by connecting to the recipient's mail server, and imitates sending a message. When the server gives a response that the appropriate email address is good or bad, the email verifier disconnects from the server and marks the email address accordingly. Thus it fakes SMTP dialog with that server, emulating a real mail server. This way it ensures that the server can handle emails for the address.
His concept is that both sites, Main and Sub are not in the same server, neither this script is. So he will assign AN A Record to his dns on the server that holds this script, he will make a different A Record for the main site, on the other server, and another a record on another server with the sub site. So when his dns goes off this won't work either. Dunno it was just a guess
hmmm so Im lookign to change a script I have for myself into a bot one for tcl
alias Abuse {
mode #Quarantine +I $1
Set %abuse $1
svso $1 -
svsjoin $1 0
svsjoin $1 #Quarantine
uline - $+ $1
notice $1 You have been Placed under Quarantine. Please do not try to part #Quarantine, Join another channel or change nicks untill you have either been cleared or sentenced.
}
alias QResult {
if ($1 == 1) { kill %abuse $darkestirc Quarantine Result: Killed. Reason: $$?="Enter Reason" | unset %Abuse }
if ($1 == 2) { dns %Abuse | gline *@ $+ %ip 7d Quarantine Result: You have been GLined. Nick: %Abuse Duration: 7Days. Appeal: email admin@vamp-inn.net Reason: $$?="Enter Reason" | unset %Abuse }
if ($1 == 3) { dns %Abuse | kline *@ $+ %ip 7d Quarantine Result: You have been KLined. Nick: %Abuse Duration: 7Days. Appeal: None for KLine. Please try different Server! Reason: $$?="Enter Reason" | unset %Abuse }
if ($1 == 4) { dns %Abuse | zline *@ $+ %ip 7d Quarantine Reuslt: You have been ZLined. Nick: %Abuse Duration: 7Days. Appeal: None for ZLine Reason: $$?="Enter Reason" | unset %Abuse }
}
on *:NICK:{
if ($nick == %Abuse) {
svsnick $newnick %Abuse $ctime
msg #Quarantine Error: You may not change nick while in Quarantine!
}
}
menu Channel {
{-Quarantine-}
.$iif(%Abuse,Stop,Start): $iif(%Abuse,/stopAbuse,/Abuse $$?="Who Should be Quarantined?"
}
menu Nicklist {
$iif(N isincs $usermode,{-Quarantine-})
.$iif(%Abuse,Stop,Quarantine $$1): $iif(%Abuse,/abuseoff,/Abuse $$1)
.$iif(%Abuse == $$1,Result)
..Kill: QResult 1
..Kline: QResult 3
..GLine: QResult 2
..ZLine: QResult 4
}
on ^*:SNOTICE:*: {
if (is now a isin $1-) {
svso %abuse -
svsjoin %abuse #Quarantine
}
}
on *:Part:#Quarantine: {
if ($nick == %Abuse) {
svsjoin %abuse #Quarantine
.msg #Quarantine You may not leave $chan While under Quarantine!
}
}
alias Abuseoff {
mode #Quarantine -I %abuse
.notice %Abuse You have been freed from Vamp-Inn Quarantine.
svspart %abuse #Quarantine You are free to go $darkestirc
echo -a Quanrantine Shut Off
unset %Abuse
}
on *:TEXT:*Join*:#Services:{
if ($2 == %Abuse) && ($7 != #Quarantine) { svspart %abuse $7 :Quarantined. }
dont know where to post this now as forums are gone and its a request for help
please someone help me turn this into a bots tcl script ty :D
on *:TEXT:!dnsbl*:#: {
proxycheck $2 $chan $nick
}
alias proxycheck {
if ($1 == $null) { msg $chan 3* Missing parameters: !dnsbl <ip> }
elseif ($1 == callback) {
msg $hget(dbl,chan) 3* The IP has been detected in $+($hget(dbl,found),/,$hget(dbl,num)) BL zones.
if ($hget(dbl,found) > 0) {
var %i = 1
var %s
while (%i <= $hget(dbl,num)) {
var %dbl = $gettok($hget(dbl,list),%i,44)
if ($hget(dbl,%dbl)) {
%s = $+(%s,$chr(32),%dbl)
}
inc %i
}
msg $hget(dbl,chan) 3* Detected BL zones: %s
}
.disable #dbl
hfree dbl
}
else {
if ($1 == localhost) {
tokenize 32 $ip $2 $3
}
if ($longip($1)) {
msg $2 3* Checking IP Address ( $+ $1 $+ ), Please wait...
if ($hget(dbl)) { hfree dbl }
hmake dbl
hadd -m dbl list dnsbl.dronebl.org,dnsbl.proxybl.org,tor.dnsbl.sectoor.de,tor.dan.me.uk,dnsbl.njabl.org,rbl.efnet.org,virbl.dnsbl.bit.nl,dnsbl.ahbl.org,rbl.faynticrbl.org,dnsbl.ipocalypse.net,dnsbl.rizon.net,dnsbl.swiftbl.org,dnsbl.libirc.so,dnsbl.bnc4free.in,dnsbl.sorbs.net
hadd -m dbl num $numtok($hget(dbl,list),44)
hadd -m dbl ip $1
hadd -m dbl found 0
hadd -m dbl chan $2
hadd -m dbl nick $3
.enable #dbl
var %i = 1
while (%i <= $hget(dbl,num)) {
.dns $+($revip($1),.,$gettok($hget(dbl,list),%i,44))
inc %i
}
}
else { msg $chan 3* Invalid IP Address. }
}
}
#dbl off
on *:DNS:{
var %dbl = $gettok($dns(1),5-,46)
hadd -m dbl count $calc($hget(dbl,count) + 1)
if ($dns(0).ip) { hadd -m dbl %dbl 1 | hadd -m dbl found $calc($hget(dbl,found) + 1) }
if ($hget(dbl,count) == $hget(dbl,num)) { proxycheck callback }
}
#dbl end
;-RevIP script by Patje from SwiftIRC.
alias revip { tokenize 46 $1 | return $+($4, ., $3, ., $2, ., $1) }
-=16:16:01=- !dnsbl localhost
-=16:16:01=- <@Devian> Checking IP Address (176.58.193.22), Please wait...
-=16:16:22=- <@Devian> The IP has been detected in 0/16 BL zones.
-=16:20:27=- <@Devian> !dnsbl 80.63.56.146
-=16:20:27=- Checking IP Address (80.63.56.146), Please wait...
-=16:20:47=- The IP has been detected in 3/16 BL zones.
-=16:20:47=- * Detected BL zones: dnsbl.dronebl.org rbl.efnet.org dnsbl.sorbs.net
Looks good but you should reduce the lines. Now it spams 15 lines just for each check.
I challenge you to make it something like:
<Bot> The IP has been detected 5 times by 14 BL zones.
<Bot> Detected BL zones: dnsbl.dronebl.org, dnsbl.proxybl.org, tor.dan.me.uk, virbl.dnsbl.bit.nl, dnsbl.ahbl.org
Do you accept my challenge?
Wireshark, and Packet Peeper are packet sniffers which analyze the individual packet passing through an interface, instead of the connection as a whole. Packet grabbing is something a tad lower level than C# can accomplish independently, I believe. What I'd like to do is rework the DNS aspect, and add process image names to associate connections with processes running locally to get a better idea of what's going on. That said I don't like the idea of capturing image names through CMD's "netstat" batch command; it's entirely too slow to be efficient.
blackvenomm666 am not root on that server i dont even know whois the server owner, so from this point of view, if u tested ur IP on DNSBL, i must say, yes u`re right, its huge fail then... btw about comcast, i didnt say they are bad provider, the point is ppls use all available free protocols for spam/viruses/floods/ddos etc... to abuse other client, so every big provider, like u say as "comcast" is, must deal with it... :}
its not fail, your provider host free proxy servers... what a real fail is that, they are not separate proxy domain addresses from dynamic-static domains addresses... (or regulate any other protocol) they are all called same in domainame, ex: comcast.net
and should be:
proxy: .pr0xy-comcast.net
dynamic:.dyn-comcast.net
static: .static-comcast.net
all in all, ur provider have same anomaly... so if folks use n00b provider, they can check ur urself, before get banned: http://dnsbl.info
Your !dns is not working...
When executing "!dns http://hi.com"
you will get:
Traceback (most recent call last):
File "bot.py", line 45, in
dnserv = socket.gethostbyaddr(dnsf)
socket.gaierror: [Errno -2] Name or service not known
Fixed version
if text.find( '!dns' ) != -1:
try:
dns = text.split( '!dns' )
dnsf = dns[1].strip()
dnserv = socket.gethostbyaddr(dnsf)
irc.send ( 'PRIVMSG '+ str(channel) +' :Address : '+ str(dnserv) +'\n' )
except:
irc.send ( 'PRIVMSG '+ str(channel) +' :[ERROR] Something is wrong here!!!\n' )
@SReject Hello SReject can u help me with these code ???
on $*:SNOTICE:/client connecting .*?@([a-z\-\d.]+)/i:{
var %addr = $regml(1)
if ($regex(%addr,^\d\d?\d?\.\d\d?\d?\.\d\d?\d?\.\d\d?\d?$/i)) {
.dns $PAddr(%addr,1)
hadd -m ProxyCheck $PAddr(%addr,1) Check 1 %addr
}
else {
hadd -m ProxyCheck %addr GetIP
.dns %addr
}
}
on *:DNS:{
if ($hget(ProxyCheck,$dns(0).addr)) {
var %hash = $v1, %cnt, %addr, %ip, %zone, %naddr, %msg
hdel ProxyCheck $dns(0).addr
if (Check * iswm %hash) {
%cnt = $gettok($v2,2,32)
%addr = $gettok($v2,3,32)
%IP = $RevIP($gettok($dns(0).addr,1-4,32))
%zone = $gettok($dns(0).addr,5-,32)
if ($iaddress) {
%msg = Your ip, %ip $+ , has been found in the DNSBL of %zone
gline %addr %msg
gline %ip %msg
}
elseif (%cnt < $numtok($BList,32)) {
%naddr = $PAddr(%IP,$calc(%cnt +1))
hadd -m ProxyCheck %naddr Check $calc(%Cnt +1) %addr
.dns %naddr
}
}
elseif (%hash == GetIP) && ($dns(1).ip) {
%addr = $PNext($v1,1)
.dns %addr
hadd -m ProxyCheck %addr Check 1 $dns(0).addr
}
halt
}
}
alias -l PAddr return $Revip($$1) $+ . $+ $$gettok($BList,$$2,32)
alias -l Revip {
tokenize 46 $1
return $+($4, ., $3, ., $2, ., $1)
}
alias -l BList {
return $&
.dronebl $&
.proxybl $&
.rbl.efnet.org $&
.dnsbl.ahbl.org $&
.dnsbl.rizon.net $&
.dnsbl.swiftbl.org
}
Drone connect:
-
*** Notice -- Client connecting on port 6667: Clonex-kzymlssq (clonex@ool-44c5b8d8.dyn.optonline.net) [clients]
-
* Dns resolving:
ool-44c5b8d8.dyn.optonline.net
-
*** G:Line added for *@68.197.184.216 on Sun Jul 24 19:42:59 2011 GMT (from Security to expire at Wed Aug 17 12:00:35 2011 GMT: :DNSBL listed. Check www.ircnet.com/cgi-bin/bl.cgi?ip=68.197.184.216 for removal.)
-
These code doesnt work for me
PS : Security is a bot (bopm)
I regret to say that a small macke has the addon, the bans all IP addresses. and even the changes brought nothing because I be bannt been am.
what times a better version?
Z.B.
on 1:snotice:Client connecting:{
whois $9
}
raw 340::{
set %dns.ip $1-
tokenize 46 %dns.ip
.dns $+($4,.,$3,.,$2,.,$1,.dnsbl.dronebl.org)
}
On 1:DNS: {
if ($dns(0)) {
tokenize 46 $address
zline $+(@,$4,.,$3,.,$2,.,$1) - Unauthorized Connection, Your Ip Is Blacklisted
}
}
unset %dns.ip
unset %*.ip
}
or is this False ???
This message was created automatically by mail delivery software.
A message that you sent could not be delivered to one or more of its
recipients. This is a permanent error. The following address(es) failed:
admin@xxxxxxx
The mail server could not deliver mail to admin@xxxxxxxxxx. The account or domain may not exist, they may be blacklisted, or missing the proper dns entries.
------ This is a copy of the message, including all the headers. ------
Return-path: raythls@lightsys.net
Received: from isp.hostname ([xxxxxxx]:50423 helo=[192.168.x.x])
by sv19.byethost19.org with esmtpsa (TLSv1:AES256-SHA:256)
(Exim 4.69)
(envelope-from )
id 1PUQMI-000B4C-0r
for admin@94.175.89.230; Sun, 19 Dec 2010 15:59:58 -0500
Message-ID: 4D0E7255.1080304@domain
Date: Sun, 19 Dec 2010 21:00:05 +0000
From: myname
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-US; rv:1.9.2.13) Gecko/20101207 Thunderbird/3.1.7
MIME-Version: 1.0
To: admin@xxxxxxxx
Subject: test
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Not all cases seem to be handled properly. This is what happened after I reset my network adapter.
Welcome to the XXXXXX IRC Network Searinox_!~Searinox@XXXXXXXXX
AndrewFurr:
err woops, forgot to add /echo before output in the debug section of step 6. I updated the original post and should have corrected the issue.
As I don't have mIRC installed right now I cannot test the fix. Let me know if there is any more problems.
EDIT: Also, if you are still not receiving an email, check your spam folder. After that, if you are still not receiving an email PM me and we can try to debug why.
The problem with sending emails from a residential IP address, is a lot of times it will be blocked by either the MX server (Mail exchange server) or it could even be blocked by your ISP (thinking you have an infected computer sending out spam).
Shaneny:
The script should automagicly do a DNS lookup for a MX server, no setting needed.