404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.227.114.67: ~ $
#!/usr/bin/env python

# Usage: reverse.py <zone_filename>...
#
# This demo script will load in all of the zones specified by the
# filenames on the command line, find all the A RRs in them, and
# construct a reverse mapping table that maps each IP address used to
# the list of names mapping to that address.  The table is then sorted
# nicely and printed.
#
# Note!  The zone name is taken from the basename of the filename, so
# you must use filenames like "/wherever/you/like/dnspython.org" and
# not something like "/wherever/you/like/foo.db" (unless you're
# working with the ".db" GTLD, of course :)).
#
# If this weren't a demo script, there'd be a way of specifying the
# origin for each zone instead of constructing it from the filename.

from __future__ import print_function

import dns.zone
import dns.ipv4
import os.path
import sys

reverse_map = {}

for filename in sys.argv[1:]:
    zone = dns.zone.from_file(filename, os.path.basename(filename),
                              relativize=False)
    for (name, ttl, rdata) in zone.iterate_rdatas('A'):
        try:
            reverse_map[rdata.address].append(name.to_text())
        except KeyError:
            reverse_map[rdata.address] = [name.to_text()]

keys = reverse_map.keys()
keys.sort(key=dns.ipv4.inet_aton)
for k in keys:
    v = reverse_map[k]
    v.sort()
    print(k, v)

Filemanager

Name Type Size Permission Actions
ddns.py File 1.18 KB 0755
e164.py File 152 B 0755
mx.py File 225 B 0755
name.py File 468 B 0755
reverse.py File 1.32 KB 0755
reverse_name.py File 177 B 0755
xfr.py File 393 B 0755
zonediff.py.gz File 2.88 KB 0644