Here’s a great place to do so:
https://mxtoolbox.com/blacklists.aspx
And another:
https://www.ultratools.com/tools/spamDBLookup
And another:
And a third, realtime:
Here’s a great place to do so:
https://mxtoolbox.com/blacklists.aspx
And another:
https://www.ultratools.com/tools/spamDBLookup
And another:
And a third, realtime:
A number of Internet tools use DNSBLs (DNS blacklists) and retrieve them by HTTP/HTTPS. Here are a number of good resources for this.
www.reddit.com/r/PFSENSE/comments/7s3ug9/pfblockerng_recommended_lists/
forum.it-monkey.net/index.php?topic=17.0
supratim-sanyal.blogspot.com/2017/04/pfsense-pfblockerng-ultimate-list-of-ip.html
A great place for general DNS lookup info:
The best WHOIS:
And one for info about IP addresses:
As of this writing, the current authoritative list, from here:
https://www.iana.org/domains/root/servers
is:
a.root-servers.net | 198.41.0.4 | 2001:503:ba3e::2:30 | VeriSign, Inc. |
b.root-servers.net | 192.228.79.201 | 2001:500:84::b | University of Southern California (ISI) |
c.root-servers.net | 192.33.4.12 | 2001:500:2::c | Cogent Communications |
d.root-servers.net | 199.7.91.13 | 2001:500:2d::d | University of Maryland |
e.root-servers.net | 192.203.230.10 | 2001:500:a8::e | NASA (Ames Research Center) |
f.root-servers.net | 192.5.5.241 | 2001:500:2f::f | Internet Systems Consortium, Inc. |
g.root-servers.net | 192.112.36.4 | 2001:500:12::d0d | US Department of Defense (NIC) |
h.root-servers.net | 198.97.190.53 | 2001:500:1::53 | US Army (Research Lab) |
i.root-servers.net | 192.36.148.17 | 2001:7fe::53 | Netnod |
j.root-servers.net | 192.58.128.30 | 2001:503:c27::2:30 | VeriSign, Inc. |
k.root-servers.net | 193.0.14.129 | 2001:7fd::1 | RIPE NCC |
l.root-servers.net | 199.7.83.42 | 2001:500:9f::42 | ICANN |
m.root-servers.net | 202.12.27.33 | 2001:dc3::35 | WIDE Project |
Wget is an excellent command-line tool for retrieval of data from http or ftp servers. Its current most-up-to-date Windows version seems to be here:
After changes are made to domain contacts at GoDaddy, Wild West Domains, and subsidiaries, it will say something like:
Transfer locked until 4/8/2014: Contact information change
This is a 60-day automatic lock, and it can be overridden by an email from the registrant contact to review60@godaddy.com.
Looks most interesting:
Sometimes IPv6 is installed on XP in a hidden form — sometimes IPv6 may be installed, but not visible in any Windows GUI. To find out, go to command prompt and enter:
netsh show helper
If IPv6 is installed, in that list will be “ipv6”. To uninstall on XP, run this:
ipv6 uninstall
The ipv6 command does not exist on Server 2003. The following does:
netsh delete ipv6mon.dll
Hidden IPv6 has been shown to cause problems in some Oracle environments.
Here is an interesting list:
http://www.debianadmin.com/bind-dns-server-web-interfacefrontend-or-gui-tools.html
But the best may be here: