One small niggle is this dig is a very old version from the looks of it. For those interested in getting it via Bind9: in addition to dig.exe, also extract libisc.dll, libdns.dll, libbind9.dll, and liblwres.dll into the same place and you're set.
Jason > -----Original Message----- > From: Kurt Buff [mailto:kurt.b...@gmail.com] > Sent: Monday, February 23, 2009 15:38 > To: MS-Exchange Admin Issues > Subject: Re: HOWTO: do reverse lookups (PTR records) with the nslookup > tool > > Google is your friend... > > On Mon, Feb 23, 2009 at 11:45, Jason Gurtz <jasongu...@npumail.com> > wrote: > > Very nice! > > > >> -----Original Message----- > >> From: Kurt Buff [mailto:kurt.b...@gmail.com] > >> Sent: Monday, February 23, 2009 13:52 > >> To: MS-Exchange Admin Issues > >> Subject: Re: HOWTO: do reverse lookups (PTR records) with the nslookup > >> tool > >> > >> A Win32 version of digL http://members.shaw.ca/nicholas.fong/dig/ > >> > >> On Mon, Feb 23, 2009 at 09:23, Jason Gurtz <jasongu...@npumail.com> > >> wrote: > >> > Note: the dig tool is easier and better than nslookup, but > >> unfortunately > >> > doesn't come with windows. You can download the Windows port of the > >> BIND > >> > name server and find dig there, but that's extra steps to find out > > just > >> > what dlls you also need, etc... If you're going to do this a lot I > do > >> > recommend that you take the time to learn dig instead of nslookup. > >> > > >> >> In the reverse DNS section of this tool, do I need to check the > box? > >> I > >> >> don't host my external DNS records, so I don't know what PTR > records, > >> if > >> >> any, are out there. > >> > > >> > Open cmd prompt. Type nslookup and press enter. At the new "> " > prompt > >> > type set type=ptr and press enter > >> > > >> > wacky thing #1: IP addy that you query is backwards from what it is > >> > wacky thing #2: you are querying for the backwards address in this > >> weird > >> > domain called in-addr.arpa. You can think of .in-addr.arpa as being > > to > >> > IP addresses the same as .com. or .org. are to domain names. It is > > the > >> > story of the whale; it's just how it is. > >> > > >> > So, for example let's look up some aol.com PTR records...3 MX > records > > I > >> > see are: > >> > > >> > mailin-01.mx.aol.com internet address = 205.188.156.248 > >> > mailin-02.mx.aol.com internet address = 205.188.249.91 > >> > mailin-03.mx.aol.com internet address = 205.188.252.17 > >> > > >> > Hey, let's see if their ducks are in a row! To query the PTR record > > for > >> > the first one just type this: > >> > > >> >> 248.156.188.205.in-addr.arpa > >> > > >> > After pressing enter you should see something like this : > >> > > >> > Non-authoritative answer: > >> > 248.156.188.205.in-addr.arpa name = dd.mx.aol.com > >> > > >> > What!? dd.mx.aol.com != mailin-01.mx.aol.com. Well that's OK, aol > is > >> > probably not sending any mail out from this box here ;) Likely, > that > >> > "box" is a load balancer of some type... OK, trawling through some > >> logs > >> > here I do see them sending mail from host imo-d05.mx.aol.com which > has > >> an > >> > address of 205.188.157.37. Let's check it out! > >> > > >> >> set type=a > >> >> imo-d05.mx.aol.com > >> > Server: dns-01.ns.aol.com > >> > Address: 64.12.51.132 > >> > > >> > Name: imo-d05.mx.aol.com > >> > Address: 205.188.157.37 > >> > > >> > [Yup, still sitting on the same addy] > >> > > >> >> set type=ptr > >> >> 37.157.188.205.in-addr.arpa > >> > Server: dns-01.ns.aol.com > >> > Address: 64.12.51.132 > >> > > >> > 37.157.188.205.in-addr.arpa name = imo-d05.mx.aol.com > >> > > >> > [This time we have a match! AOL admins know what they're doing.] > >> > > >> > 157.188.205.in-addr.arpa nameserver = dns-02.ns.aol.com > >> > 157.188.205.in-addr.arpa nameserver = dns-01.ns.aol.com > >> > dns-01.ns.aol.com internet address = 64.12.51.132 > >> > dns-02.ns.aol.com internet address = 205.188.157.232 > >> > > >> > So yeppers, all aol.com ducks in a row for that outbound server. As > >> you > >> > can see nslookup also tells you what name servers have authority for > >> the > >> > address space containing 205.188.157.37. Using a whois tool you can > >> > lookup who has registered ownership of the IP block. Now we're > > getting > >> > off on a spam fighting tangent.... > >> > > >> > if you want to script nslookup to do auditing you can use the tool > > like > >> > this to query one address at a time. Now you can loop over a whole > >> block > >> > of IPs that you might own in a batch file or powershell or whatever: > >> > > >> > C:\>nslookup -type=ptr 37.157.188.205.in-addr.arpa dns-01.ns.aol.com > >> > > >> > The last argument (dns server to query) is optional. By default, > >> nslookup > >> > should be querying the first dns server listed in your ipconfig /all > >> > output. If you're at the nslookup prompt the command "server > >> > <serverName|IP> will do the same thing. Check the ? command to see > >> other > >> > commands. Note: -type=a would be redundant since it's the default > >> query > >> > type assumed and obviously -type=mx could be useful in the email > world > >> as > >> > well. > >> > > >> > ~JasonG > >> > > >> > -- > >> > > >> > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ > >> > ~ http://www.sunbeltsoftware.com/Ninja ~ > >> > > >> > >> ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ > >> ~ http://www.sunbeltsoftware.com/Ninja ~ > > > > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ > > ~ http://www.sunbeltsoftware.com/Ninja ~ > > ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ > ~ http://www.sunbeltsoftware.com/Ninja ~ ~ Ninja Email Security with Cloudmark Spam Engine Gets Image Spam ~ ~ http://www.sunbeltsoftware.com/Ninja ~