Magic Banana's Horrible-Sed script has potential:
awk '{print $0}' 'MB-HorribleSed-Set01.txt' | sed
's/.*\([[:xdigit:]]\{4\}\)\([^[:xdigit:]]\{0,1\}\)\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\).*/\1:\3:\4:\5:\6:\7:\8:\9/g'
> Set01-output.txt
Where MB-HorribleSed-Seto1.txt is:
a7d74f79-4640-4158-b5c2-3097778fe363.fr-par-2.baremetal.scw.cloud
jobqueue-listener.jobqueue.netcraft.com-u840912b2930611eab47d156d838d6ab1u-digitalocean
jobqueue-listener.jobqueue.netcraft.com-u8af4d1e48e2711ea94c96760838d6ab1u-digitalocean-2gb
jobqueue-listener.jobqueue.netcraft.com-ubd544f468e2411ea94c96760838d6ab1u-digitalocean-2gb
The first hostname is a mess of hexadecimal characters, but the script
deciphers the other three nicely.
Alas, dig -x doesn't make any headway with the resulting pretty IPv6
addresses. Here they are:
8409:12b2:9306:11ea:b47d:156d:838d:6ab1
8af4:d1e4:8e27:11ea:94c9:6760:838d:6ab1
bd54:4f46:8e24:11ea:94c9:6760:838d:6ab1
Note that the first hextet is a bald-faced lie; IPv6 hasn't gotten there yet.
There's further obfuscation at play.
There's no 'gotcha' here. These hostnames were plucked from the wild; I may
know in a week
or so if my onging nMap scans come up with some similar PTR records ...
George Langford