Magic Banana's Horrible-Sed script has potential:

awk '{print $0}' 'MB-HorribleSed-Set01.txt' | sed 's/.*\([[:xdigit:]]\{4\}\)\([^[:xdigit:]]\{0,1\}\)\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\)\2\([[:xdigit:]]\{4\}\).*/\1:\3:\4:\5:\6:\7:\8:\9/g' > Set01-output.txt

Where MB-HorribleSed-Seto1.txt is:

a7d74f79-4640-4158-b5c2-3097778fe363.fr-par-2.baremetal.scw.cloud
jobqueue-listener.jobqueue.netcraft.com-u840912b2930611eab47d156d838d6ab1u-digitalocean
jobqueue-listener.jobqueue.netcraft.com-u8af4d1e48e2711ea94c96760838d6ab1u-digitalocean-2gb
jobqueue-listener.jobqueue.netcraft.com-ubd544f468e2411ea94c96760838d6ab1u-digitalocean-2gb

The first hostname is a mess of hexadecimal characters, but the script deciphers the other three nicely. Alas, dig -x doesn't make any headway with the resulting pretty IPv6 addresses. Here they are:

8409:12b2:9306:11ea:b47d:156d:838d:6ab1
8af4:d1e4:8e27:11ea:94c9:6760:838d:6ab1
bd54:4f46:8e24:11ea:94c9:6760:838d:6ab1

Note that the first hextet is a bald-faced lie; IPv6 hasn't gotten there yet. There's further obfuscation at play.

There's no 'gotcha' here. These hostnames were plucked from the wild; I may know in a week
or so if my onging nMap scans come up with some similar PTR records ...

George Langford

Reply via email to