Linux server1.hosting4iran.com 4.18.0-553.89.1.el8_10.x86_64 #1 SMP Mon Dec 8 03:53:08 EST 2025 x86_64
LiteSpeed
Server IP : 185.208.174.156 & Your IP : 216.73.216.218
Domains : 282 Domain
User : satitravel
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
python3-dns /
examples /
Delete
Unzip
Name
Size
Permission
Date
Action
ddns.py
1.18
KB
-rw-r--r--
2016-09-20 16:24
e164.py
152
B
-rw-r--r--
2016-09-20 16:24
mx.py
225
B
-rw-r--r--
2016-09-20 16:24
name.py
468
B
-rw-r--r--
2016-09-20 16:24
reverse.py
1.32
KB
-rw-r--r--
2016-09-20 16:24
reverse_name.py
177
B
-rw-r--r--
2016-09-20 16:24
xfr.py
393
B
-rw-r--r--
2016-09-20 16:24
zonediff.py
10.86
KB
-rw-r--r--
2016-09-20 16:24
Save
Rename
#!/usr/bin/env python # Usage: reverse.py <zone_filename>... # # This demo script will load in all of the zones specified by the # filenames on the command line, find all the A RRs in them, and # construct a reverse mapping table that maps each IP address used to # the list of names mapping to that address. The table is then sorted # nicely and printed. # # Note! The zone name is taken from the basename of the filename, so # you must use filenames like "/wherever/you/like/dnspython.org" and # not something like "/wherever/you/like/foo.db" (unless you're # working with the ".db" GTLD, of course :)). # # If this weren't a demo script, there'd be a way of specifying the # origin for each zone instead of constructing it from the filename. from __future__ import print_function import dns.zone import dns.ipv4 import os.path import sys reverse_map = {} for filename in sys.argv[1:]: zone = dns.zone.from_file(filename, os.path.basename(filename), relativize=False) for (name, ttl, rdata) in zone.iterate_rdatas('A'): try: reverse_map[rdata.address].append(name.to_text()) except KeyError: reverse_map[rdata.address] = [name.to_text()] keys = reverse_map.keys() keys.sort(key=dns.ipv4.inet_aton) for k in keys: v = reverse_map[k] v.sort() print(k, v)