|
DIG HOSTNAME('10.17.6.33')
REVERSE(*YES)
IPVSN(*IPV4ONLY)
SHORT(*YES)
IDENTIFY(*YES)
TOSTMF('/rob/digout')
dspf '/rob/digout'
....+....1....+....2....+....3....+....4....+
************Beginning of data**************
************End of Data********************
I, personally, don't see a lot of use in that.
I tried it by client name and by IP address.
No, I do not have a host table entry for it and NSLOOKUP works.
If I try something in our DMZ versus something on the same subnet it works
....+....1....+....2....+....3....+....4....+....5
************Beginning of data**************
gdweb3.dekko.com. from server 10.10.4.250 in 1 ms.
************End of Data********************
It didn't work too well for nra.org, nor the address returned by pinging
nra.org.
But NSLOOKUP seemed to work.
I do see a lot of pressure to use DIG versus NSLOOKUP.
Rob Berendt
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.