Follow-up -- ended up using nmap and funneled those results into fpdns. nmap -sUV -T4 -p53 <range> > results.txt cat results.txt | <filter> | fpdns -
Frank -----Original Message----- From: dns-operations <[email protected]> On Behalf Of [email protected] Sent: Wednesday, February 3, 2021 10:44 AM To: 'Leo Vandewoestijne' <[email protected]> Cc: [email protected] Subject: Re: [dns-operations] dnspooq Thanks, great idea! Frank -----Original Message----- From: Leo Vandewoestijne <[email protected]> Sent: Wednesday, February 3, 2021 8:47 AM To: Frank Bulk <[email protected]> Cc: [email protected] Subject: Re: [dns-operations] dnspooq On Mon, 01 Feb 2021, Frank Bulk wrote: > Is there a tool that would allow me to identify all the DNS servers on our > networks that are using dnsmasq? > fpdns should be able to help you. https://github.com/kirei/fpdns -- Met vriendelijke groet, With kind regards, Leo Vandewoestijne <***@dns.company> <www.dns.company> _______________________________________________ dns-operations mailing list [email protected] https://lists.dns-oarc.net/mailman/listinfo/dns-operations _______________________________________________ dns-operations mailing list [email protected] https://lists.dns-oarc.net/mailman/listinfo/dns-operations
