Follow-up -- ended up using nmap and funneled those results into fpdns.

nmap -sUV -T4 -p53 <range> > results.txt
cat results.txt | <filter> | fpdns -

Frank 

-----Original Message-----
From: dns-operations <[email protected]> On Behalf Of
[email protected]
Sent: Wednesday, February 3, 2021 10:44 AM
To: 'Leo Vandewoestijne' <[email protected]>
Cc: [email protected]
Subject: Re: [dns-operations] dnspooq

Thanks, great idea!

Frank 

-----Original Message-----
From: Leo Vandewoestijne <[email protected]> 
Sent: Wednesday, February 3, 2021 8:47 AM
To: Frank Bulk <[email protected]>
Cc: [email protected]
Subject: Re: [dns-operations] dnspooq

On Mon, 01 Feb 2021, Frank Bulk wrote:

> Is there a tool that would allow me to identify all the DNS servers on our
> networks that are using dnsmasq?
> 
fpdns should be able to help you.
https://github.com/kirei/fpdns     

--

Met vriendelijke groet,
With kind regards,


Leo Vandewoestijne
<***@dns.company>
<www.dns.company>


_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations


_______________________________________________
dns-operations mailing list
[email protected]
https://lists.dns-oarc.net/mailman/listinfo/dns-operations

Reply via email to