Magic Banana grumbled:
"Still no expected output..."
Maybe our postings passed each other by like ships in the night ... I really
did add several example files
attached to their relevant postings or referenced to a preceding posting.
Maybe a list of what appears to
be missing would help. I was careful to test all the scripts with their
source files.
"If the so-called "painfully obvious IPv4 addresses" are those that my last
sed's substitution extract, ..."
Not so. Too much is being read into my hyperbolic remark. Those pesky IPv4
addresses are listed, thoroughly
intermixed, with the looked-up PTR data. They're difficult to unmix, because
sorting doesn't discriminate
between numerical parts of PTR's and real IP addresses. IPv6 addresses are
easy, because they can be found
with grep by searching on the colon ':' separator.
Repeating: those IPv4and IPv6 addresses that weren't looked up by the
website's apache server had no DNS
service, and so are in classes by themselves. The addresses that Magic
Banana's excellent scripts extract
can often be tested by applying reverse DNS, but I'm finding that some IPv6
addresses that came to my
attention by means of nMap scans can be rather refractory, sometimes because
their server has been powered
down or because new PTR records have been applied to them. I even found one
set of addresses that came back
online between a Sunday nMap scan and a Tuesday re-scan.
Magic Banana's fourth script in his June 23 (17:00) works convincingly:
sed
's/[^0-9]*\([0-9]\{1,3\}\)[^0-9]\{1,5\}\([0-9]\{1,3\}\)[^0-9]\{1,5\}\([0-9]\{1,3\}\)[^0-9]\{1,5\}\([0-9]\{1,3\}\).*/\1.\2.\3.\4/'
IPv4-SourceList.txt | paste IPv4-SourceList.txt - > FourthScriptOutput.txt
Bear in mind that various obfuscation schemes may have been applied to these
PTR's, as Magic Banana addressed
some time ago with more sophisticated scripts, so the IP addresses have to be
checked by reverse DNS against
their PTR records as recorded in the Recent Visitor data. I'll check these
with:
awk '{print $2}' 'FourthScriptOutput.txt' > Temp0623E.txt ; dig -x -f
Temp0623E.txt | grep -A 1 "ANSWER SECTION:" '-' | awk '{print $5} '-' |more
The output of this ad hoc script is simply, 92.242.140.21, which is the
catch-all for unresolvable addresses.
That's the same as the apache server reported for those IPv4 addresses in May
2020. Their CIDR/24 scans may be
more revealing. That said, my check does not discover any IPv4 addresses that
inadvertently came from any of
the PTR's. Incidentally, the IPv6-List.txt file gives the identical result,
which is as expected, as there are
no PTR's with colon ':' separators.
In the meantime, collecting multi-addressed PTR's lurking in CIDR blocks has
been proving very fruitful,
especially when applied to the CIDR/32 portions (i.e., the left-most two
hextets of the not-looked-up
IPv6 addresses in the Recent Visitor data, as well as the right-most octets
of the not-looked-up IPv4
addresses in the same Recent Visitor data). There remain a great many simple
PTR records with no
embedded IP data at all or with inscrutible obfuscations that can only be
resolved by the nMap searching
scripts which are filling up my storage media.
Thank you for your continuing constructive analyses.
George Langford