首页   注册   登录
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
测试工具
SmokePing
IPv6 访问测试
Coding
V2EX  ›  宽带症候群

蛋疼的南京联通 2 组 DNS 劫持新浪短链接到 127.0.0.1

  •  
  •   yetsky · 2015-11-06 17:45:51 +08:00 · 2480 次点击
    这是一个创建于 1497 天前的主题,其中的信息可能已经有所发展或是发生改变。
    C:\>nslookup t.cn 221.6.4.66
    Server: cache5-nj
    Address: 221.6.4.66

    Name: t.cn
    Address: 127.0.0.1

    /////////////////////////////////////////////
    C:\>nslookup t.cn 58.240.57.33
    Server: cache4-nj
    Address: 58.240.57.33

    Name: t.cn
    Address: 127.0.0.1

    /////////////////////////////////////////////
    C:\>nslookup t.cn 114.114.114.11
    Server: public1.114dns.com
    Address: 114.114.114.114

    Non-authoritative answer:
    Name: t.cn
    Address: 114.134.80.138

    /////////////////////////////////////////////
    C:\>dig @58.240.57.33 -p 53 t.cn +trace

    ; <<>> DiG 9.10-P2 <<>> @58.240.57.33 -p 53 t.cn +trace
    ; (1 server found)
    ;; global options: +cmd
    . 34528 IN NS k.root-servers.net.
    . 34528 IN NS g.root-servers.net.
    . 34528 IN NS b.root-servers.net.
    . 34528 IN NS a.root-servers.net.
    . 34528 IN NS e.root-servers.net.
    . 34528 IN NS f.root-servers.net.
    . 34528 IN NS d.root-servers.net.
    . 34528 IN NS j.root-servers.net.
    . 34528 IN NS h.root-servers.net.
    . 34528 IN NS c.root-servers.net.
    . 34528 IN NS i.root-servers.net.
    . 34528 IN NS l.root-servers.net.
    . 34528 IN NS m.root-servers.net.
    ;; Received 239 bytes from 58.240.57.33#53(58.240.57.33) in 250 ms

    cn. 172800 IN NS a.dns.cn.
    cn. 172800 IN NS e.dns.cn.
    cn. 172800 IN NS d.dns.cn.
    cn. 172800 IN NS c.dns.cn.
    cn. 172800 IN NS b.dns.cn.
    cn. 172800 IN NS ns.cernet.net.
    cn. 86400 IN DS 24697 8 2 A8BD8346D72C8C08FCE76D85298A8D58025323487122C5354D6E34AD 857498E3
    cn. 86400 IN RRSIG DS 8 1 86400 20151116050000 20151106040000 62530 . cIkjHXH+7U4YBxitv/Zv52MturmIDVBXGSNYgbeSkmhQGTE6xEtilyCP xp7M
    ZFHrIksx4YU22jKg/G+rU3yF9/ATV4oSmb3YdiSqASEafsoxhSfP xJyqE/PeDnxTzMpYgijZBBhU2mKQZpvpL9WB07G8ZuSyRhMgrXdbEdgd uiw=
    ;; Received 503 bytes from 199.7.91.13#53(d.root-servers.net) in 203 ms

    t.cn. 86400 IN NS ns1.sina.com.cn.
    t.cn. 86400 IN NS ns3.sina.com.cn.
    t.cn. 86400 IN NS ns4.sina.com.cn.
    t.cn. 86400 IN NS ns2.sina.com.cn.
    3QDAQA092EE5BELP64A74EBNB8J53D7E.cn. 21600 IN NSEC3 1 1 10 AEF123AB 3QLMP0QRNQ96G5AFGOPNB7U7IJ4MBP4B NS SOA RRSIG DNSKEY NSEC3PARAM TYPE65534
    3QDAQA092EE5BELP64A74EBNB8J53D7E.cn. 21600 IN RRSIG NSEC3 8 2 21600 20151129144357 20151030142026 53988 cn. PrizLnEBoell7ySW1ZKQKLGzIKbd1SdfnFYD6f7UCk6Rb6vT7WEt
    a2o+ f2G5hJVzwjphlvD56u2xyHadokyMDX3hZlE/Fi38+hVoOHoLMyxTEXvI kn9BRCfZfOC99HipX6StutvXb2LY4Pqba2icFmMQmCI6SJt8MA/XIndE 1MI=
    ONC3D15PCDO0DV9FS2T78HT6CDQV8LJL.cn. 21600 IN NSEC3 1 1 10 AEF123AB ONF4VACH6NENVA9D682V9M515Q9H0EE5 CNAME RRSIG
    ONC3D15PCDO0DV9FS2T78HT6CDQV8LJL.cn. 21600 IN RRSIG NSEC3 8 2 21600 20151125130824 20151026122148 53988 cn. XgTPKv4aLnyWLkm1DhOpahcfIPfj1s72aMKrqV1BihE+Qs4mfV6u
    jtMJ xjCotYJbtca0TcfUiYFB6MI51p6P+cq+LgqKxncXRdzSmj5Yyjhsk8p3 TEYF9fYT4tpEvXwVRiTFojYAnrxCULFwmYl/FBi89vS2T6bjRg+yNdZN P4Y=
    ;; Received 639 bytes from 203.119.26.1#53(b.dns.cn) in 46 ms

    t.cn. 60 IN A 123.125.106.196
    t.cn. 60 IN NS ns2.sina.com.cn.
    t.cn. 60 IN NS ns3.sina.com.cn.
    t.cn. 60 IN NS ns4.sina.com.cn.
    t.cn. 60 IN NS ns1.sina.com.cn.
    ;; Received 194 bytes from 202.106.184.166#53(ns1.sina.com.cn) in 31 ms
    1 回复  |  直到 2015-11-08 12:33:57 +08:00
        1
    seeley   2015-11-08 12:33:57 +08:00
    愤怒地表示同省的南通联通也是如此!
    关于   ·   FAQ   ·   API   ·   我们的愿景   ·   广告投放   ·   感谢   ·   实用小工具   ·   2197 人在线   最高记录 5043   ·     Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.3 · 22ms · UTC 00:33 · PVG 08:33 · LAX 16:33 · JFK 19:33
    ♥ Do have faith in what you're doing.