CF1757746056269-tsm20250912070358

IPLIST.NET - exploit.sh

Search for IP or hostnames:

exploit.sh checked at 2025-09-13T06:47:36.192Z 785ms 113/113/113 100% R:15

exploit.sh

MXaspmx2.googlemail.com
A2a00:1450:400b:c02::1a 🇮🇪 Google
PTRdj-in-f26.1e100.net
A172.253.116.26🇺🇸 Google
PTRdj-in-f26.1e100.net
MXaspmx3.googlemail.com
A2a00:1450:400c:c00::1a 🇧🇪 Google
PTRws-in-f26.1e100.net
PTRws-in-x1a.1e100.net
A173.194.76.27🇺🇸 Google
PTRws-in-f27.1e100.net
NSns.exploit.sh
A2a01:7e00::f03c:91ff:fe96:bc4d 🇬🇧 Linode AS63949
PTRuk.exploit.sh
A178.79.129.224🇬🇧 Linode AS63949
PTRuk.exploit.sh
MXaspmx.l.google.com
A2607:f8b0:4004:c07::1a 🇺🇸 Google
PTRbc-in-f26.1e100.net
A172.253.122.26🇺🇸 Google
PTRbh-in-f26.1e100.net
MXalt1.aspmx.l.google.com
A2607:f8b0:4023:100f::1b 🇺🇸 Google
PTRyudfwra-in-f27.1e100.net
A192.178.220.27🇺🇸 Google
PTRyudfwra-in-f27.1e100.net
MXalt2.aspmx.l.google.com
A2a00:1450:400c:c00::1a 🇧🇪 Google
PTRws-in-f26.1e100.net
PTRws-in-x1a.1e100.net
A173.194.76.27🇺🇸 Google
PTRws-in-f27.1e100.net
A2600:3c01::f03c:91ff:fe96:92ea 🇺🇸 Linode AS63949
PTRus.exploit.sh
A178.79.129.224🇬🇧 Linode AS63949
PTRuk.exploit.sh

sh

NSa0.nic.sh
NSa2.nic.sh
NSb0.nic.sh
NSc0.nic.sh

Up

Starts with same word

Starts similarily

AI analysis

Host names vpn.exploit.sh, nsv6.exploit.sh, uk.exploit.sh, mx.exploit.sh, ns.exploit.sh, and others have exploit.sh as their parent.

exploit.sh is configured to point to two IP addresses: 2600:3c01::f03c:91ff:fe96:92ea and 178.79.129.224.

The IP numbers shared with exploit.sh also include host names such as ns.upthere.info, uk.exploit.sh, and ns.exploit.sh.

One name server, ns.exploit.sh, is the delegated server for exploit.sh.

For instance, exploit.sh shares name servers, at least in part, with other domains such as upthere.info.

ns.exploit.sh is configured to point to two IP addresses: 2a01:7e00::f03c:91ff:fe96:bc4d and 178.79.129.224.

Five mail servers, namely aspmx2.googlemail.com, aspmx3.googlemail.com, aspmx.l.google.com, alt1.aspmx.l.google.com, and alt2.aspmx.l.google.com, handle exploit.sh.

Other domains such as araselegantdesigns.com, aarin.org, televeresystems.com, drgc.in, and snookerbulls.at share at least some mail servers with exploit.sh.

The mail servers aspmx4.googlemail.com and aspmx5.googlemail.com are commonly utilized in conjunction.

aspmx2.googlemail.com is associated with IP numbers: 2a00:1450:400b:c02::1a and 172.253.116.26. aspmx3.googlemail.com is associated with IP numbers: 2a00:1450:400c:c00::1a and 173.194.76.27. aspmx.l.google.com is associated with IP numbers: 2607:f8b0:4004:c07::1a and 172.253.122.26. alt1.aspmx.l.google.com is associated with IP numbers: 2607:f8b0:4023:100f::1b and 192.178.220.27. alt2.aspmx.l.google.com is associated with IP numbers: 2a00:1450:400c:c00::1a and 173.194.76.27.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

OoZvvfz CF johedugfp 2025-09-13