CF1759183069978-tsm20250927195623

NSLIST.NET - exposedbycmd.org

Search for IP or hostnames:

exposedbycmd.org checked at 2025-09-29T21:57:49.958Z 222ms 125/125/125 100% R:12

exposedbycmd.org

MXqs4944.pair.com
A2607:f440::4227:f2b 🇺🇸 Pair Networks
PTRqs4944.pair.com
A66.39.15.43🇺🇸 Pair Networks
PTRqs4944.pair.com
NSnelly.ns.cloudflare.com
A2606:4700:50::adf5:3ad1 🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A2803:f800:50::6ca2:c0d1 🇨🇷 Cloudflare
PTRnelly.ns.cloudflare.com
A2a06:98c1:50::ac40:20d1 🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A108.162.192.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A172.64.32.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A173.245.58.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
NSpedro.ns.cloudflare.com
A2606:4700:58::a29f:2cb7 🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A2803:f800:50::6ca2:c3b7 🇨🇷 Cloudflare
PTRpedro.ns.cloudflare.com
A2a06:98c1:50::ac40:23b7 🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A108.162.195.183🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A162.159.44.183 Cloudflare
PTRpedro.ns.cloudflare.com
A172.64.35.183🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A2606:4700:3032::6815:24cb 🇺🇸 Cloudflare
A2606:4700:3033::ac43:c74a 🇺🇸 Cloudflare
A104.21.36.203 Cloudflare
A172.67.199.74🇺🇸 Cloudflare

org

NSa0.org.afilias-nst.info
NSa2.org.afilias-nst.info
NSc0.org.afilias-nst.info
NSb0.org.afilias-nst.org
NSb2.org.afilias-nst.org
NSd0.org.afilias-nst.org
rank #151195 globally
rank #13797 in the tld

PTR for

Starts with same word

Starts similarily

AI analysis

exposedbycmd.org maps to four IP numbers: 2606:4700:3032::6815:24cb, 2606:4700:3033::ac43:c74a, 104.21.36.203 and 172.67.199.74.

other host names include hariola.com, medicanimal.nl, mengdeli.com, yelpaze.com and ns5.omanairports.co.om; they share IP numbers with exposedbycmd.org.

Two name servers nelly.ns.cloudflare.com and pedro.ns.cloudflare.com handle the delegation for exposedbycmd.org.

exposedbycmd.org shares the same name server setup as other domains, for instance kochexposed.org, prwatch.org, alecexposed.com, sourcewatch.org and kochexposed.com.

exposedbycmd.org at least partially shares name servers with other domains, for instance unigenie.co.uk, wcny123.com, tehnoindustrial.ro, billet-match.fr and funofgame.com.

These name servers are commonly used with elsa.ns.cloudflare.com, alla.ns.cloudflare.com, chip.ns.cloudflare.com, alberto.ns.cloudflare.com, alexandra.ns.cloudflare.com and cesar.ns.cloudflare.com.

Six IP addresses per host:

nelly.ns.cloudflare.com points to 2606:4700:50::adf5:3ad1, 2803:f800:50::6ca2:c0d1, 2a06:98c1:50::ac40:20d1, 108.162.192.209, 172.64.32.209 and 173.245.58.209; pedro.ns.cloudflare.com points to 2606:4700:58::a29f:2cb7, 2803:f800:50::6ca2:c3b7, 2a06:98c1:50::ac40:23b7, 108.162.195.183, 162.159.44.183 and 172.64.35.183

exposedbycmd.org is handled by a single mail server, qs4944.pair.com.

The mail server setup for exposedbycmd.org is the same as for other domains, such as qs4944.pair.com.

qs4944.pair.com resolves to two IPs: 2607:f440::4227:f2b and 66.39.15.43.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

YXHIIjw CF johedugfp 2025-09-29