CF1761203937044-tsm20251017082432

MXLIST.NET - exposedbycmd.org

Search for IP or hostnames:

exposedbycmd.org checked at 2025-10-23T07:18:57.032Z 194ms 125/125/125 100% R:12

exposedbycmd.org

MXqs4944.pair.com
A2607:f440::4227:f2b 🇺🇸 Pair Networks
PTRqs4944.pair.com
A66.39.15.43🇺🇸 Pair Networks
PTRqs4944.pair.com
NSnelly.ns.cloudflare.com
A2606:4700:50::adf5:3ad1 🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A2803:f800:50::6ca2:c0d1 🇨🇷 Cloudflare
PTRnelly.ns.cloudflare.com
A2a06:98c1:50::ac40:20d1 🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A108.162.192.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A172.64.32.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
A173.245.58.209🇺🇸 Cloudflare
PTRnelly.ns.cloudflare.com
NSpedro.ns.cloudflare.com
A2606:4700:58::a29f:2cb7 🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A2803:f800:50::6ca2:c3b7 🇨🇷 Cloudflare
PTRpedro.ns.cloudflare.com
A2a06:98c1:50::ac40:23b7 🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A108.162.195.183🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A162.159.44.183 Cloudflare
PTRpedro.ns.cloudflare.com
A172.64.35.183🇺🇸 Cloudflare
PTRpedro.ns.cloudflare.com
A2606:4700:3032::6815:24cb 🇺🇸 Cloudflare
A2606:4700:3033::ac43:c74a 🇺🇸 Cloudflare
A104.21.36.203 Cloudflare
A172.67.199.74🇺🇸 Cloudflare

org

NSa0.org.afilias-nst.info
NSa2.org.afilias-nst.info
NSc0.org.afilias-nst.info
NSb0.org.afilias-nst.org
NSb2.org.afilias-nst.org
NSd0.org.afilias-nst.org
rank #151195 globally
rank #13797 in the tld

PTR for

Starts with same word

Starts similarily

AI analysis

exposedbycmd.org points to four IP numbers: 2606:4700:3032::6815:24cb, 2606:4700:3033::ac43:c74a, 104.21.36.203 and 172.67.199.74.

Other host names including medicanimal.nl, mengdeli.com, ns5.omanairports.co.om, 123-zo.vn and vet-nps.com share IP numbers with exposedbycmd.org.

exposedbycmd.org's delegation uses two name servers, nelly.ns.cloudflare.com and pedro.ns.cloudflare.com.

exposedbycmd.org shares the same name server setup as other domains, for example kochexposed.org, prwatch.org, alecexposed.com, sourcewatch.org and kochexposed.com.

exposedbycmd.org at least partially shares name servers with other domains, including unigenie.co.uk, wcny123.com, tehnoindustrial.ro, billet-match.fr and funofgame.com.

these name servers are commonly used together with elsa.ns.cloudflare.com, chip.ns.cloudflare.com and alla.ns.cloudflare.com.

Host names with six IP numbers:

nelly.ns.cloudflare.com points to: 2606:4700:50::adf5:3ad1, 2803:f800:50::6ca2:c0d1, 2a06:98c1:50::ac40:20d1, 108.162.192.209, 172.64.32.209 and 173.245.58.209.

pedro.ns.cloudflare.com points to: 2606:4700:58::a29f:2cb7, 2803:f800:50::6ca2:c3b7, 2a06:98c1:50::ac40:23b7, 108.162.195.183, 162.159.44.183 and 172.64.35.183.

exposedbycmd.org is handled by a single mail server, qs4944.pair.com.

exposedbycmd.org uses the same mail server setup as other domains, such as qs4944.pair.com.

qs4944.pair.com points to two IPs: 2607:f440::4227:f2b and 66.39.15.43.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

umtYJJP CF johedugfp 2025-10-23