CF1760332861869-tsm20251012143351

MXLIST.NET - forced.porn

Search for IP or hostnames:

forced.porn checked at 2025-10-13T05:21:01.856Z 329ms 68/68/68 100% R:10

forced.porn

NSns1.dyna-ns.net
A2400:cb00:2049:1::a29f:1a5c 🇺🇸 Cloudflare
A2400:cb00:2049:1::a29f:1b9e 🇺🇸 Cloudflare
A162.159.26.92 Cloudflare
A162.159.27.158 Cloudflare
NSns2.dyna-ns.net
A2400:cb00:2049:1::a29f:1805 🇺🇸 Cloudflare
PTRdns1.namecheaphosting.com
A2400:cb00:2049:1::a29f:1905 🇺🇸 Cloudflare
PTRdns2.namecheaphosting.com
A162.159.24.5 Cloudflare
PTRdns1.namecheaphosting.com
A162.159.25.5 Cloudflare
PTRdns2.namecheaphosting.com
A54.215.31.113🇺🇸 Amazon
PTRec2-54-215-31-113.us-west-1.compute.amazonaws.com

porn

NSa.nic.porn
NSb.nic.porn
NSc.nic.porn
NSx.nic.porn
NSy.nic.porn
NSz.nic.porn

Starts with same word

Starts similarily

AI analysis

forced.porn resolves to one IP number: 54.215.31.113.

other host names including avizo.me, cumonmyfeet.com, headcode.org, yuy.in and www.dkt.com share IP numbers with forced.porn.

forced.porn is delegated to two name servers ns1.dyna-ns.net and ns2.dyna-ns.net.

forced.porn shares the same name server setup as other domains, for instance wwanna.com, parivartan.com, celebraciones.com.mx, catstore.co and prometheus-analytics.com.

Host names with four IP numbers: ns1.dyna-ns.net points to 2400:cb00:2049:1::a29f:1a5c, 2400:cb00:2049:1::a29f:1b9e, 162.159.26.92 and 162.159.27.158; ns2.dyna-ns.net points to 2400:cb00:2049:1::a29f:1805, 2400:cb00:2049:1::a29f:1905, 162.159.24.5 and 162.159.25.5.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

iOzeIDx CF johedugfp 2025-10-13