CF1760387252128-tsm20251012143351

MXLIST.NET - step.sh

Search for IP or hostnames:

step.sh checked at 2025-10-13T20:27:32.105Z 259ms 148/148/148 100% R:14

step.sh

NSns1.markmonitor.com
A2620:10a:80a8::1 🇨🇦 CIRA-CLOUD1
A149.112.160.1🇨🇦 CIRA-CLOUD1
NSns2.markmonitor.com
A2001:67c:10b8::1 🇨🇭 RCODEZERO-ANYCAST-SEC2
PTRns2.markmonitor.com
A176.97.158.1🇦🇹 RCODEZERO-ANYCAST-SEC2
PTRns2.markmonitor.com
NSns3.markmonitor.com
A2620:10a:80a9::1 🇨🇦 CIRA-CLOUD2
A149.112.161.1🇨🇦 CIRA-CLOUD2
NSns4.markmonitor.com
A2001:67c:1bc::1 🇦🇹 RcodeZero Anycast DNS
PTRns1.markmonitor.com
A192.174.68.1🇦🇹 RcodeZero Anycast DNS
PTRns1.markmonitor.com
NSns5.markmonitor.com
A2620:10a:80a8::2 🇨🇦 CIRA-CLOUD1
A149.112.160.2🇨🇦 CIRA-CLOUD1
NSns6.markmonitor.com
A2001:67c:10b8::3 🇨🇭 RCODEZERO-ANYCAST-SEC2
PTRns6.markmonitor.com
A176.97.158.3🇦🇹 RCODEZERO-ANYCAST-SEC2
PTRns6.markmonitor.com
NSns7.markmonitor.com
A2620:10a:80a9::2 🇨🇦 CIRA-CLOUD2
A149.112.161.2🇨🇦 CIRA-CLOUD2
MXstep-sh.mail.protection.outlook.com
A2a01:111:f403:c946::5 🇺🇸 Microsoft
PTRmail-ch4pr21cu00105.inbound.protection.outlook.com
A2a01:111:f403:f802::2 🇺🇸 Microsoft
PTRmail-sj2pr05cu00202.inbound.protection.outlook.com
A2a01:111:f403:f807::1 🇺🇸 Microsoft
PTRmail-co1pr21cu00101.inbound.protection.outlook.com
A2a01:111:f403:f90c:: 🇺🇸 Microsoft
PTRmail-sn1pr03cu00100.inbound.protection.outlook.com
A52.101.8.32🇺🇸 Microsoft
PTRmail-dm5pr02cu00100.inbound.protection.outlook.com
A52.101.9.2🇺🇸 Microsoft
PTRmail-mn2pr02cu00202.inbound.protection.outlook.com
A52.101.11.9🇺🇸 Microsoft
PTRmail-sn1pr02cu00101.inbound.protection.outlook.com
A52.101.11.17🇺🇸 Microsoft
PTRmail-sn1pr0501cu00301.inbound.protection.outlook.com
A13.248.148.104🇺🇸 Amazon
PTRa1234d40bd56b6907.awsglobalaccelerator.com
A76.223.20.46🇺🇸 Amazon
PTRa1234d40bd56b6907.awsglobalaccelerator.com

sh

NSa0.nic.sh
NSa2.nic.sh
NSb0.nic.sh
NSc0.nic.sh

Starts with same word

Starts similarily

AI analysis

step.sh points to two IP numbers: 13.248.148.104 and 76.223.20.46.

Other host names such as arrio.dev, clicks.tinypulse.com, afracing.co.uk, mccomas.us and www.lds.co share IPs with step.sh.

step.sh is delegated to seven name servers: ns1.markmonitor.com, ns2.markmonitor.com, ns3.markmonitor.com, ns4.markmonitor.com, ns5.markmonitor.com, ns6.markmonitor.com and ns7.markmonitor.com.

step.sh at least partially shares name servers with other domains, for instance whisperject.net, infantfanatics.com, gymboree.net, umiessentials.com and lettuce-apps.biz.

Two IP numbers per host:

ns1.markmonitor.com points to: 2620:10a:80a8::1 and 149.112.160.1.

ns2.markmonitor.com points to: 2001:67c:10b8::1 and 176.97.158.1.

ns3.markmonitor.com points to: 2620:10a:80a9::1 and 149.112.161.1.

ns4.markmonitor.com points to: 2001:67c:1bc::1 and 192.174.68.1.

ns5.markmonitor.com points to: 2620:10a:80a8::2 and 149.112.160.2.

ns6.markmonitor.com points to: 2001:67c:10b8::3 and 176.97.158.3.

ns7.markmonitor.com points to: 2620:10a:80a9::2 and 149.112.161.2.

step.sh is handled by a single mail server, step-sh.mail.protection.outlook.com.

Host name step-sh.mail.protection.outlook.com points to eight IP numbers: 2a01:111:f403:c946::5, 2a01:111:f403:f802::2, 2a01:111:f403:f807::1, 2a01:111:f403:f90c::, 52.101.8.32, 52.101.9.2, 52.101.11.9 and 52.101.11.17.

Perform reverse DNS lookup as well as normal forward DNS. Check Autonomous System Numbers (ASNs) and BGP connections between Internet Service Providers.
dbq

xKvqGfj CF johedugfp 2025-10-13