Analysis report on IP address: 202.68.82.79
Congratulation
Your domain is really well configured
DNS
Dns servers for 82.68.202.in-addr.arpa
202.68.82.79 was detected as ipv4
Query informations
- Server
- h.root-servers.net
[ 198.97.190.53 ] - Duration
- 41 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- a.in-addr-servers.arpa
- IPs
- Name
- b.in-addr-servers.arpa
- IPs
- Name
- c.in-addr-servers.arpa
- IPs
- Name
- d.in-addr-servers.arpa
- IPs
- Name
- e.in-addr-servers.arpa
- IPs
- Name
- f.in-addr-servers.arpa
- IPs
Query informations
- Server
- a.in-addr-servers.arpa
[ 199.180.182.53 ] - Duration
- 289 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- b.in-addr-servers.arpa
[ 199.253.183.183 ] - Duration
- 36 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- c.in-addr-servers.arpa
[ 196.216.169.10 ] - Duration
- 170 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- d.in-addr-servers.arpa
[ 200.10.60.53 ] - Duration
- 239 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- e.in-addr-servers.arpa
[ 203.119.86.101 ] - Duration
- 263 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- f.in-addr-servers.arpa
[ 193.0.9.1 ] - Duration
- 16 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
- Name
- apnic.authdns.ripe.net
- IPs
- Name
- apnic1.dnsnode.net
- IPs
- Name
- ns2.apnic.net
- IPs
- Name
- ns3.lacnic.net
- IPs
- Name
- rirns.arin.net
- IPs
Query informations
- Server
- apnic.authdns.ripe.net
[ 193.0.9.9 ] - Duration
- 843 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
Query informations
- Server
- apnic1.dnsnode.net
[ 194.146.106.106 ] - Duration
- 13 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
Query informations
- Server
- ns2.apnic.net
[ 203.119.95.53 ] - Duration
- 15 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
Query informations
- Server
- ns3.lacnic.net
[ 200.3.13.14 ] - Duration
- 197 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
Query informations
- Server
- rirns.arin.net
[ 199.253.249.53 ] - Duration
- 142 ms
- Type
- authority
- Headers
- RCODE : 0 AA : 0 TC : 0
Response
Query informations
- Server
- ns1.dts.net.nz
[ 202.68.93.40 ] - Duration
- 277 ms
- Type
- unknown
- Headers
- RCODE : 0 AA : 1 TC : 0
Query informations
- Server
- ns2.dts.net.nz
[ 202.68.93.5 ] - Duration
- 269 ms
- Type
- unknown
- Headers
- RCODE : 0 AA : 1 TC : 0
Query informations
- Server
- ns3.dts.net.nz
[ 202.68.82.78 ] - Duration
- 268 ms
- Type
- unknown
- Headers
- RCODE : 0 AA : 1 TC : 0
Ip
Informations
- Ip
- 202.68.82.79
- Type
- ipv4
- Reverse
- ns5.dts.net.nz
- ARPA
- 79.82.68.202.in-addr.arpa
- Class C
- 202.68.82.0/24
- ASN
- 24183 DTS LTD
- Organisation
- DNZL1-AP
- Maintainer
- APNIC-HM
Reputation
- Blacklists
- Whois server
- whois.apnic.net
% [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html % Information related to '202.68.80.0 - 202.68.95.255' % Abuse contact for '202.68.80.0 - 202.68.95.255' is O3V2iYd5 [at] dts.net.nz' inetnum: 202.68.80.0 - 202.68.95.255 netname: DTSNET descr: ISP descr: PO Box 40-623 descr: Upper Hutt country: NZ org: ORG-DL1-AP admin-c: DNZL1-AP tech-c: DNZL1-AP abuse-c: AD792-AP status: ALLOCATED PORTABLE remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ remarks: This object can only be modified by APNIC hostmaster remarks: If you wish to modify this object details please remarks: send email to fIOHiIF1h4h5hg== [at] apnic.net with your organisation remarks: account name in the subject line. remarks: -+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ mnt-by: APNIC-HM mnt-lower: MAINT-NZ-DTS mnt-routes: MAINT-NZ-DTS mnt-irt: IRT-DTSLTD-NZ last-modified: 2020-08-30T23:03:21Z source: APNIC % Information related to '202.68.80.0/20AS24183' route: 202.68.80.0/20 origin: AS24183 descr: DTS Limited Level 4 - CBD Towers 88 - 90 Main Street Upper Hutt mnt-by: MAINT-NZ-DTS last-modified: 2020-08-31T08:20:36Z source: APNIC % This query was served by the APNIC Whois Service version 1.88.15-SNAPSHOT (WHOIS-UK3)
Blacklists
- RFC Ignorant
- Rbl Jp
- RblDns
- Sorbs
- Spam Eating Monkey
- SpamHaus
- SuRbl
- Support Intelligence
- Swinog
- UriBl
Ip is not blacklisted
SpamHaus has blacklisted your domain/IP.
An ip must not be blacklisted or it will be penalized for referencing and deliverability of emails.
0.001s
There is no mail server. Please test ns5.dts.net.nz.
- Name
- ns5.dts.net.nz
- IP
- 202.68.82.79
- Accessible
Web
There is no web server. Please test ns5.dts.net.nz.
- Url
- http://202.68.82.79/
- Reachable
- No
- Url
- https://202.68.82.79/
- Reachable
- No
HTTP port (80) is open
Skipped
This test verifies the presence of a website for the given IP or domain. Then scans port 80.
If the domain or IP is pointing to a website then port 80 must be open so that it can be accessed from a browser.
Otherwise port 80 must be closed.
0.000s
HTTPS port (443) is open
Skipped
This test verifies the presence of a website for the given IP or domain. Then scans port 443.
If the domain or IP is pointing to a website then port 443 must be open so that it can be accessed from a browser.
Otherwise port 443 must be closed.
0.000s
Web server version is hidden
Skipped
To avoid giving details to malicious people, the version of the server should not be visible.
0.000s
Web application technology is hidden
Skipped
To avoid giving details to malicious people, the technology that supports the application should not be visible.
0.000s
Cookies are secure
Skipped
Using "HttpOnly" instruction prevents someone to access to cookies via Javascript. The secure flag will allow you to prevent a cookie from ever being communicated in simple HTTP. (RFC 6265 section 8.3)
RFC0.000s
X-XSS-Protection header is present
Skipped
The HTTP X-XSS-Protection response header is a feature of Internet Explorer, Chrome and Safari that stops pages from loading when they detect reflected cross-site scripting (XSS) attacks.
documentation0.000s
Content Security Policy header is present
Skipped
The HTTP Content-Security-Policy response header allows web site administrators to control resources the user agent is allowed to load for a given page. With a few exceptions, policies mostly involve specifying server origins and script endpoints. This helps guard against cross-site scripting attacks (XSS).
documentation0.000s
Content Type Options header is present
Skipped
The only defined value, "nosniff", prevents Internet Explorer from MIME-sniffing a response away from the declared content-type. This also applies to Google Chrome, when downloading extensions.
0.000s