Help
RSS
API
Feed
Maltego
Contact
Domain > dns.seby.io
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2020-02-15
104.28.16.100
(
ClassC
)
2025-09-19
104.21.25.135
(
ClassC
)
Port 443
HTTP/1.1 200 OKDate: Fri, 19 Sep 2025 20:28:34 GMTContent-Type: text/html; charsetutf-8Transfer-Encoding: chunkedConnection: keep-aliveStrict-Transport-Security: max-age31536000; includeSubDomains; preloadcf-cache-status: DYNAMICServer: cloudflareAccess-Control-Allow-Origin: *Cache-Control: public, max-age0, must-revalidatereferrer-policy: strict-origin-when-cross-originx-content-type-options: nosniffReport-To: {endpoints:{url:https:\/\/a.nel.cloudflare.com\/report\/v4?shD9TMWeWpnDmPo3JXVMNLGDnaOuQFCSZN0Oi8X2saH96q9lNYdX%2BqzoH%2BbIhwOvLUCREAqvGre2%2B57O64RL5GBPSHGSid%2B01xKbW2XlX%2FoD%2FwpLRXFfodqteTC%2Blsw%3D%3D},group:cf-nel,max_age:604800}NEL: {success_fraction:0,report_to:cf-nel,max_age:604800}Vary: Accept-EncodingCF-RAY: 981bd48d0dd08e60-PDX !DOCTYPE html>html langen>head> title>dns.seby.io/title> meta nameviewport contentwidthdevice-width, initial-scale1> link relicon typeimage/png hreffavicon-32x32.png sizes32x32 /> link relicon typeimage/png hreffavicon-16x16.png sizes16x16 /> meta namedescription contentFree Australian DNS resolver that is respects your privacy. It is only available over encrypted DNS protocols and uses Qname minimisation to minimise information send to root.> link relcanonical hrefhttps://dns.seby.io> style> html { font-size: 18px; font-family: -apple-system, Helvetica, Arial, sans-serif; } body { margin: 6em auto; } .container{ max-width: 1000px; margin: 0 auto; } nav { background: #eee; position: absolute; top: 0; right: 0; left: 0; } nav ul { list-style: none; padding: 0 5em; line-height: 1.2em; margin: 0; } nav li { display: inline-block; box-sizing: border-box; } nav a { display: inline-block; padding: 1em; } nav a:link, nav a:visited { color: #0000ff } nav a:hover { color: #ffc455; background: #444C63; } a:link, a:visited { text-decoration: none; color: #0000ff; } a:hover { text-decoration: underline; color: #0000a4; border: 0 none; } .active a { background: #fff; } img { text-align: center; } ul { line-height: 1.4em; } code, pre { font-family: monospace; background: #444C63; color: #ffc455; font-size: 0.778em; padding: 3px 5px; } pre { overflow-x: auto; } small { top: -5px; position: relative; } .comment { color: #a7aaad } .row { margin-left: 20px; } .row p { margin: 12px 0; white-space: nowrap; } .row code, .wrap { word-break: break-all; overflow-wrap: break-word; } .tab-container { margin-top: 0px; display: -webkit-flex; display: flex; -webkit-flex-wrap: wrap; flex-wrap: wrap; } .tab-btn:first-of-type { border-left: 1px solid #ddd; } .tab-btn { width: 50%; text-align: center; box-sizing: border-box; background: #eee; color: #0000ff; border: 1px solid #ddd; border-left: 0; line-height: 2.5em; cursor: pointer; z-index: 1; } .tab-devider { border: 0; border-bottom: 1px solid #ddd; margin: 46px 0 0 0; position: absolute; left: 0; right: 0; } .tab-content { width: 100%; -webkit-order: 1; order: 1; } inputtyperadio, .tab-content { display: none; } inputtyperadio:checked + .tab-btn { background: #fff; border-bottom: 0; } inputtyperadio:checked + .tab-btn:hover, .tab-btn:hover { text-decoration: underline; color: #ffc455; background: #444C63; border-bottom: 1px solid #444C63; } inputtyperadio:checked + .tab-btn + .tab-content { display: block; } @media (max-width: 598px) { nav ul { padding: 0; } } @media (max-width: 416px) { body { margin: 8em auto; } } @media (max-width: 998px) { img { display: block; margin: 4px auto; } } @media (max-width: 1300px) { .row code, .wrap { white-space: initial; } .row p { white-space: initial; } } /style>/head>body> nav> ul> li classactive>a href/>Australian DNS resolver/a>/li> li>a hrefhttps://stats.uptimerobot.com/qx96WC8LY0 relnoreferrer nofollow>Uptime/a>/li> li>a hrefhttps://github.com/publicarray/dns-resolver-infra>GitHub/a>/li> /ul> /nav> div classcontainer> h1>Australian DNS resolver/h1> p>Location: Sydney, Australia/p> h2>Features/h2> ul> li>Privacy Focused/li> li>No Censorship/li> li>No Logging/li> li>DNSSEC validation/li> li>Build on open source technologies/li> li>a hrefhttps://en.wikipedia.org/wiki/DNS_rebinding>DNS/a> a hrefhttps://danielmiessler.com/blog/dns-rebinding-explained/>Rebind/a> protection. See the a hrefhttps://github.com/publicarray/dns-resolver-infra/blob/master/unbound/unbound.conf#L176L206>config/a> for the currently filtered IPs. As a consequence spam block lists (RBL) such as a relnofollow hrefhttps://www.spamhaus.org/zen/>spamhaus.org/a> will no longer work. Also note your public IP might still be vulnerable. a hrefhttps://github.com/transmission/transmission/pull/468>1/a> a hrefhttps://www.bleepingcomputer.com/news/security/blizzard-fixes-dns-rebinding-flaw-that-put-all-the-companys-users-at-risk/>2/a> a hrefhttps://medium.com/@brannondorsey/attacking-private-networks-from-the-internet-with-dns-rebinding-ea7098a2d325>3/a> a hrefhttps://www.youtube.com/watch?vZazk0plSoQg>4/a> a hrefhttps://media.blackhat.com/bh-us-10/presentations/Heffner/BlackHat-USA-2010-Heffner-How-to-Hack-Millions-of-Routers-slides.pdf>4 slides/a>/li> li>a hrefhttps://www.opennic.org>OpenNIC/a> TLDs/li> li>Qname minimisation (a hrefhttps://tools.ietf.org/html/rfc7816>RFC 7816/a>)/li> li>Query pre-fetching using a hrefhttps://lost-and-found-narihiro.blogspot.com/2011/10/unbound-prefetch.html>Unbound/a>s algorithm/li>!-- li>Available over the a hrefhttps://dnscrypt.info/protocol>DNSCrypt protocol/a>/li> --> li>Supports DNS-over-HTTPS (DoH) (a hrefhttps://tools.ietf.org/html/rfc8484>RFC 8484/a>) which is basically DNS over HTTP/2/li> li>Supports DNS-over-TLS (DoT) (a hrefhttps://tools.ietf.org/html/rfc7858>RFC 7858/a>)/li> /ul> h2>Installation/h2> h3>Windows/h3> p>In an elevated Terminal run the following:/p> p>code> Add-DnsClientDohServerAddress -ServerAddress 45.76.113.31 -DohTemplate https://doh.seby.io/dns-query -AutoUpgrade $True/code>/p> p>In Settings-> Network & internet -> Advanced network settings -> your network adapter -> View Additional Properties -> DNS server assignment Editp> p>Under DNS server assignment press the Edit button and set it to Manual. Next flip the IPv4 swith to ON and the enter code>45.76.113.31/code> and code>139.99.222.72/code> as the DNS servers/p> p>Finally choose code>Encrypted only (DNS over HTTPS)/code> and hit save/p> h3>iOS/h3> p>a hrefdns.mobileconfig>Download the DNS profile/a> or create your own: a hrefhttps://dns.notjakob.com/tool.html>https://dns.notjakob.com/tool.html/a>/p> h2>Server Details/h2> section classtab-container> input idtab-one typeradio nametabs checkedchecked /> label classtab-btn fortab-one>dns.seby.io - Vultr/label> div classtab-content> h3>dns.seby.io - Vultr/h3> p>IPv4 address: code>45.76.113.31/code>/p> p>This server is also part of the a hrefhttps://www.ntppool.org/user/b9nv9cqbjuhggucwvz364>NTP pool project/a>/p>!-- h4>a hrefhttps://dnscrypt.info/>DNSCrypt/a>/h4> div classrow> p>Provider Name: code>2.dnscrypt-cert.dns.seby.io/code>/p> p>DNSCrypt Ports: code>443/code> (default), 5353, 8080/p> p>Public key: code>0854:6878:8BA7:8A5E:A945:EA8F:4583:DD9C:803D:9670:3BCA:409E:EFFD:6AB8:5EB4:2C56/code>/p> p>Stamp: code>sdns://AQcAAAAAAAAADDQ1Ljc2LjExMy4zMSAIVGh4i6eKXqlF6o9Fg92cgD2WcDvKQJ7v_Wq4XrQsVhsyLmRuc2NyeXB0LWNlcnQuZG5zLnNlYnkuaW8/code>/p> small>Stamp was generated with a relnofollow hrefhttps://stamps.dnscrypt.info/>https://dnscrypt.info/stamps/a>/small> /div> --> h4>DNS-over-HTTPS (DoH)/h4> div classrow> p>HTTP/2 port: code>443/code>/p> p>Hostname: code>doh.seby.io/code>/p> p>Path: code>/dns-query/code>/p> p>Stamp: code>sdns://AgcAAAAAAAAADDQ1Ljc2LjExMy4zMSA-GhoPbFPz6XpJLVcIS1uYBwWe4FerFQWHb9g_2j24OA9kb2guc2VieS5pbzo0NDMKL2Rucy1xdWVyeQ/code>/p> small>Stamp was generated with a relnofollow hrefhttps://stamps.dnscrypt.info/>https://dnscrypt.info/stamps/a>. /small>small>Command used to get the hash: code>dnscrypt-proxy -show-certs/code>/small> p>TLS Setup: a relnofollow hrefhttps://www.immuniweb.com/ssl/doh.seby.io/h7STf3j6/>ImmuniWeb report/a>/p> /div> h4>DNS-over-TLS (DoT)/h4> div classrow> p>TLS port: code>853/code>/p> p>Hostname: code>dot.seby.io/code>/p> p>Out-of-Band public key pin: code>YLh1dUR9y6Kja30RrAn7JKnbQG/uEtLMkBgFF2Fuihg/code>/p> small>Command used: code>kdig -d @45.76.113.31 +tls-ca +tls-hostdot.seby.io example.com/code>/small> p>TLS Setup: a relnofollow hrefhttps://www.immuniweb.com/ssl/dot.seby.io/A75eDhoU/>ImmuniWeb report/a>/p> /div> /div> hr classtab-devider> /section> h5>a hrefhttps://nlnetlabs.nl/projects/unbound/about/>Unbound - DoT/a> Example:/h5>pre>server: port: 53forward-zone: name: . forward-tls-upstream: yes forward-addr: 45.76.113.31@853/pre> p>The server configuration is freely available on github:/p> p>a hrefhttps://github.com/publicarray/dns-resolver-infra>https://github.com/publicarray/dns-resolver-infra/a>/p> p>If there are any problems please open an a hrefhttps://github.com/publicarray/dns-resolver-infra/issues/new>issue/a>./p> br> p>Notes:/p> p>While the resolver is freely available abuse will not be tolerated./p> p>To deal with abuse I may need to capture limited amount of traffic,/p> p>this will be discarded after the abuse is dealt with./p> br> /div>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]