publicsuffix / list

The Public Suffix List
https://publicsuffix.org/
Mozilla Public License 2.0
2k stars 1.2k forks source link

remove Amune section #2066

Closed wdhdev closed 1 month ago

wdhdev commented 1 month ago

Reasons for removal:

Original PR was #357 opened by @mindprotectionkit-admin. That was back in 2016, so chances are they have just shutdown their service and done a "set and forget" type entry on the PSL.

groundcat commented 1 month ago

t3l3p0rt.net:

WHOIS

Creation Date: 2016-12-15T19:51:58Z which indicates that this domain is possibly still under control of original requester if it hadn't been transferred.

Please read the original WHOIS records below:

   Domain Name: T3L3P0RT.NET
   Registry Domain ID: 2082305414_DOMAIN_NET-VRSN
   Registrar WHOIS Server: whois.domrobot.com
   Registrar URL: http://www.inwx.com
   Updated Date: 2023-12-16T08:39:03Z
   Creation Date: 2016-12-15T19:51:58Z
   Registry Expiry Date: 2024-12-15T19:51:58Z
   Registrar: INWX GmbH
   Registrar IANA ID: 1420
   Registrar Abuse Contact Email: abuse@inwx.com
   Registrar Abuse Contact Phone: +49.30983212123
   Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
   Name Server: NS21.CLOUDNS.NET
   Name Server: NS23.CLOUDNS.NET
   Name Server: NS24.CLOUDNS.NET
   DNSSEC: unsigned
   URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2024-07-25T03:22:21Z <<<

Sources: whois utility generated at 2024-07-24 23:23:13

Organization Website and Nature Check

https://amune.org/ not accessible.

Sources:

_psl TXT Record

Responses from multiple DNS servers for the _psl TXT record of the domain:

Response from 8.8.8.8: empty

Response from 1.1.1.1: empty

Response from 208.67.222.222: empty

Sources: dig command using DNS servers: Google (8.8.8.8), Cloudflare (1.1.1.1), OpenDNS (208.67.222.222)

Root-level Domain Usage Scan

As a potential indicator of domain usage, we scan the following records:

NS records (t3l3p0rt.net) returns ns23.cloudns.net. ns21.cloudns.net.

Additionally, we scan the following records for possible website usage at the root level:

A record (t3l3p0rt.net) returns `` empty

A record (www.t3l3p0rt.net) returns `` empty

MX records (t3l3p0rt.net) returns `` empty

Sources: dig command for A, NS, and MX records

Search Engine Checks

For possible website usage, we queried multiple different search engines:

image image image image image

Sources:

Subdomain Discovery

For potential usage of subdomains that are not discovered by the search engines, we used the following tools and here are the obtained observations:

None with IP

image

Sources:

crt.sh Certificate Transparency Logs

For potential website usage of subdomains that are not discovered by the search engines, we checked the Certificate Transparency Logs and here are the obtained observations:

None still valid

image

Sources:

VirusTotal Check

To check for possible security issues, we used VirusTotal and here are the obtained observations:

OK

image

Sources:

groundcat commented 1 month ago

tele.amune.org:

WHOIS

possibly still under control of original requester if it hadn't been transferred.

Please read the original WHOIS records below:

Domain Name: amune.org
Registry Domain ID: 8492d39973e3482d876d0c47a21aa383-LROR
Registrar WHOIS Server: https://www.inwx.de/de/domain/whois
Registrar URL: http://www.domrobot.com/
Updated Date: 2024-07-11T13:27:38Z
Creation Date: 2014-07-11T13:27:14Z
Registry Expiry Date: 2025-07-11T13:27:14Z
Registrar: INWX GmbH
Registrar IANA ID: 1420
Registrar Abuse Contact Email: [abuse@inwx.com](mailto:abuse@inwx.com)
Registrar Abuse Contact Phone: +49.3098321212
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: autoRenewPeriod https://icann.org/epp#autoRenewPeriod
Registry Registrant ID: REDACTED FOR PRIVACY
>>> Last update of WHOIS database: 2024-07-25T03:26:59Z <<<

Sources: whois utility generated at 2024-07-24 23:27:09

_psl TXT Record

Responses from multiple DNS servers for the _psl TXT record of the domain:

Response from 8.8.8.8: ``

Response from 1.1.1.1: ``

Response from 208.67.222.222: ``

Sources: dig command using DNS servers: Google (8.8.8.8), Cloudflare (1.1.1.1), OpenDNS (208.67.222.222)

Root-level Domain Usage Scan

As a potential indicator of domain usage, we scan the following records:

NS records (tele.amune.org) returns ``

Additionally, we scan the following records for possible website usage at the root level:

A record (tele.amune.org) returns ``

A record (www.tele.amune.org) returns ``

MX records (tele.amune.org) returns ``

Sources: dig command for A, NS, and MX records

Search Engine Checks

For possible website usage, we queried multiple different search engines:

image image image image image

Sources:

Subdomain Discovery

For potential usage of subdomains that are not discovered by the search engines, we used the following tools and here are the obtained observations:

image

Sources:

crt.sh Certificate Transparency Logs

For potential website usage of subdomains that are not discovered by the search engines, we checked the Certificate Transparency Logs and here are the obtained observations:

None valid today

image

Sources:

VirusTotal Check

To check for possible security issues, we used VirusTotal and here are the obtained observations:

OK

image image

Sources:

dnsguru commented 1 month ago