Выглядет это дело примерно так:
on 1:DNS:{ var %n = $dns(0) while (%n > 0) { if (dnsbl.dronebl.org isin $dns(%n)) { var %ipbl $gettok($raddress,4,46) if (%ipbl == 2) var %blreason = Sample if (%ipbl == 3) var %blreason = IRC Drone if (%ipbl == 5) var %blreason = Bottler if (%ipbl == 6) var %blreason = Unknown spambot or drone if (%ipbl == 7) var %blreason = DDOS Drone if (%ipbl == 8) var %blreason = SOCKS Proxy if (%ipbl == 9) var %blreason = HTTP Proxy if (%ipbl == 10) var %blreason = ProxyChain if (%ipbl == 12) var %blreason = Trolls (perm) if (%ipbl == 13) var %blreason = Brute force attackers if (%ipbl == 255) var %blreason = Unknown .notice $me IP %dnsblip listed in dnsbl.dronebl.org with reason: %blreason $+ . See http://www.dronebl.org/lookup?ip= $+ %dnsblip for more info } dec %n } } menu channel { DNSBL Check IP:/dnsbl $$?="Введите IP" } alias dnsbl { if ($1) { set %dnsblip $1 dns $gettok(%dnsblip,4,46) $+ . $+ $gettok(%dnsblip,3,46) $+ . $+ $gettok(%dnsblip,2,46) $+ . $+ $gettok(%dnsblip,1,46) $+ .dnsbl.dronebl.org } }
Пример:
/dnsbl 212.98.185.169
[18:14:09] -Xam- 212.98.185.169 Listed in dnsbl.dronebl.org with reason: HTTP Proxy. See http://www.dronebl.o...=212.98.185.169 for more info
© Xam, version 0.2 alpha.
Предложения и пожелания приветствуются.