Выглядет это дело примерно так:
on 1:DNS:{
var %n = $dns(0)
while (%n > 0) {
if (dnsbl.dronebl.org isin $dns(%n)) {
var %ipbl $gettok($raddress,4,46)
if (%ipbl == 2) var %blreason = Sample
if (%ipbl == 3) var %blreason = IRC Drone
if (%ipbl == 5) var %blreason = Bottler
if (%ipbl == 6) var %blreason = Unknown spambot or drone
if (%ipbl == 7) var %blreason = DDOS Drone
if (%ipbl == 8) var %blreason = SOCKS Proxy
if (%ipbl == 9) var %blreason = HTTP Proxy
if (%ipbl == 10) var %blreason = ProxyChain
if (%ipbl == 12) var %blreason = Trolls (perm)
if (%ipbl == 13) var %blreason = Brute force attackers
if (%ipbl == 255) var %blreason = Unknown
.notice $me IP %dnsblip listed in dnsbl.dronebl.org with reason: %blreason $+ . See http://www.dronebl.org/lookup?ip= $+ %dnsblip for more info
}
dec %n
}
}
menu channel {
DNSBL Check IP:/dnsbl $$?="Введите IP"
}
alias dnsbl {
if ($1) {
set %dnsblip $1
dns $gettok(%dnsblip,4,46) $+ . $+ $gettok(%dnsblip,3,46) $+ . $+ $gettok(%dnsblip,2,46) $+ . $+ $gettok(%dnsblip,1,46) $+ .dnsbl.dronebl.org
}
}Пример:
/dnsbl 212.98.185.169
[18:14:09] -Xam- 212.98.185.169 Listed in dnsbl.dronebl.org with reason: HTTP Proxy. See http://www.dronebl.o...=212.98.185.169 for more info
© Xam, version 0.2 alpha.
Предложения и пожелания приветствуются.











