Shell Script
dig 이용 쉘 스크립트
Se Story
2014. 2. 13. 20:11
dig를 이용하기 위한 쉘 스크립트
#/bin/sh
echo ' 1. KINX-fs 203.246.160.226 2. KINX-ns 63.105.204.164 3. KT-DNS 168.126.63.1 4. SK-DNS 210.220.163.82 5. LG-DNS 164.124.107.9 6. GooGle DNS 8.8.8.8 '
echo -n "번호 선택 : " read no
echo -n "레코드 타입 : " read op
name="$op"
echo -n "레코드 입력 : " read red
name="$red"
case $no in
"1") dig @203.246.160.226 $op $red;;
"2") dig @63.105.204.164 $op $red;;
"3") dig @168.126.63.1 $op $red;;
"4") dig @210.220.163.82 $op $red;;
"5") dig @164.124.107.9 $op $red;;
"6") dig @8.8.8.8 $op $red;;
esac |
[root@RACK-Test ~]# ./dig-script.sh
1. KINX-fs 203.246.160.226 2. KINX-ns 63.105.204.164 3. KT-DNS 168.126.63.1 4. SK-DNS 210.220.163.82 5. LG-DNS 164.124.107.9 6. GooGle DNS 8.8.8.8
번호 선택 : 1 레코드 타입 : A 레코드 입력 : sestory.net
; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.17.rc1.el6_4.6 <<>> @203.246.160.226 A sestory.net ; (1 server found) ;; global options: +cmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 14276 ;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION: ;sestory.net. IN A
;; AUTHORITY SECTION: sestory.net. 1799 IN SOA ns11.dnstool.net. admin.sestory.net. 2011081911 14400 7200 3600000 86400
;; Query time: 262 msec ;; SERVER: 203.246.160.226#53(203.246.160.226) ;; WHEN: Fri Feb 14 05:06:59 2014 ;; MSG SIZE rcvd: 84 |