Solved

Script to resolve hostnames to Ip addresses

Posted on 2009-04-09
4
1,406 Views
Last Modified: 2013-11-09
Hello,
do you have or know how to do a simple script that:

-reads a .txt file with hostnames, one per line
-creates a .txt or CSV file with the IP addresses one per line or hostname and IP addresses in one line, one per line.

Thanks
0
Comment
Question by:security_guy
  • 2
  • 2
4 Comments
 
LVL 38

Expert Comment

by:Shift-3
ID: 24107063
Paste the script below into a text file with a .cmd extension.  Customize the value of the input variable on line 4 with the location of the list of hostnames.  Running the script will resolve the names and write output to a .csv file.


@echo off

setlocal enabledelayedexpansion
 

set input=computerlist.txt

set output=report.csv
 

for /F %%G in ('type "%input%"') do (

 set ip=

 for /F "tokens=2 skip=1" %%H in ('nslookup %%G 2^>NUL^|find "Address:"') do (

  set ip=%%H

 )

 echo %%G,!ip!>>"%output%"

)

Open in new window

0
 

Author Comment

by:security_guy
ID: 24107419
oh,, thank you a lot!!

Anyway i can see that it resolves only some hosts. For example my hostname is not resolving, google, and other web sites are not resolving.
Are not resolving web sites with only 1 address and also those with more than one address.

But it resolved "localhost" :)
0
 
LVL 38

Accepted Solution

by:
Shift-3 earned 500 total points
ID: 24108657
Revised to handle multiple addresses.


@echo off

setlocal enabledelayedexpansion
 

set input=computerlist.txt

set output=report.csv
 

for /F %%G in ('type "%input%"') do (

 set ip=

 

 for /F "tokens=* skip=2" %%H in ('nslookup %%G 2^>NUL') do (

  set line=%%H

  if "!line:~0,8!"=="Address:" set ip=!line:~10!

  if "!line:~0,10!"=="Addresses:" set ip=!line:~12!

 )

 

 echo %%G,!ip!>>"%output%"

)

Open in new window

0
 

Author Comment

by:security_guy
ID: 24109575
Thank you very much!!!!!!!!!!!!!!!!!!!!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In this tutorial I will show you how to provide a dynamic RTF document on your website generated with data from your database. For this tutorial you will need Microsoft Word or WordPad, WhizBase and Microsoft Access. In this tutorial I will show …
I hope you'll find this tutorial useful and interesting. So let's try to extend Tcl with a new package.  For anyone more deeply interested please check out the book "Practical Programming in Tcl and Tk". It's really one of the best written books abo…
The viewer will learn how to dynamically set the form action using jQuery.
The viewer will learn how to count occurrences of each item in an array.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now