Home Backend Development PHP Tutorial 『原创』再谈用 php 实现域名 whois 信息查询

『原创』再谈用 php 实现域名 whois 信息查询

Jun 23, 2016 pm 02:29 PM

        之前为了做 《plog.cn 1-6位 超期待删 短域名 筛查工具》,特地在 plog.cn 服务器上部署了一个 whois 查询小工具。PS:使用方法 http://plog.cn/whois/yourdomain.com

        为了实现这个 whois 小工具,查了足足有两个小时的资料,网上有很多种 whois查询 的php实现,大致实现的思路无不例外以下几种:

        1.通过http调用 xinnet或者是万网的 whois查询接口查询,而后将结果输出到页面,博客 http://blog.163.com/mengqing_dao/blog/static/133520513201162634227882/ 所描述的方法,就是这种最简单的,通过间接调用新网 whois查询接口的实现方法

        2.直接通过读取 whois服务器,实现域名的查询。文章 http://dev.meettea.com/show-78-1.html 阐述的方法,就是根据被查询域名的后缀名,访问不同的 whois服务器,查询结果

        对应的 域名后缀 -> whois 服务器 的映射关系大致如下:

'com'=>'whois.internic.net',    'net'=>'whois.internic.net',    'org'=>'whois.pir.org',    'asia'=>'whois.crsnic.net',  'cn'=>'whois.cnnic.net.cn',    'cc'=>'whois.nic.cc',   

        对于这种方法,虽然实现起来很简单,但是对于在Godaddy.com平台或者是国内的厦门易名网注册的 域名来说,只能查到一个大概,而无法查到具体真正的 domain 的信息,如下:

在godday注册的域名的whois信息

在厦门易名网注册的域名的whois信息

        所以,无论上面两种方法,都不能比较完善的实现 whois 的查询功能。

        这时候 Jay感觉到,仅仅是 whois 这件小事,也需要用牛刀,我们需要一个完善 whois查询组件。

        此时的 Jay立刻打开 google.com,搜索 php whois,果不其然!

        在 百度中,搜了半天,出来的都是一些外门奇方,google一搜,就立马出现一套完整的 whois client 的 php 实现,项目名称就叫《phpWhois》,项目主页:http://www.phpwhois.org/ ,于是立马 download 下来,根据文档中的 demo,很快就把 whois 的查询功能实现了。

        下面是调用 phpWhois 组件,实现 whois信息查询的核心代码部分:

<pre class="brush:php;toolbar:false"><?phpinclude('whois_inc/whois.main.php');$whois =newWhois();$result = $whois->Lookup($domain);$output = implode("\n", $result['rawdata']);echo $output;?>
Copy after login

在这里

Copy after login
标签的作用是定义预格式化的文本,就是将 whois 查询到的 raw text 按原来的文本排版格式直接输出。

DomainName: lxfq.cnROID:20130114s10001s62921725-cnDomainStatus: okRegistrant ID:000046dbRegistrant:黎军RegistrantContactEmail:2673732891@qq.comSponsoringRegistrar:北京网尊科技有限公司NameServer: ns1.vtopchina.cnNameServer: ns2.vtopchina.cnRegistrationDate:2013-01-1404:02:16ExpirationDate:2014-01-1404:02:16DNSSEC:unsigned
Copy after login

总结:

        whois虽然仅仅只是一种最简单的基于 tcp 的查询协议,但是很多工作,即便我们实现起来也非常简单,如果有现成的 php组件可以用的话,就应该尽量避免自己重复发明一个轮子。倒不是说不可以,只是重新实现一种协议,即便是最简单的那种,也会遇到很多的例外。

        就像 phpWhois 组件,争对godaddy类似这种的例外情况,就处理的非常好。

        所以,专业的事情,还是让专业的开源组件去实现吧!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
4 weeks ago By 尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Explain the concept of late static binding in PHP. Explain the concept of late static binding in PHP. Mar 21, 2025 pm 01:33 PM

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Framework Security Features: Protecting against vulnerabilities. Framework Security Features: Protecting against vulnerabilities. Mar 28, 2025 pm 05:11 PM

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

Customizing/Extending Frameworks: How to add custom functionality. Customizing/Extending Frameworks: How to add custom functionality. Mar 28, 2025 pm 05:12 PM

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

How to send a POST request containing JSON data using PHP's cURL library? How to send a POST request containing JSON data using PHP's cURL library? Apr 01, 2025 pm 03:12 PM

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How does session hijacking work and how can you mitigate it in PHP? How does session hijacking work and how can you mitigate it in PHP? Apr 06, 2025 am 12:02 AM

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

See all articles