『原创』再谈用 php 实现域名 whois 信息查询
之前为了做 《plog.cn 1-6位 超期待删 短域名 筛查工具》,特地在 plog.cn 服务器上部署了一个 whois 查询小工具。PS:使用方法 http://plog.cn/whois/yourdomain.com
为了实现这个 whois 小工具,查了足足有两个小时的资料,网上有很多种 whois查询 的php实现,大致实现的思路无不例外以下几种:
1.通过http调用 xinnet或者是万网的 whois查询接口查询,而后将结果输出到页面,博客 http://blog.163.com/mengqing_dao/blog/static/133520513201162634227882/ 所描述的方法,就是这种最简单的,通过间接调用新网 whois查询接口的实现方法
2.直接通过读取 whois服务器,实现域名的查询。文章 http://dev.meettea.com/show-78-1.html 阐述的方法,就是根据被查询域名的后缀名,访问不同的 whois服务器,查询结果
对应的 域名后缀 -> whois 服务器 的映射关系大致如下:
'com'=>'whois.internic.net', 'net'=>'whois.internic.net', 'org'=>'whois.pir.org', 'asia'=>'whois.crsnic.net', 'cn'=>'whois.cnnic.net.cn', 'cc'=>'whois.nic.cc',对于这种方法,虽然实现起来很简单,但是对于在Godaddy.com平台或者是国内的厦门易名网注册的 域名来说,只能查到一个大概,而无法查到具体真正的 domain 的信息,如下:
在godday注册的域名的whois信息
在厦门易名网注册的域名的whois信息
所以,无论上面两种方法,都不能比较完善的实现 whois 的查询功能。
这时候 Jay感觉到,仅仅是 whois 这件小事,也需要用牛刀,我们需要一个完善 whois查询组件。
此时的 Jay立刻打开 google.com,搜索 php whois,果不其然!
在 百度中,搜了半天,出来的都是一些外门奇方,google一搜,就立马出现一套完整的 whois client 的 php 实现,项目名称就叫《phpWhois》,项目主页:http://www.phpwhois.org/ ,于是立马 download 下来,根据文档中的 demo,很快就把 whois 的查询功能实现了。
下面是调用 phpWhois 组件,实现 whois信息查询的核心代码部分:
<pre class="brush:php;toolbar:false"><?phpinclude('whois_inc/whois.main.php');$whois =newWhois();$result = $whois->Lookup($domain);$output = implode("\n", $result['rawdata']);echo $output;?>
在这里
DomainName: lxfq.cnROID:20130114s10001s62921725-cnDomainStatus: okRegistrant ID:000046dbRegistrant:黎军RegistrantContactEmail:2673732891@qq.comSponsoringRegistrar:北京网尊科技有限公司NameServer: ns1.vtopchina.cnNameServer: ns2.vtopchina.cnRegistrationDate:2013-01-1404:02:16ExpirationDate:2014-01-1404:02:16DNSSEC:unsigned
总结:
whois虽然仅仅只是一种最简单的基于 tcp 的查询协议,但是很多工作,即便我们实现起来也非常简单,如果有现成的 php组件可以用的话,就应该尽量避免自己重复发明一个轮子。倒不是说不可以,只是重新实现一种协议,即便是最简单的那种,也会遇到很多的例外。
就像 phpWhois 组件,争对godaddy类似这种的例外情况,就处理的非常好。
所以,专业的事情,还是让专业的开源组件去实现吧!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.

The article discusses adding custom functionality to frameworks, focusing on understanding architecture, identifying extension points, and best practices for integration and debugging.

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.
