Do you know about decimal formats and websites?

Over the years, you have learned that you can go to a website by simply typing the name of the website.  Such as –

Did you know if you ping it, it will return the webserver’s address and you can use it to surf the web?

You can use this to troubleshoot your ISP.  How?  If your internet appears to be down, simple ping one of you favorite sites and then put the IP address into a browser.  If you can get to the website by doing this, more than likely your ISP’s DNS is down.

Now, did you know you can convert it to a decimal format and go to the website by typing the decimal value?


As mysterious as this may seem, networking gets even more complex.  DNS entries determine the name resolution to IP address.   Webservers can be clustered and have different entries for the hundreds or even thousands of variations of naming conventions.

The network command NSLookup can be used to see these servers.   Example:  Go to a command prompt – type
NSLookup and you’ll see multiple servers.



Non-authoritative answer:

If you ever get a decimal format in an email header and you wish to report the address as spam or as an abusive email, you can decoded it here.

To convert an IP address to a decimal format, use this site.

Here’s another small lesson using NSLookup.  Did you know you can find the email server’s information for more troubleshooting?  How?

First type nslookup and hit enter, then set the type by typing set type=mx and enter again.  Next type the website address and hit enter.

Default Server:

> set type=mx

Non-authoritative answer: MX preference = 10, mail exchanger =

For more information on set type, visit Microsoft’s TechNet Library.

About TCAT Shelbyville IT Department

The Tennessee College of Applied Technology - is one of 46 institutions in the Tennessee Board of Regents System, the seventh largest system of higher education in the nation. This system comprises six universities, fourteen community colleges, and twenty-six Applied Technology Colleges.
This entry was posted in Computer Security, Computers, Information Technology, Internet, network, Networking and tagged , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s