TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Show HN: Backname.io – every IP address gets its own domain

46 pointsby Twixesover 1 year ago
I was setting up tests involving DNS resolution recently, where something like 127.0.0.1.service.foo would have been tremendously useful. Back in the day, I&#x27;d have used xip.io - but sadly that service died.<p>Well, every excuse is a good one when it comes to writing a DNS server! Backname.io joins nip.io and sslip.io in the wildcard DNS game.

12 comments

eyepeeveeover 1 year ago
Nice. I&#x27;ve seen other usecases for this.<p>Accessing an IPv4 address on a IPv6-only network with NAT64&#x2F;DNS64 is only possible if you access that IPv4 via a DNS name that resolves to the IPv4 address. DNS64 will turn your A record into an AAAA record, with the IPv4 address mapped to a v6 addrsss that the NAT64 layer knows how to &quot;undo&quot;.<p>I&#x27;ve seen others need this a few times in practice.
quickthrower2over 1 year ago
The problem is someone ends up using one of these in production. Then backname.io becomes an attractive target.<p>It would be cool to have it as a locally installed custom DNS resolver on the developers computer though.
评论 #37700800 未加载
评论 #37698503 未加载
YaBaover 1 year ago
I&#x27;m failing to see the utility of this if I still have to type the IP address. Also, it fails using local address like 192-168-1-1.backname.io where it might be usefull somehow, so, please explain. Thanks.
评论 #37694211 未加载
评论 #37694021 未加载
评论 #37697777 未加载
评论 #37712812 未加载
评论 #37699158 未加载
评论 #37699631 未加载
globular-toastover 1 year ago
xip.io was indeed useful. nip.io seems to still work.<p>Isn&#x27;t the main useful aspect that you can do xyz.1.2.3.4.backname.io where xyz is anything you want? Perhaps you set this up anyway, but would be worth mentioning.
评论 #37699556 未加载
eva_cananimover 1 year ago
There is also <a href="http:&#x2F;&#x2F;traefik.me&#x2F;" rel="nofollow noreferrer">http:&#x2F;&#x2F;traefik.me&#x2F;</a><p>There is <a href="https:&#x2F;&#x2F;ipq.co&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;ipq.co&#x2F;</a> and <a href="https:&#x2F;&#x2F;fdns.uk&#x2F;" rel="nofollow noreferrer">https:&#x2F;&#x2F;fdns.uk&#x2F;</a> that will let you create a name to point to a chosen ip.
ncrucesover 1 year ago
<a href="https:&#x2F;&#x2F;github.com&#x2F;ncruces&#x2F;keyless">https:&#x2F;&#x2F;github.com&#x2F;ncruces&#x2F;keyless</a> was my attempt to provide you with the necessary tools to build your own service that would not only:<p><pre><code> - give you a domain for any IP (even local IPs); - give you SSL on that domain (even local IPs!); - abide by Let&#x27;s Encrypt terms.</code></pre>
ttymckover 1 year ago
Does this serve the same purpose as .in-addr.arpa?
评论 #37694253 未加载
thefilmoreover 1 year ago
I can think of at least four reasons and security concerns not to use a service like this:<p>- Exposing a potentially private IP to an external service<p>- If testing local IPs, adds a requirement for an internet connection<p>- Must trust that it will always resolve to the actual IP not another one<p>- Requires your service to accept a hostname that it likely shouldn&#x27;t
评论 #37700965 未加载
plagiat0rover 1 year ago
Just by looking at the handler, it is not RFC compliant. I do not see SOA record being generated properly nor do I see a proper handling of nxdomain vs nodatae responses.<p>See RFC 2308.
评论 #37713848 未加载
pipo234over 1 year ago
&gt; 127-0-0-1.backname.io resolves to 127.0.0.1<p>Is this enough to fool Edge (Windows 10) into allowing you to view your local Apache development environment?
评论 #37691174 未加载
gitgudover 1 year ago
This is cool! So I can spin up a server, then instantly get a domain and then an SSL cert, nice!
评论 #37701033 未加载
评论 #37698161 未加载
theyknowitsxmasover 1 year ago
<a href="http:&#x2F;&#x2F;afraid.org" rel="nofollow noreferrer">http:&#x2F;&#x2F;afraid.org</a>