Nothing malicious here, I just stumbled on bad code (similar to the wrong example) in the wild in my spare time and wanted to showcase/POC the problem in a tongue-in-cheek real-world example with this page If that's a problem you can reach out to me -- Andreas Loibl (who/aloibl) <mail@aloibl.de>![]()
Please ensure that the implementation of your verification is done in a correct way.
Naively trusting rDNS is definitely wrong.