www.dnscheck.tools Open in urlscan Pro
116.203.95.251  Public Scan

Submitted URL: http://dnscheck.tools/
Effective URL: https://www.dnscheck.tools/
Submission: On October 31 via manual from US — Scanned from IT

Form analysis 0 forms found in the DOM

Text Content

DNSCHECK.TOOLS

Results About
Hello! Your public IP addresses are:
Global Router
 * 185.198.62.147 ns: pri.authdns.ripe.net Milan, Lombardy, IT

Your DNS resolvers provide partial client IP address information (ECS):
HOS-GUN
 * 88.99.213.0/24 Falkenstein, Saxony, DE

Your DNS resolvers are:
Google
 * 172.217.33.151 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.217.33.155 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.217.33.213 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.217.33.218 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.217.33.221 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.253.1.218 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.253.1.219 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.253.1.220 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 172.253.1.222 ns: ns1.google.com Frankfurt am Main, Hesse, DE

MNT-GOOG-PROD
 * 2a00:1450:4001:c00::121 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c02::120 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c02::123 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c02::124 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c02::127 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c02::12c ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c07::123 ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c07::12a ns: ns1.google.com Frankfurt am Main, Hesse, DE
 * 2a00:1450:4001:c07::12d ns: ns1.google.com Frankfurt am Main, Hesse, DE

Your DNS security:

pending...

See more tools at addr.tools


ABOUT

dnscheck.tools is a tool to test for DNS leaks, DNSSEC validation, and more.


USAGE

Load dnscheck.tools in any web browser to identify your current DNS resolvers
and check DNSSEC validation.


DNS TEST QUERIES

dnscheck.tools is also a custom DNS test server! Make test queries like:

$ dig [SUBDOMAIN.]go[-ALG][-NET].dnscheck.tools TXT


SUBDOMAIN

The SUBDOMAIN is composed of DNS response options, separated by a hyphen.
Options may include:

 * any of:
   * <random> - a random number, up to 8 hexadecimal digits; useful for cache
     busting
   * compress - force the use of DNS message compression in the response
   * [no]truncate - force or disable message truncation for responses over UDP
   * watch - mirror corresponding requests to the /watch/<random> page; requires
     <random>
 * up to one of:
   * padding<n> - add <n> bytes of EDNS0 padding, up to 4000, to A, AAAA, and
     TXT responses
   * txtfill<n> - add <n> bytes of padding as TXT data, up to 4000, to TXT
     responses
 * up to one of:
   * formerr - respond with "format error"
   * servfail - respond with "server failure"
   * nxdomain - respond with "non-existent domain"
   * notimpl - respond with "not implemented"
   * refused - respond with "query refused"
   * noreply - do not respond
   * nullip - respond with all-zero IP (0.0.0.0 for A; :: for AAAA)
 * up to one of:
   * nosig - do not provide any DNSSEC signature in the response
   * badsig - provide an invalid DNSSEC signature when signing the response
   * expiredsig[<t>] - provide an expired DNSSEC signature when signing the
     response, <t> seconds in the past (default 1 day)


ALG & NET

The zone, go[-ALG][-NET], sets DNSSEC signing and network options.

 * ALG may be one of:
   * alg13 - sign the zone using ECDSA P-256 with SHA-256 (default)
   * alg14 - sign the zone using ECDSA P-384 with SHA-384
   * alg15 - sign the zone using Ed25519
   * unsigned - do not sign the zone
 * NET may be one of:
   * ipv4 - offer only IPv4 authoritative nameservers
   * ipv6 - offer only IPv6 authoritative nameservers

The zone "go" is equivalent to "go-alg13" and has both IPv4 and IPv6
authoritative nameservers.


EXAMPLES

See some information about your DNS resolvers:

$ dig go.dnscheck.tools TXT

For our Windows friends:

> nslookup -q=TXT go.dnscheck.tools

Getting cached results? Introduce a random number:

$ dig 123456.go.dnscheck.tools TXT

Test if your resolvers are validating DNSSEC. This should produce an error:

$ dig badsig-123456.go.dnscheck.tools TXT

Want to watch a stream of DNS requests coming from your resolvers? Goto
dnscheck.tools/watch/123456 and specify the watch option:

$ dig watch-123456.go.dnscheck.tools TXT


SEE ALSO

addr.tools


CONTACT

On reddit, u/dnschecktool


SOURCE

See GitHub. Bug reports and pull requests welcome.


THIRD-PARTY DATA

IP addresses are grouped by their network registrants as discovered by the
Registration Data Access Protocol.

Hostnames (pointer records) and authoritative nameservers are discovered by
reverse DNS resolution.

IP geolocation data is provided by ipinfo.io.


PRIVACY POLICY

No personal data is collected. This site doesn't use cookies. Cheers!

EDNS IPv6
dns: 18