- ID de l'analyse :
- df86ad2b-25e5-4cf8-93ca-3ced5ae1b840Terminée
- URL soumise :
- https://www.dnscheck.tools/
- Fin du rapport :
Liens : 12 trouvé(s)
Liens sortants identifiés à partir de la page
Lien | texte |
---|---|
https://info.addr.tools/104.28.154.61 | 104.28.154.61 |
https://info.addr.tools/2a09:bac1:2380:1138::16f:85 | 2a09:bac1:2380:1138::16f:85 |
https://info.addr.tools/172.70.61.23 | 172.70.61.23 |
https://info.addr.tools/2400:cb00:367:1024::ac46:3d17 | 2400:cb00:367:1024::ac46:3d17 |
https://www.addr.tools/ | addr.tools |
https://en.wikipedia.org/wiki/DNS_leak | DNS leaks |
https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions | DNSSEC |
https://www.reddit.com/user/dnschecktool | u/dnschecktool |
https://github.com/brianshea2/addr.tools | GitHub |
https://www.arin.net/resources/registry/whois/rdap/ | Registration Data Access Protocol |
Variables JavaScript : 3 trouvée(s)
Les variables JavaScript globales chargées dans l'objet fenêtre d'une page sont des variables déclarées en dehors des fonctions et accessibles depuis n'importe quel endroit du code au sein du champ d'application actuel
Nom | Type |
---|---|
onbeforetoggle | string |
documentPictureInPicture | string |
onscrollend | string |
Messages de journal de console : 146 trouvé(s)
Messages consignés dans la console web
Type | Catégorie | Enregistrement |
---|---|---|
log | other |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
HTML
Le corps HTML de la page en données brutes
<!DOCTYPE html><html lang="en" style="--ip-min-width: 29ch; --ptr-min-width: 27ch; --geo-min-width: 18ch;"><head><meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="description" content="A tool to test for DNS leaks, DNSSEC validation, and more">
<meta name="robots" content="noarchive">
<title>dnscheck.tools - check your dns resolvers</title>
<link rel="icon" type="image/svg+xml" href="/favicon.svg">
<link rel="stylesheet" href="/main.css">
<script type="module" src="/main.js"></script>
</head><body><header>
<h1><a href="https://www.dnscheck.tools/">dnscheck.tools</a></h1>
<nav>
<a class="tab active" id="tab-results" href="#">Results</a>
<a class="tab" id="tab-more" href="#more">About</a>
</nav>
</header>
<div class="content active" id="content-results" data-nosnippet="">
<div class="content-inner gap-2">
<div class="section" id="connection-results"><div class="dialogue">Hello! Your public IP addresses are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/104.28.154.61" target="_blank">104.28.154.61</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">MNT-CLOUDFLARE</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2a09:bac1:2380:1138::16f:85" target="_blank">2a09:bac1:2380:1138::16f:85</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div>
<div class="section hidden" id="ecs-results">
<div class="dialogue">Your DNS resolvers provide partial client IP address information (ECS):</div>
</div>
<div class="section" id="resolver-results"><div class="dialogue">Your DNS resolvers are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/172.70.61.23" target="_blank">172.70.61.23</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">CLOUDFLARE_2400_CB00_0000_36</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2400:cb00:367:1024::ac46:3d17" target="_blank">2400:cb00:367:1024::ac46:3d17</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: chloe.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div>
<div class="section" id="dnssec-results"><div class="dialogue">Great! Your DNS responses are authenticated with DNSSEC:</div><div><table class="dnssec"><thead><tr><th></th><th>ECDSA <span class="nowrap">P-256</span></th><th>ECDSA <span class="nowrap">P-384</span></th><th>Ed25519</th></tr></thead><tbody><tr><th>Good signature</th><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td></tr><tr><th>Bad signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Expired signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Missing signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr></tbody></table></div></div>
<div class="section">
<div class="dialogue">See more tools at <a href="https://www.addr.tools/">addr.tools</a></div>
</div>
</div>
</div>
<div class="content" id="content-more">
<div class="content-inner">
<div class="section">
<h2>ABOUT</h2>
<p>
dnscheck.tools is a tool to test for <a href="https://en.wikipedia.org/wiki/DNS_leak">DNS leaks</a>,
<a href="https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">DNSSEC</a> validation, and more.
</p></div>
<div class="section">
<h2>USAGE</h2>
<p>
Load <a href="https://www.dnscheck.tools/">dnscheck.tools</a> in any web browser to identify your current DNS
resolvers and check DNSSEC validation.
</p><h3>DNS TEST QUERIES</h3>
<p>
dnscheck.tools is also a custom DNS test server! Make test queries like:
</p><p class="break">
$ dig <span class="bold">[SUBDOMAIN.]go[-ALG][-NET].dnscheck.tools</span> TXT
</p><h3>SUBDOMAIN</h3>
<p>
The SUBDOMAIN is composed of DNS response options, separated by a hyphen. Options may include:
</p><ul class="d-flex-col gap-1 indent">
<li>any of:
<ul class="indent">
<li><b><i><random></i></b> - a random number, up to 8 hexadecimal digits; useful for cache busting
</li><li><b>compress</b> - force the use of DNS message compression in the response
</li><li><b>[no]truncate</b> - force or disable message truncation for responses over UDP
</li><li><b>watch</b> - mirror corresponding requests to the <a href="/watch">/watch/<i><random></i></a>
page; requires <i><random></i>
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>padding<i><n></i></b> - add <i><n></i> bytes of EDNS0 padding, up to 4000, to A, AAAA,
and TXT responses
</li><li><b>txtfill<i><n></i></b> - add <i><n></i> bytes of padding as TXT data, up to 4000, to TXT
responses
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>formerr</b> - respond with "format error"
</li><li><b>servfail</b> - respond with "server failure"
</li><li><b>nxdomain</b> - respond with "non-existent domain"
</li><li><b>notimpl</b> - respond with "not implemented"
</li><li><b>refused</b> - respond with "query refused"
</li><li><b>noreply</b> - do not respond
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>nosig</b> - do not provide any DNSSEC signature in the response
</li><li><b>badsig</b> - provide an invalid DNSSEC signature when signing the response
</li><li><b>expiredsig[<i><t></i>]</b> - provide an expired DNSSEC signature when signing the response,
<i><t></i> seconds in the past (default 1 day)
</li></ul>
</li></ul>
<h3>ALG & NET</h3>
<p>
The zone, <span class="nowrap">go[-ALG][-NET]</span>, sets DNSSEC signing and network options.
</p><ul class="d-flex-col gap-1 indent">
<li>ALG may be one of:
<ul class="indent">
<li><b>alg13</b> - sign the zone using ECDSA P-256 with SHA-256 (default)
</li><li><b>alg14</b> - sign the zone using ECDSA P-384 with SHA-384
</li><li><b>alg15</b> - sign the zone using Ed25519
</li><li><b>unsigned</b> - do not sign the zone
</li></ul>
</li><li>NET may be one of:
<ul class="indent">
<li><b>ipv4</b> - offer only IPv4 authoritative nameservers
</li><li><b>ipv6</b> - offer only IPv6 authoritative nameservers
</li></ul>
</li></ul>
<p>
The zone "go" is equivalent to "go-alg13" and has both IPv4 and IPv6 authoritative nameservers.
</p><h3>EXAMPLES</h3>
<p>
See some information about your DNS resolvers:
</p><p class="break">
$ dig go.dnscheck.tools TXT
</p><p>
For our Windows friends:
</p><p class="break">
> nslookup -q=TXT go.dnscheck.tools
</p><p>
Getting cached results? Introduce a random number:
</p><p class="break">
$ dig 123456.go.dnscheck.tools TXT
</p><p>
Test if your resolvers are validating DNSSEC. This should produce an error:
</p><p class="break">
$ dig badsig-123456.go.dnscheck.tools TXT
</p><p>
Want to watch a stream of DNS requests coming from your resolvers?
Goto dnscheck.tools/watch/123456 and specify the watch option:
</p><p class="break">
$ dig watch-123456.go.dnscheck.tools TXT
</p></div>
<div class="section">
<h2>SEE ALSO</h2>
<p>
<a href="https://www.addr.tools/">addr.tools</a>
</p></div>
<div class="section">
<h2>CONTACT</h2>
<p>
On reddit, <a href="https://www.reddit.com/user/dnschecktool">u/dnschecktool</a>
</p></div>
<div class="section">
<h2>SOURCE</h2>
<p>
See <a href="https://github.com/brianshea2/addr.tools">GitHub</a>.
Bug reports and pull requests welcome.
</p></div>
<div class="section">
<h2>THIRD-PARTY DATA</h2>
<p>
IP addresses are grouped by their network registrants as discovered by the
<a href="https://www.arin.net/resources/registry/whois/rdap/">Registration Data Access Protocol</a>.
</p><p>
Hostnames (pointer records) and authoritative nameservers are discovered by
<a href="https://en.wikipedia.org/wiki/Reverse_DNS_lookup">reverse DNS resolution</a>.
</p><p>
IP geolocation data is provided by <a href="https://ipinfo.io/">ipinfo.io</a>.
</p></div>
<div class="section">
<h2>PRIVACY POLICY</h2>
<p>
No personal data is collected. This site doesn't use cookies. Cheers!
</p></div>
</div>
</div>
<div class="status active" id="status-results" data-nosnippet="">
<div>
<span id="rtt-status" class="" title="Average DNS resolution time"><span class="green">76ms</span></span>
<span id="edns-status"><span class="green" title="Extension Mechanisms for DNS
Advertised UDP buffer sizes: 1452">EDNS</span></span>
<span id="dnssec-status"><span class="green" title="DNS Security Extensions
Your DNS responses are authenticated">DNSSEC</span></span>
<span id="ipv6-status"><span class="green" title="Your DNS resolvers connect to nameservers over IPv6">IPv6</span></span>
<span id="tcp-status"></span>
</div>
<div>
<span class="nowrap" title="Total DNS requests received and analyzed from your resolvers">
dns: <span id="count" class="">76</span>
</span>
</div>
</div>
</body></html>