- ID scansione:
- df86ad2b-25e5-4cf8-93ca-3ced5ae1b840Fatto
- URL inviato:
- https://www.dnscheck.tools/
- Report terminato:
Link · 12 trovati
I link in uscita identificati dalla pagina
Link | Testo |
---|---|
https://info.addr.tools/104.28.154.61 | 104.28.154.61 |
https://info.addr.tools/2a09:bac1:2380:1138::16f:85 | 2a09:bac1:2380:1138::16f:85 |
https://info.addr.tools/172.70.61.23 | 172.70.61.23 |
https://info.addr.tools/2400:cb00:367:1024::ac46:3d17 | 2400:cb00:367:1024::ac46:3d17 |
https://www.addr.tools/ | addr.tools |
https://en.wikipedia.org/wiki/DNS_leak | DNS leaks |
https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions | DNSSEC |
https://www.reddit.com/user/dnschecktool | u/dnschecktool |
https://github.com/brianshea2/addr.tools | GitHub |
https://www.arin.net/resources/registry/whois/rdap/ | Registration Data Access Protocol |
Variabili JavaScript · 3 trovate
Le variabili JavaScript globali caricate sull'oggetto finestra di una pagina sono variabili dichiarate all'esterno delle funzioni e accessibili da qualsiasi punto del codice nell'ambito corrente
Nome | Tipo |
---|---|
onbeforetoggle | string |
documentPictureInPicture | string |
onscrollend | string |
Messaggi di log della console · 146 trovati
Messaggi registrati nella console Web
Tipo | Categoria | Log |
---|---|---|
log | other |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
HTML
Il corpo HTML non elaborato della pagina
<!DOCTYPE html><html lang="en" style="--ip-min-width: 29ch; --ptr-min-width: 27ch; --geo-min-width: 18ch;"><head><meta charset="utf-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<meta name="description" content="A tool to test for DNS leaks, DNSSEC validation, and more">
<meta name="robots" content="noarchive">
<title>dnscheck.tools - check your dns resolvers</title>
<link rel="icon" type="image/svg+xml" href="/favicon.svg">
<link rel="stylesheet" href="/main.css">
<script type="module" src="/main.js"></script>
</head><body><header>
<h1><a href="https://www.dnscheck.tools/">dnscheck.tools</a></h1>
<nav>
<a class="tab active" id="tab-results" href="#">Results</a>
<a class="tab" id="tab-more" href="#more">About</a>
</nav>
</header>
<div class="content active" id="content-results" data-nosnippet="">
<div class="content-inner gap-2">
<div class="section" id="connection-results"><div class="dialogue">Hello! Your public IP addresses are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/104.28.154.61" target="_blank">104.28.154.61</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">MNT-CLOUDFLARE</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2a09:bac1:2380:1138::16f:85" target="_blank">2a09:bac1:2380:1138::16f:85</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div>
<div class="section hidden" id="ecs-results">
<div class="dialogue">Your DNS resolvers provide partial client IP address information (ECS):</div>
</div>
<div class="section" id="resolver-results"><div class="dialogue">Your DNS resolvers are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/172.70.61.23" target="_blank">172.70.61.23</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">CLOUDFLARE_2400_CB00_0000_36</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2400:cb00:367:1024::ac46:3d17" target="_blank">2400:cb00:367:1024::ac46:3d17</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: chloe.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div>
<div class="section" id="dnssec-results"><div class="dialogue">Great! Your DNS responses are authenticated with DNSSEC:</div><div><table class="dnssec"><thead><tr><th></th><th>ECDSA <span class="nowrap">P-256</span></th><th>ECDSA <span class="nowrap">P-384</span></th><th>Ed25519</th></tr></thead><tbody><tr><th>Good signature</th><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td></tr><tr><th>Bad signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Expired signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Missing signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr></tbody></table></div></div>
<div class="section">
<div class="dialogue">See more tools at <a href="https://www.addr.tools/">addr.tools</a></div>
</div>
</div>
</div>
<div class="content" id="content-more">
<div class="content-inner">
<div class="section">
<h2>ABOUT</h2>
<p>
dnscheck.tools is a tool to test for <a href="https://en.wikipedia.org/wiki/DNS_leak">DNS leaks</a>,
<a href="https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">DNSSEC</a> validation, and more.
</p></div>
<div class="section">
<h2>USAGE</h2>
<p>
Load <a href="https://www.dnscheck.tools/">dnscheck.tools</a> in any web browser to identify your current DNS
resolvers and check DNSSEC validation.
</p><h3>DNS TEST QUERIES</h3>
<p>
dnscheck.tools is also a custom DNS test server! Make test queries like:
</p><p class="break">
$ dig <span class="bold">[SUBDOMAIN.]go[-ALG][-NET].dnscheck.tools</span> TXT
</p><h3>SUBDOMAIN</h3>
<p>
The SUBDOMAIN is composed of DNS response options, separated by a hyphen. Options may include:
</p><ul class="d-flex-col gap-1 indent">
<li>any of:
<ul class="indent">
<li><b><i><random></i></b> - a random number, up to 8 hexadecimal digits; useful for cache busting
</li><li><b>compress</b> - force the use of DNS message compression in the response
</li><li><b>[no]truncate</b> - force or disable message truncation for responses over UDP
</li><li><b>watch</b> - mirror corresponding requests to the <a href="/watch">/watch/<i><random></i></a>
page; requires <i><random></i>
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>padding<i><n></i></b> - add <i><n></i> bytes of EDNS0 padding, up to 4000, to A, AAAA,
and TXT responses
</li><li><b>txtfill<i><n></i></b> - add <i><n></i> bytes of padding as TXT data, up to 4000, to TXT
responses
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>formerr</b> - respond with "format error"
</li><li><b>servfail</b> - respond with "server failure"
</li><li><b>nxdomain</b> - respond with "non-existent domain"
</li><li><b>notimpl</b> - respond with "not implemented"
</li><li><b>refused</b> - respond with "query refused"
</li><li><b>noreply</b> - do not respond
</li></ul>
</li><li>up to one of:
<ul class="indent">
<li><b>nosig</b> - do not provide any DNSSEC signature in the response
</li><li><b>badsig</b> - provide an invalid DNSSEC signature when signing the response
</li><li><b>expiredsig[<i><t></i>]</b> - provide an expired DNSSEC signature when signing the response,
<i><t></i> seconds in the past (default 1 day)
</li></ul>
</li></ul>
<h3>ALG & NET</h3>
<p>
The zone, <span class="nowrap">go[-ALG][-NET]</span>, sets DNSSEC signing and network options.
</p><ul class="d-flex-col gap-1 indent">
<li>ALG may be one of:
<ul class="indent">
<li><b>alg13</b> - sign the zone using ECDSA P-256 with SHA-256 (default)
</li><li><b>alg14</b> - sign the zone using ECDSA P-384 with SHA-384
</li><li><b>alg15</b> - sign the zone using Ed25519
</li><li><b>unsigned</b> - do not sign the zone
</li></ul>
</li><li>NET may be one of:
<ul class="indent">
<li><b>ipv4</b> - offer only IPv4 authoritative nameservers
</li><li><b>ipv6</b> - offer only IPv6 authoritative nameservers
</li></ul>
</li></ul>
<p>
The zone "go" is equivalent to "go-alg13" and has both IPv4 and IPv6 authoritative nameservers.
</p><h3>EXAMPLES</h3>
<p>
See some information about your DNS resolvers:
</p><p class="break">
$ dig go.dnscheck.tools TXT
</p><p>
For our Windows friends:
</p><p class="break">
> nslookup -q=TXT go.dnscheck.tools
</p><p>
Getting cached results? Introduce a random number:
</p><p class="break">
$ dig 123456.go.dnscheck.tools TXT
</p><p>
Test if your resolvers are validating DNSSEC. This should produce an error:
</p><p class="break">
$ dig badsig-123456.go.dnscheck.tools TXT
</p><p>
Want to watch a stream of DNS requests coming from your resolvers?
Goto dnscheck.tools/watch/123456 and specify the watch option:
</p><p class="break">
$ dig watch-123456.go.dnscheck.tools TXT
</p></div>
<div class="section">
<h2>SEE ALSO</h2>
<p>
<a href="https://www.addr.tools/">addr.tools</a>
</p></div>
<div class="section">
<h2>CONTACT</h2>
<p>
On reddit, <a href="https://www.reddit.com/user/dnschecktool">u/dnschecktool</a>
</p></div>
<div class="section">
<h2>SOURCE</h2>
<p>
See <a href="https://github.com/brianshea2/addr.tools">GitHub</a>.
Bug reports and pull requests welcome.
</p></div>
<div class="section">
<h2>THIRD-PARTY DATA</h2>
<p>
IP addresses are grouped by their network registrants as discovered by the
<a href="https://www.arin.net/resources/registry/whois/rdap/">Registration Data Access Protocol</a>.
</p><p>
Hostnames (pointer records) and authoritative nameservers are discovered by
<a href="https://en.wikipedia.org/wiki/Reverse_DNS_lookup">reverse DNS resolution</a>.
</p><p>
IP geolocation data is provided by <a href="https://ipinfo.io/">ipinfo.io</a>.
</p></div>
<div class="section">
<h2>PRIVACY POLICY</h2>
<p>
No personal data is collected. This site doesn't use cookies. Cheers!
</p></div>
</div>
</div>
<div class="status active" id="status-results" data-nosnippet="">
<div>
<span id="rtt-status" class="" title="Average DNS resolution time"><span class="green">76ms</span></span>
<span id="edns-status"><span class="green" title="Extension Mechanisms for DNS
Advertised UDP buffer sizes: 1452">EDNS</span></span>
<span id="dnssec-status"><span class="green" title="DNS Security Extensions
Your DNS responses are authenticated">DNSSEC</span></span>
<span id="ipv6-status"><span class="green" title="Your DNS resolvers connect to nameservers over IPv6">IPv6</span></span>
<span id="tcp-status"></span>
</div>
<div>
<span class="nowrap" title="Total DNS requests received and analyzed from your resolvers">
dns: <span id="count" class="">76</span>
</span>
</div>
</div>
</body></html>