- Scan ID:
- df86ad2b-25e5-4cf8-93ca-3ced5ae1b840Finished
- Submitted URL:
- https://www.dnscheck.tools/
- Report Finished:
Links · 12 found
The outgoing links identified from the page
Link | Text |
---|---|
https://info.addr.tools/104.28.154.61 | 104.28.154.61 |
https://info.addr.tools/2a09:bac1:2380:1138::16f:85 | 2a09:bac1:2380:1138::16f:85 |
https://info.addr.tools/172.70.61.23 | 172.70.61.23 |
https://info.addr.tools/2400:cb00:367:1024::ac46:3d17 | 2400:cb00:367:1024::ac46:3d17 |
https://www.addr.tools/ | addr.tools |
https://en.wikipedia.org/wiki/DNS_leak | DNS leaks |
https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions | DNSSEC |
https://www.reddit.com/user/dnschecktool | u/dnschecktool |
https://github.com/brianshea2/addr.tools | GitHub |
https://www.arin.net/resources/registry/whois/rdap/ | Registration Data Access Protocol |
JavaScript Variables · 3 found
Global JavaScript variables loaded on the window object of a page, are variables declared outside of functions and accessible from anywhere in the code within the current scope
Name | Type |
---|---|
onbeforetoggle | string |
documentPictureInPicture | string |
onscrollend | string |
Console log messages · 146 found
Messages logged to the web console
Type | Category | Log |
---|---|---|
log | other |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
error | network |
|
log | javascript |
|
log | javascript |
|
log | javascript |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
error | network |
|
HTML
The raw HTML body of the page
<!DOCTYPE html><html lang="en" style="--ip-min-width: 29ch; --ptr-min-width: 27ch; --geo-min-width: 18ch;"><head><meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <meta name="description" content="A tool to test for DNS leaks, DNSSEC validation, and more"> <meta name="robots" content="noarchive"> <title>dnscheck.tools - check your dns resolvers</title> <link rel="icon" type="image/svg+xml" href="/favicon.svg"> <link rel="stylesheet" href="/main.css"> <script type="module" src="/main.js"></script> </head><body><header> <h1><a href="https://www.dnscheck.tools/">dnscheck.tools</a></h1> <nav> <a class="tab active" id="tab-results" href="#">Results</a> <a class="tab" id="tab-more" href="#more">About</a> </nav> </header> <div class="content active" id="content-results" data-nosnippet=""> <div class="content-inner gap-2"> <div class="section" id="connection-results"><div class="dialogue">Hello! Your public IP addresses are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/104.28.154.61" target="_blank">104.28.154.61</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">MNT-CLOUDFLARE</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2a09:bac1:2380:1138::16f:85" target="_blank">2a09:bac1:2380:1138::16f:85</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div> <div class="section hidden" id="ecs-results"> <div class="dialogue">Your DNS resolvers provide partial client IP address information (ECS):</div> </div> <div class="section" id="resolver-results"><div class="dialogue">Your DNS resolvers are:</div><div class="subtitle bold">Cloudflare</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/172.70.61.23" target="_blank">172.70.61.23</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: cruz.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul><div class="subtitle bold">CLOUDFLARE_2400_CB00_0000_36</div><ul class="ip-list"><li><span><a href="https://info.addr.tools/2400:cb00:367:1024::ac46:3d17" target="_blank">2400:cb00:367:1024::ac46:3d17</a></span> <span class="violet"><span title="Authoritative nameserver over the reverse zone">ns: chloe.ns.cloudflare.com</span></span> <span class="indigo"><span>Madrid, Madrid, ES</span></span></li></ul></div> <div class="section" id="dnssec-results"><div class="dialogue">Great! Your DNS responses are authenticated with DNSSEC:</div><div><table class="dnssec"><thead><tr><th></th><th>ECDSA <span class="nowrap">P-256</span></th><th>ECDSA <span class="nowrap">P-384</span></th><th>Ed25519</th></tr></thead><tbody><tr><th>Good signature</th><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td><td><span class="green" title="Pass (connected)">✓</span></td></tr><tr><th>Bad signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Expired signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr><tr><th>Missing signature</th><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td><td><span class="green" title="Pass (not connected)">✓</span></td></tr></tbody></table></div></div> <div class="section"> <div class="dialogue">See more tools at <a href="https://www.addr.tools/">addr.tools</a></div> </div> </div> </div> <div class="content" id="content-more"> <div class="content-inner"> <div class="section"> <h2>ABOUT</h2> <p> dnscheck.tools is a tool to test for <a href="https://en.wikipedia.org/wiki/DNS_leak">DNS leaks</a>, <a href="https://en.wikipedia.org/wiki/Domain_Name_System_Security_Extensions">DNSSEC</a> validation, and more. </p></div> <div class="section"> <h2>USAGE</h2> <p> Load <a href="https://www.dnscheck.tools/">dnscheck.tools</a> in any web browser to identify your current DNS resolvers and check DNSSEC validation. </p><h3>DNS TEST QUERIES</h3> <p> dnscheck.tools is also a custom DNS test server! Make test queries like: </p><p class="break"> $ dig <span class="bold">[SUBDOMAIN.]go[-ALG][-NET].dnscheck.tools</span> TXT </p><h3>SUBDOMAIN</h3> <p> The SUBDOMAIN is composed of DNS response options, separated by a hyphen. Options may include: </p><ul class="d-flex-col gap-1 indent"> <li>any of: <ul class="indent"> <li><b><i><random></i></b> - a random number, up to 8 hexadecimal digits; useful for cache busting </li><li><b>compress</b> - force the use of DNS message compression in the response </li><li><b>[no]truncate</b> - force or disable message truncation for responses over UDP </li><li><b>watch</b> - mirror corresponding requests to the <a href="/watch">/watch/<i><random></i></a> page; requires <i><random></i> </li></ul> </li><li>up to one of: <ul class="indent"> <li><b>padding<i><n></i></b> - add <i><n></i> bytes of EDNS0 padding, up to 4000, to A, AAAA, and TXT responses </li><li><b>txtfill<i><n></i></b> - add <i><n></i> bytes of padding as TXT data, up to 4000, to TXT responses </li></ul> </li><li>up to one of: <ul class="indent"> <li><b>formerr</b> - respond with "format error" </li><li><b>servfail</b> - respond with "server failure" </li><li><b>nxdomain</b> - respond with "non-existent domain" </li><li><b>notimpl</b> - respond with "not implemented" </li><li><b>refused</b> - respond with "query refused" </li><li><b>noreply</b> - do not respond </li></ul> </li><li>up to one of: <ul class="indent"> <li><b>nosig</b> - do not provide any DNSSEC signature in the response </li><li><b>badsig</b> - provide an invalid DNSSEC signature when signing the response </li><li><b>expiredsig[<i><t></i>]</b> - provide an expired DNSSEC signature when signing the response, <i><t></i> seconds in the past (default 1 day) </li></ul> </li></ul> <h3>ALG & NET</h3> <p> The zone, <span class="nowrap">go[-ALG][-NET]</span>, sets DNSSEC signing and network options. </p><ul class="d-flex-col gap-1 indent"> <li>ALG may be one of: <ul class="indent"> <li><b>alg13</b> - sign the zone using ECDSA P-256 with SHA-256 (default) </li><li><b>alg14</b> - sign the zone using ECDSA P-384 with SHA-384 </li><li><b>alg15</b> - sign the zone using Ed25519 </li><li><b>unsigned</b> - do not sign the zone </li></ul> </li><li>NET may be one of: <ul class="indent"> <li><b>ipv4</b> - offer only IPv4 authoritative nameservers </li><li><b>ipv6</b> - offer only IPv6 authoritative nameservers </li></ul> </li></ul> <p> The zone "go" is equivalent to "go-alg13" and has both IPv4 and IPv6 authoritative nameservers. </p><h3>EXAMPLES</h3> <p> See some information about your DNS resolvers: </p><p class="break"> $ dig go.dnscheck.tools TXT </p><p> For our Windows friends: </p><p class="break"> > nslookup -q=TXT go.dnscheck.tools </p><p> Getting cached results? Introduce a random number: </p><p class="break"> $ dig 123456.go.dnscheck.tools TXT </p><p> Test if your resolvers are validating DNSSEC. This should produce an error: </p><p class="break"> $ dig badsig-123456.go.dnscheck.tools TXT </p><p> Want to watch a stream of DNS requests coming from your resolvers? Goto dnscheck.tools/watch/123456 and specify the watch option: </p><p class="break"> $ dig watch-123456.go.dnscheck.tools TXT </p></div> <div class="section"> <h2>SEE ALSO</h2> <p> <a href="https://www.addr.tools/">addr.tools</a> </p></div> <div class="section"> <h2>CONTACT</h2> <p> On reddit, <a href="https://www.reddit.com/user/dnschecktool">u/dnschecktool</a> </p></div> <div class="section"> <h2>SOURCE</h2> <p> See <a href="https://github.com/brianshea2/addr.tools">GitHub</a>. Bug reports and pull requests welcome. </p></div> <div class="section"> <h2>THIRD-PARTY DATA</h2> <p> IP addresses are grouped by their network registrants as discovered by the <a href="https://www.arin.net/resources/registry/whois/rdap/">Registration Data Access Protocol</a>. </p><p> Hostnames (pointer records) and authoritative nameservers are discovered by <a href="https://en.wikipedia.org/wiki/Reverse_DNS_lookup">reverse DNS resolution</a>. </p><p> IP geolocation data is provided by <a href="https://ipinfo.io/">ipinfo.io</a>. </p></div> <div class="section"> <h2>PRIVACY POLICY</h2> <p> No personal data is collected. This site doesn't use cookies. Cheers! </p></div> </div> </div> <div class="status active" id="status-results" data-nosnippet=""> <div> <span id="rtt-status" class="" title="Average DNS resolution time"><span class="green">76ms</span></span> <span id="edns-status"><span class="green" title="Extension Mechanisms for DNS Advertised UDP buffer sizes: 1452">EDNS</span></span> <span id="dnssec-status"><span class="green" title="DNS Security Extensions Your DNS responses are authenticated">DNSSEC</span></span> <span id="ipv6-status"><span class="green" title="Your DNS resolvers connect to nameservers over IPv6">IPv6</span></span> <span id="tcp-status"></span> </div> <div> <span class="nowrap" title="Total DNS requests received and analyzed from your resolvers"> dns: <span id="count" class="">76</span> </span> </div> </div> </body></html>