{{ domain }}
{{ steps.length }} Hops
{{ error }}
#ZoneNameservers / IP
{{ idx + 1 }} {{ s.zone || 'root (.)' }} {{ s.ns }}

            

Introduction:

The Domain Name System (DNS) resolves human-friendly domain names to machine-readable IP addresses through a delegated hierarchy of authoritative nameservers. Each query may cascade across the root zone, top-level domain (TLD), and successive sub-domains before returning an answer. Understanding this hop-by-hop delegation reveals latency causes, misconfigurations, or malicious tampering along the resolution path.

DNS Trace Analyzer automates that exploration by querying each zone’s NS record via DNS-over-HTTPS, following referrals until it collects the target’s authoritative addresses and any final A records. The tool converts raw answers into a structured hop list and colourful JSON so you can inspect delegation order and verify which server actually replied.

Network engineers, educators, and incident responders can quickly expose stale glue records, cyclic references, or hijacked nodes without opening command-line utilities. By visualising each hop, the tool clarifies whether delays occur at the root, registry, or authoritative layers. Because queries travel over encrypted HTTPS, corporate firewalls may still intercept or rate-limit them; run repeated traces judiciously in restricted environments.

Technical Details:

Concept Overview

The DNS trace process relies on iterative resolution, where each nameserver returns authoritative referrals instead of direct answers. Starting from the root (.), the resolver submits successive NS queries, dropping the left-most label at every step until the fully-qualified domain is reached. Because every delegation represents a contractual trust boundary, auditing these links reveals performance hotspots and security gaps across registries, operators, and global internet infrastructure.

Core Resolution Sequence

  1. Query the root zone for NS records and receive referrals for the appropriate TLD.
  2. Ask a referred TLD nameserver for NS records of the second-level domain.
  3. Repeat the referral-follow pattern down sub-domains until authoritative nameservers answer.
  4. Request the final A (or AAAA) record from an authoritative server.
  5. Aggregate each hop into an ordered list for analysis or export.

Hop Classification Table

Hop ClassMeaning
RootGlobal starting point for every DNS query, denoted by “.”
TLDTop-level domain zone such as .com or .org
Second-levelRegistered domain (e.g. example.com)
Sub-domainDelegated zone below the registered domain
ResourceAuthoritative server holding requested address records

Each hop delays the response by one additional packet round-trip; excessive or out-of-order hops usually signal configuration drift or registrar issues.

Variables & Parameters

  • Domain – fully-qualified target name.
  • Record TypeNS for delegation, A/AAAA for final mapping.
  • Resolver Endpoint – DNS-over-HTTPS service that handles each query.
  • Timeout – per-hop wait threshold before treating a server as unresponsive.

Worked Example

Assumptions & Limitations

  • Relies on public DNS-over-HTTPS; captive portals may block queries.
  • Assumes each referral returns at least one responsive nameserver.
  • Does not validate DNSSEC signatures.
  • Latency readings are illustrative, not benchmark-grade.

Edge Cases & Error Sources

  • Zones without NS records appear as dead-ends.
  • Wildcard answers mask true delegation paths.
  • Split-horizon DNS shows different hops per resolver location.
  • Very long CNAME chains inflate hop count.

Scientific Validity & References

Based on standards in RFC 1034, RFC 1035, and DNSSEC formalised in RFC 4033-4035, plus operational insights from ICANN root-server reports.

Privacy & Compliance

Queries include the target domain and travel to the chosen DNS-over-HTTPS provider; no user data is stored by the tool itself.

Step-by-Step Guide:

Follow these steps to map a domain’s entire DNS path.

  1. Enter a Domain such as example.com.
  2. Press Trace or hit Enter to start the lookup.
  3. Watch the hop list populate from root to authoritative servers.
  4. Switch to the JSON tab for a structured view.
  5. Copy or download the JSON for deeper offline analysis.

FAQ:

What is a hop?

A hop is one delegation step where a nameserver refers the resolver to the next authoritative zone.

Why do I see “root (.)”?

The root zone is the DNS hierarchy’s starting point; it has no name other than the dot.

Is my data stored?

No. The tool performs stateless lookups and discards results when you close the page.

Can I trace IPv6 records?

Yes. The resolver requests AAAA records automatically when present.

Why does a hop show “—”?

That zone returned no NS answers, indicating misconfiguration or unreachable servers.

Glossary:

DNS
Distributed system that maps names to addresses.
NS Record
Resource record identifying authoritative nameservers for a zone.
TLD
Top-level domain such as .net.
Delegation
Process of handing authority from one zone to its child.
DNS-over-HTTPS
Protocol that sends DNS queries via encrypted HTTPS.
Embed this tool into your website using the following code: