| # | Type | Answer(s) | TTL | Query ms | Copy |
|---|---|---|---|---|---|
| {{ i + 1 }} | {{ row.type }} | {{ row.answer }} | {{ row.ttl }} | {{ row.time }} |
| Check | Status | Copy |
|---|---|---|
| {{ c.label }} | Pass Fail |
Domain Name System records describe where a domain lives, which servers speak for it, and how mail should be handled so people and services find the right destination. Many teams look for a quick DNS health check for domains that highlights what is present, what is missing, and what likely needs attention.
The report here focuses on the essentials that keep a site reachable and messages deliverable, then summarizes the result in plain language so you can act without reading logs. Enter a domain, run the queries, and review a concise table of records alongside simple pass and fail checks that point to common misconfigurations.
Results include lookup times in milliseconds, a snapshot of authoritative data, and email safety indicators such as SPF and DMARC. A typical good outcome shows at least two name servers, working A or AAAA answers, mail hosts that resolve, and a DMARC policy that enforces quarantine or reject.
Configuration drifts over time, so compare runs before and after changes and keep notes on expected values. When something looks off, start with record presence and host resolution, then move to time to live settings and policy text for clarity.
This report inspects DNS for a single domain and observes record presence, host resolution, time to live values, and resolver validation. It also captures query duration so you can spot slow types and transient answers without packet captures.
The computation extracts answers and TTL from DNS responses, records whether the resolver asserted validation, and parses selected fields used in operational rules. Email safety is summarized by looking for SPF text at the apex and a DMARC record under the dedicated label for policy.
Results are interpreted as simple checks such as required records present, hosts resolve to addresses, reasonable TTL ranges, and protective mail policies in place. Crossing a boundary signals probable risk such as an alias at the apex or a permissive DMARC policy that does not enforce action.
Comparisons are valid for the same domain when run through the same resolver conditions. Values can vary between networks, so treat timing as indicative rather than absolute.
| Symbol | Meaning | Unit/Datatype | Source |
|---|---|---|---|
TTL |
Time to live of an answer | seconds | DNS answer |
| Duration of a single lookup | ms (rounded) | Measured | |
AD |
Resolver validation asserted | boolean | DNS response flag |
Status |
Resolver status code | integer | DNS response |
TTL = 300, so the A TTL check passes. No CNAME exists at the apex, so the apex alias check passes. Two NS hosts resolve to addresses, so the NS resolution check passes. A DMARC record declares p=quarantine, so the DMARC policy check passes.
| Threshold Band | Lower Bound | Upper Bound | Interpretation | Action Cue |
|---|---|---|---|---|
| SOA refresh | 900 | 86400 | Secondary update cadence | Adjust if too frequent or too sparse |
| SOA retry | 180 | 7200 | Retry window after failure | Tune to match refresh intent |
| SOA expire | 604800 | 2419200 | Time before zone is stale | Increase to retain service margin |
| SOA minimum TTL | 0 | 86400 | Negative caching guidance | Align with change frequency |
| A TTL reasonable | 60 | 86400 | Cache lifetime for A | Shorten for agility or lengthen for stability |
| AAAA TTL reasonable | 60 | 86400 | Cache lifetime for AAAA | Match with A TTL strategy |
| Field | Type | Min | Max | Step/Pattern | Error Text | Placeholder |
|---|---|---|---|---|---|---|
| Domain | string (hostname) | 1 | 253 | /^(?:[a-z0-9](?:[a-z0-9-]{0,61}[a-z0-9])?\.)+[a-z]{2,63}$/i |
Please enter a valid domain name such as example.com | example.com |
Units, precision, and rounding. Query duration uses the browser clock and is rounded to the nearest millisecond. TTL values are shown as provided by the first answer for a type. Missing answers appear as an em dash.
| Input | Accepted Families | Output | Encoding/Precision | Rounding |
|---|---|---|---|---|
| Domain | Hostnames with TLDs | Records table | Strings, integers | Times rounded to ms |
| Derived | DNS answers | Checks table | Boolean pass or fail | Not applicable |
| Derived | All tables | CSV and JSON downloads | UTF‑8 text | As above |
Networking and storage behavior. Lookups are executed from the browser against a DNS over HTTPS endpoint at https://cloudflare-dns.com/dns-query using GET with name and type parameters and an Accept: application/dns-json header. The domain you enter is sent to that resolver. No separate application server stores your results.
Performance and complexity. One base query per record type is made sequentially, followed by up to two address checks per NS and MX host. Overall cost is roughly O(R + 2H) for R record types and H hostnames. Timing varies by network distance and resolver caching.
Diagnostics and determinism. Identical inputs can yield different answers when upstream records change or caches expire. Checks are deterministic for a given response set.
Security considerations. Inputs are constrained to hostname syntax. Untrusted text is displayed without script execution. Answers are shown verbatim from the resolver response.
Scientific and standards backing. Concepts align with DNS and DNSSEC behavior defined by core IETF RFCs, DNS over HTTPS conventions, Certification Authority Authorization, the Sender Policy Framework, and DMARC policy notation.
Privacy & compliance. Requests are issued from your browser to the resolver provider; no account data or secrets are involved, and no server‑side storage is performed by this page.
DNS records and basic health checks for a domain are summarized into tables and a timing view.
Example. Enter example.com, verify two NS entries, confirm A or AAAA exists, and look for a DMARC policy stronger than p=none.
When the checks read cleanly, you have a strong baseline for stable resolution and mail delivery.
NS, SOA, A, AAAA, CNAME, MX, TXT, CAA, and DNSKEY. A DMARC lookup is also performed under the dedicated label to read policy text.
Each query duration is measured in the browser using a high resolution clock and rounded to the nearest millisecond before display.
If mail exchange is configured, SPF and DMARC help prevent spoofing. The report requires SPF to be present and DMARC to be present and not set to p=none.
It indicates the resolver asserted validation for at least one answer. Presence of DNSKEY at the zone is also checked separately.
No separate application server stores your inputs or results. Queries are sent directly from your browser to the resolver provider.
Resolver providers have their own policies.No. DNS queries require connectivity to the resolver endpoint. Without connectivity, answers will be empty and checks will fail.
Run a report and look for the DMARC presence check. Strengthen policy from none to quarantine or reject as your readiness improves.
It means the TTL is outside the suggested band. Consider shorter TTLs for agility during changes or longer TTLs for stability.
No payments are required by this page. It relies on a public resolver service operated by its provider, which may impose separate terms.
p=none → raise to quarantine or reject when ready.Prefer consistent TTLs across A and AAAA unless you have a clear reason to diverge.
Keep at least two unique NS hosts on different providers or networks.
Use distinct MX hosts and test that each resolves to multiple addresses.
Tighten DMARC gradually and monitor bounces before moving to reject.
Review SOA timers during large migrations to balance agility and stability.
Re‑run checks from different networks to compare resolver views and caches.