Dig DNS Lookup

This tool will help you to check the DNS records of a domain name.


About this tool

This tool retrieves the DNS resource records of a given domain name.

A records

Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host.

AAAA records

Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.

ANY

Tries to catch all records. Depends on target's dns server what records will be displayed.

CAA records

DNS Certification Authority Authorization, constraining acceptable CAs for a host/domain.

CNAME records

Alias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.

MX records

Maps a domain name to a list of mail servers for that domain

NS records

Delegates a DNS zone to use the given authoritative name servers

PTR record

Pointer to a canonical name, most common use is for implementing reverse DNS lookups.

SOA record

Specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.

SRV records

Generalized service location record, used for newer protocols instead of creating protocol-specific records such as MX.

TXT records

This record more often carries machine-readable data, such as specified by RFC 1464, opportunistic encryption, Sender Policy Framework, DKIM, DMARC.

Frequently Asked Questions

Cybersecurity or IT security protects networks, computer systems, and devices from theft or damage to their hardware and software or the data they process and from disrupting or misusing their services and functions. The information is private and business, which may be personal. Overall, cybersecurity is often (but not only) directed against cybercrime. Among the most significant challenges is the lack of global, centralized cybersecurity institutions and global agreements and regulations to detect and combat cybercrime and bring about cyber resilience.
A cyberattack can lead to identity theft, and blackmail attempts on an individual level. Personal data, such as credit card details or family photos, can be stolen. Critical infrastructures, such as power plants, hospitals, and financial service providers, are essential to the functioning of our society. In addition, industrial espionage is one of the most significant risks for companies.
These presentations aim at Analysts, Security Managers, Web Developers, Software Engineers, Administrators, DevOps, DevSecOps, Team Leads, Managers, CISOs, CTOs, and other Executives. The slide decks serve as an introduction and provide knowledge on all aspects of the subject area. To put it straight: Benefit from these online presentations and get more insights into the cybersecurity space.
These presentations introduce the topics and convey the contents in short, concise slides. It is crucial that the contents are as self-explanatory as possible and that the topic areas with the essential information are outlined.
Cybersecurity is a vast field. It is probably impossible to know everything or every detail. For this reason, many more courses will follow in the coming months to ensure the broadest possible coverage.
As you might imagine, cybersecurity is a broad field. Therefore, it is probably impossible to cover everything. It would go beyond the scope to write everything down. Hence, these slide decks are not intended to be exhaustive but will provide a good starting point.