DNS Tool - DNS & Email Security Auditor
DNS Tool is a professional-grade DNS, email, transport, and brand security auditor designed to answer one question clearly: can this domain be trusted on the internet today?
It analyzes real-world behavior, not just static records, and presents results in a single defensible report.
This is the authoritative version of the tool. It prioritizes clarity, correctness, and defensible conclusions over raw record dumps.
What This Tool Actually Solves
Most DNS tools dump raw records and expect you to "interpret" them. That's how people end up thinking they're secure when they're not.
DNS Tool answers the real questions:
- Can this domain be impersonated by email?
- Can this brand be convincingly faked?
- Is email encrypted and validated in transit?
- Can DNS itself be tampered with?
- Are security controls enforced, or just declared?
- Is what the world sees the same as what the nameserver is publishing?
It distinguishes configured vs enforced, unsigned vs broken, and missing vs intentionally absent. That nuance is where most tools fail.
11 Core Analysis Modules (One Pass)
- SPF validation (including lookup counts and strict vs soft fail guidance)
- DKIM discovery across 35 selectors with provider-aware logic
- DMARC policy interpretation (
none,quarantine,reject) plus DMARCbis readiness checks - DANE/TLSA validation for SMTP certificate pinning (RFC 7672)
- MTA-STS policy retrieval and enforcement validation
- TLS-RPT configuration and reporting endpoint checks
- SMTP Transport Verification - live MX STARTTLS/TLS tests (versions, ciphers, cert validity) with DNS-inferred fallback when live port 25 probing is unavailable
- DNSSEC chain-of-trust validation (root -> TLD -> domain)
- CAA analysis with CA attribution and MPIC-aware interpretation (CA/B Forum SC-067)
- BIMI + VMC validation for brand trust in inboxes
- Certificate Transparency subdomain discovery (crt.sh / RFC 6962) for external attack-surface visibility
The output is a single, defensible report - not a pile of green and red checkboxes.
Additional Domain Intelligence
- NS delegation correctness
- Resolver vs authoritative record diffing (propagation and split-brain detection)
- DNS infrastructure analysis for enterprise providers and self-hosted enterprise DNS
- Government entity recognition for .gov, .mil, .gov.uk, .gov.au, and .gc.ca domains
- A / AAAA / MX routing plus SRV record visibility for service inventory context
DNS Infrastructure Intelligence
DNS Tool doesn't just check if DNSSEC is enabled—it understands real-world security postures:
- Enterprise DNS Providers — Cloudflare, AWS Route 53, Akamai, Google Cloud DNS, Azure DNS, UltraDNS, Verisign, NS1
- Self-Hosted Enterprise — Apple, Microsoft, Meta, Amazon, Netflix, Oracle, Cisco, Intel, Salesforce, Adobe
- Government Entities — .gov (FISMA), .mil (DoD), .gov.uk (NCSC), .gov.au (ASD), .gc.ca (GC)
When DNSSEC isn't enabled, the tool explains why that might be acceptable—enterprise providers with DDoS protection, Anycast, and CAA records provide alternative security layers. This is the "symbiotic security" approach: work with the ecosystem, not against it.
Platform Features (Web App)
- Analysis history with search
- Side-by-side domain comparison
- Statistics dashboard with protocol adoption rates
- JSON export for programmatic use
- Executive-grade print/PDF reports with TLP:CLEAR classification
Why This Version Is Better Than the CLI
The original command-line tool still exists and is useful for scripting and offline checks, but the web version is the authoritative one:
- Clear verdicts instead of raw dumps
- Policy-aware logic (no misleading "monitoring-only" false confidence)
- Real-time propagation comparison
- Transport security validation in addition to DNS-only checks
- Printable, shareable reports suitable for audits, leadership, and client briefings
If you're evaluating DNS posture, this is the version you want.
Need Help Fixing Issues?
The report tells you what is wrong, but if you need help fixing it, we have a comprehensive guide:
👉 Read: DNS Security Best Practices (Step-by-Step Guide)
Command-Line Version (Still Available)
The CLI tool is open-source and maintained for those who want it:
Think of it as a sharp pocket knife.
The web version is the full diagnostic bench.