Domain Security Audit
We answer the BIG questions.
Producing Engineer's DNS Intelligence Reports and Executive's DNS Intelligence Briefs with posture scoring
Are your DNS TTLs costing you performance?
Scan your domain’s live TTL values, compare against Stability or Agility profiles, and get provider-specific recommendations with copy-paste fix instructions.
Intelligence Collection Vectors
OSINT sources we query, cross-reference, and classify through our Intelligence Classification & Interpretation Engine
DNS Records
A, AAAA, MX, TXT, and NS records from multiple resolvers with multi-resolver consensus verification
Email Authentication
SPF, DMARC, and DKIM validation with key strength analysis, DANE/TLSA certificate pinning, MTA-STS enforcement, TLS-RPT reporting, and SMTP transport verification
Domain Intelligence
Domain registration via RDAP, enterprise infrastructure detection, email security management provider identification, Certificate Transparency subdomain discovery, and DNS provider analysis
Security Posture
DNSSEC validation, DANE/TLSA verification, BIMI, CAA with MPIC context, DMARCbis readiness, graduated security posture scoring, and per-section remediation with RFC-cited fixes
Built for Decision-Makers, Operators, and the Security Research Community
From board-level risk visibility to deep DNS recon — the right intelligence at every level
Executives & Board Members
Clear CVSS-aligned risk levels (Critical / High / Medium / Low / Informational) that communicate cybersecurity posture at a glance. See whether email security is actively managed by professional providers or left unmonitored.
IT Professionals
Validate SPF, DKIM, DMARC, and DANE/TLSA configurations. Check email authentication, verify DNSSEC, and troubleshoot DNS records across multiple resolvers.
DNS Specialists
Authoritative nameserver queries, multi-resolver consensus verification, DNSSEC chain validation, DANE/TLSA analysis, and enterprise DNS provider detection.
Risk & Compliance
Verify your domain can't be impersonated. Identify who manages your DMARC monitoring and SPF. Assess brand protection with BIMI. Audit-supporting evidence artifacts — SHA-3 integrity hashing, RFC-cited findings, and reproducible verification commands for cyber insurance and compliance workflows.
Security Researchers & Red Teams
OSINT-grade DNS recon, multi-layer subdomain discovery, and attack surface enumeration with verifiable evidence. Built for reconnaissance, threat modeling, and security assessments. CLI edition on the roadmap.
Decision-Ready Intelligence
Every section of your report opens with a plain-language strategic question — answered with a data-driven verdict before the technical detail begins.
Our Mission
Produce actionable domain security intelligence from publicly observable data — transparently, independently verifiably, and without requiring authorization from or interaction with the target.
Multi-Source Collection
Redundant public sources, cross-referenced and corroborated. No single source is sufficient.
Independently Verifiable
Every conclusion reproducible with standard tools. dig, openssl, curl — verify it yourself.
Passive OSINT Only
We read public data and produce intelligence. No exploitation, no authorization required.
Frequently Asked Questions
What we do: We perform OSINT-based DNS security analysis — examining your domain's email authentication (SPF, DKIM, DMARC), transport security (DANE, MTA-STS), and public exposure posture using only publicly available data. This is complementary to PCI scanning, not a substitute for it.
If you need PCI compliance: Engage a certified ASV from the PCI SSC ASV listing. Use DNS Tool alongside your ASV to ensure your domain's DNS and email security posture is properly configured — something ASV scans typically do not cover in depth.
Federal .gov context: CISA BOD 18-01 (2017) requires valid SPF records and DMARC p=reject for federal civilian agencies. The directive doesn't explicitly specify -all vs ~all, but federal agencies widely adopted -all as a defense-in-depth practice. In 2017, most federal domains had no DMARC at all, so -all was a pragmatic safety net — you couldn't rely on DMARC being there to catch what SPF missed. Now that DMARC p=reject is in place across federal domains, the -all is somewhat redundant and creates the RFC 7489 premature-rejection risk, but federal infrastructure is controlled enough that the risk is lower. The directive hasn't been updated to reflect the broader industry consensus around ~all + DMARC reject. Microsoft also historically defaults to -all.
What actually happened: DANE for SMTP (RFC 7672) quietly grew into a global standard. Over 4 million domains now publish TLSA records (stats.dnssec-tools.org tracks daily). Adoption extends well beyond the Netherlands: Sweden (.se), Norway (.no), Czech Republic (.cz), and EU public agencies all have significant DANE deployment.
The turning point: Microsoft Exchange Online announced General Availability of inbound SMTP DANE with DNSSEC in October 2024 — available to all Exchange Online tenants at no extra cost. Outbound DANE has been live since March 2022. By Q4 2025, Microsoft plans to make outbound SMTP DANE mandatory per-tenant. The IETF itself uses DANE on mail.ietf.org. This isn't a niche experiment — it's the world's largest email platform betting on it.
Why DANE is underrepresented in DNS audits: DANE requires DNSSEC (RFC 7672 §1.3), and DNSSEC adoption was historically slow. Because DANE verification is complex and adoption was initially concentrated in a few regions, it was often omitted from DNS security assessments. This created a self-reinforcing blind spot: if DANE isn't checked, it isn't seen, and its growing adoption goes unrecognized. DNS Tool surfaces DANE as a first-class protocol.
Try it yourself — analyze these domains to see DANE in action: ietf.org (the IETF's own infrastructure), nlnetlabs.nl (creators of the Unbound DNS resolver), freebsd.org (the FreeBSD project). DANE works alongside MTA-STS — best practice is to deploy both: DANE provides cryptographic strength via DNSSEC, while MTA-STS provides broader compatibility for receivers that don't validate DNSSEC.
DNSSEC + DANE (RFC 7672) is the strongest mechanism. DANE publishes TLS certificate information in DNSSEC-signed TLSA records, creating a cryptographic chain of trust from the DNS root to the mail server certificate. This removes reliance on certificate authorities — no trust-on-first-use weakness, no vulnerability to CA compromise. The requirement: your domain must be signed with DNSSEC.
MTA-STS (RFC 8461) was created for domains where “deploying DNSSEC is undesirable or impractical” (§2). It publishes a TLS policy via HTTPS using the existing CA trust model. Simpler to deploy but inherits CA limitations and is vulnerable on first use (§10). RFC 8461 mandates: senders “MUST NOT allow MTA-STS validation to override a failing DANE validation” — DANE always takes precedence.
Why both coexist: DANE is backward-compatible by design. RFC 7672 §1.3 specifies that sending servers simply skip the DANE check if the receiving domain isn't DNSSEC-signed. This means enabling DANE never breaks anything — it only adds protection for senders that validate it. MTA-STS works independently alongside DANE without conflict.
Where the camps stand today:
- Microsoft is the strongest DANE advocate. Exchange Online enforces inbound DANE with DNSSEC (GA October 2024), and plans to make outbound DANE mandatory per-tenant. Microsoft also supports MTA-STS, but DANE is their strategic direction.
- Proton Mail & Fastmail fully support DANE with DNSSEC on their mail infrastructure, providing cryptographic transport controls for their users.
- Google validates DANE outbound (Gmail checks TLSA records when sending to DANE-enabled domains). However,
google.comis not DNSSEC-signed, and Google Workspace customers cannot deploy DANE — Google's shared multi-tenant MX infrastructure (aspmx.l.google.com) does not publish TLSA records and does not allow customers to do so. Google relies on MTA-STS for inbound transport security. - Apple uses MTA-STS for iCloud Mail.
apple.comis not DNSSEC-signed and has no DANE/TLSA records. - Government agencies (Netherlands, Germany, Czech Republic, Nordic countries) tend to mandate DANE+DNSSEC, often by policy. The IETF itself uses DANE on
mail.ietf.org.
Best practice: Deploy both for defense in depth. DANE provides the strongest cryptographic controls via DNSSEC, while MTA-STS provides coverage for senders that don't validate DNSSEC. The German BSI TR-03108 standard mandates both DANE and MTA-STS together with TLS-RPT. The protocols are complementary: DANE for cryptographic strength, MTA-STS for breadth of coverage.
See it in practice: Analyze ietf.org to see DANE + DNSSEC delivering the strongest transport security, then compare with google.com which uses MTA-STS — the best available option given Google's infrastructure cannot support DNSSEC/DANE.
DNS Tool is an OSINT platform. Every data source we query is publicly available: DNS records (via standard resolvers), certificate transparency logs, RDAP registrar data, and publicly accessible web resources. We do not bypass authentication, probe closed ports, or exploit vulnerabilities. We observe what is already visible to anyone with a browser or a
dig command — and we organize those observations into actionable intelligence.
This is the same methodology used by Shodan, Mozilla Observatory, Censys, and VirusTotal. The difference is our focus: we specialize in DNS security posture and email authentication, producing intelligence products modeled on the formats used by national intelligence agencies.
- DNS records — the same records returned by
digornslookup(A, MX, TXT, CNAME, TLSA, DNSKEY, etc.) - Certificate transparency logs — public logs maintained by CAs, queried via crt.sh
- RDAP registrar data — the public successor to WHOIS, served by IANA-accredited registries
- Publicly accessible web resources — MTA-STS policy files, security.txt, robots.txt, and (if opted in) well-known misconfiguration paths that any browser can visit
DNS Tool performs passive OSINT observation: we read public DNS records, check publicly accessible URLs, and analyze the data. No vulnerabilities are exploited, and we don’t interact with any system that requires authorization.
Think of it this way: a penetration tester tries to break into your house. We observe whether your front door is locked — from the sidewalk.
We use two cookies, both essential:
_csrf— Prevents cross-site request forgery. Required for form submissions. Security-only._dns_session— Only exists if you choose to sign in. No account required to use DNS Tool.
We log your IP address for two reasons: rate limiting (so nobody abuses the service) and security (identifying malicious actors and complying with legal obligations). We check source geography for analysis accuracy — DNS responses vary by region, and knowing which resolver answered from where makes the science better.
No tracking cookies. No analytics cookies. No ad networks. No data brokers. Our code is open-core — the application framework is publicly available under BUSL-1.1 with timed Apache-2.0 conversion. Verify it yourself.
If you create an account and want out, account deletion removes your login and scan history. Public domain analyses remain available because they contain only public DNS records, already hashed. Full details: Privacy Pledge.
