
Registry Zone Health Report
Non-existent / Undelegated Domain
Domain is not delegated or has no DNS records. This may be an unused subdomain or unregistered domain.
What This Means
- No authoritative DNS data is available for this domain
- Security posture cannot be evaluated without DNS records
- The domain may never have been registered, or has expired
- If this is your domain, check your registrar to confirm it's active
Intelligence Sources
This analysis used 4 DNS resolvers (consensus), reverse DNS (PTR), Team Cymru (ASN attribution), IANA RDAP (registrar), crt.sh (CT logs), and SMTP probing (transport). All using open-standard protocols.
Verify Report Integrity SHA-3-512 Has this report been altered since generation? Verify below
This cryptographic hash seals the analysis data, domain, timestamp, and tool version into a tamper-evident fingerprint. Any modification to the report data will produce a different hash. This is distinct from the posture hash (used for drift detection) — the integrity hash uniquely identifies this specific report instance.
c5497cba9fb366064ec1c3304b06aa2bbbd7f36cfe58198d5396bfb7a15d6383c94acf3ece4ce8ed158a947684f4143338bdb2884b5e3cd27d55b016f6b6a0a2
Download the intelligence dump and verify its integrity, like you would a Kali ISO or any critical artifact. The SHA-3-512 checksum covers every byte of the download — deterministic serialization ensures identical hashes across downloads.
After downloading, verify with any of these commands:
Tip: cd ~/Downloads first (or wherever you saved the files).
cat dns-intelligence-agentquery.json.sha3 && echo '---' && openssl dgst -sha3-512 dns-intelligence-agentquery.json
python3 -c "import hashlib; print(hashlib.sha3_512(open('dns-intelligence-agentquery.json','rb').read()).hexdigest())"
sha3sum -a 512 dns-intelligence-agentquery.json
.sha3 file or the checksum API at /api/analysis/10450/checksum. Hash algorithm: SHA-3-512 (Keccak, NIST FIPS 202).
Every finding in this report is backed by DNS queries you can run yourself. These vetted one-liners reproduce the exact checks used to build this report for agentquery. Our analysis adds multi-resolver consensus, RFC-based evaluation, and cross-referencing — but the underlying data is always independently verifiable. We are intelligence analysts, not gatekeepers.
DNS Records
dig +noall +answer agentquery A
dig +noall +answer agentquery AAAA
dig +noall +answer agentquery MX
dig +noall +answer agentquery NS
dig +noall +answer agentquery TXT
Domain Security
dig +dnssec +noall +answer agentquery DNSKEY
dig +noall +answer agentquery DS
dig +dnssec +cd agentquery A @1.1.1.1
Brand & Trust
dig +noall +answer agentquery CAA
DNS Records
dig +noall +answer agentquery HTTPS
Domain Security
dig +noall +answer agentquery CDS
Infrastructure Intelligence
curl -sL 'https://rdap.org/domain/agentquery' | python3 -m json.tool | head -50
dig, openssl, and curl — standard tools available on macOS, Linux, and WSL. Results may vary slightly due to DNS propagation timing and resolver caching.
Appendix: Verification Commands
DNS Records
dig +noall +answer agentquery A
dig +noall +answer agentquery AAAA
dig +noall +answer agentquery MX
dig +noall +answer agentquery NS
dig +noall +answer agentquery TXT
Domain Security
dig +dnssec +noall +answer agentquery DNSKEY
dig +noall +answer agentquery DS
dig +dnssec +cd agentquery A @1.1.1.1
Brand & Trust
dig +noall +answer agentquery CAA
DNS Records
dig +noall +answer agentquery HTTPS
Domain Security
dig +noall +answer agentquery CDS
Infrastructure Intelligence
curl -sL 'https://rdap.org/domain/agentquery' | python3 -m json.tool | head -50
