This mode presents DNS intelligence from an offensive-awareness perspective. It is designed for security professionals, researchers, and anyone who wants to understand how attackers evaluate targets. No additional scanning or probing is performed beyond what the standard analysis already does.
What You May Do
Analyze any domain — DNS records are public by design and every query is a standard lookup
Use findings to strengthen your own security posture or advise others
Learn how DNS infrastructure is evaluated from an adversarial perspective
Report vulnerabilities you discover in DNS Tool itself (Safe Harbor Policy)
What You May Not Do
Use intelligence gathered here to attack, disrupt, or exploit any system
Attempt denial-of-service, traffic flooding, or resource exhaustion
Conduct social engineering, phishing, or unauthorized red-team activity
Access, modify, or exfiltrate data beyond what is publicly observable via DNS
COVERT MODE ACTIVEBeta— Same intelligence, adversarial lens. Every finding reframed for offensive awareness.
Optimized for low-light tactical environments
Environment:
_csrf — Prevents cross-site request forgery. Required for form submissions. Security-only.
_dns_session — Only exists if you choose to sign in. No account required to use DNS Tool.
We log your IP address for two reasons: rate limiting (so nobody abuses the service) and security (identifying malicious actors and complying with legal obligations). We check source geography for analysis accuracy — DNS responses vary by region, and knowing which resolver answered from where makes the science better.
No tracking cookies. No analytics cookies. No ad networks. No data brokers. Our code is open-core — the application framework is publicly available under BUSL-1.1 with timed Apache-2.0 conversion. Verify it yourself.
If you create an account and want out, account deletion removes your login and scan history. Public domain analyses remain available because they contain only public DNS records, already hashed. Full details: Privacy Pledge.