View on GitHub

DNSViz: A DNS visualization tool

animalworld.world

Updated: 2024-03-26 07:03:41 UTC (91 days ago) Update now
« Previous analysis | Next analysis »
DNSSEC options (hide)
  1. |?|
  2. |?|
  3. |?|
  4. |?|
  5. |?|
  6. |?|
  7. |?|
  8. |?|
  9. |?|
Notices
DNSSEC Authentication Chain

RRset statusRRset status

Bogus (4)
  • animalworld.world/A
  • animalworld.world/NS
  • animalworld.world/SOA
  • animalworld.world/TXT

DNSKEY/DS/NSEC statusDNSKEY/DS/NSEC status

Secure (8)
  • ./DNSKEY (alg 8, id 20326)
  • ./DNSKEY (alg 8, id 30903)
  • ./DNSKEY (alg 8, id 5613)
  • animalworld.world/DS (alg 13, id 2371)
  • world/DNSKEY (alg 8, id 13081)
  • world/DNSKEY (alg 8, id 27165)
  • world/DNSKEY (alg 8, id 47949)
  • world/DS (alg 8, id 13081)
Non_existent (1)
  • animalworld.world/DNSKEY (alg 13, id 2371)

Delegation statusDelegation status

Bogus (1)
  • world to animalworld.world
Secure (1)
  • . to world

NoticesNotices

Errors (20)
  • animalworld.world zone: The server(s) were not responsive to queries over TCP. See RFC 1035, Sec. 4.2. (61.240.129.143)
  • animalworld.world zone: The server(s) were not responsive to queries over UDP. See RFC 1035, Sec. 4.2. (2408:872f:d10::2)
  • animalworld.world/A: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (60.247.150.13, 60.247.150.254, 61.240.129.143, 110.40.21.239, 118.123.249.114, 118.123.253.132, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, UDP_-_EDNS0_4096_D_KN)
  • animalworld.world/A: No response was received from the server over UDP (tried 12 times). See RFC 1035, Sec. 4.2. (2408:872f:d10::2, UDP_-_NOEDNS_)
  • animalworld.world/DNSKEY: No response was received from the server over UDP (tried 12 times). See RFC 1035, Sec. 4.2. (110.40.21.239, UDP_-_NOEDNS_)
  • animalworld.world/DNSKEY: No response was received from the server over UDP (tried 4 times). See RFC 1035, Sec. 4.2. (60.247.150.254, 110.40.21.239, 118.123.253.132, UDP_-_EDNS0_512_D_KN)
  • animalworld.world/DNSKEY: The response had an invalid RCODE (SERVFAIL). See RFC 1035, Sec. 4.1.1. (60.247.150.254, 118.123.253.132, UDP_-_NOEDNS_)
  • animalworld.world/NS: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (60.247.150.13, 60.247.150.254, 61.240.129.143, 110.40.21.239, 118.123.249.114, 118.123.253.132, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, UDP_-_EDNS0_4096_D_KN)
  • animalworld.world/NS: No response was received from the server over UDP (tried 12 times). See RFC 1035, Sec. 4.2. (2408:872f:d10::2, UDP_-_NOEDNS_)
  • animalworld.world/SOA: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (60.247.150.13, 60.247.150.254, 61.240.129.143, 110.40.21.239, 118.123.249.114, 118.123.253.132, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
  • animalworld.world/SOA: No response was received from the server over TCP (tried 3 times). See RFC 1035, Sec. 4.2. (61.240.129.143, TCP_-_EDNS0_4096_D_N)
  • animalworld.world/TXT: No RRSIG covering the RRset was returned in the response. See RFC 4035, Sec. 3.1.1. (60.247.150.13, 60.247.150.254, 61.240.129.143, 110.40.21.239, 118.123.249.114, 118.123.253.132, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, UDP_-_EDNS0_4096_D_KN)
  • world to animalworld.world: No valid RRSIGs made by a key corresponding to a DS RR were found covering the DNSKEY RRset, resulting in no secure entry point (SEP) into the zone. See RFC 4035, Sec. 2.2, RFC 6840, Sec. 5.11. (60.247.150.13, 61.240.129.143, 118.123.249.114, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • world to animalworld.world: The DS RRset for the zone included algorithm 13 (ECDSAP256SHA256), but no DS RR matched a DNSKEY with algorithm 13 that signs the zone's DNSKEY RRset. See RFC 4035, Sec. 2.2, RFC 6840, Sec. 5.11. (60.247.150.13, 61.240.129.143, 118.123.249.114, 211.149.230.100, 240e:d9:c200::2, 240e:d9:c200:1::2, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_512_D_KN)
  • animalworld.world/CNAME has errors; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/DNSKEY has errors; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/NSEC3PARAM has errors; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/MX has errors; select the "Denial of existence" DNSSEC option to see them.
  • 8nhge02w4t.animalworld.world/A has errors; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/AAAA has errors; select the "Denial of existence" DNSSEC option to see them.
Warnings (10)
  • animalworld.world/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (61.240.129.143, UDP_-_EDNS0_4096_D_KN)
  • animalworld.world/NS: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (61.240.129.143, UDP_-_EDNS0_4096_D_KN)
  • animalworld.world/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (61.240.129.143, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
  • animalworld.world/TXT: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (61.240.129.143, UDP_-_EDNS0_4096_D_KN)
  • animalworld.world/CNAME has warnings; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/DNSKEY has warnings; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/NSEC3PARAM has warnings; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/MX has warnings; select the "Denial of existence" DNSSEC option to see them.
  • 8nhge02w4t.animalworld.world/A has warnings; select the "Denial of existence" DNSSEC option to see them.
  • animalworld.world/AAAA has warnings; select the "Denial of existence" DNSSEC option to see them.

DNSKEY legend

Full legend
SEP bit setSEP bit set
Revoke bit setRevoke bit set
Trust anchorTrust anchor
Download: png | svg
Warning JavaScript is required to make the graph below interactive.
DNSSEC authentication graph