NSEC3 proving non-existence of ntp.org/DS: An iterations count of 0 must be used in NSEC3 records to alleviate computational burdens. See RFC 9276, Sec. 3.1.
NSEC3 proving non-existence of ntp.org/DS: An iterations count of 0 must be used in NSEC3 records to alleviate computational burdens. See RFC 9276, Sec. 3.1.
pool.ntp.org zone: The server(s) were not responsive to queries over UDP. See RFC 1035, Sec. 4.2. (91.212.242.43, 198.105.223.32, 199.188.48.59, 199.249.223.53, 2001:67c:16c8:2242::1, 2620:7:6000::ffff:c759:df35, 2a05:91c0:1505:5::c924)
pool.ntp.org/A: No response was received from the server over UDP (tried 12 times). See RFC 1035, Sec. 4.2. (91.212.242.43, 198.105.223.32, 199.188.48.59, 199.249.223.53, 2001:67c:16c8:2242::1, 2620:7:6000::ffff:c759:df35, 2a05:91c0:1505:5::c924, UDP_-_NOEDNS_)
pool.ntp.org/NS: No response was received from the server over UDP (tried 12 times). See RFC 1035, Sec. 4.2. (91.212.242.43, 198.105.223.32, 199.188.48.59, 199.249.223.53, 2001:67c:16c8:2242::1, 2620:7:6000::ffff:c759:df35, 2a05:91c0:1505:5::c924, UDP_-_NOEDNS_)
Warnings (40)
NSEC3 proving non-existence of ntp.org/DS: The salt value for an NSEC3 record should be empty. See RFC 9276, Sec. 3.1.
NSEC3 proving non-existence of ntp.org/DS: The salt value for an NSEC3 record should be empty. See RFC 9276, Sec. 3.1.
org to ntp.org: Authoritative AAAA records exist for ns1.everett.org, but there are no corresponding AAAA glue records. See RFC 1034, Sec. 4.2.2.
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (103.127.121.22, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.126.112.98, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.134.197.79, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.209.84.218, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.209.85.151, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.82.172.118, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2001:67c:25dc:c::c, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2001:8e0:ffff:1::282, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (212.25.19.23, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2404:1fc0:1000:400::42, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2600:3c00::f03c:91ff:fe8c:cf2c, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2600:3c03::f03c:91ff:fe83:79dd, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2a01:238:4242:6a00:3f71:8733:b607:7c2a, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (2a03:7900:104:1::2, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (31.3.105.98, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (45.11.105.142, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (45.33.123.43, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (45.79.130.187, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (46.227.203.69, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/A: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (85.214.195.29, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/NS: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (31.3.105.98, 45.11.105.142, 45.33.123.43, 45.79.130.187, 46.227.203.69, 85.214.195.29, 103.127.121.22, 185.82.172.118, 185.126.112.98, 185.134.197.79, 185.209.84.218, 185.209.85.151, 212.25.19.23, 2001:67c:25dc:c::c, 2001:8e0:ffff:1::282, 2404:1fc0:1000:400::42, 2600:3c00::f03c:91ff:fe8c:cf2c, 2600:3c03::f03c:91ff:fe83:79dd, 2a01:238:4242:6a00:3f71:8733:b607:7c2a, 2a03:7900:104:1::2, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (103.127.121.22, 2404:1fc0:1000:400::42, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.126.112.98, 2001:67c:25dc:c::c, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.134.197.79, 212.25.19.23, 2001:8e0:ffff:1::282, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.209.85.151, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (185.82.172.118, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (31.3.105.98, 2a03:7900:104:1::2, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (45.11.105.142, 45.33.123.43, 2600:3c00::f03c:91ff:fe8c:cf2c, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (45.79.130.187, 185.209.84.218, 2600:3c03::f03c:91ff:fe83:79dd, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (46.227.203.69, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/SOA: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (85.214.195.29, 2a01:238:4242:6a00:3f71:8733:b607:7c2a, TCP_-_EDNS0_4096_D_N, UDP_-_EDNS0_4096_D_KN, UDP_-_EDNS0_4096_D_KN_0x20)
pool.ntp.org/TXT: The server responded with no OPT record, rather than with RCODE FORMERR. See RFC 6891, Sec. 7. (31.3.105.98, 45.11.105.142, 45.33.123.43, 45.79.130.187, 46.227.203.69, 85.214.195.29, 103.127.121.22, 185.82.172.118, 185.126.112.98, 185.134.197.79, 185.209.84.218, 185.209.85.151, 212.25.19.23, 2001:67c:25dc:c::c, 2001:8e0:ffff:1::282, 2404:1fc0:1000:400::42, 2600:3c00::f03c:91ff:fe8c:cf2c, 2600:3c03::f03c:91ff:fe83:79dd, 2a01:238:4242:6a00:3f71:8733:b607:7c2a, 2a03:7900:104:1::2, UDP_-_EDNS0_4096_D_KN)
pool.ntp.org/CNAME has warnings; select the "Denial of existence" DNSSEC option to see them.
pool.ntp.org/MX has warnings; select the "Denial of existence" DNSSEC option to see them.
bu0ekjgoqc.pool.ntp.org/A has warnings; select the "Denial of existence" DNSSEC option to see them.
pool.ntp.org/AAAA has warnings; select the "Denial of existence" DNSSEC option to see them.
pool.ntp.org/DNSKEY has warnings; select the "Denial of existence" DNSSEC option to see them.