DNS & IP Record Check for Ratz.pl
This tool gives you a detailed look at Ratz.pl DNS setup. It checks various parts of the DNS records to ensure everything is functioning smoothly and securely.
Our DNS & IP record check is organized into 6 main groups, each focusing on different aspects of your domain's DNS configuration. Each group tests key components to ensure optimal domain performance:
- DNS Parent Group - 5 tests
- NS (Nameserver) - 17 tests
- SOA (Start of Authority) - 9 tests
- MX (Mail Exchanger) - 12 tests
- MAIL (Email) - 4 tests
- WWW (World Wide Web) - 24 tests
To help you better understand the results, our team has categorized the outcomes into four statuses:
- PASS - No issues found in the DNS record.
- FAIL - We detected a DNS record error that needs your attention.
- WARN - A minor DNS record issue was found.
- INFO - Informational data about the DNS record with no errors detected.
To ensure the integrity and security of Ratz.pl DNS data, use our DNSSEC check tool. This test provides a deeper analysis, focusing on digital signatures, security, and integrity of the DNS records.
|
Below is an overview of the results from our comprehensive DNS lookup for the domain Ratz.pl:
DNS Group | DNS Check | DNS Record Type | DNS Data Information | |||||
---|---|---|---|---|---|---|---|---|
PARENT | ||||||||
PASS | Missing Direct Parent check | OK. Your direct parent zone exists, SOA of parent zone pl is a-dns.pl which is good. Some domains (usually third or fourth level domains, such as example.co.us or subdomain.example.co.us) do not have a direct parent zone ('co.us' in this example), which is legal but can cause confusion. | ||||||
PASS | Glue at parent nameservers | OK. The parent servers have glue for your nameservers. That means they send out the IP address of your nameservers, as well as their host names | ||||||
INFO | NS records at parent servers | Your NS record at parent servers are:
These were obtained from d-dns.pl. However these were obtained from authority section and not answer section. It is better if they were obtained from answer section. |
||||||
PASS | DNS servers have A records | OK. All your DNS servers either have A records at the zone parent servers | ||||||
FAIL | Parent nameservers have your nameservers listed | Your nameservers not listed in parent servers: ns3.netmark.pl |
DNS Group | DNS Status | DNS Record Type | DNS Data Information | ||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
NS | |||||||||||
INFO | NS records at your nameservers | Your NS records at your nameservers are:
|
|||||||||
PASS | Mismatched NS records | OK. NS records at all your nameservers are identical. | |||||||||
PASS | All nameservers respond | All your nameservers responding. | |||||||||
PASS | Recursive queries | None of your nameservers allow recursive queries | |||||||||
PASS | Zone Transfer | Zone transfer not allowed by any of your nameservers | |||||||||
PASS | No NS A records at nameservers | OK. Your nameservers do include corresponding A records when asked for your NS records. This ensures that your DNS servers know the A records corresponding to all your NS records. | |||||||||
PASS | Nameserver name validity | OK. All of the NS records that your nameservers report seem valid (no IPs or partial domain names). | |||||||||
PASS | Number of nameservers | You have 2 nameservers. You must have at least 2 nameservers (RFC2182 section 5 recommends at least 3 nameservers), and preferably no more than 7. | |||||||||
PASS | Lame nameservers | OK. All the nameservers listed at the parent servers answer authoritatively for your domain. | |||||||||
FAIL | Missing (stealth) nameservers | FAIL: You have one or more missing (stealth) nameservers. The following nameserver(s) are listed (at your nameservers) as nameservers for your domain, but are not listed at the parent nameservers (therefore, they may or may not get used, depending on whether your DNS servers return them in the authority section for other requests, per RFC2181 5.4.1). You need to make sure that these stealth nameservers are working; if they are not responding, you may have serious problems! The report will not query these servers, so you need to be very careful that they are working properly. ns3.netmark.pl |
|||||||||
PASS | Missing nameservers 2 | All nameservers listed at parent servers are listed as NS records at your nameservers | |||||||||
PASS | No CNAMEs for domain | OK. There are no CNAMEs for Ratz.pl. RFC1912 2.4 and RFC2181 10.3 state that there should be no CNAMEs if an NS (or any other) record is present. | |||||||||
PASS | TCP Allowed | All your nameservers allow TCP connection | |||||||||
FAIL | Stealth NS record leakage | Your DNS servers leak stealth information in non-NS requests: ns1.netmark.pl ns2.netmark.pl |
|||||||||
PASS | Nameservers on separate class C's | OK. You have nameservers on different Class C (technically, /24) IP ranges. You must have nameservers at geographically and topologically dispersed locations. RFC2182 3.1 goes into more detail about secondary nameserver location. | |||||||||
PASS | All NS IPs public | OK. All of your NS records appear to use public IPs. If there were any private IPs, they would not be reachable, causing DNS delays. | |||||||||
FAIL | Glue for NS record | Your nameservers for your NS records didn't return the A records for the NS records. |
DNS Group | DNS Status | DNS Record Type | DNS Data Information |
---|---|---|---|
SOA | |||
INFO | SOA record | Your SOA record [TTL=86400] is: Primary Name server: ns1.netmark.pl Hostmaster E-mail address: firma.netmark.pl Serial #:2025042601 Refresh: 3600 Retry: 7200 Expire: 1209600 Default: 86400 |
|
PASS | SOA MNAME entry | SOA MNAME ns1.netmark.pl is listed as a primary nameserver at your parent nameserver | |
PASS | SOA RNAME entry | OK. Your SOA (Start of Authority) record states that your DNS contact E-mail address is: [email protected] (techie note: we have changed the initial '.' to an '@' for display purposes). | |
PASS | NS agreement on SOA Serial # | OK. All your nameservers agree that your SOA serial number is 2009050102. That means that all your nameservers are using the same data (unless you have different sets of data with the same serial number, which would be very bad)! Note that the DNS report only checks the NS records listed at the parent servers (not any stealth servers). | |
PASS | SOA Serial | Your SOA serial number is: 2025042601. This appears to be in the recommended format of YYYYMMDDnn. | |
INFO | SOA REFRESH | OK. Your SOA REFRESH interval is: 3600. RFC 1912 recommends 1200 to 43200 seconds, low (1200) if the data is volatile or 43200 (12 hours) if it's not. If you are using NOTIFY you can set for much higher values, for instance, 1 or more days (> 86400 seconds). | |
WARN | SOA RETRY | OK. Your SOA RETRY interval is: 7200. Typical values would be 180 (3 minutes) to 900 (15 minutes) or higher. | |
INFO | SOA EXPIRE | OK. Your SOA EXPIRE interval is: 1209600 .RFC 1912 recommends 1209600 to 2419200 seconds (2-4 weeks) to allow for major outages of the zone master. | |
PASS | SOA MINIMUM TTL | OK. Your SOA MINIMUM TTL is: 86400. That is OK |
DNS Group | DNS Status | DNS Record Type | DNS Data Information |
---|---|---|---|
MX | |||
PASS | MX Glue | MX record look up sends glue record which is good. | |
PASS | MX records are not CNAMEs | OK. Looking up your MX record did not just return a CNAME. If an MX record query returns a CNAME, extra processing is required, and some mail servers may not be able to handle it. | |
PASS | MX name validity | Good. We did not detect any invalid chars in hostnames for your MX records. | |
PASS | MX is host name, not IP | OK. All of your MX records are host names (as opposed to IP addresses, which are not allowed in MX records). | |
PASS | Different MX records at nameservers | Good. Looks like all your nameservers have the same set of MX records. This tests to see if there are any MX records not reported by all your nameservers | |
PASS | MX Glues match | MX Glue returned by nameserver for MX record match with A record of MX hostname. | |
PASS | Duplicate MX records | OK. You do not have any duplicate MX records (pointing to the same IP). Although technically valid, duplicate MX records can cause a lot of confusion, and waste resources. | |
PASS | MX A lookups have no CNAMEs | OK. There appear to be no CNAMEs returned for A records lookups from your MX records (CNAMEs are prohibited in MX records, according to RFC974, RFC1034 3.6.2, RFC1912 2.4, and RFC2181 10.3). | |
INFO | MX Record | Your 1 records: 0 ratz.pl [IP Address=185.36.171.17] [TTL=14400] |
|
FAIL | Multiple MX records | You need to have multiple MX records so that if one is down or unreachable, the other(s) will be able to accept mail for you. | |
PASS | Reverse MX A records (PTR) | The reverse (PTR) record for your MX records: 185.36.171.17 -> cl7.netmark.pl |
|
PASS | All MX IPs public | OK. All of your MX records appear to use public IPs. If there were any private IPs, they would not be reachable, causing slight mail delays, extra resource usage, and possibly bounced mail. |
DNS Group | DNS Status | DNS Record Type | DNS Data Information |
---|---|---|---|
PASS | SPF record | v=spf1 +a +mx +ip4:185.36.171.17 include:_spf.netmark.pl +ip4:91.189.252.37 ~all this domain sends email from following domains/subdomains:_spf.netmark.pl |
|
WARN | Sender ID record(spfv2.0) | SenderID framework not implemented | |
WARN | Domain Key Test | Domain keys not implemenetd for _domainkey.Ratz.pl. Separate domainkey records may exist for subdomains and selectors under this domain. this cannot be tested. | |
WARN | DMARC | DMARC policy not found. Not enabled. |
DNS Group | DNS Status | DNS Record Type | DNS Data Information |
---|---|---|---|
WWW | |||
INFO | WWW A record | Your WWW A record is: www.Ratz.pl > Ratz.pl. Resolved IP: 185.36.171.17 Your WWW is CNAME record and your CNAME entry returns A record which is good. WA & DA Score for Ratz.pl |
|
PASS | IPs are public | OK. All of your WWW IP addresses appear to be public IP addresses. | |
PASS | HTTP Service | OK: We can connect to http service on port 80. | |
FAIL | Server | http service on port 80 didn't return server information. | |
PASS | Server Header | http response header returns information about server as: LiteSpeed |
|
PASS | Connection | http connection header return connection as: Keep-Alive | |
WARN | Secure Header HSTS | The server did not implement the HSTS (HTTP Strict Transport Security) policy. The header over the HTTPS connection was not found. | |
WARN | Secure Header X-Frame-Options | XFO clickjacking protection response header was not found. XFO enables content to be found or not within iframes via the browser. | |
WARN | Secure Header X-Content-Type-Options | The X-Content-Type-Options secure header is not set | |
WARN | Secure Header Content-Security-Policy | CSP is not defined in the policy. The return secure header does not send any feedback that the CSP has been set | |
WARN | Secure Header X-Permitted-Cross-Domain-Policies | X-Permitted-Cross-Domain-Policies was not found in the response header | |
WARN | Secure Header Referrer-Policy | The Referrer-Policy HTTP header is not set, as it is not in the Referrer header. | |
INFO | Secure Header Clear-Site-Data | Clear-Site-Data was not found in the response header | |
INFO | Secure Header Cross-Origin-Embedder-Policy | COEP response header was not found in the HTTP request | |
INFO | Secure Header Cross-Origin-Opener-Policy | COOP response header was not found in the HTTP request | |
WARN | Secure Header Cross-Origin-Resource-Policy | CORP policy not found in response header | |
WARN | Secure Header Cache-Control | Cache-Control policy header not found in HTTP responses | |
WARN | Secure Header Permissions-Policy | Permissions-Policy header was not found in the HTTP responses. | |
INFO | Secure Header Feature-Policy | Feature-Policy header was not found in the HTTP responses. | |
INFO | Secure Header X-XSS-Protection (Deprecated) | X-XSS-Protection header was not found in the HTTP responses. | |
INFO | Secure Header HTTP Public Key Pinning (Deprecated) | HPKP header was not found in the HTTP responses. | |
INFO | Secure Header Expect-CT (Deprecated) | Expect-CT header was not found in the HTTP responses. | |
PASS | SSL / HTTPS Protocol | Domain use encrypted SSL / HTTPS connection on port 443. View SSL Certificate: Ratz.pl. |
|
FAIL | IPv6 | Your domain has no IPv6 support |