Web-Based Dig

Use this tool to perform a dig for a given domain or host. You can also add flags to the input to include things such as the axfr flag to pull a full DNS zone file.

Examples

@ns1.fatcow.com mx opphouseinc.org
dnssec fda.gov
@200.143.64.162 axfr simtelecom.net.br
-t cname googleec29c0f501f436ce.greatrealestate.ca
-t NS ringofsaturn.com
pioneerphysicians.com +bufsize=1024 +short rs.dns-oarc.net txt
dig  

Output of dig -t AAAA www.v6.facebook.com

; <<>> DiG 9.18.27 <<>> -t AAAA www.v6.facebook.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64229
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: fec12649d39bd69601000000664bfcc2b5c6c78237830efd (good)
;; QUESTION SECTION:
;www.v6.facebook.com.		IN	AAAA

;; ANSWER SECTION:
www.v6.facebook.com.	300	IN	CNAME	star-mini6.c10r.facebook.com.
star-mini6.c10r.facebook.com. 60 IN	AAAA	2a03:2880:f134:183:face:b00c:0:25de

;; Query time: 85 msec
;; SERVER: 47.190.90.80#53(47.190.90.80) (UDP)
;; WHEN: Mon May 20 20:45:38 CDT 2024
;; MSG SIZE  rcvd: 146