Web-Based Dig

Use this tool to perform a dig for a given domain or host. You can also add flags to the input to include things such as the axfr flag to pull a full DNS zone file.

Examples

@ns1.fatcow.com mx opphouseinc.org
dnssec fda.gov
@200.143.64.162 axfr simtelecom.net.br
-t cname googleec29c0f501f436ce.greatrealestate.ca
-t NS ringofsaturn.com
pioneerphysicians.com +bufsize=1024 +short rs.dns-oarc.net txt
dig  

Output of dig voxcast.games2girls.com

; <<>> DiG 9.20.20 <<>> voxcast.games2girls.com
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28863
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
; COOKIE: 7bb4ef90c69e63960100000069b11d93dba7789692fb73f6 (good)
;; QUESTION SECTION:
;voxcast.games2girls.com.	IN	A

;; AUTHORITY SECTION:
games2girls.com.	1800	IN	SOA	kai.ns.cloudflare.com. dns.cloudflare.com. 2397207135 10000 2400 604800 1800

;; Query time: 47 msec
;; SERVER: 47.190.90.80#53(47.190.90.80) (UDP)
;; WHEN: Wed Mar 11 02:45:23 CDT 2026
;; MSG SIZE  rcvd: 138