DNS tools Archives - ClouDNS Blog https://www.cloudns.net/blog/tag/dns-tools/ Articles about DNS Hosting and Cloud Technologies Tue, 17 Sep 2024 09:52:34 +0000 en-US hourly 1 https://wordpress.org/?v=6.2.6 Traceroute command and its options https://www.cloudns.net/blog/traceroute-command-tracert/ https://www.cloudns.net/blog/traceroute-command-tracert/#respond Tue, 17 Sep 2024 04:53:00 +0000 https://www.cloudns.net/blog/?p=656 The Traceroute command is one of the easiest yet most effective ways of troubleshooting network issues. It is great software for checking the route from a computer to a hostname or an IP address. Almost every operating system includes it, so you can use Traceroute regardless of the kind of computer you are using. What …

The post Traceroute command and its options appeared first on ClouDNS Blog.

]]>
The Traceroute command is one of the easiest yet most effective ways of troubleshooting network issues. It is great software for checking the route from a computer to a hostname or an IP address. Almost every operating system includes it, so you can use Traceroute regardless of the kind of computer you are using.

What is the Traceroute command?

The Traceroute command (Tracert on Windows) is a small network diagnostic software that you have built-in on your device and servers for tracing the route, hop by hop to a target.
Many network administrators use the Traceroute command daily. It is a convenient tool that you can use under different operation systems – Windows (Tracert), macOS, Linux (Traceroute), and even on mobile (Android and iOS).
To access the traceroute, you will need to use the Terminal (Linux and macOS) or the Command Prompt (Windows).
You can use the Traceroute and see the full route that the packets take to their destination (domain or IP address). Apart from that, you will see the hostnames and IPs of the routers on the way and the latency, the time it takes for each device to receive and resend the data.
You can see which gateway is discarding your data, and later you can fix it.

How does it work?

When you run a traceroute, you send an IP packet containing the source and destination addresses and the time to live (TTL) for each hop. TTL in packets decreases with each hop. This is to avoid server looping issues. Furthermore, when the TTL is reached, the packet expires and is discarded. When this occurs, Traceroute returns to the sender ICMP Time Exceeded messages (RFC 792). Because small TTL settings cause packets to expire quickly, traceroute forces all routers in a packet’s path to produce the ICMP messages that identify the router.

To better visualize the traceroute’s working mechanism, you can look at the following chart.

Why use the Traceroute or the Tracert command?

The benefits of using the traceroute command or its alternative for Windows called tracert command are:

  • Complete route list. You will see all the routers on the way, with their IP addresses and the time it took. You can better understand the network.
  • Route timing. See how much time does it take to finish the query. Is it ok for you? What can you do to speed it up? You can have a starting point for improvements.
  • It is built-in. You don’t need to install additional software, and its use is free.
  • Check if you can reach a target. See if there is a connection between your device and the hostname or IP address you put in the command.
  • See problematic slow router. You can see how much time it took in each hop. So you can see a spot that significantly slows your network. You can fix the problem or add more presence in the area.

When will you need it?

Here are several scenarios where using a traceroute to diagnose a problem you are having can be necessary.

  • Sluggish site

Run a traceroute from your computer to your website if you find it is operating slowly. With it, you will check for networking issues between your location and the server.

  • Customer timeouts for email

Run a traceroute to assess the quality of the connection to the mail server if you have problems with your mail connection. In addition, you can find your mail server IP by running the following command: “ping smtp.server.com”. It will return the IP address of the Simple Mail Transfer Protocol (SMTP) server that you need for Traceroute purposes.

How to use the Traceroute command?

Use the Traceroute command by writing the command “traceroute + domain.com / IP address” or, in the Terminal on Linux and macOS or “tracert + domain.com / IP address” in the Command Prompt on Windows.

Traceroute (Linux and macOS)

traceroute domian.com or traceroute 12.23.34.45

Tracert (Windows)

tracert domian.com or tracert 12.23.34.45

On macOS, you can also use the Traceroute utility. Press the command button + space. Then write Network Utility. Inside it, navigate to Traceroute. Write the hostname or IP address and press enter. It will show you the result.

*You can change the domain.com with another domain you want to probe, and the same goes for the IP address.

Some differences between the Traceroute command, and the Tracert exist. Check the options below.

Traceroute command vs Tracert command

Apart from the small difference between typing traceroute and the Tracert, the fact that the first works on Linux and macOS, and the second on Windows, the other significant differences are the syntax and the options.

Syntax of the traceroute and Tracert commands

traceroute [options] host_Address [pathlength] (Linux)

traceroute [options] host [packetsize] (macOS)

tracert [-d] [-h maximum_hops] [-j host-list] [-w timeout] [-R] [-S srcaddr] [-4] [-6] target_name (Windows)

Example of Traceroute (Tracert on Windows)

The name of Traceroute on Windows is Tracert. It works very similar to the version on the other operating systems.
Traceroute

And this is how the Traceroute command looks on Linux and macOS:

Traceroute command Linux

Traceroute options for Linux

If you are a Linux user (Ubuntu, Linux Mint, Manjaro, Red Hat, Debian, etc.), you can specify your traceroute command with the following options:

Option

Description

–help

Information about the command.

-d

This command enables debugging on Linux.

-F

Forbid fragmentation.

-f first_ttl

Put the first TTL value of the packet.

-g gateway

Define a loose source route gateway.

-i interface

Set the interface for the probes.

-m max_ttl

The TTL in traceroute means the maximum amount of hops.

-N

The number of probes that are sent at the same time (simultaneously).

-n

Stop the resolving of the IP addresses.

-p port

Define the port for the query.

-t

Set the type-of-service in probes.

-w waittime

Maximum waiting time for each of the replies.

-q nqueries

Set the number of queries. The default value is 3.

-r

Bypass the routing tables and send them to the host directly (on an attached network only).

-S srcaddr

IPv6 only – source address.

-e

Show ICMP extensions.

-A

AS lookups enable for each hop.

-V

Show version.

-U

Use a particular UDP port. The default value is 53.

-UL

Use the UDPLITE for the query.

-P protocol

Send packets of a specified IP protocol.

-I

Use the ICMP echo for the requests.

-T

Use the TCP SYN for the requests.

-4

Use only IPv4 addresses

-6

Use only IPv6 addresses

rDNS explained in detail

Traceroute options for Windows

You can use the Tracert command with various options to perform more precise tests. The following options work on Windows Vista, Windows 7, Windows 8, and of course, Windows 10.

Option

Description

-d

Do not resolve addresses to hostnames.

-h aximum_hops

Maximum number of hops to search for target. You can put higher than 30, if you want to query a very remote target.

-j host-list

Loose source route along host-list (IPv4-only). Show only IPv4 addresses.

-w timeout Wait timeout milliseconds for each reply. Inscrease it, to see more about slower routers.

-R

Trace round-trip path (IPv6-only).

-S srcaddr

Source address to use (IPv6-only).

-4

Force using IPv4.

-6

Force using IPv6.

Traceroute options for macOS

While the Traceroute command on macOS is very similar to its Linux version, there are small differences in their options.

Option

Description

-a

AS# lookups enable for each hop.

-d

Socket level debugging.

-D

When an ICMP response to our probe datagram is received, print the differences between the transmitted packet and the packet quoted by the ICMP response.

-e

Mode – Firewall evasion. The ports for UDP and TCP will be fixed and won’t increase with each hop.

-f first_ttl

Put the first TTL value of the packet.

-F

Forbid fragmentation.

-g gateway

Define a loose source route gateway.

-i iface

Set the interface for the probes.

-I

Use the ICMP echo for the requests.

-M first_ttl

Same as -f.

-m max_ttl

Set the maximum amount of hops. By default, it is set to 30.

-n

Show the hop addresses numerically.

-P proto

Send packets of a specified IP protocol.

-p port

Define the port for the query.

-q nqueries

Put a specific number of queries. The default value is 3.

-r

Bypass the routing tables and send them to the host directly (on an attached network only).

-S srcaddr

IPv6 only – source address.

-S

Summary of unanswered probes.

-t

Set the type-of-service in probes.

-v

Verbose output.

-w

Set waiting interval (in seconds) for a response. The default value is 3.

-x

Toggle IP checksums.

-z

Set a pause (in seconds) between the probes. The default value is 0.

Save Traceroute results for later analysis

Traceroute outputs can be long and detailed, especially when diagnosing complex networks. Saving the results for future analysis helps document network issues, allowing users to track changes, compare routes, or share the data with colleagues or support teams.

To save traceroute results to a file, simply redirect the output into a text file using the following syntax:

For Linux/macOS:

traceroute example.com > traceroute_results.txt

For Windows:

tracert example.com > tracert_results.txt

This command captures the entire output of the traceroute (or tracert) command and saves it in a file called traceroute_results.txt in the current directory. You can then review or share this file at any time, making it easier to troubleshoot ongoing network issues without needing to rerun the command.

The TTL and Traceroute

Each packet that you send contains a TTL (time to live). It is not a time but a limit of hops it can do before getting the result.

Usual limit is 30, but it can be more like 64 for example. This limit stops your data after a certain amount of hops so it won’t go forever. The IP packet will follow until it gets “time exceeded” or “port unreachable” when it gets to the host.

Starting at 30, on the next hop, it will drop to 29 and so on. If it can’t find the domain or IP that you wanted it will display a message where did it fail, so you will know where the problem is.

Distinction between Ping and Traceroute

Both Ping and Traceroute are tools for analyzing networks. However, the Traceroute is a little more advanced. For example, ping will check the connectivity between two hosts but does not reveal the route between them. On the opposite, the Traceroute shows every stop between the source and the final destination. This can be helpful when connectivity is patchy, such as when only 50% of ping attempts between two places are thriving.

So, to sum up, the Traceroute command can be used to identify connectivity issues, while ping is a quick approach to determine whether a host is reachable over a network. Both of these commands are beneficial to be aware of because knowing how they operate and what their output denotes can be very valuable when analyzing network connectivity issues.

Traceroute’s Restrictions

  • It establishes the route at the interface level rather than at the router level.
  • The Traceroute may not respond after crossing the maximum number of hops if there are firewalls between the source and destination routers that prevent the probe packets from being sent. Furthermore, despite the hops IP address, the router will display * (asterisk) if no response is received. Therefore, using a traceroute under these circumstances is not suggested.
  • Based on the IP headers, load balancing routers can route the traffic via a number of different paths. Therefore, if we execute a traceroute in this case, it will give us an incorrect path between the origin and the goal. Accordingly, it is not advisable to employ traceroutes in this circumstance either.

Are there alternatives to the traceroute command?

Yes, there are various alternatives to the traceroute commands like MTR command, Dig command, Open Visual Traceroute, Nmap.

MTR command (Linux and macOS)

mtr domain.com

The MTR command is an improved traceroute command that can give more statistics and data for lost packets (percentage).

Dig command (Linux and macOS)

dig +trace domain.com

If you already use the Dig command, you can use it for tracing the route too.

Open Visual Traceroute (Linux, macOS, and Windows)

This one is for people who want a visual interface. It is heavier, but it can show you, in a graphical way, the route of the queries and also get Gantt graphs.

Nmap (Linux, macOS, Windows, BSD, and more)

nmap –traceroute domain.com

The results are very similar to the traceroute command.

Conclusion

By using the newly collected data, you can see if there is any problem on the route (not responsive server or very slow one) and later focus your attention to fix it. If you want to see few more tools you can check one of our previous article Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup.

The post Traceroute command and its options appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/traceroute-command-tracert/feed/ 0
8 DNS tools for testing your servers https://www.cloudns.net/blog/dns-tools/ https://www.cloudns.net/blog/dns-tools/#comments Wed, 11 Sep 2024 05:43:00 +0000 https://www.cloudns.net/blog/?p=286 You are already a DNS user, and your server or website works great when you visit it from your computer. But that is not enough. You want to be sure that the DNS works great all around the world. For example, your primary server is in the US, but you want to see if there …

The post 8 DNS tools for testing your servers appeared first on ClouDNS Blog.

]]>
You are already a DNS user, and your server or website works great when you visit it from your computer. But that is not enough. You want to be sure that the DNS works great all around the world. For example, your primary server is in the US, but you want to see if there is not too much latency in Singapore, what should you do? Or you want to compare with your rivals, to know which is their provider and how well is it performing? There are many DNS tools that you can easily use for free, to check your DNS servers and to see if everything is working well. Each of these tools has slightly different functionality, just follow us, and we will explain to you what they are good fo

ClouDNS

Featuring in our list is the freshly launched ClouDNS DNS tool. This tool is intended for examining DNS records linked to a specific host alongside measuring the velocity of DNS queries. Some of the records that it will show information are A, CNAME, PTR (responsible for Reverse DNS lookup), MX, CAA, NS (needed to create DNSSEC), etc. It also incorporates a comprehensive audit feature. Developed by ClouDNS, the functionality of the tool has been designed considering the need of users to optimize their server’s performance effectively. The tool offers three types of assessments – DNS records, DNS audit, and DNS speed assessments, providing a holistic insight into the server’s DNS operation. The best part? It’s completely FREE!

DNS.Computer

DNS.Computer is highly efficient and simple to use. With just the insertion of the domain name and a click on ‘audit’, this tool generates a detailed report featuring observations and suggestions for optimization. This report, even available as a download in PDF format, provides valuable insights such as nameservers at the parent server, synchronization of NS records, and data contained in the SOA (Start of Authority) record.

It also showcases A record data by location with their response times, giving you insightful geographical distribution of your DNS. Plus, it displays an average response time for your DNS, advising a switch to Anycast DNS if the response time is significantly high. Overall, DNS.Computer is a dynamic tool that offers quick and specific insights to boost your DNS performance.

30-day Free Trial for Premium Anycast DNS hosting

Pingdom DNS Test

Pingdom DNS Test outshines its dual-feature of web page speed testing and DNS troubleshooting. It pinpoints performance bottlenecks, providing insights to optimize your site’s speed and user experience. Advanced diagnostics are visualized using color codes, icons, and dots, making it a hassle-free tool for improving site performance.

Additionally, the DNS tool provides intuitive visual aids, using color codes to denote different stages of a request, icons for various content types, and colored dots for different HTTP response codes

What is Web (HTTP/HTTPS) monitoring?

Into DNS

IntoDNS takes DNS evaluation to a new level by providing a detailed assessment of your server’s health and configuration status. It generates exhaustive DNS reports with actionable recommendations for improvements, backed by references to official protocol documentation. This covers a series of checks from MX records to SOA data and even WWW IPs, making it a powerful tool for enhancing server performance and stability.

Check Host

Check Host DNS tool provides substantial insight into any website’s domain. By entering a hostname or IP address, it can provide data from nameservers located in different countries concurrently. This quick global overview can provide you with pertinent information about your domain from various locations. 

After you input a domain into the Check Host DNS tool, it will give you comprehensive information, including the DNS result under specific categories such as ‘Location,’ ‘Result,’ and ‘TTL (Time to Live).’ Each of these categories gives you insight into different aspects of your domain’s DNS performance in various locations worldwide. That means, you can evaluate the response time (ping) from a variety of locations, which aids in testing server speed globally.

What Ping monitoring is?

View DNS

ViewDNS offers an all-embracing analysis of your domain’s DNS settings. Aimed at assisting webmasters and system administrators, this tool completes multiple tests to uncover DNS-related issues. Moreover, it checks A records for each NS at parent servers and whether the local nameservers send the IP address (glue) along with your NS records. These results are displayed in a readily understood format, offering valuable insights for your DNS health and improvement recommendations.

Suggested article: What are Glue records?

WhatsmyDNS

WhatsmyDNS effectively simplifies DNS queries with its DNS Lookup tool. It allows you to query DNS servers and receive quick insights for any domain name. The tool is designed to support most common DNS record types and also lets you choose from a selection of DNS servers. It’s a valuable resource for conducting a fast and robust DNS check.

DNSdumpster

DNSdumpster also deserves a mention – this is a no-cost domain research tool that’s instrumental in identifying specific hosts associated with a particular domain. Conducting a visibility check of hosts from the perspective of potential attackers forms a crucial aspect of a security assessment process, and this is exactly what DNSdumpster assists with. It also features an additional unique functionality called ‘mapping the domain,’ the data for which can be conveniently downloaded in a .xlsx format for a comprehensive list of hosts. This tool is particularly useful for those focusing on enhancing their server security measures.

Benefits of regular DNS audits

Performing regular DNS audits is essential to maintaining the health of your server and website. These audits can identify issues such as outdated or incorrect DNS records, misconfigurations, and potential security vulnerabilities. By regularly checking the accuracy and performance of your DNS setup, you ensure your domain resolves correctly for all users, reducing the chances of downtime or delays. DNS audits also help you stay compliant with best practices, optimize load balancing, and improve your website’s speed by using the best available resources. Ultimately, consistent DNS audits lead to enhanced performance, increased security, and a better user experience.

Conclusion

In summary, these DNS tools offer a range of features to help you test and optimize your server’s DNS performance, ensuring global accessibility, troubleshooting, and security enhancement. Whether you’re a novice or an experienced user, these tools provide valuable insights into your DNS infrastructure’s health and performance

The post 8 DNS tools for testing your servers appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/dns-tools/feed/ 1
Linux Host command, troubleshot your DNS https://www.cloudns.net/blog/linux-host-command-troubleshot-dns/ https://www.cloudns.net/blog/linux-host-command-troubleshot-dns/#respond Tue, 19 Mar 2024 08:02:00 +0000 https://www.cloudns.net/blog/?p=1108 Today we will add one more handy DNS tool – Host command on Linux. For the purpose, we will use the latest Linux Mint 19.1 (based on Ubuntu Linux). For those of you who are used to Windows, Linux Host command is very similar to nslookup, but a bit more advanced. Host command replaced the …

The post Linux Host command, troubleshot your DNS appeared first on ClouDNS Blog.

]]>
Today we will add one more handy DNS tool – Host command on Linux. For the purpose, we will use the latest Linux Mint 19.1 (based on Ubuntu Linux). For those of you who are used to Windows, Linux Host command is very similar to nslookup, but a bit more advanced. Host command replaced the nslookup on Linux-based operating systems.  You can use it to check different types of DNS records.

What is the Host command?

The Host command is a software with a command-line interface that serves to test DNS. Internet Systems Consortium created it, and it is distributed as a permissive free software with an ISC license. 

As we mentioned already, the Host command is a utility tool for network diagnostic that you can use to probe different DNS records. You can see the A or AAAA records to get the IP address of a domain, see the name servers, find the start of authority, MX records, and more.

The purpose of the Linux Host command

The purpose of the Linux Host command is to query Domain Name System (DNS) servers to resolve domain names to IP addresses or vice versa. It is a command-line tool that can be used to retrieve DNS information about a hostname or domain, such as its IP address, aliases, or mail exchange (MX) records.

The Host command is a beneficial tool for developers and IT professionals who need to troubleshoot network issues or debug applications that rely on DNS. By using the Host command, they can quickly determine if a hostname is resolving to the correct IP address or if there are any issues with the DNS resolution process.

Additionally, the Host command can be used to perform advanced DNS queries, such as retrieving different types of DNS records and setting a specific timeout value. This makes it a versatile tool that can be used in various scenarios, from simple DNS lookups to more complex network debugging tasks.

Host command syntax

If you want to see the syntax of the Host command and the options that it has, you can simply write “host” and press “Enter.”

host [-aCdlnrsTwv] [-c class] [-N ndots] [-R number] [-t type] [-W time] [-m flag] [-4] [-6] hostname [server]

host command syntax

Host command Options

Here you can see all the available options. Whenever you forgot them, just write “host” in the Terminal.

options for the command

Host command examples

For all the cases we will use Google.com. You can change Google.com with your domain or whichever else domain that you are interested in. We will give you several examples that can be useful for your work.

Search for the IP address of the domain.

host google.com

This command will show the content of the A and AAAA records. You will get IPv4 and IPv6 results for the domain.

host google.com

SOA Record

See the Start of Authority records with this command. The SOA record is used for zone transfer. There could be only one SOA record per zone file. If you see more, then you need to fix the problem.

host –C google.com

SOA record

Check the name servers of the domain

host –t ns google.com

It will display the name servers of the host. The –t, we use to specify the type of query. When you know all of the available name servers, you can test them individually. 

host ns record

Check a particular name server

You want, for example, to review the ns1. To see if it is responsive or is there any problem, so you type:

host google.com ns1.google.com

particular name server

 CNAME record

host –t cname mail.google.com

You can use it to find CNAME record. Those records will link one alias to the true name, the canonical. 

host cname

MX record

Check the incoming mail server with this query. You can see if they are responding correctly. 

host –n –t mx google.com

mx record host command

TXT Record

You can also check TXT records. There are various TXT DNS records that serve for authentication or verification. One of them is the SPF record that shows who can send emails from the particular domain. 

host –t txt google.com

txt host command

Decide the Waiting time for a query

You can use –w to wait forever or –W and time in seconds to decide how long to wait for a reply.

host –T –W 10 google.com

select time for host command

Reverse lookup

You can also check the IP and see the host. It is a must to set the Reverse Lookup Zone for your mail server to work properly. 

host 216.58.194.142

reverse dns lookup with host command

Host command to see all of the DNS records for a domain

host –a google.com

You will get information about various types of records – NS, AAAA, MX, etc. With that report, later, you can probe each DNS individually. 

all records host command

Change the default number of tries from 1 to the number you desire

host -R 8 google.com

In this example of host command, we changed from 1 to 8, the number of tries. The domain will have 8 chances to respond. When it manages to answer, it will stop the retries.   

-R : In order to specify the number of retries you can do in case one try fails. If anyone try succeeds then the command stops.

Troubleshooting Tips

When using the Linux Host command for DNS queries, you may encounter various issues. Here are some troubleshooting tips to help you resolve common problems:

  • Domain does not resolve: If a domain doesn’t resolve, first ensure that the domain name is correctly spelled. Next, check your network connection and confirm that your DNS servers are set up correctly. Use other DNS tools like dig or nslookup for comparison. If the issue persists, it might be due to DNS propagation delays, which can take up to 48 hours after a DNS change.
  • Interpreting error messages: Error messages can provide insights into what’s wrong. For example, “Host not found” suggests the domain name does not exist or DNS propagation has not completed. “Connection timed out” indicates a problem reaching the DNS server, possibly due to network issues or incorrect DNS server settings.
  • DNS propagation delays: After DNS changes, it can take time for the updates to propagate through the internet’s DNS system. Use tools like whois or online DNS checkers to see if your changes have propagated. Patience is key here, as this process is beyond your direct control.

Alternatives to the Host command

There are several alternative DNS probing tools that you can use in place of the Host command, and some of the most popular ones include:

  • Nslookup command: This tool is available on Linux, macOS, and Windows, and is straightforward to use. It’s a reliable, always-on-hand option for DNS lookups.
  • Dig command: Some users prefer this tool over Host as it has additional options and can retrieve all types of DNS records.
  • Ping command: While not as comprehensive as other tools, this network utility is useful for checking host availability by sending packets to a host or IP address to see how it responds.

Exploring and learning to use various DNS probing tools is great. Having multiple options on hand can be beneficial, especially if you manage multiple sites or need to troubleshoot different types of network issues.

Conclusion:

This was the Host command. Now you have one more way to troubleshoot your DNS. If you are interested in diagnostic tools, we recommend you the following articles too: Dig command, Nslookup, Traceroute, MTR and Ping. They will expand your knowledge in DNS diagnostic.

The post Linux Host command, troubleshot your DNS appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/linux-host-command-troubleshot-dns/feed/ 0
Linux dig command, how to install it and use it https://www.cloudns.net/blog/linux-dig-command-install-use/ https://www.cloudns.net/blog/linux-dig-command-install-use/#respond Thu, 14 Mar 2024 09:54:00 +0000 https://www.cloudns.net/blog/?p=1070 This article will show you how to use the dig command on Linux. You can apply the knowledge to Windows or MacOS.

The post Linux dig command, how to install it and use it appeared first on ClouDNS Blog.

]]>
Dig command (Domain Information Groper) is one of the most popular DNS testing tools. You can use it to troubleshoot your DNS and make sure everything works fine. You can try it on Linux, Mac OS, and Windows. For this demonstration, we will use a random old laptop with the latest version of Linux Mint (19.1). Linux Mint is based on Ubuntu Linux. Many old laptops can get a new life as a diagnostic tool.

How does Dig Command work?

Dig Command works the same way as a typical DNS query. Let’s take an A record request. If you want to see the A record, you want to know the IP address of a particular domain. The request will first check if your router has the information of many sites’ addresses in its cache. If it doesn’t have it, the request must be answered from another recursive server. The common solution is that your query will be responded from the recursive servers of your internet provider. It is possible that it doesn’t know it either. No problem, your query will go on a search for the root server. The request will go to the top-level domain like .COM or .EU, and in the end you will get the IP address from the authoritative server for the domain you were checking. 

Dig Command Syntax

Understanding the syntax of the dig command is crucial for effectively utilizing it for DNS troubleshooting and queries. The basic syntax of the dig command is as follows:

dig [@server] [name] [query type] [options]

  • [@server]: Specifies the DNS server to query. If omitted, dig uses the default server specified in your system’s resolver configuration (usually defined in /etc/resolv.conf).
  • [name]: This is the domain name or IP address you want to query. For example, cloudns.net.
  • [query type]: This specifies the type of DNS record you are interested in. Common types include A, MX, SOA, TXT, PTR etc. If this is left out, dig defaults to querying the A record.
  • [options]: Dig offers a wide range of options to modify its behavior and output. For example, +short displays only the answer section of the query. Other options include +trace for tracing the path of the query across DNS servers, +noall +answer to show only the answer section, and many more.

How to install the dig command on Linux?

First, let’s check if you already have the dig command installed. You can do that by opening the terminal and writing dig -v. If you have it, your computer will show a message similar to this one:

DiG 9.11.3-1ubuntu1.7-Ubuntu.

Many new Linux distros have it pre-installed. In case you don’t have it, you will get the following message:

dig command not found

For Linux Mint, Ubuntu and other Ubuntu-based Linux distributions you can use the following command:

sudo apt install dnsutils

If you are using Fedora or CentOS you should use:

sudo yum install bind-utils

And for Arch Linux users:

sudo pacman -S bind-tools

Understanding the dig command

Let’s start with a simple example to understand it. We will use google.com for the testing. You can try it directly with your domain, by simply replacing google.com with your domain.

dig google.com

dig command

The first line will inform you about the version of the dig command and the second about the global option.

After that, you will get technical information provided by the DNS nameserver. The header shows you what did you do and was it successful. If there is “NOERROR” that there was no problem.
You will see the answer for the EDNS.
Following line shows that by default you are requesting the A record.
You will get the answer for the A record – the correspondent IP address and you will get statistic about the query.

10 Most used Dig commands

More dig command examples:

dig google.com +short

dig command + short

This will show you just the IP address without any additional information. Quick and easy to use the answer that is basically the answer of an A record. 

dig google.com MX

dig command MX

You can query different types of records like the mail exchanger ones. MX records show the responsible mail server for accepting emails. You can see if all of the servers are working the right way and if they are responding too slowly.

dig google.com SOA

dig command SOA

SOA – the start of authority, shows the authoritative DNS server. In this record, you see valuable information about the zone. There is only one SOA per zone. 

dig google.com TTL

dig command TTL

TTL – time to live. It shows how long the data should be kept. You can read more about TTL HERE. People usually leave longer TTL, and that way, they lower the DNS servers’ load. When you are creating records, you can set it to a low value, if you like. Also, it is possible to set different TTL for different DNS records.  

dig google.com +nocomments +noquestion +noauthority +noadditional +nostats

dig command no stats

Only answer query. Use it if you don’t want to receive extra information. A clear and short answer that will evade the extra statistics that you might want to skip. 

dig google.com ANY +noall +answer

Query all types of DNS records. It will show all the different types of DNS records. This will give you an overview of the domain. Later you can use the dig command for the exact DNS records that you want. 

dig -x 172.217.1.142

dig command ptr

Reverse DNS lookup. You can also do the opposite and check the IP address. The rDNS is used for verification. The result will be a PTR record that verifies the nameserver. It is needed that a PTR record exists. Otherwise, this revers checking can’t give an answer.

dig @8.8.8.8 +trace google.com

dig command trace

Trace DNS Path. It will show the whole route that a DNS query takes. Every hop from a server to server. It can show you where exactly server is not working. You might be surprised how far does your query travels. Check it from different locations, and you might see where in the world you need a new point of presence to reduce the latency for the users there.

11 dig -p 5300 google.com

dig command port

Specify Port Number. If you have changed the standard port 53 to another for increased security, you can make a dig command to check if it is working correctly. And of course, you can check if you have closed the standard ports, and you don’t have any “open doors” for attackers. 

dig _sip._udp.YOURDOMAIN.com SRV

Another record that you can check with this command is the SRV. The SRV records are often used in VoIP. In this example, we are checking the SIP service, and we will use the UDP protocol. The answer will show you the time for response and the server’s IP responsible for the SIP service. 

dig google.com TXT

To see all of the TXT records, use this command. TXT records can be used for verifications and can have different variations. For example, it can be a DMARC record. To see a particular one, you can use the following command and change the “dmarc” with the one you need. 

dig _dmarc.google.com TXT

Now you know the basics of the dig command on Linux. You can start experimenting by yourself.

We can recommend you a few more tools that can be useful for your DNS diagnostic Nslookup, Traceroute, MTR, Host, and Ping.

Conclusion

The dig command is an indispensable tool for DNS troubleshooting and analysis. Its flexibility and powerful options make it a preferred choice for network administrators and IT professionals. By understanding how to install and use the dig command, as well as mastering its syntax, you can efficiently diagnose and solve DNS-related issues. Whether you’re checking DNS records, performing reverse DNS lookups, or tracing the path of DNS queries, dig provides you with the insights needed to ensure your domain’s DNS is functioning correctly. Remember, practice is key to becoming proficient with the dig command, so don’t hesitate to experiment with different queries and options. With this knowledge, you’re well-equipped to tackle any DNS challenges that come your way.

The post Linux dig command, how to install it and use it appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/linux-dig-command-install-use/feed/ 0
Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup https://www.cloudns.net/blog/dns-tools-dns-trace-online-ping-traceroute-dns-lookup-reverse-lookup/ https://www.cloudns.net/blog/dns-tools-dns-trace-online-ping-traceroute-dns-lookup-reverse-lookup/#comments Thu, 07 Mar 2024 06:15:00 +0000 https://www.cloudns.net/blog/?p=544 Navigating the world of DNS and network management can often feel like a complex puzzle, especially when things don’t work as expected. Whether you’re troubleshooting connectivity issues, ensuring your website is accessible, or just curious about how network paths operate, having the right tools at your disposal is crucial. This article introduces you to a …

The post Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup appeared first on ClouDNS Blog.

]]>
Navigating the world of DNS and network management can often feel like a complex puzzle, especially when things don’t work as expected. Whether you’re troubleshooting connectivity issues, ensuring your website is accessible, or just curious about how network paths operate, having the right tools at your disposal is crucial. This article introduces you to a suite of essential tools – DNS trace, Ping, Traceroute, Nslookup, and Reverse lookup – each designed to help you diagnose and solve various network and DNS challenges. These tools are vital for diagnosing connectivity issues, optimizing network performance, and ensuring your online services run smoothly. Let’s dive into how to use them effectively.

DNS trace (dig + trace)

Using DNS trace, you can troubleshoot your DNS. You can use it on Linux OS, Mac OS and even on Windows (using Cygwin). You will trace the route of a DNS query. If there is a problem, you will see exactly where it is.

$ dig +trace www.cloudns.net

(you can write your website)

First, you request a webpage, for example, www.cloudns.net.

The query gets to the root name server for it.

This name server will show you the TLD authoritative server.

Your recursive resolver queries the .com TLD authoritative server for www.cloudns.net.

The .com TLD authoritative server refers your recursive server to the authoritative servers for cloudns.net.

Your recursive resolver queries the authoritative servers for www.cloudns.net and receives the IP as the answer.

Your recursive resolver caches the answer for the duration of the time-to-live (TTL) specified on the record and returns it to you.

This is how domain resolution works. You can get valuable information about the speed and accuracy of the answer.

Additionally, DNS trace is invaluable for diagnosing and understanding DNS propagation issues. It helps identify delays in DNS updates or misconfigurations across different levels of the DNS hierarchy. By understanding the path a DNS query takes, administrators can pinpoint issues more efficiently and ensure that DNS records are correctly resolved. Additionally, DNS trace is an excellent educational tool for those learning about the complexities of internet addressing and domain name resolution.

Premium DNS Service!

Online Ping

Online Ping is a DNS tool that administrator use for checking the connectivity and the speed. Using this command, you send a small data packet to a particular IP address. Then wait to get a feedback packet. You can also use it to ping a name resolution. If you get an answer when you do a ping to an IP but not when you do it to a name, then the two don’t match.

ping www.cloudns.net

Beyond checking connectivity and speed, Online Ping can be used to monitor the availability and response time of a server or network device continuously. This is crucial for maintaining high uptime for critical services and websites. Regular ping tests can alert administrators to network congestion, latency issues, or outages that may affect user experience. It’s a simple yet powerful tool for ensuring that network paths are optimal and services remain accessible.

What is ICMP Ping monitoring?

Traceroute

Tracing the route is similar to the ping. Using this DNS tool, you send a packet of data to an internet host, and it gives you back a result for every hop your query makes in seconds. If your website has a slow response, using this tool you can see where exactly it is the problem.

Try our Free DNS tool! 

traceroute www.cloudns.net

Traceroute not only helps in identifying where problems lie in the network path but also in understanding network infrastructure and performance. By showing the route data packets take to reach their destination, traceroute can reveal unexpected routing behavior or bottlenecks. This insight is useful for network optimization and planning, as well as for security purposes to detect any unauthorized or suspicious network paths.

DNS lookup (nslookup)

You can use this tool on different Operating systems for making DNS queries to get to an IP address or for specific DNS records. You can use it to see if you have any problems with any kind of DNS record that you are using.

nslookup www.cloudns.net

In addition to querying IP addresses or specific DNS records, nslookup is also useful for verifying and troubleshooting DNS configurations and propagation status. This tool can help ensure that your DNS settings are correctly implemented and propagated across the internet, which is critical for website accessibility and performance. It’s also beneficial for security analysis, allowing administrators to check for DNS-based threats or misconfigurations.

10 most used nslookup commands

Reverse DNS lookup

It does what it says, here you start with an IP address and you can find the domain name. This process uses PTR records that show exactly that. You can use it for troubleshooting.

dig -x 136.243.33.126

Reverse DNS lookup is not only crucial for troubleshooting but also plays a significant role in network security and anti-spam efforts. By verifying the domain name associated with an IP address, administrators can identify potential sources of spam or malicious activity. Furthermore, reverse DNS lookups are used in email authentication processes to reduce spam by verifying that the IP address sending the email matches the domain from which it claims to come.

Read more for the Reverse DNS and PTR records in our article: rDNS explained in detail

Conclusion

In conclusion, mastering the use of essential DNS tools like DNS trace, Ping, Traceroute, Nslookup, and Reverse lookup is paramount for network administrators and troubleshooters. These tools offer invaluable insights into diagnosing connectivity issues, optimizing network performance, and ensuring the smooth operation of online services. By harnessing their capabilities effectively, administrators can navigate the complexities of DNS management with confidence, ultimately leading to a more stable and reliable networking environment.

The post Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/dns-tools-dns-trace-online-ping-traceroute-dns-lookup-reverse-lookup/feed/ 2
What is Ping command and how to use it? https://www.cloudns.net/blog/what-is-ping-how-to-use-ping/ https://www.cloudns.net/blog/what-is-ping-how-to-use-ping/#respond Tue, 06 Feb 2024 09:43:44 +0000 https://www.cloudns.net/blog/?p=652 What is Ping command? Ping is a very universal command between all the operating systems. You can use it to test if you can reach your target and how much time it will take to do it. Ping sends Internet Control Message Protocol (ICMP) packets to the destination. Then it waits for the echo reply. …

The post What is Ping command and how to use it? appeared first on ClouDNS Blog.

]]>
What is Ping command?

Ping is a very universal command between all the operating systems. You can use it to test if you can reach your target and how much time it will take to do it. Ping sends Internet Control Message Protocol (ICMP) packets to the destination. Then it waits for the echo reply. It can show statistic for this request, errors and packet loss.

When you use this command, you will send few echo requests, usually 4. Then you will receive a result for each of them, that indicates if they were successful, how much data was received, the time it took for the response and TTL (Time to live).

Ping command

Brief History

The Ping command is a foundational tool in computer networking, tracing its origins back to the earliest days of the Internet. Developed by Mike Muuss in 1983, Ping emerged as a simple yet powerful utility for testing the reachability of a host on an Internet Protocol (IP) network.

Muuss, a respected computer scientist, created the tool while working at the Ballistic Research Laboratory. The name “Ping” itself reflects the sonar concept from submarines, where a pulse is sent to measure the distance to an object. Similarly, the Ping command dispatches small packets of data to a target device, awaiting their return to measure the round-trip time. 

Initially implemented for Unix-based systems, Ping swiftly gained widespread adoption due to its effectiveness in troubleshooting network connectivity issues. Over time, it has evolved alongside networking technologies, remaining a staple tool for network administrators, system engineers, and enthusiasts alike. Its versatility extends beyond connectivity testing, serving as a vital diagnostic tool for assessing network performance and identifying potential bottlenecks.

How does it work?

Imagine the Ping command as an echo locater. When you use it on your computer, it sends a specific small packet with the ICMP ECHO_REQUEST to its destination (it could be a server, another computer on the network or a router). The recipient must bounce back the message, and send ECHO_REPLY as an answer. 

Your computer will always have 127.0.0.1 IP address. If you try to ping it, you will always get fast result. The command will verify that the TCP/IP on your device is working fine. 

You can use ping localhost and get the same result since it is the same.

What is Localhost (IP 127.0.0.1)?

If you get 4x Request timed out, then it is not working ok.  

How to use Ping command?

You have the ping utility on whatever operating system you have. 

On Windows, open the Command Prompt and on macOS and different Linux distros, open the Terminal. 

There are small differences in the syntax of the ping command on the OSes. You can see them down below. 

You can ping: 

  • A domain name and see how much time it will take to respond.
  • An IP address. It will also show response time, but it will the important part is that it will show that the device is well-connected. 

We will try to use it with www.google.com. Write the following: 

ping www.google.com

Ping Google

The first part that you will see, who are you pinging, its IP address, and the packet’s size – 32 bytes. 

After that, you will get 4 results. Ping sends 4 echo messages unless you specify a different number. Those 4 answers will have response times in ms – milliseconds and TTL value showing the time to live of the packet. 

You will also get a few stats – completion rate that shows how many packets managed to arrive and a minimum, maximum, and average time. 

Ping switches and variables 

There are a lot of small differences when you use ping on Windows and Linux or macOS. For example, the option in Windows is “–n” and in Linux and macOS is “–c”. The best thing you can do is to check the syntax first. You can see all the available variables, switches, and options with a short command. 

Ping command syntax for Windows 

To get to the list of all possible options for the ping command on Windows, you can write in the Command Prompt:

ping -?

It will give you a result with a full list of options that can make your troubleshooting easier.

Midifier/OptionWhat does it do?
-tConstant ping without stopping
-aResolve an IP address to its hostname 
-nSetting the number of echo messages. The default value is 4
-l Use to send the size of the buffer
-fStopping the fragmentation of the flag (IPv4-only)
-iChange the  TTL value
-vNot functioning any more
-rUse it to see the number of hops and get a record (IPv4-only)
-sA timestamp for each hop (IPv4-only)
-jLoose source route along host-list (IPv4-only)
-kStrict source route along host-list (IPv4-only)
-wSetting the time that your device can wait for an answer
-RCheck the reverse route (IPv6-only)
-SSource address to use
-cRouting compartment identifier
-pPing a Hyper-V Network Virtualization provider address
-4Use IPv4 only
-6Use IPv6 only

Ping command syntax for Linux and macOS 

To get to the ping syntax on Linux or a computer with macOS, you need to type this in the Terminal: 

ping –h

Midifier/OptionWhat does it do?
aMakes a sound when it arrives at the target device
bThis lets ping a broadcast IP address.
BStops the ping from changing the source IP address. 
c (count)Set the number of pings. 
dSO-DEBUG on the used socket
fFloods the network with many ping packets a second. 
i (interval)Interval, in seconds, between successful transmissions. 
I (interface address)Defines the source IP address to a particular interface IP address. 
1 (preload)Numbers of echoes sent without waiting for the replies. 
nIn the output, it shows hostname instead of IP addresses 
qA quiet output. One-line ping and summary
T (ttl)T – time to live value (TTL)
vVerbose output
VCheck the version of the ping command with it
w (deadline)Time for the exit, no matter the number of messages sent and received.
W (timeout)Waiting for response time (seconds)

Troubleshooting

  • Ping an IP address to see if the device is well connected. If it fails, then the device is not connected at this moment or not reachable over the network we are checking.
  • Another scenario is that it is successful but the response times are very long. It means that you or the other side might have problems with the connection.
  • You can test different parts of the network to check which are working fine and which are not.
  • If you want to check if you are connected to the Internet, you can check one of Google’s IPs, “ping 172.217.6.164”. Why Google you ask? It is just effortless to remember. And do you remember Google been offline? Not really.
  • You can use it as a constant checker. Put it with an option to “run until stopped,” and as long as everything is okay, it will continue, but if something fails you will see it immediately.
  • If you can’t reach the name, but you can reach the IP address, this shows a problem with the hostname resolution. Probably the DNS servers are not pointed correctly, or they are not accessible.

Monitoring

Ping command appears to be a great tool for monitoring the network availability of different devices. If the command runs as a scheduled task, it can offer simple polling of any network computer or machine. The great thing about it is that it is not necessary to install any additional software or open additional ports.

ICMP Ping monitoring is easy to accomplish due to the ‘run until stopped’ option, which allows the most basic of any up/down monitor. So, whenever the pings start failing, that means there are some difficulties reaching the system.

The ping time, measured in milliseconds (ms), is preferred to be as lower as possible. That is going to indicate the good quality of the ping. In addition, it can deliver signals about the health of your network and its performance speed. Ping monitoring sends an Internet Control Message Protocol (ICMP) echo request. That means when the monitored device receives the request, it replies immediately with the echo reply packets.

Monitoring service by ClouDNS

Security

Sometimes, a cybercriminal is enough to know that a precise system exists and is connected to the global network to initiate a malicious attack. Thankfully, performing a detailed analysis of the Ping command replies could be extremely helpful. You could perhaps find valuable details, like which operating system (OS) the target is running, where the device is located, and so on.

There are different hacking tools that allow taking advantage of “walking the range.” They use the Ping command for each IP address on a targeted network in order to obtain a list of systems that are reachable and will reply. For that reason, a lot of firewalls are configured in a way that stops Ping requests coming from untrusted networks.

More examples of Ping command (Windows, Linux and macOS)

Here we have a few more use cases of ping command for Windows, Linux and macOS users:

*You can change the IP addresses of the examples or the hostnames and use them with yours. Also feel free to modify the command for your needs.  

Intervalping –i 5 8.8.8.8 (Linux)

This will make it wait 5 seconds before sending the following packet. 

Custom number of pingsping –n 8 google.com (Windows) ; ping google.com –c 8 (Linux and macOS)

You can decide how many echo messages to send. 

Check versionping –V (Linux)

You will see the version of the ping you have. 

Floodping –f 127.0.0.1 (Linux)

This will flood the network with many pings. 

Only Statisticping google.com –q (Linux and macOS)

It will show you just the statistic, not each individual ping time. 

Change packet sizeping –s 100 google.com (Linux)

It will change the size of the packets. The original is 32 bytes (Windows) and 56 (Linux and macOS), and in this example we have set it to 100. 

Timeout – ping –w 20 google.com (Linux)

If you use this example, the ping will exit in 20 seconds. It will terminate regardless of the number of packets send or received. 

Constant pingping –t google.com (Windows) ; ping google.com (Linux and macOS)

It will run without stopping. Endless loop. On Linux and macOS, it runs forever by default. You can stop it with Ctrl+C.

Extra tip

Did you know that you can use the ping command online, straight from your browser? This can come in handy if you only have a mobile phone around. 

Just google it, and you will see more than a few sites. If you decide to use it in this way, please make sure that the site you visit is safe, and it is not going to harm your device or personal data in any way. 

Conclusion:

The ping is not the most sophisticated tool, but it is incredibly handy thanks to the fact it works on any device. Using it, you can quickly diagnose different part of the network and find the problem. You can also check our previous article and find more useful tools in our article Тools – DNS trace, Ping, Traceroute, Nslookup, Reverse lookup.

The post What is Ping command and how to use it? appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/what-is-ping-how-to-use-ping/feed/ 0
DNS Troubleshooting – tools and commands https://www.cloudns.net/blog/dns-troubleshooting-tools-commands/ https://www.cloudns.net/blog/dns-troubleshooting-tools-commands/#respond Thu, 19 Oct 2023 08:49:00 +0000 https://www.cloudns.net/blog/?p=1140 In the vast universe of network management and IT troubleshooting, issues related to the Domain Name System (DNS) often crop up. DNS is a crucial part of online existence, responsible for translating human-friendly domain names into numerical IP addresses that computers use to communicate with one another. So, when DNS issues emerge, they can cause …

The post DNS Troubleshooting – tools and commands appeared first on ClouDNS Blog.

]]>
In the vast universe of network management and IT troubleshooting, issues related to the Domain Name System (DNS) often crop up. DNS is a crucial part of online existence, responsible for translating human-friendly domain names into numerical IP addresses that computers use to communicate with one another. So, when DNS issues emerge, they can cause significant problems. 

However, like every other IT problem, DNS issues can be resolved. You just have to know the right tools and commands. In this blog post, we’ll delve into some of these essential DNS troubleshooting tools and commands that every network administrator ought to arm themselves with.

Common DNS Issues 

Before we dive into the tools and commands, let’s understand the most common DNS issues that most administrators often encounter:

  1. DNS Downtime: This occurs when DNS servers that translate domain names are temporarily unavailable.
  2. Incorrect DNS Configuration: This involves errors in the setup of DNS settings which may lead to problems accessing certain websites or the internet.
  3. DNS Cache Poisoning: Also known as DNS Spoofing, it refers to fraudulent entries in the DNS cache, causing traffic to be directed to the wrong place.
  4. DNS Propagation Delays: This happens when you make changes to your DNS records and they are not immediately effective due to the time taken to update network servers around the globe.

Now that we have a basic understanding of common DNS issues, let’s explore the essential DNS troubleshooting commands that can help you diagnose and resolve these problems.

DNS Troubleshooting Tools

There are plenty of tools that you can use. The tools can be specific for Linux, Windows, or Mac OS, or they can be browser-based. Most of the tools that we will show you overlaps in functionality, and it will be your decision which one you would use in the future.

Check if the problem is not just in your device

Before you start with the DNS troubleshooting, check if the problem is only local. If you are trying to access your website, but you are getting this message “DNS_PROBE_FINISHED_NXDOMAIN” the problem might be in your device. We recently wrote a way to fix it. Go and read the article. 

Dig command

dig command example

The ‘dig’ command, which stands for ‘Domain Information Groper,’ is a handy command-line tool used in the DNS name resolution process. It sends a DNS query to a specified DNS server and gets a response. It’s a useful tool for finding DNS-related issues. 

With this command you can see all the DNS records. You can use it on Linux and Mac OS, but you can search for a port for Windows too. A typical dig command will show you an Authority Section. You can see if the DNS is pointing correctly.

Use it with +trace in dig +trace combination “dig +trace YOURDOMAIN” to see the whole route of your query. This way you can locate the exact problem.

ClouDNS Free DNS tool

Free DNS tool

ClouDNS brings to you a valuable Free DNS tool that has transformative capabilities to enhance your DNS troubleshooting tactics. With this tool, you can inspect the DNS records for a specific host and assess the speed of DNS queries. Aside from these, you can also create a comprehensive audit, a feature that helps in in-depth analysis and identification of problematic areas.

Designed to facilitate the work of their customers, the ClouDNS Free DNS tool is user-friendly and accessible, making DNS troubleshooting a breeze even for beginners in the field. All you need to do is enter your domain and host into the tool, select the tool type as “DNS Records”, and choose ‘Google’ as your DNS resolver, then hit ‘CHECK’. 

What’s more, this powerhouse tool is free of cost, making it a stellar choice for efficient network management. The value it provides, particularly in terms of insight into DNS records and query speed, can go a long way in troubleshooting DNS-related problems swiftly and effectively.

Traceroute

Traceroute

The ‘traceroute’ command enables you to track the pathway that a packet takes from the host to the destination server. As the name suggests, this will be ideal for checking the entire route of a DNS query. You can use it on Windows as Tracert, Linux and Mac OS as traceroute. You can try it with a domain or IP address, and you will see a result with all the hops and response time.

NSLookup

Command line: $ nslookup -debug

NSLookup‘ stands for ‘Name Server Lookup’. This command-line tool is used for obtaining information about DNS settings. It allows users to enter a host name and find out the corresponding IP address, or vice versa.

This command lets you check any type of DNS record. You can use it to see all the available DNS records, or you can look for a specific type like – A, AAAA, SOA, MX, PTR, NS, etc. You can use it to troubleshoot a domain using a particular port too. 

Host command

host google.com DNS Troubleshooting

‘Host’ command is very similar to the NSLookup but available only on Linux. You have to write the commands in the Terminal, and you can see the different types of DNS records.

One thing that you can troubleshoot if you have problems with your emails are the TXT records. You can see if there is a SPF record. It is a TXT record that prevents spoofing and stops your outgoing emails from going directly into the spam folder.

Generate SPF record for free!

Conclusion

There are plenty of useful tools that you can use for DNS troubleshooting. Try all of these and find the right one for you and your problem. Many overlaps in functionality, but have some small differences that can help you in a specific case.

As you saw, there are utilities for every operating system so that you can find the problem easily. After you see where the problem is, it is easy to fix it.  

The post DNS Troubleshooting – tools and commands appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/dns-troubleshooting-tools-commands/feed/ 0
DNS_PROBE_FINISHED_NXDOMAIN, now what to do? https://www.cloudns.net/blog/dns-probe-finished-nxdomain-explained/ https://www.cloudns.net/blog/dns-probe-finished-nxdomain-explained/#comments Wed, 29 May 2019 19:09:49 +0000 https://www.cloudns.net/blog/?p=1085 What to do when you see this error on your screen DNS_PROBE_FINISHED_NXDOMAIN? Learn what it is and how to fix it. You can do it in just a few minutes!

The post DNS_PROBE_FINISHED_NXDOMAIN, now what to do? appeared first on ClouDNS Blog.

]]>
Imagine the situation, you are browsing the internet, minding your own business and suddenly you see DNS_PROBE_FINISHED_NXDOMAIN in your Chrome browser! You didn’t enter the page you wanted, you hit refresh and still nothing! Now, what to do?

What is DNS_PROBE_FINISHED_NXDOMAIN?

It is a DNS-related error that shows that the domain that you are trying to reach does not exist (NXDOMAIN means non-existing domain). The DNS can’t find the corresponding IP address to the domain you just entered.
Most of the times this is a DNS configuration problem, and the problem is in your device, not in the domain itself.

Ok, we said Chrome, but does this happen when you are using other browsers?

We mention Google Chrome, where you get “This site can’t be reached,” but you can get a similar message in any other browser. Mozilla’s Firefox will show you “Hmm. We’re having trouble finding that site”, Microsoft Edge “Hmmm… can’t reach this page”, and almost identical messages on the rest of the browsers.

Ok, so what to do when we see the DNS_PROBE_FINISHED_NXDOMAIN?

There are several ways that you can fix your problem. Let’s explore the possibilities:

1.    Flush the DNS cache

If it is bad-configured DNS, the easiest is to start from zero. Flush the current DNS cache and renew the IP address.

For Windows users, follow these steps:
Open the Command Prompt as an administrator. Click the start menu icon and write “Command Prompt,” then run as administrator. Then type “ipconfig /release” and press Enter on your keyboard. Now you can see your current IP address. After that, write “ipconfig /flushdns” and press Enter. You flushed the cache, “Successfully flushed the DNS Resolver Cache.” Next thing to type in “ipconfig /renew”. And now your IP address has been renewed.

Flush DNS to fix DNS_PROBE_FINISHED_NXDOMAIN

For Mac OS users:
Go to “System Preferences…”, then “Network” and later “Advanced.” When you are there, go to TCP/IP and click the “Renew DHCP.”
You can also delete the DNS cache. First, open the “Utilities” and then the “Terminal.” The command you need to write is “dscacheutil –flushcache” and press Enter. It is ready. There is no confirmation message here.

Mac OS fix DNS_PROBE_FINISHED_NXDOMAIN

For Linux (Linux Mint, Ubuntu):
If you are using Linux Mint or Ubuntu, by default, the DNS cache is disabled. You can check if it is enabled with the following command “ps ax | grep dnsmasq”. In the message that you’ll get check if “cache-size=0”, then it is disabled. If it is enabled, write the following command “udo /etc/init.d/dns-clean restart”. Then type “sudo /etc/init.d/networking force-reload”. Done!

Linux Mint fix DNS_PROBE_FINISHED_NXDOMAIN

2.    Reinitiate the DNS Client Server.

For Windows users, we will use the “Run” to open “services.msc.” Now you will see all the services that run on your computer. Go to DNS Client, stop it and start it again.

Restart DNS client to fix DNS_PROBE_FINISHED_NXDOMAIN

3.    Change the DNS servers

Your internet provider automatically set your IP address, using their DNS servers. But you have the chance to change to another DNS server like Google’s public DNS.

Windows:
Go first to “Control Panel,” then “Network and Internet” and later “Network and Sharing Center.” There click the “Change adapter settings” and select the network that you are using. Go to properties, search for the “Internet Protocol Version 4” and click on the properties. Set the following DNS servers 8.8.8.8 and 8.8.4.4

Mac OS:
“System Preferences,” Network,” and then “Advanced.” Click on DNS and add the same 8.8.8.8 and 8.8.4.4.

Mac OS DNS settings

Linux (Linux Mint, Ubuntu):
Open “System Settings,” “Network.” Then select the network that you are using and choose “Settings.” Go to the “IPv4 Settings,” and there you will see “Additional DNS servers.” add “8.8.8.8, 8.8.4.4”.

Linux Mint DNS settings

4.    Chrome Flags Reset.

Maybe the problem comes from your Chrome browser. Go to your Chrome browser and type “chrome://settings/clearBrowserData” in the address bar. Delete the “Cached images and files,” “Cookie and other site and plugin data” and “Browsing history” from “the beginning of time.”
After that type “chrome://flags/” and a menu will open. Click on the “Reset all to default.” Now restart the browser, and you are ready.

Google Chrome flags reset to default

Conclusion

Next time when you see the DNS_PROBE_FINISHED_NXDOMAIN don’t panic. There are easy solutions to this problem. Just try one of those, and you will be ready is a few minutes.
If the site that shows the error is yours, and after trying nothing is happening, go and check if the domain is correctly redirected. If no, do fix it.

Don’t stop following our blog, which is full of exciting and useful articles!

The post DNS_PROBE_FINISHED_NXDOMAIN, now what to do? appeared first on ClouDNS Blog.

]]>
https://www.cloudns.net/blog/dns-probe-finished-nxdomain-explained/feed/ 2