Work in progress!

Follow IntoDNS on Twitter


Category Status Test name Information
Parent Info Domain NS records Nameserver records returned by the parent servers are:

open.auth.studio.   ['91.200.176.1']   [TTL=3600]
private.auth.studio.   ['185.85.196.65']   [TTL=3600]

v0n1.nic.studio was kind enough to give us that information.

Pass TLD Parent Check Good. v0n1.nic.studio, the parent server I interrogated, has information for your TLD. This is a good thing as there are some other domain extensions like "co.us" for example that are missing a direct check.
Pass Your nameservers are listed Good. The parent server v0n1.nic.studio has your nameservers listed. This is a must if you want to be found as anyone that does not know your DNS servers will first ask the parent nameservers.
Pass DNS Parent sent Glue Good. The parent nameserver sent GLUE, meaning he sent your nameservers as well as the IPs of your nameservers. Glue records are A records that are associated with NS records to provide "bootstrapping" information to the nameserver.(see RFC 1912 section 2.3)
Pass Nameservers A records Good. Every nameserver listed has A records. This is a must if you want to be found.
NS Info NS records from your nameserversNS records got from your nameservers listed at the parent NS are:

open.auth.studio  ['91.200.176.1']   [TTL=172800]
private.auth.studio  ['109.104.147.1']   [TTL=172800]

Pass Recursive Queries Good. Your nameservers (the ones reported by the parent server) do not report that they allow recursive queries for anyone.
Warn Same Glue Looks like the A records (the GLUE) got from the parent zone check are different than the ones got from your nameservers. You have to make sure your parent server has the same NS records for your zone as you do.I detected some problems as follows:
For private.auth.studio the parent reported: ['185.85.196.65'] and your nameservers reported: ['109.104.147.1']
Pass Glue for NS records OK. When I asked your nameservers for your NS records they also returned the A records for the NS records. This is a good thing as it will spare an extra A lookup needed to find those A records.
Pass Mismatched NS records OK. The NS records at all your nameservers are identical.
Error DNS servers responded ERROR: One or more of your nameservers did not respond:
The ones that did not respond are:
185.85.196.65
Warn Name of nameservers are valid WARNING: At least one of your NS name does not seem a valid host name
The ones that do not seem valid:
open.auth.studio private.auth.studio
Pass Multiple Nameservers Good. You have multiple nameservers. According to RFC2182 section 5 you must have at least 3 nameservers, and no more than 7. Having 2 nameservers is also ok by me.
Pass Nameservers are lame OK. All the nameservers listed at the parent servers answer authoritatively for your domain.
Pass Missing nameservers reported by parent OK. All NS records are the same at the parent and at your nameservers.
Pass Missing nameservers reported by your nameservers OK. All nameservers returned by the parent server v0n1.nic.studio are the same as the ones reported by your nameservers.
Pass Domain CNAMEs OK. RFC1912 2.4 and RFC2181 10.3 state that there should be no CNAMEs if an NS (or any other) record is present.
Pass NSs CNAME check OK. RFC1912 2.4 and RFC2181 10.3 state that there should be no CNAMEs if an NS (or any other) record is present.
Pass Different subnets OK. Looks like you have nameservers on different subnets!
Pass IPs of nameservers are public Ok. Looks like the IP addresses of your nameservers are public. This is a good thing because it will prevent DNS delays and other problems like
Pass DNS servers allow TCP connection OK. Seems all your DNS servers allow TCP connections. This is a good thing and useful even if UDP connections are used by default.
Pass Different autonomous systems OK. It seems you are safe from a single point of failure. You must be careful about this and try to have nameservers on different locations as it can prevent a lot of problems if one nameserver goes down.
Pass Stealth NS records sent Ok. No stealth ns records are sent
SOA Info SOA recordThe SOA record is:
Primary nameserver: open.auth.studio
Hostmaster E-mail address: da.zhao.hu
Serial #: 2020825365
Refresh: 7200
Retry: 900
Expire: 1209600   2 weeks
Default TTL: 86400
Pass NSs have same SOA serial OK. All your nameservers agree that your SOA serial number is 2020825365.
Pass SOA MNAME entry OK. open.auth.studio That server is listed at the parent servers.
Warn SOA Serial Your SOA serial number is: 2020825365. This can be ok if you know what you are doing.
Pass SOA REFRESH OK. Your SOA REFRESH interval is: 7200. That is OK
Pass SOA RETRY Your SOA RETRY value is: 900. Looks ok
Pass SOA EXPIRE Your SOA EXPIRE number is: 1209600.Looks ok
Pass SOA MINIMUM TTL Your SOA MINIMUM TTL is: 86400. This value was used to serve as a default TTL for records without a given TTL value and now is used for negative caching (indicates how long a resolver may cache the negative answer). RFC2308 recommends a value of 1-3 hours. Your value of 86400 is OK.
MX Error MX RecordsOh well, I did not detect any MX records so you probably don't have any and if you know you should have then they may be missing at your nameservers!
WWW Info WWW A Record Your www.auth.studio A record is:
www.auth.studio -> auth.studio -> [ 52.58.78.16  ]

[Looks like you have CNAME's]
Pass IPs are public OK. All of your WWW IPs appear to be public IPs.
Pass WWW CNAME OK. You do have a CNAME record for www.auth.studio.Your CNAME entry also returns the A record for the CNAME entry, which is good.

Processed in 9.290 seconds.