| Zone (*) | DNSSEC - Informations |
|---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 61809, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 21.11.2025, 00:00:00 +, Signature-Inception: 31.10.2025, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: dk
|
|
dk
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 20109, DigestType 2 and Digest XIamiuLDq3QYKzrQdJtG5V+JK4NflXjPoS+Qk/slK9A=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner dk., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 19.11.2025, 05:00:00 +, Signature-Inception: 06.11.2025, 04:00:00 +, KeyTag 61809, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 61809 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 20109, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 50934, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner dk., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 30.11.2025, 08:39:01 +, Signature-Inception: 02.11.2025, 07:09:01 +, KeyTag 20109, Signer-Name: dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 20109 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 20109, DigestType 2 and Digest "XIamiuLDq3QYKzrQdJtG5V+JK4NflXjPoS+Qk/slK9A=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: hooked.dk
|
|
hooked.dk
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 1790, DigestType 4 and Digest I/XRgkaVtxHhXEhaCWbkKceNLadUhvV9Yfcp6MmQ524l1iJ312hovXeiVjJtr2qb
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner hooked.dk., Algorithm: 13, 2 Labels, original TTL: 7200 sec, Signature-expiration: 29.11.2025, 10:42:02 +, Signature-Inception: 01.11.2025, 09:12:02 +, KeyTag 50934, Signer-Name: dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 50934 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 1 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 1790, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner hooked.dk., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 1790 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 1790, DigestType 4 and Digest "I/XRgkaVtxHhXEhaCWbkKceNLadUhvV9Yfcp6MmQ524l1iJ312hovXeiVjJtr2qb" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| A-Query sends a valid NSEC3 RR as result with the hashed query name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" equal the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that A RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" equal the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" equal the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" equal the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.hooked.dk) sends a valid NSEC3 RR as result with the hashed owner name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" (unhashed: hooked.dk). So that's the Closest Encloser of the query name.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "pvfejmjtb2flea68no6vgf3n02b46dci" (unhashed: _tcp.hooked.dk) with the owner "oprmb5a632cj4gnnj0cbg69c62ohmsje" and the NextOwner "sjeh232niggl5ts1q2d57id38u9k9csq". So that NSEC3 confirms the not-existence of the Next Closer Name. TLSA-Query sends a valid NSEC3 RR as result with the hashed owner name "oprmb5a632cj4gnnj0cbg69c62ohmsje" (unhashed: *.hooked.dk) as the Wildcard-Expansion of the Closest Encloser of the query name "5hq6j9ue56k7933n6f6n28j9ig8j575p". So the Wildcard-Expansion of the Closest Encloser confirms that the query name is generated via wildcard expansion (NoError instead of NXDomain).
Bitmap: A, RRSIG Validated: RRSIG-Owner oprmb5a632cj4gnnj0cbg69c62ohmsje.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "bhjrcp2ug2dh73h4qgqlrrf090at70qr" equal the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.hooked.dk
|
|
www.hooked.dk
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC3 RR as result with the hashed query name "oljt3eok0t3bn64n1to22q1tfjgm2tul" between the hashed NSEC3-owner "oljt3eok0t3bn64n1to22q1tfjgm2tul" and the hashed NextOwner "oprmb5a632cj4gnnj0cbg69c62ohmsje". So the parent zone confirmes the not-existence of a DS RR.
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 87.62.99.247
Validated: RRSIG-Owner www.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 3600 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| CNAME-Query sends a valid NSEC3 RR as result with the hashed query name "oljt3eok0t3bn64n1to22q1tfjgm2tul" equal the hashed NSEC3-owner "oljt3eok0t3bn64n1to22q1tfjgm2tul" and the hashed NextOwner "oprmb5a632cj4gnnj0cbg69c62ohmsje". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC3 RR as result with the hashed query name "oljt3eok0t3bn64n1to22q1tfjgm2tul" equal the hashed NSEC3-owner "oljt3eok0t3bn64n1to22q1tfjgm2tul" and the hashed NextOwner "oprmb5a632cj4gnnj0cbg69c62ohmsje". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| AAAA-Query sends a valid NSEC3 RR as result with the hashed query name "oljt3eok0t3bn64n1to22q1tfjgm2tul" equal the hashed NSEC3-owner "oljt3eok0t3bn64n1to22q1tfjgm2tul" and the hashed NextOwner "oprmb5a632cj4gnnj0cbg69c62ohmsje". So the zone confirmes the not-existence of that AAAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.hooked.dk) sends a valid NSEC3 RR as result with the hashed owner name "oljt3eok0t3bn64n1to22q1tfjgm2tul" (unhashed: www.hooked.dk). So that's the Closest Encloser of the query name.
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Next Closer Name "uqh1c5fpl1pjqnnuaesafpe5bd5n5rr0" (unhashed: _tcp.www.hooked.dk) with the owner "sjeh232niggl5ts1q2d57id38u9k9csq" and the NextOwner "bhjrcp2ug2dh73h4qgqlrrf090at70qr". So that NSEC3 confirms the not-existence of the Next Closer Name.
Bitmap: A, RRSIG Validated: RRSIG-Owner sjeh232niggl5ts1q2d57id38u9k9csq.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| TLSA-Query sends a valid NSEC3 RR as result and covers the hashed Wildcard expansion of the ClosestEncloser "j7koe06slgju62bvlosk3bhfqb0pvkkm" (unhashed: *.www.hooked.dk) with the owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So that NSEC3 confirms the not-existence of the Wildcard expansion. TLSA-Query (_443._tcp.www.hooked.dk) sends a valid NSEC3 RR as result with the hashed query name "ffi3acvgh004u9dq114c3usiuv5ag7qm" between the hashed NSEC3-owner "bhjrcp2ug2dh73h4qgqlrrf090at70qr" and the hashed NextOwner "oljt3eok0t3bn64n1to22q1tfjgm2tul". So the zone confirmes the not-existence of that TLSA RR.
Bitmap: NS, SOA, RRSIG, DNSKEY, NSEC3PARAM Validated: RRSIG-Owner bhjrcp2ug2dh73h4qgqlrrf090at70qr.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NXDomain-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC3 RR as result with the hashed query name "oljt3eok0t3bn64n1to22q1tfjgm2tul" equal the hashed NSEC3-owner "oljt3eok0t3bn64n1to22q1tfjgm2tul" and the hashed NextOwner "oprmb5a632cj4gnnj0cbg69c62ohmsje". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, RRSIG Validated: RRSIG-Owner oljt3eok0t3bn64n1to22q1tfjgm2tul.hooked.dk., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 20.11.2025, 00:00:00 +, Signature-Inception: 30.10.2025, 00:00:00 +, KeyTag 1790, Signer-Name: hooked.dk
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|