| Zone (*) | DNSSEC - Informations |
|---|
|
|
Zone: (root)
|
|
(root)
| 1 DS RR published
|
|
|
|
|
| DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest 4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=
|
|
|
|
|
| • Status: Valid because published
|
|
|
|
|
| 3 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 20326, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 21831, Flags 256
|
|
|
|
|
| Public Key with Algorithm 8, KeyTag 38696, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner (root), Algorithm: 8, 0 Labels, original TTL: 172800 sec, Signature-expiration: 03.03.2026, 00:00:00 +, Signature-Inception: 10.02.2026, 00:00:00 +, KeyTag 20326, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 20326 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 8, KeyTag 20326, DigestType 2 and Digest "4G1EuAuPHTmpXAsNfGXQhFjogECbvGg0VxBCN8f47I0=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: com
|
|
com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 8, 1 Labels, original TTL: 86400 sec, Signature-expiration: 26.02.2026, 05:00:00 +, Signature-Inception: 13.02.2026, 04:00:00 +, KeyTag 21831, Signer-Name: (root)
|
|
|
|
|
| • Status: Good - Algorithmus 8 and DNSKEY with KeyTag 21831 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 19718, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 35511, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner com., Algorithm: 13, 1 Labels, original TTL: 86400 sec, Signature-expiration: 21.02.2026, 15:02:35 +, Signature-Inception: 06.02.2026, 14:57:35 +, KeyTag 19718, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 19718 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 19718, DigestType 2 and Digest "isuwzSj0ElCoCkkTiUJNNBUi2Uaw2gwCkfLT13HXgFo=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
Zone: tgmcc.com
|
|
tgmcc.com
| 1 DS RR in the parent zone found
|
|
|
|
|
| DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest Dx8avAnr4dqE2bf9HIFndyXS2KGB953mov2GIrEOfTk=
|
|
|
|
|
| 1 RRSIG RR to validate DS RR found
|
|
|
|
|
| RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 86400 sec, Signature-expiration: 19.02.2026, 01:25:13 +, Signature-Inception: 12.02.2026, 00:15:13 +, KeyTag 35511, Signer-Name: com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 35511 used to validate the DS RRSet in the parent zone
|
|
|
|
|
| 2 DNSKEY RR found
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 2371, Flags 257 (SEP = Secure Entry Point)
|
|
|
|
|
| Public Key with Algorithm 13, KeyTag 34505, Flags 256
|
|
|
|
|
| 1 RRSIG RR to validate DNSKEY RR found
|
|
|
|
|
| RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 3600 sec, Signature-expiration: 24.03.2026, 06:55:42 +, Signature-Inception: 22.01.2026, 06:55:42 +, KeyTag 2371, Signer-Name: tgmcc.com
|
|
|
|
|
| • Status: Good - Algorithmus 13 and DNSKEY with KeyTag 2371 used to validate the DNSKEY RRSet
|
|
|
|
|
| • Status: Valid Chain of trust. Parent-DS with Algorithm 13, KeyTag 2371, DigestType 2 and Digest "Dx8avAnr4dqE2bf9HIFndyXS2KGB953mov2GIrEOfTk=" validates local Key with the same values, Key ist Secure Entry Point (SEP) of the zone
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.21.94.102
172.67.222.89
Validated: RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| RRSIG Type 16 validates the TXT - Result: v=spf1 include:spf.protection.outlook.com -all
google-gws-recovery-domain-verification=60103841
openai-domain-verification=dv-A90JMV66FPbD96IoXdEOrQyq
google-site-verification=yZGtfqPRvNRoEnj_Mv7Halj43m7_i3KN11bCHvCtE3E
Validated: RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2606:4700:3034:0000:0000:0000:AC43:DE59
2606:4700:3037:0000:0000:0000:6815:5E66
Validated: RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 300 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "tgmcc.com" equal the NSEC-owner "tgmcc.com" and the NextOwner "\000.tgmcc.com". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, URI, CAA Validated: RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.tgmcc.com) sends a valid NSEC RR as result with the query name "_443._tcp.tgmcc.com" equal the NSEC-owner "_443._tcp.tgmcc.com" and the NextOwner "\000._443._tcp.tgmcc.com". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, 128 Validated: RRSIG-Owner _443._tcp.tgmcc.com., Algorithm: 13, 4 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "tgmcc.com" equal the NSEC-owner "tgmcc.com" and the NextOwner "\000.tgmcc.com". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, NS, SOA, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, DNSKEY, TLSA, 53, HIP, CDS, CDNSKEY, 61, 64, 65, URI Validated: RRSIG-Owner tgmcc.com., Algorithm: 13, 2 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
Zone: www.tgmcc.com
|
|
www.tgmcc.com
| 0 DS RR in the parent zone found
|
|
|
|
|
| DS-Query in the parent zone has a valid NSEC RR as result with the domain name between the NSEC-Owner "www.tgmcc.com" and the NextOwner "\000.www.tgmcc.com". So the parent zone confirmes the non-existence of a DS RR.
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA
|
|
|
|
|
| RRSIG Type 1 validates the A - Result: 104.21.94.102
172.67.222.89
Validated: RRSIG-Owner www.tgmcc.com., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| RRSIG Type 28 validates the AAAA - Result: 2606:4700:3034:0000:0000:0000:AC43:DE59
2606:4700:3037:0000:0000:0000:6815:5E66
Validated: RRSIG-Owner www.tgmcc.com., Algorithm: 13, 3 Labels, original TTL: 300 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| CNAME-Query sends a valid NSEC RR as result with the query name "www.tgmcc.com" equal the NSEC-owner "www.tgmcc.com" and the NextOwner "\000.www.tgmcc.com". So the zone confirmes the not-existence of that CNAME RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner www.tgmcc.com., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TXT-Query sends a valid NSEC RR as result with the query name "www.tgmcc.com" equal the NSEC-owner "www.tgmcc.com" and the NextOwner "\000.www.tgmcc.com". So the zone confirmes the not-existence of that TXT RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI, CAA Validated: RRSIG-Owner www.tgmcc.com., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| TLSA-Query (_443._tcp.www.tgmcc.com) sends a valid NSEC RR as result with the query name "_443._tcp.www.tgmcc.com" equal the NSEC-owner "_443._tcp.www.tgmcc.com" and the NextOwner "\000._443._tcp.www.tgmcc.com". So the zone confirmes the not-existence of that TLSA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: RRSIG, NSEC, 128 Validated: RRSIG-Owner _443._tcp.www.tgmcc.com., Algorithm: 13, 5 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|
|
|
|
|
| CAA-Query sends a valid NSEC RR as result with the query name "www.tgmcc.com" equal the NSEC-owner "www.tgmcc.com" and the NextOwner "\000.www.tgmcc.com". So the zone confirmes the not-existence of that CAA RR, but the existence of that query name (minimal one RR with that name exists).
Bitmap: A, 13, MX, TXT, AAAA, LOC, SRV, NAPTR, CERT, SSHFP, RRSIG, NSEC, TLSA, 53, HIP, 61, 64, 65, URI Validated: RRSIG-Owner www.tgmcc.com., Algorithm: 13, 3 Labels, original TTL: 1800 sec, Signature-expiration: 14.02.2026, 09:17:37 +, Signature-Inception: 12.02.2026, 07:17:37 +, KeyTag 34505, Signer-Name: tgmcc.com
|
|
|
|
|
| Status: Good. NoData-Proof required and found.
|