DNS Health Report

39 checks across DNSSEC, email infrastructure, record hygiene, nameservers, and more. Takes about three seconds. No account needed.

DNSSEC validation MX & email checks Severity scoring API & MCP access

What the report actually checks

Most DNS tools check one thing at a time. This report checks everything at once — 39 checks across 7 categories — and tells you what's broken, what's at risk, and what's fine.

DNSSEC

Chain of trust validation

Checks for DNSKEY and DS records, validates the chain of trust between parent and child zones, identifies the NSEC/NSEC3 mode, and flags deprecated algorithms like RSA/SHA-1. With CA/B Forum SC-085v2 mandating DNSSEC validation before SSL certificate issuance (effective March 2026), this is now a hard compliance requirement — not a nice-to-have.

MX & Email

Inbound email infrastructure

Validates MX records exist and resolve, confirms they point to hostnames (not bare IPs — an RFC violation), checks forward/reverse DNS (PTR match), verifies redundancy across distinct IP ranges, and tests MTA-STS enforcement. A misconfigured MX setup silently drops legitimate email.

DNS Hygiene

Record conflicts and violations

Detects duplicate TXT records that cause parsing failures, multiple SPF records (spec violation — only one v=spf1 is allowed), wildcard MX/TXT records that create unintended coverage, CNAME at apex (breaks MX and TXT lookups per RFC), and TXT response size exceeding UDP limits.

TTL & SOA

Timing and propagation hygiene

Validates TTL ranges for NS (3600–86400), MX (300–86400), and A/AAAA (60–86400) records. Checks SOA refresh, retry, expire, and minimum values against RFC best practices. Flags TTL inconsistencies across record types and identifies SOA serial format as an operational maturity signal.

Nameservers

Redundancy and delegation

Ensures at least 2 nameservers (RFC requirement), checks IP range diversity, ASN diversity (single AS = single point of failure), detects lame delegations (NS listed but not authoritative), measures response latency, verifies consistent SOA serials across all NS, and confirms EDNS0 support (required for DNSSEC).

CAA & Ops

Certificate control and operational maturity

Checks CAA records controlling which CAs can issue certificates, evaluates issuewild restrictions, verifies iodef reporting is configured, tests abuse mailbox reachability, and checks for security.txt presence at the well-known path — signals that indicate mature security operations.


How to use this DNS health checker

Enter a domain and get a full infrastructure audit in seconds. No account, no configuration.

Enter the domain

Type any domain — example.com, mail.example.com, api.example.com. We check the exact zone you specify.

We run 39 checks across 7 categories

All checks run in parallel — DNSSEC validation, MX infrastructure, record hygiene, TTL analysis, nameserver configuration, CAA records, and operational maturity signals. The whole process takes about 3 seconds.

Read the scored results

Each category gets a severity-weighted score. Critical checks (like DNSSEC chain of trust) count more than informational checks (like SOA serial format). The overall score is a weighted average across all categories. Failed checks show their severity level — critical, warning, or info — so you know what to fix first.

Check via API or MCP

If you're building tooling, running automated checks, or using an AI assistant that supports MCP, you can access the DNS health checker programmatically.

REST API — no authentication required
GET https://api.nslookup.io/v1/dns-health/example.com

# Returns: overall score, 7 category scores,
#          39 individual check results with pass/fail/severity
MCP (Model Context Protocol)
# Add to your MCP config:
{
  "mcpServers": {
    "nslookup": {
      "url": "https://mcp.nslookup.io/mcp"
    }
  }
}

# Then in Claude, Cursor, or any MCP-compatible client:
# "Run a DNS health check on api.example.com"

Understanding the results

How scoring works

Each check has a severity level that determines how much it affects the score:

SeverityWeightExamples
Critical10 pointsDNSSEC chain of trust, SPF conflicts, lame delegation, MX resolution
Warning5 pointsMTA-STS enforcement, TTL ranges, IP diversity, EDNS0 support
Info2 pointsSOA serial format, ASN diversity, security.txt presence

A domain that passes all critical checks but fails some informational checks still scores high — because the critical infrastructure is solid.

Score ranges

ScoreRatingWhat it means
90–100ExcellentDNS infrastructure is well-configured with no critical issues
80–89GoodSolid foundation with minor improvements possible
60–79Needs improvementSome checks failing — review warnings and fix critical items
0–59Critical issuesSignificant DNS problems that may affect email delivery, security, or certificate issuance

Why DNSSEC matters now — SC-085v2

The CA/Browser Forum passed Ballot SC-085v2, which requires Certificate Authorities to validate DNSSEC before issuing SSL certificates, effective March 2026. This means:

  • If your zone has DNSSEC deployed with a broken chain of trust (DS/DNSKEY mismatch), CAs may refuse to issue certificates
  • If you haven't deployed DNSSEC, there's no immediate impact — but the industry is moving toward DNSSEC-as-baseline
  • Companies that ignored DNSSEC now have a hard deadline to get their zones signed correctly

Common issues and what causes them

IssueRoot causeImpactFix
Multiple SPF recordsAdded new SPF without removing old oneEmail auth fails (RFC says only one v=spf1 allowed)Merge into single SPF record
CNAME at apexSet CNAME on naked domain for CDNBreaks MX and TXT lookups per RFCUse ALIAS/ANAME or A record instead
Lame delegationChanged NS at registrar but old NS still listedIntermittent resolution failuresUpdate all NS records at registrar
No MTA-STSNever configuredEmail can be downgraded to plaintext in transitDeploy MTA-STS with enforce mode
DS/DNSKEY mismatchMigrated DNS provider without updating DS at registrarDNSSEC validation fails → SERVFAIL for validating resolversUpdate DS record at registrar to match new DNSKEY
Single NS ASNAll nameservers on same providerProvider outage takes down all DNSUse secondary DNS on different provider

Questions we get a lot

What's the difference between this and a regular DNS lookup?

A DNS lookup shows you what records exist. The DNS Health Report tells you whether those records are configured correctly — and catches problems that a simple lookup won't show, like DNSSEC chain-of-trust failures, TTL misconfigurations, lame delegations, missing MTA-STS, and conflicting SPF records.

Why does my domain score low even though everything "works"?

DNS misconfigurations are silent. A missing intermediate in your certificate chain still works in Chrome but breaks on mobile. A duplicate SPF record still lets some email through but causes intermittent failures. A lame delegation only causes problems when that specific nameserver is queried. The health report catches these invisible issues before they become outages.

Do I need DNSSEC?

If you issue SSL certificates (which you almost certainly do), yes — starting March 2026. CA/B Forum Ballot SC-085v2 requires CAs to validate DNSSEC before certificate issuance. If your zone has DNSSEC deployed incorrectly (broken chain of trust), certificate issuance may fail. If you haven't deployed DNSSEC at all, there's no immediate failure, but the industry direction is clear.

What's MTA-STS and why should I care?

MTA-STS (Mail Transfer Agent Strict Transport Security) prevents email from being downgraded to plaintext during delivery. Without it, a man-in-the-middle can strip TLS from your email connections. Deploying MTA-STS with mode: enforce tells sending servers to only deliver over encrypted connections. It requires a DNS TXT record at _mta-sts.yourdomain.com and a policy file served over HTTPS.

Why does the report check for a CNAME at the apex?

A CNAME record at the zone apex (e.g., example.com pointing to a CDN) violates RFC 1034. When a resolver queries the apex for MX or TXT records, the CNAME redirects the entire query — which means your MX records and SPF records may not be found. Some DNS providers offer ALIAS or ANAME records as a standards-compliant alternative.

Is this checker free?

Yes. The DNS Health Report is completely free — no account required, no data stored. You can also access it via the REST API and MCP for automated checks.

Can I check DNS health via API?

Yes. GET /v1/dns-health/example.com returns the full report as structured JSON — overall score, 7 category scores, and all 39 individual check results with pass/fail status and severity. No API key needed. Also available via MCP for use in AI assistants like Claude and Cursor.


DNS health is one layer. These tools check the rest of the stack.