DNS Checker Blog
Expert insights, tutorials, and news about DNS, domain management, and web infrastructure.
65
Technical articles on DNS, security, and infrastructure
10
Topic areas including email auth, DNSSEC, and abuse reporting
20+
Years of hands-on networking and infrastructure experience
A+ N+ S+
CompTIA certified author — A+, Network+, Security+
The DNS Checker Blog is a technical resource covering DNS infrastructure, email authentication, domain security, and network troubleshooting. Published by Ishan Karunaratne, a CompTIA A+, Network+, and Security+ certified engineer with over 20 years of hands-on networking experience, the blog contains 65 articles organized into 10 topic areas. Coverage spans DNS record types (A, AAAA, MX, CNAME, TXT), propagation mechanics and TTL behavior, email authentication protocols (SPF, DKIM, DMARC), DNSSEC deployment, and common DNS attacks including cache poisoning, amplification, tunneling, and zone transfer exploits. Step-by-step tutorials cover building DNS resolvers in Node.js, Python, and PHP, using the dig command, and verifying DNS changes after hosting migrations. The abuse reporting series documents how to report DDoS attacks, phishing, spam, brute-force attempts, and other IP-based abuse to ISPs, hosting providers, and law enforcement.
Security
Articles on DNS security including DNSSEC, email authentication, and threat protection.
145,061 Domains Delegated to a Misspelled Name Server — Here's How the Attack Works
What Happens When One DNS Provider Goes Down: The Hidden Fragility of TLD Ecosystems
How Expired Name Servers Become Domain Hijacking Vectors
Why DNSSEC Is Still Failing: Lessons from 240 Million Domains
Phantom Domain Attack: How Unresponsive Domains Exhaust DNS Resolvers
DNSSEC Downgrade Attack: How Attackers Strip Cryptographic Protection from DNS
Fast Flux DNS: How Botnets Hide Behind Rapidly Rotating IP Addresses
DNS Rebinding Attack: How Browsers Are Tricked Into Bypassing Same-Origin Policy
DNS Over HTTPS Abuse: How Encrypted DNS Creates Security Blind Spots
DNS Tunneling Attack: How Data Is Smuggled Through Port 53
NXDOMAIN Attack: How Nonexistent Domain Floods Exhaust DNS Resolvers
DNS Water Torture Attack: How Random Subdomain Floods Overwhelm Nameservers
DNS Amplification Attack Explained: How Open Resolvers Enable Massive DDoS
Subdomain Takeover: How Dangling DNS Records Let Attackers Hijack Your Domain
DNS Hijacking Explained: How Attackers Take Control of Your Domain's Resolution
What Is DNS Cache Poisoning? How It Works and How to Prevent It
DNS Zone Walking for Subdomain Enumeration: How NSEC Exposes Your Subdomains
DNS Zone Walking at the TLD Level: How Attackers Discover Every Domain in a TLD
DNS Zone Transfer Attack (AXFR): How a Single Query Exposes Your Entire Domain
What Is an Open DNS Resolver? Why It's Dangerous and How to Fix It
How to Identify and Manage Web Crawlers: A Sysadmin's Guide to robots.txt, AI Bots, and SEO Crawlers
How to Report Usenet Abuse: Spam, Piracy, and Illegal Content on Newsgroup Servers
How to Report Network Security Incidents to a CERT Team: Templates for Vulnerability Exploitation and Intrusions
How to Contact Law Enforcement About Cybercrime: Filing Reports With FBI IC3, Europol, and National CERTs
How to Report Child Exploitation Material (CSAM) Online: Emergency Contacts and Reporting Steps
DMCA Takedown Notice Template: How to Report Copyright Infringement to a Hosting Provider
How to Report Phishing Emails and Websites Hosted on an IP Address
How to Report Spam From an IP Address: Abuse Reports for Unsolicited Email
How to Report a Hacked Server: Filing Abuse Reports After a Compromise
How to Report Malware and Botnet Command-and-Control Traffic From an IP Address
How to Report Port Scanning and Network Reconnaissance to an ISP
How to Report Brute Force SSH and RDP Attacks: Log Evidence and Abuse Report Templates
How to Report a DDoS Attack to Your ISP: Evidence, Templates, and Escalation Steps
How to Report IP Address Abuse: The Complete Guide to Filing Reports That Get Results
What Is DNSSEC and Why Should You Enable It?
SPF, DKIM, and DMARC: How DNS Protects Your Email From Spoofing
Dangling CNAMEs and Subdomain Takeover Risk Across the Global DNS
IPv6 Adoption: Which Countries and TLDs Are Leading the Transition?
Misconfigured SPF Records: Too Many Includes, Missing -all, and Other Common Mistakes
Email Authentication by the Numbers: SPF, DKIM, and DMARC Adoption from 262 Million DNS Records
Unsecured IoT Protocols: MQTT, Telnet, and CoAP Exposure Trends
The Shrinking Perimeter: Common Service Exposure Across IPv4
Tutorials
Step-by-step guides for configuring, verifying, and troubleshooting DNS settings.
DNS Lookups in PHP: dns_get_record, gethostbyname, and Beyond
Build a DNS Resolver from Scratch in PHP
DNS Queries in Node.js: dns.lookup vs dns.resolve Explained
Build a DNS Resolver from Scratch in Node.js
DNS Lookups in Python: Complete Guide with dnspython
Build a DNS Resolver from Scratch in Python
The Complete dig Command Guide: Every Flag and Option Explained
How DNS Queries Work: A Developer's Guide to the DNS Protocol
DNS Troubleshooting Tools: What the Pros Actually Use
How to Set Up a Custom Domain for Your Email (Google Workspace, Microsoft 365)
Troubleshooting Common DNS Issues: A Step-by-Step Guide
How to Verify DNS Changes After Switching Hosting Providers
What Is DNS Propagation and Why Does It Take So Long?
DNS Basics
Foundational articles about how the Domain Name System works, from records to resolution.
DNS Root Servers Explained: The 13 Servers That Run the Internet
What Is SERVFAIL? Understanding DNS Server Failure Responses
What Is NXDOMAIN? Understanding the 'Domain Does Not Exist' DNS Response
What Is DNS TTL? How Time to Live Controls Caching, Propagation, and Performance
DNS Propagation Myths Debunked: It's Really About Cache Freshness
25 DNS Jokes Every SysAdmin Will Painfully Relate To
Understanding DNS Record Types: A, AAAA, CNAME, MX, TXT, and More
TLD Guide
Explore the world of top-level domains from classic .com to the newest gTLDs.
