DNS Info Zone Commands,DNS Dig command explained

Dig command explained

Are you ready to learn all about one simple and a great tool for network diagnostic? Here comes the Dig command! Small, fast, and useful. It can become your go-to DNS utility tool from now on.

History of the Dig command

The creator of the dig command is Stev Hotz. The utility tool was part of the BIND 4 (Berkeley Internet Name Domain) DNS software that was introduced in the late 80s. Some year later, another developer called Michael Sawyer rewrote the code of dig and integrated it into the BIND 9. 

Dig command explained

To explain to you the Dig command, the easiest way, we can start with its full name – Domain Information Groper. What you can get from the name is that this software has the purpose get information about a domain. You can perform various DNS probing and get important information that can help you detect a problem with your domain, DNS records, or name servers. 

What can you do with the Dig command?

With the Dig command, you can see all kinds of DNS records, check name servers, do a reverse DNS, and more. See the whole list here:

  • Check all name servers (see the NS DNS records). 
  • Probe an individual name server after you know it from the previous probe. 
  • Probe all available DNS records
  • Perform a specific check for a certain type of DNS record – A, AAAA, MX, NS, SOA, TXT, CNAME, or another. 
  • Check an IP and trace it back to a hostname.
  • Trace the complete route of a DNS query from a point (your computer or another resolver) to the hostname or IP address. 

Dig output explained

Let’s go deep into the output that you will get after performing a dig query. 

Go to the Terminal and write:

dig yahoo.com

*you can change yahoo.com with another domain that you want. 

  1. The first part of the output will show you the version of the dig command and the global option for the particular check. You can disable this part with the +nocmd option.
  2. Then you will get a header that will show you if you got an answer or no (NOERROR means you got no problem receiving the answer), flags used for the query, and type of answer – authoritative or no. Remove this part with +nocomments options. 
  3. In the newer version of Dig, you will have an OPT section that shows EDNS and its port. +noedns will remove this. 
  4. The question, by default, is the A record, but you can ask for: A, AAAA, MX, SOA, NS, CNAME, TXT, PTR or another record, particular host, IP address, port, or another. 

Examples of some dig questions:

dig a yahoo.com

dig aaaa yahoo.com

dig mx yahoo.com

dig soa yahoo.com

dig ns yahoo.com

dig txt yahoo.com

dig yahoo.com +trace (trace route)

dig -x 11.22.33.44 (reverse lookup of the IP address 11.22.33.44)

dig -p 43 yahoo.com (check the domain using port 43)

You can use extra options by putting them after your question and domain. An example of an option is +short for a shorter answer of only IPv4 (dig yahoo.com +short). Multiple options can be added by simply separating them with space. Example of two options together:

dig -x 11.22.33.44 +noall +answer – a reverse lookup for 11.22.33.44 without all the information, but include the answer.

  1. The answer. It will show what you asked before. The common answer will show the hostname, a TTL value of the DNS record, its type, and value. If it is an A record query, you will get the IPv4 addresses. 

If you don’t want to see the answer section for some reason, you can remove it with the option +noanswer.

  1. Authority section shows which are the authoritative name servers for the particular domain. 

+noauthority will disable this part. 

  1. Additional information about the addresses IPv4 and IPv6 of the authoritative name servers. 

+noadditional to disable it. 

  1. Statistic. It will show the general statistics about the query like time, packet size, and date.

+nostats option will dissable it.

Suggested article: Traceroute command explained

Conclusion

Now you know everything about the Dig command. Go ahead and use the examples of dig commands from part 4 of the “Dig output explained”. Learn to use, and you will always have a great domain testing tool at hand.

1 thought on “Dig command explained”

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Post

DNS PTR record

DNS PTR record explainedDNS PTR record explained

DNS PTR record – What is it?

DNS PTR record is a type of DNS record, which is oftentimes called pointer record. This is because it helps to associate an IP address to a domain name. The goal is to show that the specific IP address is actually related to the domain name. If somebody is checking it, this record proves that there is no scam. With the DNS PTR record it is easy to validate the different elements or additional services, such as a mail server.

Looking for more information? Take a look at this fantastic about the DNS PTR record!

(more…)

Domain Name System DNS

Domain Name System (DNS) explainedDomain Name System (DNS) explained

Are you interested in the Domain Name System (DNS)? To get into this topic is like getting into another world—a tech one with its own rules and processes. If you are ready, just fasten your belt, and let’s go into DNS!

What is DNS?

DNS is a system, a naming database, for locating and translating Internet domain names into IP addresses. Think about it, like a directory or, more modernly, like your mobile’s contacts list where names and their corresponding numbers are correctly matched. 

DNS directory is distributed worldwide, and it works daily, helping to search and reach the millions of existing domain names every day. 

Domain Name System explained in details

What is DNS hierarchy?

(more…)

Nslookup command

Nslookup command – five easy examplesNslookup command – five easy examples

Nslookup command explained

The Nslookup command is a commonly used tool with a command-line interface. Usually, it is applied for DNS probing. Nslookup command is perfect if you want to check a domain name, its IP address, and various DNS records. The great benefit is that it is typically pre-built on almost every OS. Additionally, the Nslookup command presents clean and straightforward answers. 

(more…)