DNS Security Analysis

rqb.ir

Last updated:3/18/2025, 9:12:34 AM

Security Score

F

DNS Name Server Configuration

NS Records

PASS

NS records are properly configured.

dns3.rqbank.ir.
ns1.mresalat.ir.
dns2.rqbank.ir.
dns1.rqbank.ir.

An NS record (or nameserver record) is a DNS record that contains the name of the authoritative name server within a domain or DNS zone. Without these records, your domain won't work because other servers won't know where to look for information. Every domain must have at least one NS record.

Name Servers IPv4 Support

PASS

Found proper A records for IPv4 connectivity on all name servers:

dns3.rqbank.ir. ==> 5.160.154.61
ns1.mresalat.ir. ==> 46.32.4.137
dns2.rqbank.ir. ==> 5.160.154.34
dns1.rqbank.ir. ==> 185.129.111.248

A records connect your domain names to IPv4 addresses. Without these records, other systems cannot reach your name servers. Each name server must have an A record to be accessible on the internet.

Name Servers IPv6 Support

FAIL

Name servers lack IPv6 support. This only matters if you need IPv6 access:

dns3.rqbank.ir. ==> ?
ns1.mresalat.ir. ==> ?
dns2.rqbank.ir. ==> ?
dns1.rqbank.ir. ==> ?

AAAA records enable IPv6 connectivity. This is optional but recommended for future-proofing your domain as more networks move to IPv6.

Recursive Queries

FAIL

Name servers allow recursive queries, making them vulnerable to amplification attacks.

5.160.154.61 ==> Recursive search is disabled. flags: 1000010100000000
46.32.4.137 ==> Recursive search is enabled. flags: 1000010110000000
5.160.154.34 ==> Recursive search is disabled. flags: 1000010100000000
185.129.111.248 ==> Recursive search is enabled. flags: 1000010110000000

Recursive queries allow DNS servers to look up other domains on behalf of anyone who asks. If enabled, attackers can use your servers for denial of service attacks or cache poisoning. Best practice is to disable recursive queries for external users.

Public IP Usage

PASS

Name servers use public IP addresses as required for internet access.

This check verifies if name servers use public IP addresses. Using private IPs (like 192.168.x.x or 10.x.x.x) will make your servers unreachable from the internet. RFC 1918 defines which IPs are private and shouldn't be used for public services.

Name Server Count

PASS

Number of nameservers is within the recommended range of 2 to 8.

there is 4 name server

This verifies the number of name servers hosting your domain. Having too few creates reliability risks, while too many cause synchronization problems. RFC 2182 recommends having at least 2 name servers, with a maximum of 8 for optimal operation.

Zone Transfer

FAIL

Zone transfers are allowed, exposing all your DNS records to potential attackers.

5.160.154.61 ==> Server refused zone transfer
46.32.4.137 ==> Server refused zone transfer
5.160.154.34 ==> Server refused zone transfer
185.129.111.248 ==> Zone Transfer is enabled. data : @ 3600 IN SOA ns1. hostmaster. 63 900 600 86400 3600 @ 3600 IN NS dns2.rqbank.ir. 3600 IN NS dns3.rqbank.ir. 3600 IN NS ns1.mresalat.ir. 3600 IN NS dns1.rqbank.ir. @ 3600 IN TXT "e363f14c3437129a05cb27a013d7e023104f73b03c1e99eb0ddeddbbd3522ad" "" dns2.rqbank.ir. 3600 IN A 5.160.154.34 dns3.rqbank.ir. 3600 IN A 5.160.154.61 ns1.mresalat.ir. 3600 IN A 46.32.4.137 dns1.rqbank.ir. 3600 IN A 185.129.111.248 api 3600 IN A 5.160.154.56 customer 3600 IN A 5.160.154.39 email 3600 IN A 5.160.154.62 hamyar 3600 IN A 5.160.154.88 ibank 3600 IN A 5.160.154.41 ipv4 3600 IN A 91.98.102.70 m 3600 IN A 5.160.154.85 mb 3600 IN A 5.160.154.85 mbank 3600 IN A 5.160.154.52 mhesam-bff 3600 IN A 5.160.154.98 mhesam-ui 3600 IN A 5.160.154.100 mobileuat 3600 IN A 77.237.87.169 mssql 3600 IN A 91.98.102.70 new-ebill 3600 IN A 5.160.154.112 newebillcompany 3600 IN A 5.160.154.112 notification 3600 IN A 5.160.154.46 oauth 3600 IN A 185.129.111.244 OAuth1 3600 IN A 77.237.87.171 pishnahad 3600 IN A 91.99.103.146 plesk 3600 IN A 91.98.102.70 preoauth 3600 IN A 5.160.154.62 presec 3600 IN A 5.160.154.62 prevbank 3600 IN A 5.160.154.62 sec 3600 IN A 5.160.154.86 v 3600 IN A 5.160.154.85 vbank 3600 IN A 185.129.111.245 wallet-bff 3600 IN A 5.160.154.98 wallet-ui 3600 IN A 5.160.154.99

Zone transfers let other servers copy all your DNS records. This should be restricted to prevent attackers from getting a complete map of your network.

DNS Security Extension (DNSSEC)

FAIL

DNSSEC is not enabled. Enabling it would protect against DNS spoofing.

DS Record: No DS record found in parent zone
DNSKEY Record: No DNSKEY records found
RRSIG Records: No RRSIG records found for SOA
DNSSEC is not set up for this domain

DNSSEC adds cryptographic signatures to DNS records. This prevents attackers from forging DNS responses and redirecting traffic. RFC 4033 defines DNSSEC as a security standard for DNS.

TXT RECORD

PASS

Found TXT records.

e363f14c3437129a05cb27a013d7e023104f73b03c1e99eb0ddeddbbd3522ad
v=spf1 a mx ip4:5.160.154.61 ~all

TXT records are used to store arbitrary text data associated with a domain. These are often used for domain verification purposes (e.g., for Google Search Console or SPF records) and email authentication (e.g., DKIM or DMARC). Ensuring the correct TXT records are set up for your domain helps improve security and validation of your domain's identity.

Email Server Configuration

Mail Exchange Records (MX)

PASS

Found required MX records for mail delivery:

email.rqb.ir.

MX records specify which servers handle email for your domain. Without valid MX records, no one can send email to your domain. RFC 5321 requires at least one MX record for email delivery.

Email Servers IPv4 Support

PASS

All mail servers have required A records for IPv4 connectivity:

email.rqb.ir. ==> 5.160.154.62

A records are essential for connecting mail servers to IPv4 addresses. Without these records, email delivery will fail, as other servers won’t be able to locate your mail server. Ensure that each mail server listed in your MX records has a corresponding A record to enable proper communication and delivery.

Email Servers IPv6 Support

FAIL

Mail servers lack IPv6 support. This only matters if you need IPv6 access:

email.rqb.ir. ==> ?

AAAA records let your mail servers receive email over IPv6. This is optional but helps future-proof your email setup.

Public IP Usage

PASS

Mail servers use public IP addresses as required for email delivery.

This verifies mail servers use public IP addresses. Private IPs prevent external email delivery. RFC 1918 defines which IPs are private and unsuitable for internet mail servers.

Reverse DNS Records

FAIL

Some mail servers have incorrect reverse DNS entries, affecting email delivery:

email.rqb.ir. ==> 5.160.154.62 ==> ? ==> ?

PTR records provide reverse DNS lookup for mail server IPs. Many email providers reject messages from servers without valid PTR records. RFC 1912 requires PTR records for each mail server IP.

SPF (Sender Policy Framework) Record

PASS

An SPF record is present and properly configured to mitigate email spoofing.

SPF record:
v=spf1 a mx ip4:5.160.154.61 ~all

SPF records list authorized email senders for your domain. This prevents others from sending fake emails from your domain. RFC 7208 defines SPF as a standard email authentication method.

Domain Authority Records (SOA)

Start of Authority Record (SOA)

PASS

SOA record exists and contains required domain information

serial: 65
rname: hostmaster.
refresh: 900
expire: 86400
minimum: 3600
retry: 600
mname: ns1.

The SOA record contains core information about your DNS zone. It defines the primary name server, contact email, and update parameters. RFC 1035 requires every DNS zone to have exactly one SOA record.

Domain Administrator Contact

PASS

Administrator contact email exists in SOA record for Zone management

Contact email for DNS problems is 'hostmaster@' (hostmaster.)

The RNAME field in SOA record specifies the domain administrator's email. This contact is used for technical issues with your domain. RFC 2142 recommends using hostmaster@{domain.com} format.

SOA Serial Numbers Match

FAIL

Name servers have different serial numbers. DNS changes may not be synchronized across all servers

master SOA serial ==> 65
5.160.154.61 ==> 153000633
46.32.4.137 ==> 65
5.160.154.34 ==> 153000633
185.129.111.248 ==> 63

The serial number tracks DNS zone updates. Different serial numbers indicate servers have inconsistent information. RFC 1912 requires serial numbers to increment with each zone change.