DNS Security Analysis

quera.org

Last updated:3/18/2025, 11:00:39 AM

Security Score

A-

DNS Name Server Configuration

NS Records

PASS

NS records are properly configured.

k.ns.arvancdn.ir.
q.ns.arvancdn.ir.

An NS record (or nameserver record) is a DNS record that contains the name of the authoritative name server within a domain or DNS zone. Without these records, your domain won't work because other servers won't know where to look for information. Every domain must have at least one NS record.

Name Servers IPv4 Support

PASS

Found proper A records for IPv4 connectivity on all name servers:

k.ns.arvancdn.ir. ==> 185.143.232.253
q.ns.arvancdn.ir. ==> 185.143.235.253

A records connect your domain names to IPv4 addresses. Without these records, other systems cannot reach your name servers. Each name server must have an A record to be accessible on the internet.

Name Servers IPv6 Support

FAIL

Name servers lack IPv6 support. This only matters if you need IPv6 access:

k.ns.arvancdn.ir. ==> ?
q.ns.arvancdn.ir. ==> ?

AAAA records enable IPv6 connectivity. This is optional but recommended for future-proofing your domain as more networks move to IPv6.

Recursive Queries

PASS

Name servers are configured to prevent recursive queries, improving security.

185.143.232.253 ==> Recursive search is disabled. flags: 1000010100000000
185.143.235.253 ==> Recursive search is disabled. flags: 1000010100000000

Recursive queries allow DNS servers to look up other domains on behalf of anyone who asks. If enabled, attackers can use your servers for denial of service attacks or cache poisoning. Best practice is to disable recursive queries for external users.

Public IP Usage

PASS

Name servers use public IP addresses as required for internet access.

This check verifies if name servers use public IP addresses. Using private IPs (like 192.168.x.x or 10.x.x.x) will make your servers unreachable from the internet. RFC 1918 defines which IPs are private and shouldn't be used for public services.

Name Server Count

PASS

Number of nameservers is within the recommended range of 2 to 8.

there is 2 name server

This verifies the number of name servers hosting your domain. Having too few creates reliability risks, while too many cause synchronization problems. RFC 2182 recommends having at least 2 name servers, with a maximum of 8 for optimal operation.

Zone Transfer

PASS

Zone transfers are disabled, keeping your DNS data secure.

185.143.232.253 ==> Server refused zone transfer
185.143.235.253 ==> Server refused zone transfer

Zone transfers let other servers copy all your DNS records. This should be restricted to prevent attackers from getting a complete map of your network.

DNS Security Extension (DNSSEC)

FAIL

DNSSEC is not enabled. Enabling it would protect against DNS spoofing.

DS Record: No DS record found in parent zone
DNSKEY Record: No DNSKEY records found
RRSIG Records: No RRSIG records found for SOA
DNSSEC is not set up for this domain

DNSSEC adds cryptographic signatures to DNS records. This prevents attackers from forging DNS responses and redirecting traffic. RFC 4033 defines DNSSEC as a security standard for DNS.

TXT RECORD

PASS

Found TXT records.

google-site-verification=Xh0wQPJEmP5AeO4BS_D1kEQzEu1lZZqxWq31C63bG9I
v=spf1 include:mailgun.org include:zoho.com include:spf.postal.quera.org -all
google-site-verification=KxFlV1Q4x2zBFq_zFRkr2mb4EYmz7vBCv_KAvRfhdfk
zoho-verification=zb83519331.zmverify.zoho.com

TXT records are used to store arbitrary text data associated with a domain. These are often used for domain verification purposes (e.g., for Google Search Console or SPF records) and email authentication (e.g., DKIM or DMARC). Ensuring the correct TXT records are set up for your domain helps improve security and validation of your domain's identity.

Email Server Configuration

Mail Exchange Records (MX)

PASS

Found required MX records for mail delivery:

mx.zoho.com.
mx3.zoho.com.
mx2.zoho.com.

MX records specify which servers handle email for your domain. Without valid MX records, no one can send email to your domain. RFC 5321 requires at least one MX record for email delivery.

Email Servers IPv4 Support

PASS

All mail servers have required A records for IPv4 connectivity:

mx.zoho.com. ==> 204.141.43.44, 204.141.33.44
mx3.zoho.com. ==> 204.141.43.44
mx2.zoho.com. ==> 204.141.33.44

A records are essential for connecting mail servers to IPv4 addresses. Without these records, email delivery will fail, as other servers won’t be able to locate your mail server. Ensure that each mail server listed in your MX records has a corresponding A record to enable proper communication and delivery.

Email Servers IPv6 Support

FAIL

Mail servers lack IPv6 support. This only matters if you need IPv6 access:

mx.zoho.com. ==> ?
mx3.zoho.com. ==> ?
mx2.zoho.com. ==> ?

AAAA records let your mail servers receive email over IPv6. This is optional but helps future-proof your email setup.

Public IP Usage

PASS

Mail servers use public IP addresses as required for email delivery.

This verifies mail servers use public IP addresses. Private IPs prevent external email delivery. RFC 1918 defines which IPs are private and unsuitable for internet mail servers.

Reverse DNS Records

FAIL

Some mail servers have incorrect reverse DNS entries, affecting email delivery:

mx.zoho.com. ==> 204.141.43.44 ==> mx8.zoho.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.43.44 ==> mx3.zoho.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.43.44 ==> mx2.zohomail.com. ==> 204.141.33.44 - 204.141.43.44
mx.zoho.com. ==> 204.141.43.44 ==> mx.zohomail.com. ==> 136.143.183.44
mx.zoho.com. ==> 204.141.43.44 ==> mx7.zoho.com. ==> 204.141.33.44
mx.zoho.com. ==> 204.141.43.44 ==> mx.zoho.com. ==> 204.141.43.44 - 204.141.33.44
mx.zoho.com. ==> 204.141.43.44 ==> mx2.zoho.com. ==> 204.141.33.44
mx.zoho.com. ==> 204.141.43.44 ==> mx6.zoho.com. ==> 136.143.183.44
mx.zoho.com. ==> 204.141.43.44 ==> mx3.zohomail.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.33.44 ==> mx8.zoho.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.33.44 ==> mx2.zoho.com. ==> 204.141.33.44
mx.zoho.com. ==> 204.141.33.44 ==> mx3.zohomail.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.33.44 ==> mx3.zoho.com. ==> 204.141.43.44
mx.zoho.com. ==> 204.141.33.44 ==> mx.zohomail.com. ==> 136.143.183.44
mx.zoho.com. ==> 204.141.33.44 ==> mx7.zoho.com. ==> 204.141.33.44
mx.zoho.com. ==> 204.141.33.44 ==> mx6.zoho.com. ==> 136.143.183.44 - 204.141.33.44
mx.zoho.com. ==> 204.141.33.44 ==> mx.zoho.com. ==> 204.141.43.44 - 204.141.33.44
mx.zoho.com. ==> 204.141.33.44 ==> mx2.zohomail.com. ==> 204.141.43.44 - 204.141.33.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx6.zoho.com. ==> 136.143.183.44 - 204.141.33.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx.zohomail.com. ==> 136.143.183.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx3.zohomail.com. ==> 204.141.43.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx8.zoho.com. ==> 204.141.43.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx3.zoho.com. ==> 204.141.43.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx2.zohomail.com. ==> 204.141.33.44 - 204.141.43.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx7.zoho.com. ==> 204.141.33.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx.zoho.com. ==> 204.141.43.44 - 204.141.33.44
mx3.zoho.com. ==> 204.141.43.44 ==> mx2.zoho.com. ==> 204.141.33.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx2.zohomail.com. ==> 204.141.43.44 - 204.141.33.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx2.zoho.com. ==> 204.141.33.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx6.zoho.com. ==> 136.143.183.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx.zohomail.com. ==> 136.143.183.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx3.zoho.com. ==> 204.141.43.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx.zoho.com. ==> 204.141.43.44 - 204.141.33.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx8.zoho.com. ==> 204.141.43.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx3.zohomail.com. ==> 204.141.43.44
mx2.zoho.com. ==> 204.141.33.44 ==> mx7.zoho.com. ==> 204.141.33.44

PTR records provide reverse DNS lookup for mail server IPs. Many email providers reject messages from servers without valid PTR records. RFC 1912 requires PTR records for each mail server IP.

SPF (Sender Policy Framework) Record

PASS

An SPF record is present and properly configured to mitigate email spoofing.

SPF record:
v=spf1 include:mailgun.org include:zoho.com include:spf.postal.quera.org -all

SPF records list authorized email senders for your domain. This prevents others from sending fake emails from your domain. RFC 7208 defines SPF as a standard email authentication method.

Domain Authority Records (SOA)

Start of Authority Record (SOA)

PASS

SOA record exists and contains required domain information

serial: 1740701448
rname: hostmaster.arvancloud.ir.
refresh: 86400
expire: 604800
minimum: 7200
retry: 7200
mname: k.ns.arvancdn.ir.

The SOA record contains core information about your DNS zone. It defines the primary name server, contact email, and update parameters. RFC 1035 requires every DNS zone to have exactly one SOA record.

Domain Administrator Contact

PASS

Administrator contact email exists in SOA record for Zone management

Contact email for DNS problems is 'hostmaster@arvancloud.ir.' (hostmaster.arvancloud.ir.)

The RNAME field in SOA record specifies the domain administrator's email. This contact is used for technical issues with your domain. RFC 2142 recommends using hostmaster@{domain.com} format.

SOA Serial Numbers Match

PASS

Name servers are properly synchronized with matching serial numbers

master SOA serial ==> 1740701448
185.143.232.253 ==> 1740701448
185.143.235.253 ==> 1740701448

The serial number tracks DNS zone updates. Different serial numbers indicate servers have inconsistent information. RFC 1912 requires serial numbers to increment with each zone change.