Professional DNS troubleshooting and analysis tools
Analyze SSL/TLS certificate chains, verify trust paths, and detect issues with certificate validation.
Compare DNS records between two servers to verify migration integrity and detect discrepancies.
Check DNS propagation across multiple global nameservers to verify changes have propagated worldwide.
Monitor for domain mentions, data breaches, and leaked credentials on dark web forums and marketplaces.
Trace network path with real-time geolocation mapping and latency analysis.
Validate DNSSEC chain of trust, verify signatures, and troubleshoot DNSSEC configuration issues.
Get comprehensive risk assessment (0-100) based on email security, SSL/TLS, domain age, service verifications, and threat intelligence.
Discover subdomains from Certificate Transparency logs, DNS bruteforce, and certificate SANs. Check for subdomain takeover vulnerabilities.
Search for all domains registered by a specific person, organization, registrar, or using specific nameservers. Similar to SecurityTrails reverse WHOIS.
Discover related domains through shared infrastructure: IP addresses, nameservers, SSL certs, WHOIS registrant, email security, services, and more.
Industry-first SaaS API combining JA4 + proprietary DNS4 suite for comprehensive network traffic analysis. Detect malware C2, track certificate reuse, identify VPNs/proxies, and correlate network behavior with DNS intelligence.
curl -X POST https://api.dnsscience.io/v1/fingerprint/submit \
-H "X-API-Key: YOUR_KEY" \
-H "Content-Type: application/json" \
-d '{"source_ip":"1.2.3.4","fingerprints":{"ja4":"..."}}'
Enterprise-grade CLI for managing DNS and DHCP across Infoblox, BlueCat, Route53, Cloudflare, Azure DNS, and 20+ platforms with built-in compliance, auditing, and ticketing integration.
pip install dnsscience-dnsnet # Initialize configuration dnsnet config init # List zones from Infoblox dnsnet infoblox dns zones list # Check DNS propagation globally dnsnet test propagation example.com A
Deploy DNS monitoring on client networks, analyze packet captures, and integrate with our API for comprehensive DNS security.
Real-Time DNS Traffic Monitoring Daemon
Deploy on client networks to capture and analyze ALL DNS queries in real-time. Automatically detects threats, blacklisted DNS servers, and suspicious traffic patterns.
git clone https://github.com/dnsscience/dnsscience_snifferd.git cd dnsscience_snifferd sudo pip3 install -r requirements.txt sudo python3 dnsscience_snifferd.py -c config.yamlπ View Documentation
PCAP Analysis Tool for Forensic Investigation
Offline analysis of DNS traffic from packet captures. Perfect for security incident investigation and historical traffic analysis.
# Analyze a PCAP file python3 dnsscience_analyze.py -c config.yaml capture.pcap # Output includes: # β’ Total packets and DNS queries # β’ Unique domains and IPs # β’ Threat detection summary # β’ Query type breakdown # β’ Top DNS servers used
REST API for Programmatic Access
Manage monitoring locations, retrieve threat data, and integrate DNS monitoring into your applications.
GET /api/v1/dns-monitoring/locations - List monitoring locationsPOST /api/v1/dns-monitoring/locations - Create new locationPOST /api/v1/dns-monitoring/queries - Ingest DNS queriesGET /api/v1/dns-monitoring/threats - Retrieve detected threatsGET /api/v1/dns-monitoring/stats - Get statisticscurl -X POST https://www.dnsscience.io/api/v1/dns-monitoring/locations \
-H "X-API-Key: YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{"location_name": "Office HQ"}'
# Returns API key for dnsscience_snifferd deployment
π Full API Documentation
All DNS monitoring tools are available in the dnsscience_snifferd/ directory. Create a free account to get your API key and start monitoring DNS traffic today!
Deploy intelligent DNS resolvers with integrated threat intelligence, policy enforcement, and real-time analytics using our Unbound Python module.
Python-Powered DNS Security & Intelligence
Custom Unbound Python module that integrates DNS Science threat intelligence directly into your DNS resolver for real-time protection and analytics.
Containerized DNS Resolver with DNS Science Integration
Pre-built Docker container with Unbound DNS resolver and DNS Science Python module pre-configured for immediate deployment.
# Pull DNS Science Unbound container docker pull dnsscience/unbound:latest # Run with your API key docker run -d \ -p 53:53/udp \ -p 53:53/tcp \ -e DNSSCIENCE_API_KEY=your_key_here \ --name dnsscience-resolver \ dnsscience/unbound:latest
-v /path/to/config:/etc/unbound/dnsscience.confREST API for Unbound Module Management
Manage your Unbound resolvers, retrieve threat data, and configure policies via our specialized API endpoints.
POST /api/v1/unbound/register - Register new resolver instancePOST /api/v1/unbound/query - Submit query for threat analysisPOST /api/v1/unbound/analytics - Batch upload query statisticsGET /api/v1/unbound/policy - Download latest policy rulesPOST /api/v1/unbound/alerts - Submit security alertsGET /api/v1/unbound/stats - Get resolver statisticscurl -X POST https://www.dnsscience.io/api/v1/unbound/register \
-H "X-API-Key: YOUR_API_KEY" \
-H "Content-Type: application/json" \
-d '{
"resolver_name": "Office DNS",
"location": "HQ Data Center",
"modules_enabled": [
"threat_intel",
"analytics",
"policy"
]
}'
# Returns resolver ID and module-specific API key
π Full Unbound API Documentation
Convert between DNS zone file formats: BIND (named.conf), NSD (nsd.conf), and DNS Science JSON. Upload your zone files and download in your desired format.
DNS Science automatically tracks which services and platforms domains have verified with by analyzing TXT records. This provides unique insights into technology adoption, platform usage, and business intelligence across your domain portfolio.
Our system automatically:
Built by DNS Science: A comprehensive Model Context Protocol (MCP) server that brings expert DNS knowledge and powerful DNS tools directly into your Claude Desktop conversations.
The Model Context Protocol (MCP) is an open standard that lets Claude Desktop access external knowledge bases and tools. DNS Science created this powerful MCP server to extend Claude with comprehensive DNS expertise, real-time DNS queries, zone validation, and debugging capabilities. Think of it as having a DNS expert assistant built right into Claude Desktop!
git clone https://github.com/straticus1/dnsscience-dnsmcp.git cd dnsscience-dnsmcp npm install npm run build
{
"mcpServers": {
"dns": {
"command": "node",
"args": ["/path/to/dnsscience-dnsmcp/dist/index.js"]
}
}
}
Config location:
β’ macOS: ~/Library/Application Support/Claude/claude_desktop_config.json
β’ Windows: %APPDATA%/Claude/claude_desktop_config.json
β’ Linux: ~/.config/Claude/claude_desktop_config.json
Completely quit and reopen Claude Desktop to load the MCP server.
"Help me set up DNSSEC for my domain using BIND"
"Check this zone file for errors: [paste zone]"
"I'm migrating from BIND to PowerDNS, what do I need to know?"
"How do I implement DANE for my mail server?"
"My domain returns SERVFAIL, help me debug it"
"Generate a BIND configuration for authoritative DNS"
DNS Science is committed to making DNS expertise accessible to everyone. We built this MCP server to bring our years of DNS knowledge directly into your Claude conversations.