No Terminal Required
Get DNS record lookups from any browser without installing dig, nslookup, or any CLI tool. Works on Windows, macOS, Linux, and mobile — wherever you have a browser open.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Query public DNS records with SSRF-safe hostname validation
DNS Lookup Tool on UtilityKit queries live public DNS records for any domain directly from your browser — no terminal, no dig command, no local DNS resolver configuration required. Enter a hostname, pick a record type, and the tool returns a structured JSON response showing every record the authoritative nameserver returns for that query. Supported record types cover the full operational range: A records resolve IPv4 addresses for a hostname; AAAA records resolve IPv6 addresses; MX records list mail exchange servers and their priority weights; TXT records expose SPF, DKIM, DMARC, site verification tokens, and other policy strings; CNAME records follow alias chains to their canonical name; and NS records reveal which nameservers are authoritative for the domain. The backend performs SSRF-safe hostname resolution, blocking localhost, RFC1918 private ranges (10.x.x.x, 172.16–31.x.x,.
Get DNS record lookups from any browser without installing dig, nslookup, or any CLI tool. Works on Windows, macOS, Linux, and mobile — wherever you have a browser open.
Query A, AAAA, MX, TXT, NS, and CNAME records in a single interface. Switch record types with a dropdown and re-query in one click without clearing the hostname.
Results are returned as formatted JSON with type, value, and TTL fields for each record — easy to read, compare, and paste into documentation or incident reports.
Queries go through a public DNS resolver and reflect what the global internet resolves — not your local network's potentially stale or split-horizon DNS cache.
The backend validates and blocks all private, loopback, and link-local addresses before resolving, preventing the tool from being used to probe internal network infrastructure.
After a DNS change, query the same hostname repeatedly to watch TTL values decrease and confirm when new records have propagated to the public resolver being queried.
Input: Hostname: utilitykit.tools | Type: A
Output: { "type": "A", "hostname": "utilitykit.tools", "records": [ { "address": "134.122.89.44", "ttl": 300 } ] }
Input: Hostname: gmail.com | Type: MX
Output: { "type": "MX", "hostname": "gmail.com", "records": [ { "exchange": "alt1.gmail-smtp-in.l.google.com", "priority": 5, "ttl": 300 }, { "exchange": "alt2.gmail-smtp-in.l.google.com", "priority": 10, "ttl": 300 }, { "exchange": "alt3.gmail-smtp-in.l.google.com", "priority": 20, "ttl": 300 }, { "exchange": "alt4.gmail-smtp-in.l.google.com", "priority": 30, "ttl": 300 }, { "exchange": "gmail-smtp-in.l.google.com", "priority": 5, "ttl": 300 } ] }
Input: Hostname: example.com | Type: TXT
Output: { "type": "TXT", "hostname": "example.com", "records": [ { "value": "v=spf1 include:_spf.google.com include:amazonses.com ~all", "ttl": 3600 }, { "value": "google-site-verification=abc123XYZverificationtoken", "ttl": 3600 } ] }