Httpfy

DNS Report for cfe.mx

Date Generated: 2024-09-14 06:41:09

Nameservers

  • ns1.a2.impervasecuredns.net
    • IPv4: 192.230.123.1
    • IPv6: 2a02:e980:6::1
    • TTL (IPv4): 30 seconds
    • TTL (IPv6): 30 seconds
    • Recursive: N/A
  • ns1.a1.impervasecuredns.net
    • IPv4: 192.230.122.1
    • IPv6: 2a02:e980:5::1
    • TTL (IPv4): 30 seconds
    • TTL (IPv6): 30 seconds
    • Recursive: N/A
  • ns1.a0.impervasecuredns.net
    • IPv4: 192.230.121.1
    • IPv6: 2a02:e980:4::1
    • TTL (IPv4): 30 seconds
    • TTL (IPv6): 30 seconds
    • Recursive: N/A

Nameserver Count - OK

Nameserver Queries

  • ns1.a2.impervasecuredns.net
    • Status: Responded
    • IP(s): 45.60.163.51, 45.60.151.51
    • TTL: 3600 seconds
    • Recursive Queries: Unclear (Response code: NOTAUTH)
    • TCP Connectivity: TCP connection failed (Response code: NOTAUTH)
  • ns1.a1.impervasecuredns.net
    • Status: Responded
    • IP(s): 45.60.163.51, 45.60.151.51
    • TTL: 3600 seconds
    • Recursive Queries: Unclear (Response code: NOTAUTH)
    • TCP Connectivity: TCP connection failed (Response code: NOTAUTH)
  • ns1.a0.impervasecuredns.net
    • Status: Responded
    • IP(s): 45.60.163.51, 45.60.151.51
    • TTL: 3600 seconds
    • Recursive Queries: Unclear (Response code: NOTAUTH)
    • TCP Connectivity: TCP connection failed (Response code: NOTAUTH)

SOA Records

ns1.a2.impervasecuredns.net
  • Serial: 5
  • Refresh: 3600
  • Retry: 600
  • Expire: 604800
  • Minimum TTL: 3600
ns1.a1.impervasecuredns.net
  • Serial: 5
  • Refresh: 3600
  • Retry: 600
  • Expire: 604800
  • Minimum TTL: 3600
ns1.a0.impervasecuredns.net
  • Serial: 5
  • Refresh: 3600
  • Retry: 600
  • Expire: 604800
  • Minimum TTL: 3600

Serial: 5 - OK

REFRESH: 3600 - OK

RETRY: 600 - OK

EXPIRE: 604800 - OK

MINIMUM TTL: 3600 - OK

MX Records

ns1.a2.impervasecuredns.net
ns1.a1.impervasecuredns.net
ns1.a0.impervasecuredns.net

MX Record Consistency - Warning: Inconsistencies found

MX Record Count - Warning: Only one MX record

Reverse MX A records (PTR)

  • 56.41.101.52.in-addr.arpa -> mail-sj0pr21cu00100.inbound.protection.outlook.com
  • 4.42.101.52.in-addr.arpa -> mail-co1pr03cu00104.inbound.protection.outlook.com
  • 36.8.101.52.in-addr.arpa -> No PTR record found: The DNS query name does not exist: 36.8.101.52.in-addr.arpa.

PTR Records - OK

  • Signed: No
  • Validation: Failed
  • DNSKEY Records: None
  • DS Records in parent zone: None
  • DS at Parent: None

DNSSEC - Note: Domain is not signed with DNSSEC

Error: No DNSSEC records found

SPF (Sender Policy Framework)

SPF Record Published: Passed

Multiple SPF Records: Passed

SPF Record 1:
  • Record: v=spf1 ip4:159.16.1.16 ip4:159.16.1.17 ip4:159.16.1.18 ip4:159.16.1.19 ip4:159.16.244.49 include:spf.protection.outlook.com -all
  • SPF Syntax: Passed
  • Deprecated Elements: Passed
  • IP Addresses: 159.16.1.16, 159.16.1.17, 159.16.1.18, 159.16.1.19, 159.16.244.49
  • Includes: spf.protection.outlook.com
  • DNS Lookups: 2
  • Void Lookups: Passed
  • Escaping Chars: Not Present
  • All Mechanism: -all

DKIM (DomainKeys Identified Mail)

  • DKIM Records Found: Yes
  • Selectors Found: selector1
  • Selector 'selector1':
    Record: v=DKIM1; k=rsa; p=MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAqckuh757Y74uKpFSyaYQzY56D3Aqg1t2KtVPtJ5i3tLKFoMp/xieQuXaRqQLvFQ1AT7jEY3pyv8U6BLqM9ka4j+4BNiI3M3Mur91CtDST7GGmyBBJAqFDFVx1tFP2oHWpMnCNdmBg0qotrnJTx0gTxLZlnt81tIGafx/muKdnBxwUzFm51j/gCsshSr9cwlCf
  • Valid Syntax: Yes

DMARC

  • Record: v=DMARC1; p=reject; adkim=s; aspf=s; fo=1; ri=3600; pct=100; rua=mailto:[email protected]; ruf=mailto:[email protected]
  • Syntax: Valid
  • Policy: reject
  • Percent: 100%
  • RUA (Aggregate Reports): mailto:[email protected]
  • RUF (Forensic Reports): mailto:[email protected]
  • Failure Options (fo): 1
  • DKIM Alignment (adkim): Strict
  • SPF Alignment (aspf): Strict
  • Reporting Interval: 3600 seconds
DMARC External Validation:
  • All external domains in your DMARC record are giving permission to send them DMARC reports.
Check DNS for Another Domain

Use our DNS Checker to analyze DNS records for any domain.

Go to DNS Checker