The dig (domain information groper) command under unix/Linux is a great way to help verify that a DNS host like BIND is working properly.
A few of my servers are Linux, but most of my desktops usually are Windows, so I was happy to find the Using the dig dns tool on Windows 7 article by Dan Esparza explaining there is a Windows version.
So I:
- Downloaded the Windows version of BIND (I took the BIND 9.9.2-P1 ZIP file)
- Unzipped that into my C:\BIN\BIND directory
- Ran this command, just like I would on a Linux box:
dig @192.168.171.214 pluimers.com
- Checked the below output to the zone configuration on the openSUSE box serving the DNS for my domain

; <<>> DiG 9.9.2-P1 <<>> @192.168.171.214 pluimers.com
; (1 server found)
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12911
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 5, ADDITIONAL: 6
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;pluimers.com. IN A
;; ANSWER SECTION:
pluimers.com. 172800 IN A 82.161.132.169
;; AUTHORITY SECTION:
pluimers.com. 172800 IN NS ns7.4delphi.com.
pluimers.com. 172800 IN NS ns6.4delphi.com.
pluimers.com. 172800 IN NS ns2.4delphi.com.
pluimers.com. 172800 IN NS ns1.4delphi.com.
pluimers.com. 172800 IN NS ns3.4delphi.com.
;; ADDITIONAL SECTION:
ns1.4delphi.com. 172800 IN A 82.161.132.169
ns2.4delphi.com. 172800 IN A 176.9.152.132
ns3.4delphi.com. 172800 IN A 176.9.152.131
ns6.4delphi.com. 172800 IN A 109.70.6.22
ns7.4delphi.com. 172800 IN A 176.9.143.167
;; Query time: 15 msec
;; SERVER: 192.168.171.214#53(192.168.171.214)
;; WHEN: Wed Jan 02 16:07:58 2013
;; MSG SIZE rcvd: 235
–jeroen
via Dig (command) – Wikipedia, the free encyclopedia.
Like this:
Like Loading...