Discover, Score, and Audit Every DNS Server in an IP Range
Find every host in a CIDR running a DNS service, score each one for capability and security posture, and flag the dangerous ones — hijacking resolvers, open recursors abusable for amplification DDoS, NXDOMAIN-rewriters that lie about negative answers. Multi-baseline hijack detection compares each resolver's answer against four trusted reference resolvers (system + 1.1.1.1 + 8.8.8.8 + 9.9.9.9) at the /16 prefix, defeating CDN-geo-steering false positives. ASN and org names come from Team Cymru's IP-to-ASN DNS service — no API keys, no setup, instant enrichment on every responder.
Try DNS Infrastructure Scanner
Probes every IP in the range for DNS service; scores capability + security; flags hijacked / open-recursor / NXDOMAIN-rewriting resolvers. Multi-baseline hijack check vs 1.1.1.1 / 8.8.8.8 / 9.9.9.9. ASN via Team Cymru. 2 free runs/day.
How It Works
From target input to actionable findings in three straightforward steps.
Supply a CIDR or IP List
Enter a CIDR (e.g. 10.0.0.0/24), single IP, or paste a list. Engagement-scoped ranges > 1024 hosts are validated against the declared scope before any probe goes out.
Each Host Gets 12 Probes
Liveness via UDP/53 with TCP/53 fallback, A/AAAA/MX/TXT/NS resolution scoring, DNSSEC AD-bit check, EDNS0 support, off-zone open-recursion probe, CHAOS version.bind disclosure, random-subdomain NXDOMAIN rewrite check, multi-baseline hijack comparison, plus optional CAA/DS/DNSKEY/TLSA/SRV/NAPTR for DNSSEC chain inspection.
Score and Filter Results
Each resolver gets a 0–100 score based on capability + security posture. Filter by hijacked / open-recursor / DNSSEC / NXDOMAIN-rewriting. Sort by score, IP, ASN, or RTT. Export the full result set to CSV for SIEM ingestion or SOC handoff.
Key Capabilities
Purpose-built scanning backed by real penetration testing expertise.
Multi-Baseline Hijack Detection
Compares each resolver answer against four trusted baselines (system + 1.1.1.1 + 8.8.8.8 + 9.9.9.9). Hijack only fires when the surveyed answer is disjoint from EVERY baseline at the /16 prefix — defeats CDN geo-steering false-positives.
Open-Resolver Hunting
Probes each host with an off-zone recursive query checking the RA flag. Open resolvers are weaponisable for reflection / amplification DDoS and downstream cache poisoning.
NXDOMAIN Rewrite Detection
High-entropy random-subdomain probes catch ISP NXDOMAIN redirection, captive-portal interception, and transparent DNS hijacks where the resolver lies about negative answers.
CHAOS Version Disclosure
Sends version.bind, hostname.bind, and version.server CHAOS-class lookups to enumerate disclosed BIND / NSD / PowerDNS / Knot builds — pipes into the platform CVE retro-match workflow.
ASN / Org Enrichment via Team Cymru
Each responder gets ASN, org name, and country annotated via Team Cymru's free DNS-based IP-to-ASN service. LRU-cached so a /24 sweep that finds 30 resolvers in three AS networks makes ~6 unique lookups.
UDP/53 with TCP/53 Fallback
When a host refuses or drops UDP, the scanner re-tries TCP/53 automatically and tags the resolver as TCP-only — catches resolvers behind UDP-blocking firewalls.
Pause / Resume / Cancel
Long-running surveys can be paused mid-flight without losing state, resumed later, or cancelled cleanly. Worker-side polling means in-flight probes finish before the pause takes effect.
Live Log Panel and Real-Time Progress
Per-IP probe events stream into a live log while the survey runs; progress counters update every 32 IPs probed. CSV export at completion.
Common Use Cases
Why Use Pentestas
Security tools built by penetration testers, not just developers.
Enterprise-Grade Accuracy
Our scanning engine is built on the same methodologies our penetration testers use in manual engagements, tuned to minimize false positives and surface genuine risk.
Fast, Actionable Results
Get findings in minutes rather than days. Every result includes severity ratings, technical evidence, and clear remediation steps your team can act on immediately.
Continuous Monitoring
Schedule recurring scans from the Pentestas platform to catch regressions before they reach production. Stay ahead of new CVEs and configuration drift.
Privacy First
Your scan data is encrypted at rest and in transit. You own your data, with full control over retention and export.
Detailed Reporting
Export findings as PDF, CSV, or JSON. Feed results directly into your SIEM, ticketing system, or CI/CD pipeline through our REST API.
Instant Setup
Run scans directly from your browser. Enter a target, click scan, and receive results. Ready in under a minute.
Start scanning with DNS Infrastructure Scanner today
Create a free account and run your first scan in under a minute. Full platform access during your 14-day trial.