Fully signed zone
Input: cloudflare.com
Output: DS: 2 records · DNSKEY: 4 records · RRSIG: many → signed
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Look up DS, DNSKEY, and RRSIG records for a domain to confirm DNSSEC is enabled and inspect the chain-of-trust artifacts.
The DNSSEC Checker queries the three records that prove a zone is cryptographically signed: DS at the parent (delegation signer, links your zone into the chain of trust), DNSKEY at your zone (public KSK and ZSK), and RRSIG (signatures over each RRset). When all three exist, the resolver path is signed end-to-end and validating resolvers (Cloudflare 1.1.1.1, Google 8.8.8.8, Quad9) can detect cache poisoning and forged answers. The tool reports each record set count, surfaces the raw values, and flags a domain as unsigned when none exist. Because DNSSEC gates many compliance regimes (federal .gov, finance audits, the baseline for any zone hosting sensitive APIs), confirming the signing posture in seconds is the difference between a passing audit and a back-and-forth. Queries run from our backend against public DNS; nothing is forwarded externally.
Input: cloudflare.com
Output: DS: 2 records · DNSKEY: 4 records · RRSIG: many → signed
Input: old-corporate.example
Output: DS: 0 · DNSKEY: 0 · RRSIG: 0 → not signed
Input: newsigner.example
Output: DS: 0 · DNSKEY: 4 · RRSIG: many → signed in zone but not chained — registrar missing DS