Generated by GPT-5-mini| dig | |
|---|---|
![]() Museu Valencià d'Etnologia from València, España · CC BY-SA 2.0 · source | |
| Name | dig |
| Developer | Internet Systems Consortium, BIND contributors |
| Released | 1980s |
| Latest release | varies by distribution |
| Operating system | Unix-like, Windows |
| Platform | x86, ARM |
| Size | small |
| License | ISC License, permissive |
dig
dig is a command-line utility for querying the Domain Name System, used to retrieve DNS records and troubleshoot name resolution. It is commonly distributed with the BIND software suite and included in many Unix-like and Windows network diagnostic toolsets. Network engineers, system administrators, and security researchers rely on it alongside tools from major organizations and standards bodies.
dig provides queries for resource records such as A, AAAA, MX, NS, TXT and SOA, enabling inspection of authoritative and recursive responses from name servers like those run by Internet Systems Consortium, Cloudflare, Google Public DNS, Quad9, and OpenDNS. Operators use it in conjunction with protocols and documents from RFC 1034, RFC 1035, IETF working groups, and network measurement projects at institutions like Network Time Foundation and CAIDA. The utility outputs sections including QUESTION, ANSWER, AUTHORITY, and ADDITIONAL, and supports options for specifying transport (UDP, TCP, TLS) and flags relevant to DNSSEC as defined by RFC 4033, RFC 4034, and RFC 7858.
dig originated as part of the development of the BIND suite in the 1980s, with contributions from engineers affiliated with University of California, Berkeley projects and the Internet Systems Consortium. Its evolution tracks major milestones in DNS history such as the introduction of EDNS0 in RFC 2671, the deployment of DNSSEC via IETF standards, and the adoption of DNS over TLS and DNS over HTTPS advocated in later RFCs and implemented by providers like Cloudflare and Google. Over decades, dig has been updated to reflect changes driven by events and organizations including IANA root zone management, root server operators, and large-scale incidents that prompted operational guidance from bodies like ENISA and US-CERT.
dig supports direct queries to authoritative servers and iterative resolver behavior useful for diagnosing delegation, zone transfers, and caching. It can request type-specific records used by mail and web infrastructure such as those defined for SMTP and DMARC policies, often inspected alongside records for services hosted by organizations like Amazon Web Services, Microsoft Azure, Akamai Technologies, Fastly, and Cloudflare. Advanced flags enable DNSSEC validation checks, EDNS options, and toggles for TCP fallback, matching recommendations in documents from IETF and implementations by resolver projects including Unbound and PowerDNS. dig also supports inverse queries, class specification (IN, CH, HS), and options to format output for parsing by automation tools commonly authored in environments like GitHub repositories maintained by corporations and open-source foundations.
Common usage includes querying A and AAAA records for hostnames resolved by providers such as Verizon Communications networks or content hosts run by Google LLC and Amazon.com, Inc.. Operators may trace delegation chains by querying NS records for zones managed by registries like Verisign and regional registrars under ICANN policies. Example workflows pair dig with system utilities on platforms from Debian and Red Hat, Inc. distributions or administrators using management consoles from Microsoft and orchestration tools authored on GitLab or GitHub. In incident response, teams from organizations including SANS Institute, CERT/CC, and national CERTs use dig outputs to correlate DNS behavior with indicators of compromise and coordinate disclosures with registries and hosting providers.
dig is distributed with ISC's BIND and reimplemented in projects such as PowerDNS utilities and lightweight clients included in distributions like Ubuntu, Debian, Fedora, and Alpine Linux. Ports and native builds exist for Microsoft Windows and mobile or embedded platforms using toolchains maintained by organizations like LLVM and GCC. Cloud providers such as Amazon Web Services, Google Cloud Platform, and Microsoft Azure publish docs showing dig examples for troubleshooting hosted DNS and hybrid cloud name resolution. Third-party GUIs and integrated development environments provided by vendors and projects on GitHub wrap dig functionality for users preferring graphical inspection.
dig itself is a diagnostic client and does not perform enforcement, so its outputs must be interpreted in the context of deployment documents from authorities like IETF, NIST, and regional cybersecurity agencies. Limitations include potential to trigger rate limits when used at scale against infrastructure operated by Cloudflare, Akamai Technologies, or root server operators, and exposure of query metadata when using unsecured transports contrary to recommendations in RFC 7858 and RFC 8484. For DNSSEC validation and privacy-preserving transports, administrators follow guidance from IETF working groups and implementers such as Unbound and Knot Resolver to mitigate spoofing, cache poisoning, and traffic analysis risks.
Category:Network administration tools