. IN DS ( 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d )
;; Response received from [193.0.14.129] 1414 octets ;; HEADER SECTION ;; id = 34369 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; . IN DNSKEY ;; ANSWER SECTION (5 records) . 172800 IN DNSKEY ( 256 3 8 AwEAAbNTVC2+pry4pc37pZI9Oj6b8FHxT3VGrvSPKLE1Tjyfe2kUZUtVX5xrv6AV4BVO+ygrYjGZ MNgEnbLU4zknnlnhI2e0g6iTza1aZh0dRZXGH16C1NUNq1CxBkUhIYQhQDeIOtLacx+RmFTc+hSH JJ2MJ79IS00kA7eKi6mofQ7SPJmdJVjI+JAx791y0f5QaB+iHGANU53FwiYXNUQjfAzCrtOaSevG sx8SO8BTaXLAjFq5eewOtwScVwfVDhEXlvpE6e+mIncwhNKaMRD9IPuHENqCNPI5MjxfAMVS6cEY 8eEozIkv/vHc+0Auu3n+Fcx6F2Js4KPXaHEShAXugfU= ) ; keytag 21831 . 172800 IN DNSKEY ( 256 3 8 AwEAAb5dDYffpgAJ8VUGLwQtWXPlQWsjIFJtCM00/XaKU+8ln+ofah3q2KxEIjvzQg+nqdxRj+8e mtPne1mtYcbFWP4Q9E+DniOJLK09R05FuzvGbrG7DDdRDUX/cedFdV7O8pFEAYpJqYNR9BCTIAV9 73DO2biauKSA31b7I2lK/woxoR1tf5cqJ4SMbJUviuHicAEoUi2ATswloZNWd5T5thmEFZnxFx7D 5UgKCY7oflS7+GU7dNJwEtmFnWYVETHN0kHXVz6aguouaAZp706YXNIoR/iTgQhmsR7XX+wL0Z8Q M2LxQIyU6vRZ06IyuJMGRMiwkSuGElbumyBt12JZbrU= ) ; keytag 54393 . 172800 IN DNSKEY ( 257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlE xOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgC mr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+ SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnX GXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU= ) ; keytag 20326 . 172800 IN DNSKEY ( 257 3 8 AwEAAa96jeuknZlaeSrvyAJj6ZHv28hhOKkx3rLGXVaC6rXTsDc449/cidltpkyGwCJNnOAlFNKF 2jBosZBU5eeHspaQWOmOElZsjICMQMC3aeHbGiShvZsx4wMYSjH8e7Vrhbu6irwCzVBApESjbUdp WWmEnhathWu1jo+siFUiRAAxm9qyJNg/wOZqqzL/dL/q8PkcRU5oUKEpUge71M3ej2/7CPqpdVwu MoTvoB+ZOT4YeGyxMvHmbrxlFzGOHOijtzN+u1TQNatX2XBuzZNQ1K+s2CXkPIZo7s6JgZyvaBev YtxPvYLw4z9mR7K2vaF18UYH9Z9GNUUeayffKC73PYc= ) ; keytag 38696 . 172800 IN RRSIG ( DNSKEY 8 0 172800 20260422000000 20260401000000 20326 . Nt4x7yqmsincs4ioIgZsndCkDnX0VGYvrwktw71R5xqyzdE8no8GBFuMSWBfOe7t64hIVApinTCZ ozwhiHQ9vjxEzz1vOf/3AjXXYclWI2UtaLlkJnb+Kv5ZFQH5j98nmRo1d0DKHg5rVUUQKY0VsfxP mnJ0y+ZWA7RWzQSR0zKvZbrX2wjtaUe5ZqpWk/+Yk3e4MiC1P9wMs5w6X+MkidQDlMQsrYQW57Xt 8iqTK2Wm66WIXzDkP7OSl8jTLINhz+o/3OOMLgkG8zTwh4BTWI36ySyZIUtqXdrsIZrX60U1nutq AMONInBHXGLfw3VODBlMvIeD0WLk3e52pYP/Tg== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
. 172800 IN DNSKEY ( 256 3 8 AwEAAbNTVC2+pry4pc37pZI9Oj6b8FHxT3VGrvSPKLE1Tjyfe2kUZUtVX5xrv6AV4BVO+ygrYjGZ MNgEnbLU4zknnlnhI2e0g6iTza1aZh0dRZXGH16C1NUNq1CxBkUhIYQhQDeIOtLacx+RmFTc+hSH JJ2MJ79IS00kA7eKi6mofQ7SPJmdJVjI+JAx791y0f5QaB+iHGANU53FwiYXNUQjfAzCrtOaSevG sx8SO8BTaXLAjFq5eewOtwScVwfVDhEXlvpE6e+mIncwhNKaMRD9IPuHENqCNPI5MjxfAMVS6cEY 8eEozIkv/vHc+0Auu3n+Fcx6F2Js4KPXaHEShAXugfU= ) ; keytag 21831
. 172800 IN DNSKEY ( 256 3 8 AwEAAb5dDYffpgAJ8VUGLwQtWXPlQWsjIFJtCM00/XaKU+8ln+ofah3q2KxEIjvzQg+nqdxRj+8e mtPne1mtYcbFWP4Q9E+DniOJLK09R05FuzvGbrG7DDdRDUX/cedFdV7O8pFEAYpJqYNR9BCTIAV9 73DO2biauKSA31b7I2lK/woxoR1tf5cqJ4SMbJUviuHicAEoUi2ATswloZNWd5T5thmEFZnxFx7D 5UgKCY7oflS7+GU7dNJwEtmFnWYVETHN0kHXVz6aguouaAZp706YXNIoR/iTgQhmsR7XX+wL0Z8Q M2LxQIyU6vRZ06IyuJMGRMiwkSuGElbumyBt12JZbrU= ) ; keytag 54393
. 172800 IN DNSKEY ( 257 3 8 AwEAAaz/tAm8yTn4Mfeh5eyI96WSVexTBAvkMgJzkKTOiW1vkIbzxeF3+/4RgWOq7HrxRixHlFlE xOLAJr5emLvN7SWXgnLh4+B5xQlNVz8Og8kvArMtNROxVQuCaSnIDdD5LKyWbRd2n9WGe2R8PzgC mr3EgVLrjyBxWezF0jLHwVN8efS3rCj/EWgvIWgb9tarpVUDK/b58Da+sqqls3eNbuv7pr+eoZG+ SrDK6nWeL3c6H5Apxz7LjVc1uTIdsIXxuOLYA4/ilBmSVIzuDWfdRUfhHdY6+cn8HFRm+2hM8AnX GXws9555KrUB5qihylGa8subX2Nn6UwNR1AkUTV74bU= ) ; keytag 20326
. 172800 IN DNSKEY ( 257 3 8 AwEAAa96jeuknZlaeSrvyAJj6ZHv28hhOKkx3rLGXVaC6rXTsDc449/cidltpkyGwCJNnOAlFNKF 2jBosZBU5eeHspaQWOmOElZsjICMQMC3aeHbGiShvZsx4wMYSjH8e7Vrhbu6irwCzVBApESjbUdp WWmEnhathWu1jo+siFUiRAAxm9qyJNg/wOZqqzL/dL/q8PkcRU5oUKEpUge71M3ej2/7CPqpdVwu MoTvoB+ZOT4YeGyxMvHmbrxlFzGOHOijtzN+u1TQNatX2XBuzZNQ1K+s2CXkPIZo7s6JgZyvaBev YtxPvYLw4z9mR7K2vaF18UYH9Z9GNUUeayffKC73PYc= ) ; keytag 38696
. 172800 IN RRSIG ( DNSKEY 8 0 172800 20260422000000 20260401000000 20326 . Nt4x7yqmsincs4ioIgZsndCkDnX0VGYvrwktw71R5xqyzdE8no8GBFuMSWBfOe7t64hIVApinTCZ ozwhiHQ9vjxEzz1vOf/3AjXXYclWI2UtaLlkJnb+Kv5ZFQH5j98nmRo1d0DKHg5rVUUQKY0VsfxP mnJ0y+ZWA7RWzQSR0zKvZbrX2wjtaUe5ZqpWk/+Yk3e4MiC1P9wMs5w6X+MkidQDlMQsrYQW57Xt 8iqTK2Wm66WIXzDkP7OSl8jTLINhz+o/3OOMLgkG8zTwh4BTWI36ySyZIUtqXdrsIZrX60U1nutq AMONInBHXGLfw3VODBlMvIeD0WLk3e52pYP/Tg== )
;; Response received from [192.5.5.241] 624 octets ;; HEADER SECTION ;; id = 39589 ;; qr = 1 aa = 0 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 0 ;; nscount = 6 arcount = 9 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1472, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (0 records) ;; AUTHORITY SECTION (6 records) GOV. 172800 IN NS a.ns.GOV. GOV. 172800 IN NS b.ns.GOV. GOV. 172800 IN NS c.ns.GOV. GOV. 172800 IN NS d.ns.GOV. GOV. 86400 IN DS ( 2536 13 2 0baf26b7bbf313a859046fd3b1ee49ddfba33934cfb3e717c21e2a2935c2f259 ) GOV. 86400 IN RRSIG ( DS 8 1 86400 20260421200000 20260408190000 54393 . FkPjXZrE1Q+XJQrerOGASSi6Ae965RJ8sZJtWWdC3ErdukPY3Vy+iytjEp4sO3B2XNyfn7MYYcpz btSb4cWR6bGbJJYsx7Y3ntrcwyxnXkwFPpwr66QQ8xH8d5m+zi1khnHDZov58O1HsHNO+QIq6TJt KlHwGq8IQgKoB++gCwcP+Pzh1YxR4vnhddsvCVf68zi0mepir+CqT4pMWmjWu3jJlZmPxmfPDPZQ 0qUJSjDuWhoS29+k7jJu+nHnpqwL5wQOPBZ0/i9l0Mg+auKUYJhBRl7QJTXk31i6MxXRdT7OWnhp saC+ivXfcpbBj9WjPZ2rCe7xhCcrvqUwNed1IA== ) ;; ADDITIONAL SECTION (9 records) a.ns.GOV. 172800 IN A 199.33.230.1 a.ns.GOV. 172800 IN AAAA 2001:503:ff40::1 b.ns.GOV. 172800 IN A 199.33.231.1 b.ns.GOV. 172800 IN AAAA 2001:503:ff41::1 c.ns.GOV. 172800 IN A 199.33.232.1 c.ns.GOV. 172800 IN AAAA 2001:503:ff42::1 d.ns.GOV. 172800 IN A 199.33.233.1 d.ns.GOV. 172800 IN AAAA 2001:503:ff43::1 ;; { "EDNS-VERSION": 0 }
;; Response received from [192.58.128.30] 610 octets ;; HEADER SECTION ;; id = 61497 ;; qr = 1 aa = 0 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 0 ;; nscount = 6 arcount = 9 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1472, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; GOV. IN DNSKEY ;; ANSWER SECTION (0 records) ;; AUTHORITY SECTION (6 records) GOV. 172800 IN NS a.ns.GOV. GOV. 172800 IN NS b.ns.GOV. GOV. 172800 IN NS c.ns.GOV. GOV. 172800 IN NS d.ns.GOV. GOV. 86400 IN DS ( 2536 13 2 0baf26b7bbf313a859046fd3b1ee49ddfba33934cfb3e717c21e2a2935c2f259 ) GOV. 86400 IN RRSIG ( DS 8 1 86400 20260421200000 20260408190000 54393 . FkPjXZrE1Q+XJQrerOGASSi6Ae965RJ8sZJtWWdC3ErdukPY3Vy+iytjEp4sO3B2XNyfn7MYYcpz btSb4cWR6bGbJJYsx7Y3ntrcwyxnXkwFPpwr66QQ8xH8d5m+zi1khnHDZov58O1HsHNO+QIq6TJt KlHwGq8IQgKoB++gCwcP+Pzh1YxR4vnhddsvCVf68zi0mepir+CqT4pMWmjWu3jJlZmPxmfPDPZQ 0qUJSjDuWhoS29+k7jJu+nHnpqwL5wQOPBZ0/i9l0Mg+auKUYJhBRl7QJTXk31i6MxXRdT7OWnhp saC+ivXfcpbBj9WjPZ2rCe7xhCcrvqUwNed1IA== ) ;; ADDITIONAL SECTION (9 records) a.ns.GOV. 172800 IN A 199.33.230.1 a.ns.GOV. 172800 IN AAAA 2001:503:ff40::1 b.ns.GOV. 172800 IN A 199.33.231.1 b.ns.GOV. 172800 IN AAAA 2001:503:ff41::1 c.ns.GOV. 172800 IN A 199.33.232.1 c.ns.GOV. 172800 IN AAAA 2001:503:ff42::1 d.ns.GOV. 172800 IN A 199.33.233.1 d.ns.GOV. 172800 IN AAAA 2001:503:ff43::1 ;; { "EDNS-VERSION": 0 }
;; Response received from [193.0.14.129] 367 octets ;; HEADER SECTION ;; id = 14881 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 2 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; GOV. IN DS ;; ANSWER SECTION (2 records) GOV. 86400 IN DS ( 2536 13 2 0baf26b7bbf313a859046fd3b1ee49ddfba33934cfb3e717c21e2a2935c2f259 ) GOV. 86400 IN RRSIG ( DS 8 1 86400 20260421200000 20260408190000 54393 . FkPjXZrE1Q+XJQrerOGASSi6Ae965RJ8sZJtWWdC3ErdukPY3Vy+iytjEp4sO3B2XNyfn7MYYcpz btSb4cWR6bGbJJYsx7Y3ntrcwyxnXkwFPpwr66QQ8xH8d5m+zi1khnHDZov58O1HsHNO+QIq6TJt KlHwGq8IQgKoB++gCwcP+Pzh1YxR4vnhddsvCVf68zi0mepir+CqT4pMWmjWu3jJlZmPxmfPDPZQ 0qUJSjDuWhoS29+k7jJu+nHnpqwL5wQOPBZ0/i9l0Mg+auKUYJhBRl7QJTXk31i6MxXRdT7OWnhp saC+ivXfcpbBj9WjPZ2rCe7xhCcrvqUwNed1IA== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
GOV. 86400 IN RRSIG ( DS 8 1 86400 20260421200000 20260408190000 54393 . FkPjXZrE1Q+XJQrerOGASSi6Ae965RJ8sZJtWWdC3ErdukPY3Vy+iytjEp4sO3B2XNyfn7MYYcpz btSb4cWR6bGbJJYsx7Y3ntrcwyxnXkwFPpwr66QQ8xH8d5m+zi1khnHDZov58O1HsHNO+QIq6TJt KlHwGq8IQgKoB++gCwcP+Pzh1YxR4vnhddsvCVf68zi0mepir+CqT4pMWmjWu3jJlZmPxmfPDPZQ 0qUJSjDuWhoS29+k7jJu+nHnpqwL5wQOPBZ0/i9l0Mg+auKUYJhBRl7QJTXk31i6MxXRdT7OWnhp saC+ivXfcpbBj9WjPZ2rCe7xhCcrvqUwNed1IA== )
GOV. 86400 IN DS ( 2536 13 2 0baf26b7bbf313a859046fd3b1ee49ddfba33934cfb3e717c21e2a2935c2f259 )
;; Response received from [199.33.232.1] 291 octets ;; HEADER SECTION ;; id = 38677 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 3 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; GOV. IN DNSKEY ;; ANSWER SECTION (3 records) GOV. 3600 IN DNSKEY ( 257 3 13 D6ZhJTObQw3+kcewWf5iTHbzD3uTdbs5xf0kQfP/VXZcDovWJd0DUgHlp2VC002aLDCwhLoPPVN2 VfyoPnjCqg== ) ; keytag 2536 GOV. 3600 IN DNSKEY ( 256 3 13 Of5kU9k4XfdcPwCK9k/zRJNu+Xspnw/BDd+1V6ZpDXRIpHe35BnHTZUBJN9gd6++HkiGXx2YnTji iO7/q+Yamg== ) ; keytag 35496 GOV. 3600 IN RRSIG ( DNSKEY 13 1 3600 20260605110630 20260405110630 2536 gov. 2iHkI6KNpypgXNkkvAKmXKicvyZoEJm+L3HYyM8970H7lTBFwiVYd2cum3MuioVU5WzMEQw1k1c6 /r/8XT47qw== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
GOV. 3600 IN DNSKEY ( 257 3 13 D6ZhJTObQw3+kcewWf5iTHbzD3uTdbs5xf0kQfP/VXZcDovWJd0DUgHlp2VC002aLDCwhLoPPVN2 VfyoPnjCqg== ) ; keytag 2536
GOV. 3600 IN DNSKEY ( 256 3 13 Of5kU9k4XfdcPwCK9k/zRJNu+Xspnw/BDd+1V6ZpDXRIpHe35BnHTZUBJN9gd6++HkiGXx2YnTji iO7/q+Yamg== ) ; keytag 35496
GOV. 3600 IN RRSIG ( DNSKEY 13 1 3600 20260605110630 20260405110630 2536 gov. 2iHkI6KNpypgXNkkvAKmXKicvyZoEJm+L3HYyM8970H7lTBFwiVYd2cum3MuioVU5WzMEQw1k1c6 /r/8XT47qw== )
;; Response received from [199.33.232.1] 369 octets ;; HEADER SECTION ;; id = 33291 ;; qr = 1 aa = 0 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 0 ;; nscount = 7 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (0 records) ;; AUTHORITY SECTION (7 records) IDENTITYTHEFT.GOV. 10800 IN NS ns-1332.awsdns-38.org. IDENTITYTHEFT.GOV. 10800 IN NS ns-1738.awsdns-25.co.uk. IDENTITYTHEFT.GOV. 10800 IN NS ns-239.awsdns-29.com. IDENTITYTHEFT.GOV. 10800 IN NS ns-722.awsdns-26.net. IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 1 65c017c64fce0f06179b851cbba243f4cf3b66b0 ) IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 2 4ce230e7cda16c14deda61475bf200778fb7c869817a3be962f6f1c24c7e80fe ) IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DS 13 2 3600 20260410015218 20260407235218 35496 gov. 6aNDyWvsqs1y9AmMHtzFcneEo7Z5WxR/Ax7vBmPKil23tSD/YHY4kesMnjSq4ygUbZi+b0CztLKa Ai2ABzsEhA== ) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [199.33.230.1] 369 octets ;; HEADER SECTION ;; id = 14325 ;; qr = 1 aa = 0 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 0 ;; nscount = 7 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN DNSKEY ;; ANSWER SECTION (0 records) ;; AUTHORITY SECTION (7 records) IDENTITYTHEFT.GOV. 10800 IN NS ns-1332.awsdns-38.org. IDENTITYTHEFT.GOV. 10800 IN NS ns-1738.awsdns-25.co.uk. IDENTITYTHEFT.GOV. 10800 IN NS ns-239.awsdns-29.com. IDENTITYTHEFT.GOV. 10800 IN NS ns-722.awsdns-26.net. IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 1 65c017c64fce0f06179b851cbba243f4cf3b66b0 ) IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 2 4ce230e7cda16c14deda61475bf200778fb7c869817a3be962f6f1c24c7e80fe ) IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DS 13 2 3600 20260410015218 20260407235218 35496 gov. OWmSwhqZLFjTK51VKX08l5FiTghvVo+6kKgWP/tw0/DLf7UOugxieAQTxOhG0FIzzvDSAttzQ/kF OySS56O2Zg== ) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [199.33.232.1] 229 octets ;; HEADER SECTION ;; id = 24821 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 0 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 3 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 1232, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN DS ;; ANSWER SECTION (3 records) IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 1 65c017c64fce0f06179b851cbba243f4cf3b66b0 ) IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 2 4ce230e7cda16c14deda61475bf200778fb7c869817a3be962f6f1c24c7e80fe ) IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DS 13 2 3600 20260410015218 20260407235218 35496 gov. dX6FA6FUj2Nd4U9+PWdwFzkNY2TMZC3Ihsqzi5H64P04dxkXSRhTc8aUm0T+OpX4jRHKpaOjduBT +3B2sb3NHA== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DS 13 2 3600 20260410015218 20260407235218 35496 gov. dX6FA6FUj2Nd4U9+PWdwFzkNY2TMZC3Ihsqzi5H64P04dxkXSRhTc8aUm0T+OpX4jRHKpaOjduBT +3B2sb3NHA== )
IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 1 65c017c64fce0f06179b851cbba243f4cf3b66b0 )
IDENTITYTHEFT.GOV. 3600 IN DS ( 14432 13 2 4ce230e7cda16c14deda61475bf200778fb7c869817a3be962f6f1c24c7e80fe )
;; Response received from [205.251.197.52] 399 octets ;; HEADER SECTION ;; id = 13295 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 4 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN DNSKEY ;; ANSWER SECTION (4 records) IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 256 3 13 KqE3lJx9hz1+pwoiDjGrazMC2C3/y7Btj8QKeIczYSGjX02u6WUOoRziBfL34cTAkphvndaUuJow 67QV3LbR1w== ) ; keytag 63455 IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 256 3 13 do1DrukZD3uiCMax/iaa9DTGHU4Fc6fovCPk2NSuiEVF6mAiTIgZvfWvz4REvOQ27TdpdMZAeVPX H142lhsW+w== ) ; keytag 10556 IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 257 3 13 0TFLu57EJyHphd9PuaErZVKrUQu+KhUdvRKCPla+JnPMC43MSReb9ax4S/3G2X7Rs6LItvFUHIcz JxHpzWFWcw== ) ; keytag 14432 IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DNSKEY 13 2 3600 20260409100000 20260408230000 14432 identitytheft.gov. 8OjlkHrFO2NCaLy6ptAZMMo3WV4NdR3UXk1ImjVYQoii0BKBZDqPoj5RoCrctCiTGAsUd1KprfuX uegivifzcA== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 256 3 13 KqE3lJx9hz1+pwoiDjGrazMC2C3/y7Btj8QKeIczYSGjX02u6WUOoRziBfL34cTAkphvndaUuJow 67QV3LbR1w== ) ; keytag 63455
IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 256 3 13 do1DrukZD3uiCMax/iaa9DTGHU4Fc6fovCPk2NSuiEVF6mAiTIgZvfWvz4REvOQ27TdpdMZAeVPX H142lhsW+w== ) ; keytag 10556
IDENTITYTHEFT.GOV. 3600 IN DNSKEY ( 257 3 13 0TFLu57EJyHphd9PuaErZVKrUQu+KhUdvRKCPla+JnPMC43MSReb9ax4S/3G2X7Rs6LItvFUHIcz JxHpzWFWcw== ) ; keytag 14432
IDENTITYTHEFT.GOV. 3600 IN RRSIG ( DNSKEY 13 2 3600 20260409100000 20260408230000 14432 identitytheft.gov. 8OjlkHrFO2NCaLy6ptAZMMo3WV4NdR3UXk1ImjVYQoii0BKBZDqPoj5RoCrctCiTGAsUd1KprfuX uegivifzcA== )
;; Response received from [205.251.194.210] 223 octets ;; HEADER SECTION ;; id = 49638 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015318 20260408235218 63455 identitytheft.gov. Ci7Mh+ycZ1whi/45SEukWRp72GJCksgHthoAhMJlzDEZPfMkRh5B85yOF+RirxnZb8RTOD/VDp26 JOg3XN0IsQ== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.192.239] 244 octets ;; HEADER SECTION ;; id = 64200 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 2 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN SOA ;; ANSWER SECTION (2 records) IDENTITYTHEFT.GOV. 900 IN SOA ( ns-1332.awsdns-38.org. awsdns-hostmaster.amazon.com. 1 ;serial 7200 ;refresh 900 ;retry 1209600 ;expire 86400 ;minimum ) IDENTITYTHEFT.GOV. 900 IN RRSIG ( SOA 13 2 900 20260409020718 20260408235218 63455 identitytheft.gov. CLQlz26w1xQKLdSVCwac1wGJY6sWuiXYXJhedJid0ZNU+JYeabV2CAfIpw+7HKeyIsqV+smhPrj8 ZHCcY7ZSDA== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.198.202] 244 octets ;; HEADER SECTION ;; id = 13940 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 2 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN SOA ;; ANSWER SECTION (2 records) IDENTITYTHEFT.GOV. 900 IN SOA ( ns-1332.awsdns-38.org. awsdns-hostmaster.amazon.com. 1 ;serial 7200 ;refresh 900 ;retry 1209600 ;expire 86400 ;minimum ) IDENTITYTHEFT.GOV. 900 IN RRSIG ( SOA 13 2 900 20260409020718 20260408235218 63455 identitytheft.gov. 7uINe79SRKq2SAekdDUrsvHMmUE/p6l7A28E+4yBhC4k6kT7XJlVvvAg0hdx27JS0NzZijrBf+ab x+4e2jY2fg== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.197.52] 244 octets ;; HEADER SECTION ;; id = 32420 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 2 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN SOA ;; ANSWER SECTION (2 records) IDENTITYTHEFT.GOV. 900 IN SOA ( ns-1332.awsdns-38.org. awsdns-hostmaster.amazon.com. 1 ;serial 7200 ;refresh 900 ;retry 1209600 ;expire 86400 ;minimum ) IDENTITYTHEFT.GOV. 900 IN RRSIG ( SOA 13 2 900 20260409020718 20260408235218 63455 identitytheft.gov. CU1M4Q6gdxV0Q6BEdovNL+Mnrl+Od6ujiqFAyHcUTRPX6tZTN+dH8u1/Fg7o98Bo1NaGm2KyC1Xz f6y9ZcYYGg== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.194.210] 223 octets ;; HEADER SECTION ;; id = 46613 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. yinRA9QU7T16ZR0HGpPRhvgjGu3l8hWH/MXjeu3LJIg/s5tz+OumQ5wl6883YNODTQYnV3/287uG SNbEXPx2xw== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. yinRA9QU7T16ZR0HGpPRhvgjGu3l8hWH/MXjeu3LJIg/s5tz+OumQ5wl6883YNODTQYnV3/287uG SNbEXPx2xw== )
;; Response received from [205.251.197.52] 223 octets ;; HEADER SECTION ;; id = 53111 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. 5vxFNVN/p5QlaBgTQGxwwnUsZJ3z7alFwrBRhp6/TjlcOdz0qlpJ6Lv2li4NGicMSsGUdWMxqYzV +ug3wlvuQw== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.197.52] 223 octets ;; HEADER SECTION ;; id = 33438 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. tXg3MPW44/RftulvtDEA7iUhMQ+6PNPXAd9HAZO1b/M8zYwUTKBlm6W44lzkAIRX+4Njcqs8wTYe aiNvjEK1Cw== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. tXg3MPW44/RftulvtDEA7iUhMQ+6PNPXAd9HAZO1b/M8zYwUTKBlm6W44lzkAIRX+4Njcqs8wTYe aiNvjEK1Cw== )
;; Response received from [205.251.198.202] 223 octets ;; HEADER SECTION ;; id = 21501 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. WySWj+zhTF8JGk9RwV2sRJcqxsSMJxC4BWH6LOpLffem8/O1WYNoEwNDaQpN/jlGHatvAZzYhYgz npXnXBFYjQ== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.198.202] 223 octets ;; HEADER SECTION ;; id = 57470 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. uDH6BLAY3KcA/NeCVvQud1iu6GXnKDSRWEIi5bDJqea6wgNS3XRPk2hPbEAGJS1Kp+4AugWOhHMI qBK+czaFxQ== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. uDH6BLAY3KcA/NeCVvQud1iu6GXnKDSRWEIi5bDJqea6wgNS3XRPk2hPbEAGJS1Kp+4AugWOhHMI qBK+czaFxQ== )
;; Response received from [205.251.192.239] 223 octets ;; HEADER SECTION ;; id = 10205 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. HXPLjwaj6Q59DFlmC7h8qN+09fwgbenxM7bAR66cHpsGhNmreHjS8e1VXN1TeCOitpXsdvGu4mDE GJXRQVCJoA== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
;; Response received from [205.251.192.239] 223 octets ;; HEADER SECTION ;; id = 13127 ;; qr = 1 aa = 1 tc = 0 rd = 0 opcode = QUERY ;; ra = 0 z = 0 ad = 1 cd = 0 rcode = NOERROR ;; do = 1 co = 0 ;; qdcount = 1 ancount = 5 ;; nscount = 0 arcount = 1 ;; { "EDNS-VERSION": 0, ;; "FLAGS": "8000", ;; "RCODE": 0, ;; "UDPSIZE": 4096, ;; "OPTIONS": [ ] ;; } ;; QUESTION SECTION (1 record) ;; IDENTITYTHEFT.GOV. IN A ;; ANSWER SECTION (5 records) IDENTITYTHEFT.GOV. 60 IN A 13.35.107.8 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.46 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.21 IDENTITYTHEFT.GOV. 60 IN A 13.35.107.105 IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. QlGMKmLNW13nLzP3a78PTr/MWP6qK7xwx8egzUOlQXcjcWlO0icvgVzxDrG8F2jsu/MDhCW/JmVl yUIFgSWaew== ) ;; AUTHORITY SECTION (0 records) ;; ADDITIONAL SECTION (1 record) ;; { "EDNS-VERSION": 0 }
IDENTITYTHEFT.GOV. 60 IN RRSIG ( A 13 2 60 20260409015319 20260408235219 63455 identitytheft.gov. QlGMKmLNW13nLzP3a78PTr/MWP6qK7xwx8egzUOlQXcjcWlO0icvgVzxDrG8F2jsu/MDhCW/JmVl yUIFgSWaew== )
Move your mouse over any or symbols for remediation hints.
Want a second opinion? Test IDENTITYTHEFT.GOV at dnsviz.net.
↓ Advanced options ↑ Advanced options
Paste a DS or DNSKEY record into the field above to use a Trust Anchor that is not published in the DNS. Validation will begin at the owner name of the DS/DNSKEY record.
You may also supply alternative starting name servers, separated by whitespace or commas. The given name servers must be authoritative for the same zone as the Trust Anchor.