IPv4 Addresses
centralnicstatus.com. 300 IN A 104.21.75.207 centralnicstatus.com. 300 IN A 172.67.181.252
IPv6 Addresses
centralnicstatus.com. 300 IN AAAA 2606:4700:3034:0:0:0:AC43:B5FC centralnicstatus.com. 300 IN AAAA 2606:4700:3036:0:0:0:6815:4BCF
Name Servers
centralnicstatus.com. 1200 IN NS anna.ns.cloudflare.com. centralnicstatus.com. 1200 IN NS noel.ns.cloudflare.com.
Mail Servers
centralnicstatus.com. 300 IN MX 1 aspmx.l.google.com. centralnicstatus.com. 300 IN MX 5 alt1.aspmx.l.google.com. centralnicstatus.com. 300 IN MX 5 alt2.aspmx.l.google.com. centralnicstatus.com. 300 IN MX 10 alt3.aspmx.l.google.com. centralnicstatus.com. 300 IN MX 10 alt4.aspmx.l.google.com.
SOA Details
centralnicstatus.com. 1200 IN SOA anna.ns.cloudflare.com. dns.cloudflare.com. 2402913878 10000 2400 604800 1800
Certificate Authority Authorization
No CAA records were returned at this registrable domain name. With no CAA policy, any public certificate authority (CA) may issue TLS certificates for names under this zone unless a parent publishes CAA; add issue / issuewild / iodef records to restrict issuance.
DMARC
Organizational policy (p): how receivers treat mail that fails aligned DMARC checks — none (monitor only), quarantine (often junk), or reject (block).
pct: share of mail that gets quarantine/reject; 100 = all failing messages (default).
100Aggregate DMARC reports (ZIP/XML). Optional but recommended for visibility.
Forensic (per-failure) reports. Often omitted for privacy or volume.
centralnicstatus.com. 300 IN DMARC v=DMARC1; p=none; rua=mailto:[email protected]
DKIM
No DKIM TXT with `v=DKIM1` was returned for the selector names we probe automatically.
SPF (Sender Policy Framework)
| Qualifier | Mechanism | Target / value | Valid | Details |
|---|---|---|---|---|
| + Pass | include |
|
||
| + Pass | include |
|
||
| + Pass | include |
|
||
| - Fail | all |
—
|
|
centralnicstatus.com. 300 IN TXT "v=spf1 include:mail.zendesk.com include:spf.protection.outlook.com include:_spf.google.com -all"
MTA-STS
This hostname does not publish an MTA-STS policy (no v=STSv1 TXT at _mta-sts.<name> and/or no policy at https://mta-sts.<name>/.well-known/mta-sts.txt).
Text Content
centralnicstatus.com. 300 IN TXT "MS=ms83023435" centralnicstatus.com. 300 IN TXT "google-site-verification=Vc6ss1IOo4IUFKE_uEKf8Ml27GZ_EnMqoPPOolay6uo" centralnicstatus.com. 300 IN TXT "status-page-domain-verification=gb4c1d4b76p0" centralnicstatus.com. 300 IN TXT "C0E0N41352"
DNSSEC Public Keys
centralnicstatus.com. 1200 IN DNSKEY 256 3 13 oJMRESz5E4gYzS/q6XDrvU1qMPYIjCWzJaOau8XNEZeqCYKD5ar0IRd8KqXXFJkqmVfRvMGPmM1x8fGAa2XhSA== centralnicstatus.com. 1200 IN DNSKEY 257 3 13 mdsswUyr3DPW132mOi8V9xESWE8jTo0dxCjjnopKl+GqJxpVXckHAeF+KkxLbxILfDLUT0rAK9iUzy1L53eKGQ==
Delegation Signer
centralnicstatus.com. 1200 IN DS 2371 13 2 83554480A29CFC680DE30128197681F9AEDABFF26D6DC4B2700DF67789B08CAF
DNSSEC Next Secure
centralnicstatus.com. 1200 IN NSEC .centralnicstatus.com ["TYPE65", "TYPE64", "TYPE61", "TYPE60", "TYPE59", "TYPE55", "TYPE53", "TYPE52", "DNSKEY", "NSEC", "RRSIG", "TYPE44", "TYPE37", "TYPE35", "SRV", "TYPE29", "AAAA", "TXT", "MX", "TYPE13", "SOA", "NS", "A", "CAA", "TYPE256"]