Sends small test packets to a server and measures how long they take to come back. Like shouting across a room and timing the echo. If packets don't come back — the server is unreachable or blocking ICMP. Packet loss % tells you how reliable the connection is.
ping -c 5 example.com
→ 5 packets sent, 0% packet loss, avg 12ms
Shows every router ("hop") your traffic passes through on the way to a server. Like tracking a parcel at each delivery stop. A * * * at a hop means that router isn't responding. If hops stop at your ISP — the ISP is the problem. traceroute on Linux/Mac, tracert on Windows.
traceroute example.com
1. 192.168.1.1 (your router) 1ms
2. 10.0.0.1 (ISP) 8ms
3. 203.0.113.1 (backbone) 14ms
The best of ping + traceroute combined. Shows every hop in real-time with live packet loss and latency stats. Much better for diagnosing intermittent issues than a one-time traceroute snapshot. Install on Linux/Mac with brew install mtr.
mtr --report example.com
HOST Loss% Avg
1. router 0.0% 1.2ms
2. isp-gateway 0.0% 8.4ms
3. destination 0.0% 14.1ms
The standard DNS lookup tool. Asks a DNS server "what IP address does this domain point to?" and shows the full response. Much more detailed than nslookup. dig +trace follows the full DNS chain from root servers down — essential for debugging DNS delegation issues.
dig example.com
;; ANSWER SECTION:
example.com. 3600 IN A 93.184.216.34
dig +trace example.com ← full delegation chain
Simpler DNS lookup tool available on all platforms including Windows. Good for quick checks. You can also specify a DNS server to query — useful to test if a specific resolver (like Google's 8.8.8.8) sees the same records as your default one.
nslookup example.com ← use default DNS
nslookup example.com 8.8.8.8 ← use Google DNS
nslookup example.com 1.1.1.1 ← use Cloudflare DNS
The most powerful command for testing HTTP/HTTPS. Makes actual web requests and shows you everything — headers, status codes, TLS certificates, redirects. -I fetches only headers. -v shows verbose output including the full TLS handshake. -L follows redirects.
curl -Iv https://example.com ← verbose + headers only
curl -ILv https://example.com ← follow redirects too
curl -w "%{http_code}" -o /dev/null -s https://example.com ← just the status code
Connects directly to a server's SSL/TLS port and shows you the full certificate chain, expiry dates, issuer, and negotiated cipher suite. Indispensable for debugging HTTPS issues, certificate mismatches, and expired certs without needing a browser.
openssl s_client -connect example.com:443
→ Certificate chain, expiry, issuer, cipher shown
Looks up domain registration information — who registered it, through which registrar, when it expires, and what nameservers it uses. Critical for checking if a domain has expired or been transferred to the wrong registrar.
whois example.com
→ Registrar: GoDaddy
→ Expiry: 2026-08-01
→ Name Servers: ns1.example.com
Tests raw TCP port connectivity — does the port actually accept connections? If telnet example.com 443 connects, the port is open at the network level. If it hangs or refuses, there's a firewall or the service isn't running. nc -zv is the modern alternative.
telnet example.com 443 ← port open check
nc -zv example.com 80 443 ← check multiple ports
Network port scanner. Scans a host to find which ports are open, closed, or filtered. Used to verify which services are exposed. Use responsibly — only scan servers you own or have permission to test.
nmap -p 80,443,8080,8443 example.com
80/tcp open http
443/tcp open https
8080/tcp closed http-alt
Maps a domain name to an IPv4 address. The most fundamental DNS record. When you visit example.com, your browser first looks up its A record to find the IP address of the server to connect to.
example.com → 93.184.216.34
Same as A record but for IPv6 addresses. IPv6 is the newer, longer address format (e.g. 2606:2800:220:1:248:1893:25c8:1946). Many sites have both A and AAAA records. If only AAAA exists and the user's network doesn't support IPv6, the site won't load.
example.com → 2606:2800:220:1:248:1893:25c8:1946
An alias — points one domain name to another domain name (not an IP). Common with CDNs: www.example.com → example.cdn.net. The CDN then resolves to an IP. You can't have a CNAME on an apex/root domain (e.g. bare example.com) — only on subdomains.
www.example.com → example.cdn.net → 1.2.3.4
Specifies which mail server handles email for the domain. Without correct MX records, email won't be delivered. The number before the hostname is priority — lower number = higher priority. Multiple MX records provide redundancy.
example.com MX 10 mail1.example.com
example.com MX 20 mail2.example.com ← backup
Nameserver records — specifies which DNS servers are authoritative for the domain. These are the servers that hold all other records. If NS records are wrong, nothing else works. Changing NS records (e.g. moving from GoDaddy DNS to Cloudflare) can take up to 48 hours to propagate.
example.com NS ns1.cloudflare.com
example.com NS ns2.cloudflare.com
Free-text records used for domain verification and email authentication. Common uses: SPF (email sending rules), DMARC (email policy), DKIM (email signing), Google/Microsoft domain ownership verification, and Cloudflare challenges.
example.com TXT "v=spf1 include:sendgrid.net ~all"
example.com TXT "google-site-verification=abc123"
DNS
PTR Record (Reverse DNS)
The opposite of an A record — maps an IP address back to a hostname. Critical for email servers (receiving mail servers check PTR records to verify the sender). If a server's IP doesn't have a matching PTR record, emails sent from it are likely to be marked as spam.
93.184.216.34 → example.com ✓ (PTR matches A record)
Certificate Authority Authorization — specifies which Certificate Authorities are allowed to issue SSL certs for the domain. A security measure to prevent rogue CAs from issuing fake certificates. If no CAA record exists, any CA can issue a cert.
example.com CAA 0 issue "letsencrypt.org"
← only Let's Encrypt can issue certs
Sender Policy Framework — a TXT record that lists which servers are authorised to send email on behalf of your domain. Prevents spammers from forging your domain as the sender. If a server not listed in SPF sends email claiming to be from your domain, receiving servers can reject it.
v=spf1 include:sendgrid.net include:google.com ~all
← only SendGrid and Google can send email for this domain
Domain-based Message Authentication — tells receiving mail servers what to do with emails that fail SPF/DKIM checks. p=none = monitor only. p=quarantine = send to spam. p=reject = block completely. Without DMARC, your domain can easily be spoofed.
_dmarc.example.com TXT "v=DMARC1; p=reject; rua=mailto:dmarc@example.com"
DomainKeys Identified Mail — adds a cryptographic signature to outgoing emails. The public key is stored in DNS. Receiving servers verify the signature to confirm the email genuinely came from your domain and wasn't tampered with in transit.
selector._domainkey.example.com TXT "v=DKIM1; k=rsa; p=MIGfMA0..."
Every HTTP response has a 3-digit code:
2xx Success — 200 OK (all good)
3xx Redirect — 301 Permanent, 302 Temporary redirect
4xx Client error — 400 Bad Request, 401 Unauthorized, 403 Forbidden, 404 Not Found
5xx Server error — 500 Internal Error, 502 Bad Gateway, 503 Service Unavailable, 504 Gateway Timeout
502 Bad Gateway → your load balancer can't reach the app server
503 Service Unavailable → server is overloaded or in maintenance
504 Gateway Timeout → upstream server too slow to respond
SSL (now TLS) is the encryption layer behind HTTPS. When you visit https://, your browser and the server do a "TLS handshake" to establish an encrypted connection. A valid SSL certificate proves the server is who it claims to be. Expired or misconfigured certs cause browser warnings and connection failures.
openssl s_client -connect example.com:443
→ Shows: issuer, expiry, chain, cipher negotiated
Cross-Origin Resource Sharing — a browser security policy that restricts web pages from making requests to a different domain than the one that served the page. This is why the Run Checks tool can't read actual HTTP response codes — the browser blocks it. Not a network problem, just a browser restriction.
fetch("https://other-site.com") from your-site.com
→ Browser blocks unless other-site.com allows it via headers
When you change a DNS record, it doesn't update everywhere instantly. Each DNS server caches records for the TTL (Time To Live) duration — often 5 minutes to 48 hours. During propagation, some users see the old IP and some see the new one depending on which DNS server they're using.
TTL 300 → record refreshes every 5 minutes (fast propagation)
TTL 86400 → record caches for 24 hours (slow to change)
NET
ASN (Autonomous System Number)
A unique number assigned to a network operator (ISP, cloud provider, CDN). AS13335 = Cloudflare, AS16509 = Amazon AWS, AS15169 = Google. When diagnosing routing issues, the ASN tells you exactly which company's network is involved. BGP routing problems often involve specific ASNs.
IP: 104.16.1.1 → ASN: AS13335 (Cloudflare, Inc.)
IP: 54.230.1.1 → ASN: AS16509 (Amazon.com)
NET
BGP (Border Gateway Protocol)
The routing protocol that connects the internet — it's how networks tell each other which IP addresses they own and how to reach them. BGP hijacking or route leaks can cause traffic to be misdirected to the wrong network, making sites unreachable or insecure.
Check bgp.he.net to see routing paths and detect anomalies
NET
CDN (Content Delivery Network)
A network of servers distributed globally that caches and serves content from the location closest to the user. Cloudflare, Fastly, Akamai, and AWS CloudFront are major CDNs. When a CDN is in front of your site, the IP you see in DNS belongs to the CDN, not your actual server.
User in Dublin → Cloudflare Dublin edge → Your origin server in US
→ Faster load, DDoS protection, SSL termination at CDN
DNS Security Extensions — adds cryptographic signatures to DNS records to prevent attackers from forging DNS responses (DNS spoofing/cache poisoning). The AD (Authenticated Data) flag in a DNS response means the records have been cryptographically verified. Not all domains use DNSSEC.
dig example.com +dnssec
→ AD flag in response = DNSSEC validated ✓
Real-time Blackhole List — databases of IP addresses known to send spam or malicious traffic. Mail servers check these to decide whether to accept or reject incoming email. Spamhaus, Barracuda, SORBS, SpamCop are the major ones. If your server IP is listed, email will be blocked or marked as spam.
Check: mxtoolbox.com/blacklists.aspx
Remove: contact the specific RBL to request delisting
Two meanings in networking: (1) DNS TTL — how many seconds a DNS record is cached before being re-queried. Lower TTL = faster DNS changes propagate. (2) Packet TTL — how many router hops a packet can traverse before being discarded. traceroute exploits this to map the route.
DNS: example.com 300 IN A 1.2.3.4 ← cached 300 seconds
Packet: TTL=64 means can pass through 64 routers max
NET
Latency vs Packet Loss
Latency = how long a round-trip takes (milliseconds). High latency = slow but working. Packet loss = percentage of packets that never arrive. Even 1% packet loss causes significant TCP performance degradation. Both are measured by ping and mtr. Loss at a hop in traceroute doesn't always mean a problem — some routers deprioritise ICMP.
ping: 64 bytes from 1.2.3.4: icmp_seq=1 ttl=55 time=12.4ms
→ 12.4ms latency, no loss = healthy connection
Protocols for querying domain registration information. WHOIS is the older standard; RDAP is the modern JSON-based replacement. Both tell you: registrar, registration date, expiry date, nameservers, and domain status (e.g. clientTransferProhibited = domain is locked against transfer).
whois example.com
→ Registrar: Cloudflare, Inc.
→ Expiry: 2027-03-15
→ Status: clientTransferProhibited
Checks DNS propagation from 20+ DNS servers worldwide simultaneously. If you changed a DNS record, this shows you which regions have picked up the new value and which still see the old one.
TOOL
SSL Labs (ssllabs.com)
Deep SSL/TLS analysis tool. Grades your HTTPS configuration A–F and checks: certificate chain, expiry, cipher suites, HSTS, TLS version support, and known vulnerabilities. Free and authoritative — many security audits reference SSL Labs grades.
All-in-one diagnostic tool. Does DNS, MX, blacklist, SMTP, SPF, DKIM, and DMARC checks from one interface. The Domain Health report runs all checks at once and is a great starting point for email deliverability problems.
Hurricane Electric's BGP toolkit. Look up any IP or domain to see its BGP routing data, ASN, prefix, and network paths. Essential for diagnosing routing anomalies, BGP leaks, and understanding which upstream networks carry traffic to a host.
Searches the Certificate Transparency (CT) logs — a public record of every SSL certificate ever issued. Use it to find all subdomains that have had certs issued, verify a cert was correctly issued, check for rogue certificates issued for your domain, or confirm expiry dates.
TOOL
Wayback Machine (archive.org)
Internet Archive's historical snapshots of websites. Useful for confirming whether a site was working yesterday before the issue started, recovering content from a site that's now down, or checking what a page looked like before a deployment.