command:
All DNS information: dig mail.163.com any
Filter part of the information: dig + noall + answer mail.163.com | awk '{print & 5}' direct output
Reverse Lookup: dig -x 220.181.12.209
Query bind version: dig + noall + answer txt chaos VERSION.BIND @ ns3.dnsv4.com
Track DNS: dig + trace www.sina.com @ 8.8.8.8
Directly through the root domain, com domain, sina.com domain iterative query
Dns server can penetrate the relevant version of the vulnerabilities through the official website, access to relevant information dns
FQDN: full qualified domain name fully qualified domain name with the host name and domain name
The header record: A (IPv4), AAAA (A address in IPv6) C Name, NS, MX, PTR