DNS & Email Security Checker – Endpoint
Base URL
https://api.rsch.ioPath
/api/v1/recon/dnsMethod
GETQuery Parameters
domain– Required. Root domain to inspect, for exampletestphp.vulnweb.com.
Example Request
GET https://api.rsch.io/api/v1/recon/dns?domain=testphp.vulnweb.comResponses follow the standard API envelope:
{
"status": "success",
"request_id": "bf1eb59d-0689-4271-b4ea-dc4875c4fc96",
"date": "2025-11-19 08:19:28",
"duration": 0.0488569736480713,
"data": {
"domain": "http://testphp.vulnweb.com/",
"dns_basic": {
"a_aaaa": {
"status": "FAIL",
"A": [],
"AAAA": []
},
"ns": {
"status": "FAIL",
"NS": []
},
"mx": {
"status": "WARN",
"MX": []
}
},
"email_security": {
"spf": {
"status": "FAIL",
"found": false,
"record": null,
"notes": "No SPF (v=spf1) TXT record on the root domain."
},
"dmarc": {
"status": "FAIL",
"found": false,
"record": null,
"parsed": null,
"notes": "No _dmarc TXT record found."
},
"dkim": {
"status": "WARN",
"found_any": false,
"records": [],
"notes": "No DKIM records found for common selectors. The domain may be using custom selectors."
}
}
}
}On error, the envelope contains an error field with a human-readable message.
Last updated on