NSLOOKUP is a DNS tool for DNS answers and usually its used like this,
C:\>nslookup
Default Server: dns1.unicorn.local
Address: 10.345.12.88
> google.com
Server: dns1.unicorn.local
Address: 10.345.12.88
Name: google.com
Addresses: 2a00:1450:400e:809::200e
216.58.204.14
Not very helpful in diagnostics really is it……..to get more information use this:
> set debug
Then you get this, which it a lot more like it, here you can see all name servers it has queried, like dig in Unix……
> google.com
Server: dns1.unicorn.local
Address: 10.345.12.88
------------
Got answer:
HEADER:
opcode = QUERY, id = 10, rcode = NXDOMAIN
header flags: response, auth. answer, want recursion, recursion avail.
questions = 1, answers = 0, authority records = 1, additional = 0
QUESTIONS:
google.com.xx, type = A, class = IN
AUTHORITY RECORDS:
-> xx
ttl = 3600 (1 hour)
primary name server = xx
responsible mail addr =xx
serial = 5153857
refresh = 900 (15 mins)
retry = 600 (10 mins)
expire = 86400 (1 day)
default TTL = 3600 (1 hour)
------------
------------
Got answer:
HEADER:
opcode = QUERY, id = 11, rcode = NXDOMAIN
header flags: response, auth. answer, want recursion, recursion avail.
questions = 1, answers = 0, authority records = 1, additional = 0
QUESTIONS:
google.com.xx, type = AAAA, class = IN
AUTHORITY RECORDS:
-> xx
ttl = 3600 (1 hour)
primary name server = xx
responsible mail addr = xx
serial = 5153857
refresh = 900 (15 mins)
retry = 600 (10 mins)
expire = 86400 (1 day)
default TTL = 3600 (1 hour)
------------
Non-authoritative answer:
------------
Got answer:
HEADER:
opcode = QUERY, id = 17, rcode = NOERROR
header flags: response, want recursion, recursion avail.
questions = 1, answers = 1, authority records = 0, additional = 0
QUESTIONS:
google.com, type = AAAA, class = IN
ANSWERS:
-> google.com
AAAA IPv6 address = 2a00:1450:400e:809::200e
ttl = 138 (2 mins 18 secs)
------------
Name: google.com
Addresses: 2a00:1450:400e:809::200e
216.58.204.14