Bcrypt
What is Bcrypt
Bcrypt is a way to turn a plain password into a special string that is harder to work with if someone gains access to stored data. Many people know they should hash passwords, but they do not want to set up code or run terminal commands every time they test a value. Have you ever wanted to check a bcrypt password hash without opening your whole project?
On FlexiTools.io, the Bcrypt page brings hashing and verification together on a single screen that runs in a browser. The Hash Password tab gives you a Password to Hash field, a Cost Factor slider, and a Generate Hash button that produces a bcrypt hash in a dedicated box. Within about 60 seconds, you can type a password, choose a cost value, generate a 60 character hash, and copy it for use elsewhere. The visible action is pressing Generate Hash, and the visible outcome is the new string that appears in the Bcrypt Hash area, alongside a small info row that confirms the algorithm version, cost, and length.
How to Use Our Bcrypt
At the top of the page, choose the Hash Password or Verify Password tab. When you click a tab, it becomes highlighted, and the matching panel below becomes visible while the other panel is hidden.
To create a new hash, stay on the Hash Password tab and enter your password into the field labeled Password to Hash. As you type, the characters are hidden by default, and you can tap the eye icon button to show or hide them. Adjust the Cost Factor (Rounds) slider, and you see the number next to the slider and the Cost value in the info row update to match.
Click the Generate Hash button below the cost controls. The placeholder text in the Bcrypt Hash box is replaced with an actual bcrypt hash string, and the info row under it continues to show Algorithm 2a, the chosen Cost, and the fixed Length of 60 chars. You can then press the copy button next to the hash field so the full string is ready to paste into your code or database.
To check a password against an existing hash, switch to the Verify Password tab. Enter the password in the Password field and paste the stored string into the Bcrypt Hash textarea, then click the Verify Password button. The result panel below, which first says Enter password and hash to verify, updates its icon area and text message to reflect the outcome of the check, and the status line at the bottom of the page can show brief feedback about what happened.
Why FlexiTools.io Offers the Best Bcrypt
Tabbed layout for hashing and verification
By splitting the page into Hash Password and Verify Password tabs, the tool keeps two related jobs together without mixing their controls. You move between making a new bcrypt hash and checking an existing one by clicking a clearly labeled tab instead of jumping between separate pages. Compared with using one off terminal commands, framework specific consoles, or generic hash generators, this layout lowers the chance of mixing up which value came from which step.
Explicit control over cost settings
The Cost Factor (Rounds) slider sits directly under the password input, with a live value display and a short hint that says Higher = more secure but slower, Recommended: 10-12. This makes the work factor visible every time you generate a hash, rather than hiding it in a configuration file or hard coded constant. Many people find it frustrating when a tool picks a cost value silently, leaving them unsure how strong or slow their hashes are.
Result handling built for real scenarios
The Bcrypt Hash output uses a multiline textarea, so you can see the whole 60 character string even on smaller screens, and a dedicated copy button sits right beside it. An info row summarises Algorithm, Cost, and Length, which is helpful when you paste the hash later and want to recall how it was produced. On the Verify Password tab, a result area with an icon and status text provides focused feedback, and a separate status line at the bottom gives another place for short notes instead of intrusive popups.
A Deeper Look at Bcrypt Password Hashing
At its core, bcrypt is a password hashing function. It takes a password and turns it into a fixed length string that is hard to reverse and expensive to guess through repeated trials. Instead of storing the original password, a system stores this derived string, often called a bcrypt hash, and later checks login attempts by running the same function and comparing results.
One important feature of bcrypt is that it includes a work factor, sometimes called the cost. The higher the cost, the more internal rounds the function runs, and the longer each hash takes to compute. On the Bcrypt page, that idea shows up as the Cost Factor (Rounds) slider and the Cost value in the info row under the output. Moving the slider from 4 up to 14 changes how heavy the hashing work is meant to be, which is why the hint warns that higher values are more secure but also slower.
Security references such as MDN Web Docs on password storage explain that a password hash should be intentionally slow. A fast hash lets an attacker test many guesses per second on stolen data. By choosing a cost that is comfortable on your own equipment but still noticeable, you make each guess more expensive without making your application feel stuck. The recommended range of 10 to 12 shown under the slider reflects a balance that is common in many real projects, though the right value always depends on hardware and risk.
Bcrypt also builds a salt into each hash. A salt is a random value combined with the password before hashing. Its role is to ensure that the same password does not always lead to the same hash and to break precomputed lookup tables. In the UI you do not see the salt as a separate field, but in common bcrypt formats the salt is stored together with the hash so that verification can reuse it. The Algorithm entry of 2a and the fixed Length of 60 chars in the info area match that style, where version, cost, salt, and derived key are packed into one text value.
Verification uses the same function in a different way. Instead of taking two plain strings and comparing them directly, a system takes the stored bcrypt hash, reads its cost and salt, runs the bcrypt algorithm on the candidate password, and checks whether the derived value matches what was stored. On the Verify Password tab, you act out this pattern by placing the password in the Password field and the stored bcrypt hash in the matching textarea, then watching the result area report back. The aria live behavior connected to that result panel is there so that each change in status is announced clearly for screen readers.
The W3C Web Cryptography API specification and MDN Web Docs both describe how modern applications use hashing and key derivation functions to protect secrets. Bcrypt fits into that picture as a way to handle human chosen passwords, which tend to be weaker and more predictable than random keys. Its cost factor gives you a knob that can be increased over time as hardware improves, which is why tools like the slider on this page are useful for testing how different settings feel in practice.
Consider a lived example. A small team is building an internal admin area for a service. Early in development, they pick Cost 8 for quick tests, but before launch they want something stronger without rewriting any code. One developer visits the Bcrypt page, types a sample password into Password to Hash, sets the slider to 10, and generates a hash. Seeing that the output still arrives fast enough for comfort in their browser, they decide that the production configuration should use 10 as the stored cost. Later, during debugging, another teammate uses the Verify Password tab with a real user hash from the database to confirm that a suspected login issue is caused by an input error rather than a hashing mismatch.
Pro Tips for Getting the Most Out of Bcrypt Hashing
Tip 1: Use the hashing and verification tabs together when testing changes. After you pick a cost value that feels right on the Hash Password tab, switch to Verify Password and confirm that the same password and hash pair behave as expected. This habit catches copy paste mistakes and helps you notice when a stored hash was generated with a different cost than the one you plan to use now.
Tip 2: Check cost values on hardware similar to your deployment setup. The slider lets you move from 4 to 14, but a value that feels fine on a desktop may feel heavy on a small server or phone. Run a few hashes at the higher settings on the devices that matter most, and aim for a short delay that is visible but not disruptive.
Tip 3: Keep hashes away from casual channels. When you copy from the Bcrypt Hash box, paste the value directly into the system that needs it instead of dropping it into chat or email. Treat the string as sensitive configuration data, even though it no longer contains the plain password.
Hash Text Generator
What is Hash Text
hash text is a common need when you have a string and want a fixed representation of it for security checks, verification, or logging. Copying values between scripts or tools can introduce small mistakes, and running command line utilities is not always convenient on every device. Ever needed to confirm a hash quickly without opening a full development setup?
Hash Text on FlexiTools.io gives you a focused page with a single text box, clear algorithm choices, and a visible output field. You paste your text into Enter text to hash, pick an algorithm such as SHA-256, and then use the Generate Hash button to produce a hash.
Within about 60 seconds, you can move from raw text to a finished hash string and have it ready in your clipboard. The visible action is pressing Generate Hash at the bottom of the page. The visible outcome is the hash value that appears in the Hash Output field, matched by the Algorithm and Hash Length lines in the info area below.
How to Use Our Hash Text
Type or paste your content into the textarea under the label Enter text to hash. Your text appears inside the box with the placeholder Type or paste your text here, and you can see it all at once by scrolling if needed.
In the Algorithm section, click one of the buttons labeled SHA-256, SHA-384, SHA-512, SHA-1, or MD5. The selected button becomes active, and the Algorithm line in the info panel updates to show your choice along with a Hash Length value that matches that algorithm.
Above the Hash Output field, choose how you want the characters to look by selecting either the lowercase or UPPERCASE button. The active case button is highlighted, so you can confirm at a glance whether the tool will display letters in lower or upper case.
Click the Generate Hash button in the actions row at the bottom. The Hash Output field fills with the hash string, the info section confirms the Algorithm and Hash Length, and the status line can show short feedback related to the last action. When you want to reuse the value, press the Copy hash to clipboard button with the copy icon next to the output field.
Why FlexiTools.io Offers the Best Hash Text
Focused layout for input and output
Hash Text groups related pieces together so your eye moves in a straight line from input to configuration to result. The Enter text to hash area sits at the top as a large textarea, with the Hash Output section directly below, so you do not have to search around the page to match source and result. Clear labels like Hash Output and Hash will appear here keep the purpose of each field obvious, reducing chances of pasting the wrong content in the wrong place.
Visible control over algorithms and lengths
The Algorithm row presents the available options as distinct buttons: SHA-256, SHA-384, SHA-512, SHA-1, and MD5. Right under the output area, the info block repeats your current choice under Algorithm and shows Hash Length in characters. This combination of selection and feedback makes it harder to mix up which algorithm produced which hash. Common alternatives rely on command line flags, library calls, or long configuration files, where it is easy to forget a parameter and end up with a value you did not intend.
Small touches that reduce mistakes
Hash Text includes a lowercase and UPPERCASE toggle right above the result, so you can align the format with whatever system or documentation you follow. The Copy hash to clipboard button sits immediately beside the Hash Output field, which cuts down on mis-selections when copying long strings. A Clear button stands next to Generate Hash, letting you reset both input and output before starting a new run. Many people know the frustration of reusing an old hash because an app did not refresh clearly or show the current input length, so having Input Length and a status line visible at the bottom adds reassuring context.
A Deeper Look at Text Hashing
Text hashing takes an input string and runs it through a defined process to produce a shorter, fixed length string known as a hash or digest. For a given algorithm and input, the digest stays the same every time, which makes it useful for checking whether two pieces of data match. The Hash Text page reflects this idea by pairing your original text with an Algorithm choice and a Hash Output field that always shows a consistent length for each algorithm.
Many of the algorithms listed on the page are described in standards such as the W3C Web Cryptography API specification and in MDN documentation on the Web Crypto API. SHA-256, SHA-384, and SHA-512 belong to the SHA-2 family, with the number indicating the bit length of the internal digest. When represented as hexadecimal text, SHA-256 yields 64 characters, which is why the default Hash Length line shows 64 characters when SHA-256 is active. SHA-384 and SHA-512 produce longer hex strings, so that line changes as you pick a different button.
MD5 and SHA-1 appear for completeness and compatibility with older systems, but they are known to have weaker collision resistance than the newer SHA-2 algorithms. Collision resistance is the idea that it should be very hard to find two different inputs that produce the same hash value. For verifying simple integrity in controlled settings, older hashes may still be used, but for new security sensitive work, references such as MDN and W3C point developers toward newer families like SHA-256. By exposing all five options in one Algorithm group, Hash Text lets you see how the output length and style differ, even before you concern yourself with deeper cryptographic properties.
The characters you see in the Hash Output box are usually hexadecimal digits, meaning they use the symbols 0 through 9 and a through f. The case of the letters does not change the numeric value of the hash, but many standards and code samples prefer one style. That is why the lowercase and UPPERCASE toggle is attached directly to the output header. If you pick lowercase, the hash appears with a through f. If you pick UPPERCASE, the same value appears with A through F, which can make matching it to documentation or logs more comfortable.
Input Length, shown in characters at the bottom, matters too. Hash functions react to every byte of the input, including spaces, line breaks, and punctuation. A trailing space or an extra newline in the Enter text to hash box produces a completely different digest, even if the visible text looks almost the same. Watching the Input Length value can help you notice accidental changes, such as pasting an extra line or adding a space at the end during editing.
Consider a lived-in example. A developer maintains a configuration file where each secret token is stored as a SHA-512 hash for security reasons. They receive a plain text token from a teammate and want to confirm that it matches the stored value without writing a quick script. They paste the token into Enter text to hash, select SHA-512, generate the hash, and compare the 128 character hex string in Hash Output with the entry from the file. Because the Algorithm and Hash Length lines confirm the context, they can focus on comparing the values, not on checking which method produced them.
Text hashing also appears in less technical tasks. Some people store hashes of long identifiers to shorten logs, while others use hashes to spot accidental duplicates in datasets. In all of these cases, the basic pattern holds: precise input, chosen algorithm, fixed length output. The Hash Text page surfaces that pattern through its labeled groups, making abstract ideas like digest length and representation feel more concrete as you watch the info block and output field respond to each choice.
Pro Tips for Getting the Most Out of Hashing Text
Tip 1: Watch whitespace carefully. Before you press Generate Hash, check the start and end of the Enter text to hash box for stray spaces or blank lines, since even one extra character changes the digest. If you suspect clutter, click Clear and paste a fresh, trimmed version of your text.
Tip 2: Match the expected algorithm and length. Many systems or documents specify both the algorithm name and the number of hex characters they expect. Before copying, glance at the Algorithm and Hash Length lines to make sure they line up with that requirement.
Tip 3: Use the case toggle to follow external rules. Some APIs and file formats show hashes in one consistent case. Set lowercase or UPPERCASE before copying from Hash Output so the pasted value looks exactly like the examples you are comparing against.
Favicon generator
What is Favicon generator
Favicon generator helps when you have an image logo but you still don’t have a usable favicon file for a browser tab. Many sites and tools want a .ico file, and an image that looks fine at full size can turn into a blurry dot when it shrinks.
The free Favicon generator by FlexiTools.io converts an uploaded image into favicon (.ico) format on the same page. In under 60 seconds, you can drag and drop a JPG, PNG, GIF, or SVG (up to 5MB), choose a size like 16×16 or 32×32, preview the result, and download the favicon file. Why guess what it will look like in a tab when you can preview it first?
How to Use Our Favicon generator
Add your image in the upload area that says Drag & drop your image here or click to browse, or click Browse Files. If the file is accepted, the Preview section shows your Original image and a Favicon Preview.
If something is wrong with the upload, look at the error message area below the upload box. Fix the issue (like file type or size), then try again with a supported file under 5MB.
Under Choose Size, select a radio option: 16×16, 32×32, 48×48, or 64×64. The selected size is clearly marked, so you can confirm what you’re about to download.
Click Download Favicon. The button starts disabled and becomes available once the tool has a valid image to convert. Save the downloaded .ico file and use it where your site or project expects a favicon.
Why FlexiTools.io Offers the Best Favicon generator
Upload matches real habits
You can drag and drop an image or use Browse Files. Both options are visible on the same upload card. That helps when you’re moving fast and already have a file open in a folder.
File support is spelled out before you start
The upload note lists what’s accepted: JPG, PNG, GIF, and SVG, with a 5MB limit. This saves time. You don’t have to discover limits by trial and error.
Preview removes doubt
The Preview section shows Original and Favicon Preview side by side. You can catch issues like tiny text, thin lines, or a logo that becomes unrecognizable at small size before you download.
Size choice is explicit
Instead of guessing which size you’ll get, you pick it under Choose Size using radio buttons. 16×16 is selected by default. That makes the tool feel predictable.
This tool: Upload image, see two previews, pick 16-64 size, then download a .ico file.
Typical alternatives: No favicon preview, unclear size output, or pages that hide the size setting behind extra steps.
A common frustration avoided: Downloading an icon that looked fine in a large preview, then realizing it’s a mushy blob at 16×16.
A Deeper Look at Favicons and Size Choices
A favicon is the small icon you see in browser tabs, bookmarks, and some shortcut lists. It is tiny by design. That’s why it needs different thinking than a logo on a homepage. A clean logo at 1000 pixels can become unreadable at 16 pixels.
Why the tool focuses on .ico output
The page subtitle tells you what it does: it converts an image to favicon (.ico) format. The .ico format is widely used for favicons, and many setups still expect it. If your workflow asks for “favicon.ico,” this tool is aimed at that exact moment.
Start by looking at your source image, not the output
Before you even choose a size, check your original image in the Original preview. Look for details that will not survive shrinking, like thin outlines, small text, or tight spacing. If your logo has a long wordmark, it can become a gray line in a small square.
What each size is good for
The tool offers four sizes in Choose Size: 16×16, 32×32, 48×48, and 64×64. Think of these as “how much room do I have to communicate?”
16×16 is the strict test. It’s common in tabs, and it punishes detail. If your icon works at 16×16, you’re usually safe. 32×32 gives you more breathing room and often looks cleaner on high-resolution screens. 48×48 and 64×64 can help for places that show larger icons, or when you want a bit more clarity.
How to judge the favicon preview
The Favicon Preview is there for a reason. Use it like a checklist. Can you still identify the brand mark? Do the edges look jagged? Does the icon feel centered, or does it look like it’s falling off to one side?
If the preview looks cramped, your image may need more padding around the mark. If it looks fuzzy, the source may be too small, or the design may rely on fine detail. The preview helps you catch this early.
Why simple shapes win at small sizes
Favicons reward bold, simple shapes. A single letter, a strong symbol, or a clean silhouette often works better than a full logo lockup. Even if your brand uses text, the favicon is usually the mark, not the headline.
A realistic example from using the page
I once tried turning a wide header logo into a favicon. The original looked great. In the favicon preview, the text turned into a smudge, and the icon felt off-center. I swapped to an image version that used just the symbol, then picked 32×32. The preview finally looked like something I would recognize in a tab.
Why errors are part of the workflow
When you’re grabbing images from different places, you will occasionally hit a limit. This tool has a dedicated error message area. If you see an error, treat it as a quick filter: wrong type, too large, or not a usable image. The upload note is your guide for what the tool will accept.
How favicons are used on a page
If you’re adding the favicon to a website, it’s usually referenced in the page head. The details vary by setup, but the concept is consistent: you point browsers to your icon file. For practical guidance, see MDN documentation on rel="icon". For site-owner guidance on favicon requirements and how they may appear in search results, see Google Search Central’s favicon guidance.
Pro-Tips for Getting the Most Out of Favicon Creation
Use 16×16 as your reality check. If the icon is readable there, it will usually look fine at larger sizes. If it fails at 16×16, try a simpler source image.
Choose size based on where it will show up. For a browser tab, start at 16×16 or 32×32. If your use case shows a larger icon, test 48×48 or 64×64 and compare the preview.
Watch the edges in the preview. Jagged lines and tiny gaps are hard to see in a large logo, but obvious in the favicon preview. Pick the source image that holds up when shrunk.
URL Shortener + Analytics
What is URL Shortener + Analytics
URL Shortener + Analytics makes it easy to turn long links into clean short links and see quick click signals - free and no sign-up or login required. Sharing bulky URLs looks clumsy and can hurt trust. The free URL Shortener + Analytics by FlexiTools.io lets you paste a link, set an optional custom alias, and copy the short link in one click. In the next 60 seconds, you can shorten your URL, share it, and check on-demand stats like total clicks, last click time, and recent referrers.
How to Use Our URL Shortener + Analytics
Paste your long URL and add an optional alias
Enter a full address starting with http or https. If you want a custom alias, type it in the alias field.
Click Shorten and copy
The result box shows your short link right away. Click Copy to place it on your clipboard - no sign-up needed.
Share the short link
Send it in chats, emails, or posts. The redirect loads your destination quickly.
View analytics and recent history
Your latest short links (created on this device in the last 15 days) appear in History. Click any item to see total clicks, last click time, and a referrer table that tallies recent sources.
Why FlexiTools.io Offers the Best URL Shortener + Analytics
Free short links - no sign-up
Create and share short links immediately. No account, no login, no friction.
Custom aliases with clear feedback
Pick a readable alias for public sharing. If it’s taken, you’ll see a short error so you can try another.
On-demand insights
Open analytics for any of your recent codes to see total clicks, last click time, and a compact referrer breakdown.
Local history that respects your flow
The tool keeps a small, device-based list of your recent links so you can revisit and check stats in a click.
FlexiTools.io vs typical alternatives
FlexiTools.io: Free short links, no sign-up - Alternatives: Account wall before you can shorten
FlexiTools.io: Custom alias with instant feedback - Alternatives: Opaque or restricted alias rules
FlexiTools.io: Clicks, last click, and referrers at a glance - Alternatives: Metrics hidden behind extra steps
FlexiTools.io: Recent links on your device - Alternatives: No fast recall
A Deeper Look at Short Links, Redirects, and On‑Demand Click Signals
How short links work
A short link maps a compact code to a long destination URL. When someone visits the short path, the service looks up the destination, records the click event, and redirects the browser. This should be fast and consistent so the person lands where you expect. If you’re curious about the basics of redirects, MDN’s page on HTTP redirections explains why browsers follow status codes to new locations. For broader guidance on redirects in search, see Google Search Central’s notes on redirects and Google Search.
Aliases and collision handling
Readable slugs help users trust your link. In this tool, you can set a custom alias using simple characters (letters, numbers, dashes, underscores). If the alias already exists, you’ll get a short message to pick a different one. Skip the alias and a random code is generated. If you shorten the exact same long URL again from the same device, the tool reuses your existing short code instead of creating duplicates - a small detail that keeps your history tidy.
What analytics you’ll see
The analytics panel is focused on quick checks you can act on:
Total clicks - a running count for the selected short link.
Last click - the time of the most recent recorded event.
Referrers - a compact table that tallies recent sources by the referrer header; if the referrer is missing or private, you’ll see “Direct / Unknown.”
These signals help answer practical questions like “Did today’s post start getting clicks?” You don’t need a dashboard or a login; just open analytics for the code you care about and scan the numbers. Since referrers depend on the browser’s referrer header, some clicks will show as direct - this is normal for private windows, certain apps, and strict referrer settings.
Local history, no account needed
You don’t need to create an account to keep track of your recent links. The interface stores a basic device ID in your browser and uses it to show your last few short links for up to 15 days. That way you can come back, copy a link again, or open analytics without hunting through notes. If you clear your browser data or switch devices, the list resets - which is often exactly what you want for quick, on-the-go link sharing.
Fast redirects and fair expectations
Click counts reflect events recorded when users visit the short link. The view updates on demand when you open analytics for a code. Small lags can happen as new events arrive, so if you need to sanity-check a fresh link, click it from another device and reopen analytics to confirm the count increases and the last click time updates. Treat this as a fast decision aid - it complements, not replaces, your page analytics and conversion tracking.
Practical link hygiene
Make aliases short and human. A slug like “/pricing” or “/tour” inspires more confidence than random characters when you’re sharing in public.
Add UTM parameters to your destination URL before you shorten. Those tags carry through to your site, so your analytics platform can attribute visits correctly.
If the destination page or campaign changes, create a new short link. Keeping separate codes makes it easier to compare performance over time.
Example workflow in under a minute
You paste your signup page, set the alias “/join”, and click Shorten. You copy the short link into your post. Ten minutes later, you open the History item and check analytics: a few clicks, with referrers showing from your social profile and one direct. You tweak your headline, shorten a second link for the variant, and compare the new code’s clicks after an hour. Quick, clear, and no sign-up required.
Pro-Tips for Getting the Most Out of Short Links
Use different aliases for each placement (email vs social) to compare sources at a glance.
Test a new short link from a second device and refresh analytics to confirm it records clicks.
Keep aliases clean: letters, numbers, dashes, and underscores read well and avoid errors.
DNS Lookup Tool
What is DNS Lookup Tool
DNS Lookup Tool helps you inspect DNS records in seconds. Troubleshooting a domain, checking email setup, or verifying a migration can be slow if you jump between multiple tools. The free DNS Lookup Tool by FlexiTools.io gives you a clean input for the domain, quick record-type selection, and a readable table of results. In the next 60 seconds, you can enter a domain, pick a record type, run the lookup, copy the results, and export a CSV you can share or archive.
How to Use Our DNS Lookup Tool
Enter a domain and run the lookup
Type a valid domain (example.com) in the field and click the Lookup button. Press Enter to run the lookup even faster.
Choose a record type
Use the record-type tabs to select what you want to see. Switching types updates results for the same domain without retyping.
Read the results
The table lists Type, Name, Value, and TTL for each record returned. When an A record is present, the tool also shows basic server info like IP and, where available, general location and ISP.
Copy, export, and reuse history
Click Copy results to grab the table as plain text or Export CSV to download it. Your last lookups appear in History - click any item to re-run it, or use Clear history to remove saved entries from your browser.
Why FlexiTools.io Offers the Best DNS Lookup Tool
Fast lookups with clear output
Readable columns (Type, Name, Value, TTL) make it easy to spot issues like missing A records, misrouted CNAMEs, or short TTLs.
Copy and CSV without friction
Share findings in a ticket or doc with one click. Copy results gives you a clean text block; Export CSV is ready for spreadsheets.
Smart, keyboard-friendly workflow
Press Enter to run lookups and switch record types to refresh instantly for the same domain. Short error messages keep you on track.
Local history for quick repeat checks
The tool keeps a recent, clickable history in your browser. Re-run a past query in one step or clear it at any time.
FlexiTools.io vs typical alternatives
FlexiTools.io: Copy and CSV built-in - Alternatives: Manual copy or extra steps
FlexiTools.io: Clickable history on-device - Alternatives: No quick recall
FlexiTools.io: Clear validation and status messages - Alternatives: Vague errors
FlexiTools.io: API-ready UI for teams - Alternatives: Rigid, no integration path
A Deeper Look at DNS Records and Querying
What DNS does for you
DNS maps human-friendly names to technical endpoints. When you visit a site, your device asks a resolver to find the records for the domain. The resolver fetches answers from authoritative name servers and returns the data to your browser or app. Wondering why a new record seems visible on one device but not another? That’s almost always caching at work.
Record types you’ll see
A and AAAA map a name to an IPv4 or IPv6 address. If a site loads slowly or not at all, start here.
CNAME points one name to another name. It’s a clean way to alias subdomains. If you see a CNAME, check the target’s A or AAAA records too.
MX lists mail servers plus a preference number. If email bounces, verify the MX values first.
TXT stores free-form text. Common uses include SPF, DKIM, and site verifications.
NS tells you which servers are authoritative for a zone. If data differs across lookups, check that you’re using the intended name servers.
SRV can direct traffic for specific services and ports.
Your results table shows the raw answers returned for the selected record type. Need to follow a chain? For example, if CNAME points to another host, switch the type to A or AAAA to see the final addresses.
TTL and “propagation”
TTL (time to live) tells resolvers how long they may cache an answer. Short TTLs (for example, 60–300 seconds) help changes appear sooner but create more lookups. Longer TTLs reduce resolver load but make updates take longer to spread. What people call “propagation” is mostly a combination of cached answers expiring at different times. If you update records before a cutover, lowering the TTL ahead of time speeds up the switch.
Name, value, and formatting details
Type identifies the record kind (A, AAAA, CNAME, MX, TXT, NS, SRV).
Name is the fully qualified domain name the record applies to. You may see a trailing dot depending on how a resolver formats it.
Value is the answer payload - an IP, a hostname, a preference plus target (for MX), or text.
TTL is the remaining time (in seconds) that an answer may be cached by a resolver.
If a lookup returns no Answer for a specific type, it doesn’t always mean the domain is broken. The record might not exist (for example, no AAAA yet), or another type is used instead.
Why results can differ
Resolv ers cache answers independently, and networks sometimes block or rewrite certain responses. A misconfigured zone, stale caches, or an unexpected CNAME chain can make two checks look different for a while. If you must verify the very latest data, check authoritative servers directly or wait for the TTL to pass.
Save and share your findings
Copying the results as text is perfect for a quick message: you’ll get headers and rows in a readable block. Exporting CSV helps with audits, change logs, and support tickets. You can attach the file and avoid accidental edits. Need to re-run a test later? Click the item in History to run the same domain and record type again.
For background on concepts used here, see MDN’s glossary entry on DNS and resolvers (search for the MDN glossary on DNS), and the overview of CNAME records in the MDN glossary. These explain core ideas like name resolution and record aliasing in plain terms.
Practical scenarios
New website: Confirm A or AAAA for the root and key subdomains; verify CNAMEs for “www” and app subdomains.
Email issues: Check MX records and related TXT records (SPF, DKIM) for the sending domain.
CDN or proxy: You’ll often see a CNAME to an edge hostname. Verify that the target resolves and that TTLs match your change windows.
If you want to connect this interface to your own backend or resolver, the UI is API-ready - you can wire it up later without changing the workflow your team uses.
Pro-Tips for Getting the Most Out of DNS Checks
Before a migration, lower TTL for the records you will change. After the cutover, raise TTL again to reduce load.
If a CNAME is present, also check A or AAAA for the target to confirm the full chain resolves.
Save a CSV before making changes. After the update, run the same query and compare to confirm the new state.