And since you mentioned scanning the IPv4 address space for DNS servers - I did that as well at a some point for a product I've built (and even have a patent on). The list of servers you're going to get with a naive scanning approach is not what you want. It won't include the servers you probably want (such as the customer-facing DNS servers of ISPs) and will include an insane amount of junk like home routers or weird IoT devices that expose their port 53. Hit me up via the email in my profile if you want to chat.
[1]: https://www.submarinecablemap.com/
[2]: https://resolve.rs/
A couple thoughts:
1) Nameserver “redundancy” that isn’t. All the ns1/ns2 setups that collapse onto the same provider or ASN once you follow the trail.
2) Authoritative drift. One server quietly serving an older serial or odd TTL for a while — invisible until something breaks. With global data, quirks like that become obvious.
Anyway, inspiring job. Wirewiki already feels like something that should have existed but somehow didn’t.
1) Include a link to dnsviz.net to check on the DNSSEC status of domains. They've already done all the work and it would be a nice integration.
2) Something that I wish more DNS operators understood is the concept of shared fate between authoritative name servers. Shared fate can come in the form of same AS, same upstream, same parent domain, etc. Operators might think they have redundancy when in fact all their servers are located in the same AS, for example. If there is any way you can highlight this or show this it would be useful.
3) I didn't try looking up a phishing domain, but displaying whether a domain exists on popular block lists would be awesome.
I love your attempt at understanding all the TXT RRs that have spread across the DNS in the last 10 years. What a mess.
You're right in that this is a rabbit hole. You could spend the rest of your life building this and never actually completing it, be careful!