Show HN: DNS Benchmark Tool – Compare and monitor resolvers
v0.3.0 just released with new features: compare: Test single domain across all resolvers top: Rank resolvers by latency/reliability/balanced monitor: Continuous tracking with threshold alerts
1,400+ downloads in first week.
Quick start: pip install dns-benchmark-tool dns-benchmark compare --domain google.com
CLI stays free forever. Hosted version (multi-region, historical tracking, alerts) coming Q1 2026.
GitHub: https://github.com/frankovo/dns-benchmark-tool Feedback: https://forms.gle/BJBiyBFvRJHskyR57
Built with Python + dnspython. Open to questions and feedback!
Discussion Activity
Moderate engagementFirst comment
31m
Peak period
6
Hour 1
Avg / period
5
Based on 10 loaded comments
Key moments
- 01Story posted
11/19/2025, 5:52:52 PM
2h ago
Step 01 - 02First comment
11/19/2025, 6:23:53 PM
31m after posting
Step 02 - 03Peak activity
6 comments in Hour 1
Hottest window of the conversation
Step 03 - 04Latest activity
11/19/2025, 7:02:44 PM
1h ago
Step 04
Generating AI Summary...
Analyzing up to 500 comments to identify key contributors and discussion patterns
That said, more options are good. I'll give this one a go.
So, my impression from the doc (and a quick browse of the code) is that this is a tool for monitoring DNS caching / recursing resolver (RD) performance, not authoritative. If performance really matters to you, you should be running your own resolver(s). [0] Granted, you will quickly realize that some outfits running auth servers seem to understand that they're dependent on caching / recursing resolvers, and some are oblivious. Large public servers (recursing and auth) tend to "spread the pain" and so most people don't feel the bumps; but when they fall over they fall over large, and they bring some principles (and thereby create "vulnerabilities") at odds with what the DNS was architected for and throw the mitigation on the other operators, including operators who never accepted these self-anointed principles to begin with.
I have a hard time understanding how DNS is adding 300ms to every one of your API requests... unless DNS is both the API and transport, or you're using negative TTLs /s.
Good doc, by the way.
[0] Actual resolvers. Not forwarders.
Want the full context?
Jump to the original sources
Read the primary article or dive into the live Hacker News thread when you're ready.