Learn how to use the dig command to do DNS record lookups. dig is a command-line tool that originally was an acronym that stood for Domain Information Groper. Find more at tonyteaches.tech Check out my vlog channel @TonyFlorida #dig
4:45 the file /etc/resolve.conf suggests to use the scutil command btw I wonder what's the relationship between this list of DNS servers and the ones you see when using +trace 7:45
You'll have to check the "headers" of the email (all the metadata from the email). It contains all ip addresses (and/or dns names) necessary to perform the checks. For example in gmail, you can click the 3 dots and select "Show original". Email clients like e.g. Thunderbird offer the option "View source" to let you see the email headers. Make sure that you do not open the mail in doing so, or prevent any remote content to be loaded. Spam and phishing mails often contain remote content that notifies the sender that your email has been opened when remote content is loaded. Then they know you're email address is active and their info of you becomes more valuable to them (and you can expect more phishing or spam).
Windows install can be done with the `scoop.sh` package manager. The command would be `scoop install main/bind` .... as soon as that runs, you will have the `dig` command and all the other BIND9 tools installed