The aim of this service is to provide an independent test verifying IPv6 support on web, DNS and e-mail servers and also security of domains through DNSSEC, ie. requirements under the Government resolution no. 727 of June 8, 2009 and no. 982 of December 18, 2013 . In addition, there is carried out a test whether you are connected to the Internet via IPv6, ie. the support of the Internet protocol with your ISP, including comparing speeds over IPv4 and IPv6.



IP addresses represent a basic building block of the Internet. It is not possible to connect to the world wide web without IP addresses; therefore, mutual recognition and interconnection of computers are also not possible.

In September 2012, free address blocks of IPv4 were used up in Europe and these addresses are now assigned only to a limited extent.

The answer to the insufficiency of IP addresses is a new version of the Internet Protocol IPv6 offering a virtually unlimited supply of addresses and also new opportunities both in terms of security and network management. Under Government Resolution state institutions are obliged to disclose their Internet presentations through both IPv4 and IPv6 for several years. As of March 1, 2015, this requirement applies to mail servers as well.

Besides the availability of the website presentation, the support of IPv6 within the Internet connectivity (Internet connection) is important, so you could take full advantage of this protocol as well as access to websites that do not support IPv4 any more.


DNSSEC is an extension of domain name system (DNS) which increases its security. DNSSEC technology assures the users that the information they have obtained from DNS were provided by the correct source, are complete and their integrity was not disrupted during transmission. DNSSEC ensures authenticity of data obtained from DNS.

Why this may be a serious problem? Imagine that the service is a data box or a state office where is published a bank account number for sending taxes. In this case, you do not want the information you receive to be from an untrustworthy (fraudulent) source and that the information you send would not end in the hands of someone unauthorized. And that exactly can happen with DNS abuse if you are not protected by DNSSEC.

At the end of the year 2013 the Czech government adopted a resolution according to which all government bodies are required to ensure their held domains through DNSSEC technology no later than June 30, 2015.