To use *.log.dnsp.co, you select any subdomain you want (for instance "test.log.dnsp.co") and send a request. In the response, you will get a list of all the IP addresses that have made that identical request (since the last database wipe, anyway). If you think someone else might be watching your traffic and resolving the domains that you visit you can come back later and send the request again and see the list.
Note: Logs in all cases, but only returns results via TCP (dig +tcp). Alternately, search via https, below:
In this case I had already run the test a couple times. The multiple IPs visible are all external IPs of Google's 220.127.116.11 nameserver.
prompt> dig +tcp test.log.dnsp.co ; <<>> DiG 9.5.0-P2 <<>> test.log.dnsp.co ;; global options: printcmd ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 61 ;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 0, ADDITIONAL: 0 ;; QUESTION SECTION: ;test.log.dnsp.co. IN A ;; ANSWER SECTION: test.log.dnsp.co. 0 IN A 18.104.22.168 test.log.dnsp.co. 0 IN A 22.214.171.124 test.log.dnsp.co. 0 IN A 126.96.36.199 test.log.dnsp.co. 0 IN A 188.8.131.52 ;; Query time: 56 msec ;; SERVER: 184.108.40.206#53(220.127.116.11) ;; WHEN: Mon Dec 22 02:29:51 2014 ;; MSG SIZE rcvd: 98