DNS Architect Pro

DNS Record Types at a Glance

A quick, visual reference for the most common DNS records and their primary functions. Use this as a starting point before diving into the detailed sections.

DNS Fundamentals

Explore the foundational concepts that power the entire Domain Name System. These interactives break down the core mechanics of how queries are resolved and managed.

Use Case 1: The Journey of a DNS Query

Every action on the internet, from loading a webpage to sending an email, begins with a DNS query. This isn't a single request but a multi-step conversation between different servers, each with a specialized role. Understanding this hierarchical journey is the first step to diagnosing almost any DNS issue. It explains why a change made at your DNS provider isn't instantly visible everywhere and reveals the multiple points where a lookup can fail or be delayed. Click through the interactive steps below to trace this fundamental process.

Use Case 2: The Strategic Power of TTL

Time-To-Live (TTL) is one of the most critical yet misunderstood settings in DNS management. It dictates how long a resolver should cache a DNS answer before asking for it again. This creates a direct trade-off: a long TTL (e.g., 24 hours) improves performance and reduces server load, making it ideal for stable records like your main website's IP. A short TTL (e.g., 5 minutes) provides agility, allowing for rapid changes during a migration or failover event, but at the cost of increased query traffic and potential cost. Use the slider to visualize this balance between performance and agility.

Use Case 3: Negative Caching (NXDOMAIN)

What happens when you look up a domain that doesn't exist? To prevent resolvers from repeatedly querying for invalid domains and wasting resources, the DNS system caches "negative" answers (an NXDOMAIN or "Non-Existent Domain" response). The duration of this negative cache is not controlled by a record's TTL but by a specific value in the domain's Start of Authority (SOA) record. This is a common source of confusion during troubleshooting, as a typo can result in a "stuck" negative answer for hours. Test it below.

Use Case 4: Recursive vs. Authoritative Servers

The DNS system is not monolithic; it relies on two distinct types of servers working in concert. Understanding their different roles is key to knowing where to look when problems arise. A change made on an authoritative server won't be reflected for a user until their recursive server's cache expires. This distinction is fundamental to DNS troubleshooting.

Recursive Server (The Librarian)

Receives a question from a user and is responsible for hunting down the answer across the internet. It caches answers to speed up future requests. Examples include your ISP's DNS, Google's `8.8.8.8`, or Cloudflare's `1.1.1.1`.

Authoritative Server (The Author)

Holds the original, master copy of the DNS records for a specific domain. It gives the final, official answer and doesn't ask other servers. This is the server you configure at your DNS provider (e.g., AWS Route 53, GoDaddy, Cloudflare).

Use Case 5: The DNS Cache Hierarchy

To improve performance and reduce global traffic, DNS answers are cached at multiple levels between you and the authoritative server. When you request a domain, your system checks these caches in order before initiating a full network lookup. This hierarchy is why a DNS change can sometimes seem to work for you but not for others—they may have an older answer stored in a different cache. Click the button to simulate the cache check process.

1. Browser Cache: Checks if you've visited the site very recently. Lasts for a very short time.
2. Operating System (OS) Cache: The OS maintains its own DNS cache (the "stub resolver").
3. Recursive Resolver Cache: Your ISP's resolver checks its large, shared cache. This is where most caching occurs.
4. Full Recursive Lookup: If not found in any cache, a full lookup to the authoritative server is performed.

Use Case 6: `dig` Command Simulator

The `dig` (Domain Information Groper) command-line utility is the professional's choice for DNS diagnostics, offering far more detail and control than tools like `nslookup` or `ping`. The `+short` option provides a clean, simple output perfect for scripting and quick checks. Simulate a `dig` command below to see how it directly queries for specific record types.

$ dig +short

                

Use Case 7: The Role of the Root Servers

The entire global DNS hierarchy starts with a small, critical set of servers known as the root servers. There are only 13 logical root server IP addresses (named A through M), though these are replicated in hundreds of physical locations worldwide using Anycast for resilience. These servers don't know the IP for `google.com`, but they hold the "master list" of where to find the authoritative servers for each Top-Level Domain (e.g., `.com`, `.org`, `.net`), making them the essential first step in any DNS query that isn't already cached.

a.root-servers.net
b.root-servers.net
c.root-servers.net
d.root-servers.net
e.root-servers.net
f.root-servers.net
g.root-servers.net
h.root-servers.net
i.root-servers.net
j.root-servers.net
k.root-servers.net
l.root-servers.net
m.root-servers.net

Use Case 8: Zone File vs. GUI

Historically, DNS records were managed exclusively in raw text files known as BIND-style zone files. Today, most administrators use a provider's graphical user interface (GUI). While GUIs are easier for simple changes, understanding the underlying zone file format is crucial for advanced configurations, bulk imports, and Infrastructure as Code (IaC) automation. The GUI is just a user-friendly abstraction over this raw text format.

Zone File Format

@ 3600 IN A 93.184.216.34
www 3600 IN CNAME @

GUI Representation

A@93.184.216.343600
CNAMEwww@3600

Core Record Explorer

Dive into the workhorses of DNS. These records form the bedrock of web connectivity and email delivery. Each section includes interactive examples of their configuration and common pitfalls.

A & AAAA Records

The Address (`A`) record and its IPv6 counterpart, the `AAAA` record, are the most fundamental types. Their sole purpose is to map a human-readable hostname to a machine-readable IP address. Every time you visit a website, your device performs a lookup for its A or AAAA record to know which server to connect to. While simple in function, they are the critical final step in the resolution chain for web traffic.

Use Case 9: Live A/AAAA Record Tracer

Enter a domain to fetch its live A (IPv4) and AAAA (IPv6) records. This is the first step in troubleshooting any "website not found" error.

Use Case 10: DNS Round-Robin Load Balancing

A simple but effective technique for distributing traffic is to create multiple A records for the same hostname, each pointing to a different server. Resolvers will typically rotate through the list, providing basic load balancing. However, this method is not "health-aware" and will continue sending traffic to a server even if it's down.

Resolved IP: ...

CNAME Record

A Canonical Name (`CNAME`) record acts as an alias, pointing one hostname to another. This is extremely powerful for abstracting services. For example, you can point `shop.example.com` to a third-party e-commerce platform's hostname. If that platform changes its IP addresses, you don't need to do anything; the `CNAME` handles the redirection. However, this flexibility comes with a critical, protocol-level restriction.

The Apex CNAME Prohibition

A CNAME record cannot be placed at the zone apex (the root domain, e.g., `example.com`) because the apex must also have `SOA` and `NS` records, and a CNAME cannot coexist with any other record type. This is a fundamental DNS rule.

Use Case 11: CNAME Chain Visualizer

Each `CNAME` in a chain adds an extra DNS lookup, increasing latency for the end-user. Long chains should be avoided. Use this tool to trace the CNAME chain for a domain and see the performance impact.

MX Record

Mail Exchanger (`MX`) records are the gatekeepers of your domain's email. They specify which servers are designated to accept mail on behalf of your domain. Without valid MX records, you cannot receive email. They work in conjunction with a priority system to allow for primary and backup mail servers.

Use Case 12: MX Priority Failover Simulation

Sending mail servers always try the `MX` record with the lowest priority number first. If that server is unavailable, they move to the next lowest priority. This creates a resilient failover system. Toggle the servers' status below to see how traffic is rerouted through the chain.

TXT Record

The Text (`TXT`) record is the Swiss Army knife of DNS. It allows administrators to associate arbitrary text with a domain, which can be used for a huge range of purposes, from simple domain ownership verification to complex email security policies that are critical for modern digital communication.

Use Case 13: DKIM Key Formatter

A single string within a TXT record is limited to 255 characters. Longer values, like cryptographic DKIM keys, must be split into multiple quoted strings within a single record. This tool correctly formats a long key for you.


                        
                    

Use Case 14: DMARC Policy Builder

DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a critical email security policy built on top of SPF and DKIM. It tells receiving mail servers what to do with messages that fail authentication. Use this tool to build a syntactically correct DMARC record.


                    

Advanced Records & Services

Go beyond the basics to explore records that enable complex services, administration, and modern security policies.

Use Case 15: SOA Serial Number Validator

The Start of Authority (SOA) record contains critical administrative information for a DNS zone. Its most important, and often mishandled, component is the serial number. This number must be incremented every time the zone is changed. Secondary nameservers check this number to know if they need to request an updated copy of the zone. Using the `YYYYMMDDnn` format (e.g., 2025070201 for the first change on July 2nd, 2025) is a robust best practice.

Use Case 16: Live SRV Record Tracer

The Service (`SRV`) record is a powerful mechanism that allows clients to discover services dynamically, without needing to know a specific IP address or port number. It's the backbone of modern protocols like VoIP (SIP), messaging (XMPP), and network services like Active Directory. Trace an SRV record below to see how a client can find the correct server and port for a service.

Use Case 17: FCrDNS Simulator

While A records map names to IPs (forward DNS), Pointer (`PTR`) records map IPs back to names (reverse DNS). This is not just a trivial reversal; it's a critical component of email security. Mail servers perform a Forward-Confirmed Reverse DNS (FCrDNS) check to verify a sender's identity. This simulator walks through the two-step check that helps prevent IP address spoofing.

Use Case 18: CAA Record Management

Certificate Authority Authorization (CAA) is a simple but powerful security measure that allows a domain owner to specify, via a DNS record, which Certificate Authorities (CAs) are permitted to issue SSL/TLS certificates for their domain. This helps prevent the mis-issuance of certificates, whether accidental or malicious. Use the tools below to build a policy and validate an existing one.

CAA Record Builder


                    

Live CAA Record Validator

Security & Architecture

Learn how to secure your DNS infrastructure against modern threats and design resilient, high-performance global systems.

Use Case 19: Live DNSSEC Chain of Trust Tracer

The original DNS protocol was built on trust, with no way to verify if an answer was authentic. DNS Security Extensions (DNSSEC) solve this by adding cryptographic signatures to DNS data. A validating resolver can check these signatures, following a "chain of trust" from the root zone down to your domain. This tool simulates that process, checking for the required DS records at each step of the delegation and verifying the final "Authenticated Data" (AD) flag.

Use Case 20: Anatomy of a Subdomain Takeover

One of the most common and dangerous DNS vulnerabilities is the "dangling DNS" record. This occurs when a DNS record points to a third-party service that has been de-provisioned, leaving the subdomain open for an attacker to claim. Because the subdomain is on a trusted domain, it can be used for highly effective phishing or malware distribution. This animated scenario shows how the simple act of forgetting to delete a DNS record can lead to a major security breach.

Use Case 21: GeoDNS vs. Anycast

For global applications, routing users to the nearest server is critical for performance. GeoDNS and Anycast are two technologies used to achieve this, but they work in fundamentally different ways. GeoDNS is "smarter," making decisions at the DNS level based on the user's location, while Anycast is "simpler" at the network level, directing users to the topologically closest server announcing a shared IP. The most advanced providers often use a hybrid approach.

(World Map Placeholder)

Click a region on the map.

Provider Examples

  • Cloudflare: A prime example of a hybrid model. Their DNS resolution uses a massive Anycast network for speed and DDoS protection, while their Load Balancer product uses GeoDNS logic to steer traffic to optimal application servers.
  • AWS Route 53: Offers multiple routing policies. "Latency-based routing" is a form of GeoDNS that routes users to the AWS region with the lowest latency. "Geolocation routing" allows for explicit rules based on continent or country.
  • Akamai: A foundational CDN that heavily utilizes both Anycast for its edge network and sophisticated GeoDNS (as part of its Global Traffic Management) to make intelligent routing decisions based on real-time internet conditions.

Use Case 22: Encrypting DNS with DoH & DoT

By default, DNS queries are sent in plaintext, allowing network operators, ISPs, and anyone on the path to see every website you visit. DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) are two standards that solve this privacy problem by wrapping DNS queries in an encrypted tunnel, making them unreadable to third parties. Most modern browsers and operating systems are moving towards supporting these protocols by default.

Standard DNS (Port 53)

You → example.com? → ISP

Query is visible to network operator.

DoH/DoT (Encrypted)

You → [Encrypted Blob] → Resolver

Query is private and secure.

Live Tools & Diagnostics

Move from theory to practice. Use these live tools to query real DNS records, validate configurations, and troubleshoot common problems.

Tool: Live DNS Lookup

Query any domain and record type directly from your browser.

Tool: SPF Record Validator

Checks an SPF record for the 10-DNS-lookup limit.

Tool: Glue Record Checker

Checks if a domain's nameservers require glue records.

Tool: Reverse DNS (PTR) Lookup

Find the hostname associated with an IP address.

Tool: DNS Provider Detector

Identifies the DNS hosting provider based on nameservers.

Tool: DNS Propagation Checker

Check a record's value against multiple global DNS resolvers.

Tool: DNSSEC Validator

Checks if a domain has DNSSEC enabled and configured.

Tool: DMARC Record Validator

Fetches and validates the syntax of a DMARC record.

Tool: Interactive Troubleshooter

Select a symptom to diagnose the probable cause.

Probable Cause:

Solution: