DNS Record Types at a Glance
A quick, visual reference for the most common DNS records and their primary functions. Use this as a starting point before diving into the detailed sections.
DNS Fundamentals
Explore the foundational concepts that power the entire Domain Name System. These interactives break down the core mechanics of how queries are resolved and managed.
Use Case 1: The Journey of a DNS Query
Every action on the internet, from loading a webpage to sending an email, begins with a DNS query. This isn't a single request but a multi-step conversation between different servers, each with a specialized role. Understanding this hierarchical journey is the first step to diagnosing almost any DNS issue. It explains why a change made at your DNS provider isn't instantly visible everywhere and reveals the multiple points where a lookup can fail or be delayed. Click through the interactive steps below to trace this fundamental process.
Use Case 2: The Strategic Power of TTL
Time-To-Live (TTL) is one of the most critical yet misunderstood settings in DNS management. It dictates how long a resolver should cache a DNS answer before asking for it again. This creates a direct trade-off: a long TTL (e.g., 24 hours) improves performance and reduces server load, making it ideal for stable records like your main website's IP. A short TTL (e.g., 5 minutes) provides agility, allowing for rapid changes during a migration or failover event, but at the cost of increased query traffic and potential cost. Use the slider to visualize this balance between performance and agility.
Use Case 3: Negative Caching (NXDOMAIN)
What happens when you look up a domain that doesn't exist? To prevent resolvers from repeatedly querying for invalid domains and wasting resources, the DNS system caches "negative" answers (an NXDOMAIN or "Non-Existent Domain" response). The duration of this negative cache is not controlled by a record's TTL but by a specific value in the domain's Start of Authority (SOA) record. This is a common source of confusion during troubleshooting, as a typo can result in a "stuck" negative answer for hours. Test it below.
Use Case 4: Recursive vs. Authoritative Servers
The DNS system is not monolithic; it relies on two distinct types of servers working in concert. Understanding their different roles is key to knowing where to look when problems arise. A change made on an authoritative server won't be reflected for a user until their recursive server's cache expires. This distinction is fundamental to DNS troubleshooting.
Recursive Server (The Librarian)
Receives a question from a user and is responsible for hunting down the answer across the internet. It caches answers to speed up future requests. Examples include your ISP's DNS, Google's `8.8.8.8`, or Cloudflare's `1.1.1.1`.
Authoritative Server (The Author)
Holds the original, master copy of the DNS records for a specific domain. It gives the final, official answer and doesn't ask other servers. This is the server you configure at your DNS provider (e.g., AWS Route 53, GoDaddy, Cloudflare).
Use Case 5: The DNS Cache Hierarchy
To improve performance and reduce global traffic, DNS answers are cached at multiple levels between you and the authoritative server. When you request a domain, your system checks these caches in order before initiating a full network lookup. This hierarchy is why a DNS change can sometimes seem to work for you but not for others—they may have an older answer stored in a different cache. Click the button to simulate the cache check process.
Use Case 6: `dig` Command Simulator
The `dig` (Domain Information Groper) command-line utility is the professional's choice for DNS diagnostics, offering far more detail and control than tools like `nslookup` or `ping`. The `+short` option provides a clean, simple output perfect for scripting and quick checks. Simulate a `dig` command below to see how it directly queries for specific record types.
Use Case 7: The Role of the Root Servers
The entire global DNS hierarchy starts with a small, critical set of servers known as the root servers. There are only 13 logical root server IP addresses (named A through M), though these are replicated in hundreds of physical locations worldwide using Anycast for resilience. These servers don't know the IP for `google.com`, but they hold the "master list" of where to find the authoritative servers for each Top-Level Domain (e.g., `.com`, `.org`, `.net`), making them the essential first step in any DNS query that isn't already cached.
Use Case 8: Zone File vs. GUI
Historically, DNS records were managed exclusively in raw text files known as BIND-style zone files. Today, most administrators use a provider's graphical user interface (GUI). While GUIs are easier for simple changes, understanding the underlying zone file format is crucial for advanced configurations, bulk imports, and Infrastructure as Code (IaC) automation. The GUI is just a user-friendly abstraction over this raw text format.
Zone File Format
@ 3600 IN A 93.184.216.34 www 3600 IN CNAME @
GUI Representation
Core Record Explorer
Dive into the workhorses of DNS. These records form the bedrock of web connectivity and email delivery. Each section includes interactive examples of their configuration and common pitfalls.
A & AAAA Records
The Address (`A`) record and its IPv6 counterpart, the `AAAA` record, are the most fundamental types. Their sole purpose is to map a human-readable hostname to a machine-readable IP address. Every time you visit a website, your device performs a lookup for its A or AAAA record to know which server to connect to. While simple in function, they are the critical final step in the resolution chain for web traffic.
Use Case 9: Live A/AAAA Record Tracer
Enter a domain to fetch its live A (IPv4) and AAAA (IPv6) records. This is the first step in troubleshooting any "website not found" error.
Use Case 10: DNS Round-Robin Load Balancing
A simple but effective technique for distributing traffic is to create multiple A records for the same hostname, each pointing to a different server. Resolvers will typically rotate through the list, providing basic load balancing. However, this method is not "health-aware" and will continue sending traffic to a server even if it's down.
Resolved IP: ...
CNAME Record
A Canonical Name (`CNAME`) record acts as an alias, pointing one hostname to another. This is extremely powerful for abstracting services. For example, you can point `shop.example.com` to a third-party e-commerce platform's hostname. If that platform changes its IP addresses, you don't need to do anything; the `CNAME` handles the redirection. However, this flexibility comes with a critical, protocol-level restriction.
The Apex CNAME Prohibition
A CNAME record cannot be placed at the zone apex (the root domain, e.g., `example.com`) because the apex must also have `SOA` and `NS` records, and a CNAME cannot coexist with any other record type. This is a fundamental DNS rule.
Use Case 11: CNAME Chain Visualizer
Each `CNAME` in a chain adds an extra DNS lookup, increasing latency for the end-user. Long chains should be avoided. Use this tool to trace the CNAME chain for a domain and see the performance impact.
MX Record
Mail Exchanger (`MX`) records are the gatekeepers of your domain's email. They specify which servers are designated to accept mail on behalf of your domain. Without valid MX records, you cannot receive email. They work in conjunction with a priority system to allow for primary and backup mail servers.
Use Case 12: MX Priority Failover Simulation
Sending mail servers always try the `MX` record with the lowest priority number first. If that server is unavailable, they move to the next lowest priority. This creates a resilient failover system. Toggle the servers' status below to see how traffic is rerouted through the chain.
TXT Record
The Text (`TXT`) record is the Swiss Army knife of DNS. It allows administrators to associate arbitrary text with a domain, which can be used for a huge range of purposes, from simple domain ownership verification to complex email security policies that are critical for modern digital communication.
Use Case 13: DKIM Key Formatter
A single string within a TXT record is limited to 255 characters. Longer values, like cryptographic DKIM keys, must be split into multiple quoted strings within a single record. This tool correctly formats a long key for you.
Use Case 14: DMARC Policy Builder
DMARC (Domain-based Message Authentication, Reporting, and Conformance) is a critical email security policy built on top of SPF and DKIM. It tells receiving mail servers what to do with messages that fail authentication. Use this tool to build a syntactically correct DMARC record.
Advanced Records & Services
Go beyond the basics to explore records that enable complex services, administration, and modern security policies.
Use Case 15: SOA Serial Number Validator
The Start of Authority (SOA) record contains critical administrative information for a DNS zone. Its most important, and often mishandled, component is the serial number. This number must be incremented every time the zone is changed. Secondary nameservers check this number to know if they need to request an updated copy of the zone. Using the `YYYYMMDDnn` format (e.g., 2025070201 for the first change on July 2nd, 2025) is a robust best practice.
Use Case 16: Live SRV Record Tracer
The Service (`SRV`) record is a powerful mechanism that allows clients to discover services dynamically, without needing to know a specific IP address or port number. It's the backbone of modern protocols like VoIP (SIP), messaging (XMPP), and network services like Active Directory. Trace an SRV record below to see how a client can find the correct server and port for a service.
Use Case 17: FCrDNS Simulator
While A records map names to IPs (forward DNS), Pointer (`PTR`) records map IPs back to names (reverse DNS). This is not just a trivial reversal; it's a critical component of email security. Mail servers perform a Forward-Confirmed Reverse DNS (FCrDNS) check to verify a sender's identity. This simulator walks through the two-step check that helps prevent IP address spoofing.
Use Case 18: CAA Record Management
Certificate Authority Authorization (CAA) is a simple but powerful security measure that allows a domain owner to specify, via a DNS record, which Certificate Authorities (CAs) are permitted to issue SSL/TLS certificates for their domain. This helps prevent the mis-issuance of certificates, whether accidental or malicious. Use the tools below to build a policy and validate an existing one.
CAA Record Builder
Live CAA Record Validator
Security & Architecture
Learn how to secure your DNS infrastructure against modern threats and design resilient, high-performance global systems.
Use Case 19: Live DNSSEC Chain of Trust Tracer
The original DNS protocol was built on trust, with no way to verify if an answer was authentic. DNS Security Extensions (DNSSEC) solve this by adding cryptographic signatures to DNS data. A validating resolver can check these signatures, following a "chain of trust" from the root zone down to your domain. This tool simulates that process, checking for the required DS records at each step of the delegation and verifying the final "Authenticated Data" (AD) flag.
Use Case 20: Anatomy of a Subdomain Takeover
One of the most common and dangerous DNS vulnerabilities is the "dangling DNS" record. This occurs when a DNS record points to a third-party service that has been de-provisioned, leaving the subdomain open for an attacker to claim. Because the subdomain is on a trusted domain, it can be used for highly effective phishing or malware distribution. This animated scenario shows how the simple act of forgetting to delete a DNS record can lead to a major security breach.
Use Case 21: GeoDNS vs. Anycast
For global applications, routing users to the nearest server is critical for performance. GeoDNS and Anycast are two technologies used to achieve this, but they work in fundamentally different ways. GeoDNS is "smarter," making decisions at the DNS level based on the user's location, while Anycast is "simpler" at the network level, directing users to the topologically closest server announcing a shared IP. The most advanced providers often use a hybrid approach.
(World Map Placeholder)
Provider Examples
- Cloudflare: A prime example of a hybrid model. Their DNS resolution uses a massive Anycast network for speed and DDoS protection, while their Load Balancer product uses GeoDNS logic to steer traffic to optimal application servers.
- AWS Route 53: Offers multiple routing policies. "Latency-based routing" is a form of GeoDNS that routes users to the AWS region with the lowest latency. "Geolocation routing" allows for explicit rules based on continent or country.
- Akamai: A foundational CDN that heavily utilizes both Anycast for its edge network and sophisticated GeoDNS (as part of its Global Traffic Management) to make intelligent routing decisions based on real-time internet conditions.
Use Case 22: Encrypting DNS with DoH & DoT
By default, DNS queries are sent in plaintext, allowing network operators, ISPs, and anyone on the path to see every website you visit. DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH) are two standards that solve this privacy problem by wrapping DNS queries in an encrypted tunnel, making them unreadable to third parties. Most modern browsers and operating systems are moving towards supporting these protocols by default.
Standard DNS (Port 53)
You → example.com? → ISP
Query is visible to network operator.
DoH/DoT (Encrypted)
You → [Encrypted Blob] → Resolver
Query is private and secure.
Live Tools & Diagnostics
Move from theory to practice. Use these live tools to query real DNS records, validate configurations, and troubleshoot common problems.
Tool: Live DNS Lookup
Query any domain and record type directly from your browser.
Tool: SPF Record Validator
Checks an SPF record for the 10-DNS-lookup limit.
Tool: Glue Record Checker
Checks if a domain's nameservers require glue records.
Tool: Reverse DNS (PTR) Lookup
Find the hostname associated with an IP address.
Tool: DNS Provider Detector
Identifies the DNS hosting provider based on nameservers.
Tool: DNS Propagation Checker
Check a record's value against multiple global DNS resolvers.
Tool: DNSSEC Validator
Checks if a domain has DNSSEC enabled and configured.
Tool: DMARC Record Validator
Fetches and validates the syntax of a DMARC record.
Tool: Interactive Troubleshooter
Select a symptom to diagnose the probable cause.