Free DNS Lookup

Query DNS records for any domain using Cloudflare DNS-over-HTTPS.

DNS Record Types Explained

A · Maps domain to IPv4 address

AAAA · Maps domain to IPv6 address

CNAME · Alias pointing to another domain

MX · Mail exchange servers (with priority)

TXT · Arbitrary text (SPF, DKIM, domain verification)

NS · Nameservers authoritative for the domain

SOA · Start of authority, primary nameserver info

PTR · Reverse DNS, maps IP back to domain

How It Works

  1. Enter a domain: Type any domain name (including subdomains) into the input field.
  2. Select record types: Choose which DNS record types to query: A, AAAA, MX, CNAME, TXT, NS, SOA, or all of them.
  3. View results: Results are fetched from a public DNS-over-HTTPS provider and displayed with TTL values and record data.
  4. Diagnose issues: Compare results from different record types to identify misconfiguration, propagation delays, or missing records.

Why Use DNS Lookup?

DNS issues are among the most common causes of website downtime, email delivery failures, and domain migration problems. Being able to query DNS records directly from the browser, without using command-line tools like dig or nslookup: is valuable for developers, DevOps engineers, and sysadmins. This tool queries records via DNS-over-HTTPS for privacy and firewall bypass. Use it to verify MX records after changing email providers, confirm A/CNAME records after a DNS migration, check TXT records for SPF/DKIM email authentication, and diagnose propagation delays.

DNS Record Types

40 years of DNS: from RFC 882 to DNS over QUIC

The Domain Name System was designed by Paul Mockapetris at USC/ISI and specified in RFC 882 and RFC 883 (November 1983), replacing the flat HOSTS.TXT file that the ARPANET had outgrown. The system was overhauled and formalised in RFC 1034 and RFC 1035 (November 1987), the documents still cited today. Jon Postel coordinated the assignment of the original 13 root nameservers, labelled a.root-servers.net through m.root-servers.net, a count fixed not by capacity but by the 512-byte UDP packet size limit of the era. Two major shocks reshaped DNS in this century. In July 2008, Dan Kaminsky disclosed a cache-poisoning attack that let attackers inject forged records into resolvers within seconds. The industry responded with a coordinated patch (source-port randomisation) and renewed interest in DNSSEC (RFC 4033-4035, March 2005), which signs records cryptographically. The second shock was privacy: queries travelled in plaintext on UDP port 53 for 35 years. DNS over TLS (DoT, RFC 7858, May 2016) wraps queries in TLS on port 853. DNS over HTTPS (DoH, RFC 8484, October 2018) tunnels queries through HTTPS on port 443, hiding even the fact that DNS is happening. DNS over QUIC (RFC 9250, May 2022) is the latest, using the same transport that powers HTTP/3. Public resolvers 1.1.1.1 (Cloudflare, launched April 1, 2018), 8.8.8.8 (Google Public DNS, December 2009), and 9.9.9.9 (Quad9, November 2017) all support DoH and DoT today.

Record types in depth

Where DNS lookup actually helps

DNS mistakes that break sites and email

More frequently asked questions

Why does this tool sometimes return different results than dig?

Two main reasons. First, this tool queries via DNS over HTTPS through Cloudflare's 1.1.1.1 resolver, while dig on your laptop queries whatever resolver you have configured (often your ISP). Different resolvers cache for different durations and may have stale data. Second, EDNS Client Subnet (ECS, RFC 7871) sends a hint about your network to authoritative servers, which can return GeoDNS-tailored answers; Cloudflare 1.1.1.1 explicitly strips ECS for privacy, so geo-targeting sees you as «coming from Cloudflare» rather than your real location. dig +short on a residential ISP will often see the GeoDNS-personalised result.

What's the difference between authoritative and recursive resolvers?

Authoritative resolvers hold the master copy of a zone (Cloudflare DNS, Route 53, DigitalOcean DNS, etc.) and answer only for the domains they're configured for. Recursive resolvers (1.1.1.1, 8.8.8.8, your ISP) take queries from clients and walk the DNS tree on their behalf: root → TLD → authoritative. They cache answers up to the TTL, which is why a record change can take time to «propagate». This tool talks to a recursive resolver (Cloudflare 1.1.1.1), so the answer you see is the cached view that recursive resolver currently holds.

How long does DNS propagation actually take?

«Propagation» is a misnomer: DNS doesn't push updates, recursive resolvers around the world simply keep cached copies until their TTL expires. If your existing A record had a TTL of 300 seconds, every cache will refresh within 5 minutes. If it was 86400 (24 hours, a common default), worst-case is 24 hours. Some misbehaving resolvers ignore TTL and cache longer; some over-eager browsers and OSes cache locally too (Chrome's internal DNS cache lasts 1 minute). Drop TTL low before a planned change, then raise it again afterward.

Is DNS over HTTPS really «private»?

It hides queries from your ISP and from on-path observers on Wi-Fi, but the resolver you choose can still see every query. Trust shifts from your ISP to whoever runs the DoH endpoint (Cloudflare, Google, Quad9, NextDNS). Some, like Cloudflare 1.1.1.1, publish independent audits of their no-logs policy; others don't. DoH also doesn't hide the IP address you ultimately connect to, your subsequent TLS handshake's SNI field reveals the destination domain to network observers, until ECH (Encrypted Client Hello, RFC 9180) is universally deployed. As of 2024, ECH is supported by Cloudflare, Firefox, Chrome (behind a flag) but not yet ubiquitous.

Why do I need a network connection if this is a «browser-based» tool?

The UI runs entirely in your browser (no proprietary code on our server), but DNS lookup itself is by definition a network operation: it queries a remote authoritative or recursive nameserver. This tool sends a single HTTPS request per lookup to Cloudflare's public 1.1.1.1 DoH endpoint at cloudflare-dns.com/dns-query. The domain you query is visible to Cloudflare; nothing else (no IP, no fingerprint) is sent.

Related Tools