Blog
Written By Qasim, WhoisFreaks Team Published: November 18, 2024, Last Updated: April 21, 2026
DNS records are resource records stored in zone files on authoritative DNS servers. Each record maps a domain name to specific information: an IP address, a mail server, a canonical name, or security verification data. When a browser loads a webpage, it is DNS records that translate the domain name into the server address the request needs to reach.
This guide covers every major DNS record type, how the lookup process works, and how records are used in routing, email delivery, and security enforcement.
DNS records are resource records stored in zone files on authoritative DNS servers. They contain structured data that maps domain names to the resources they need to reach: IPv4 and IPv6 addresses, mail servers, canonical names, and text strings used for security verification.
Every domain requires at least one DNS record to be reachable on the internet. A domain with no records cannot receive web traffic, route email, or pass security checks performed by mail filters and certificate authorities. Queries against these records are handled by resolvers and authoritative name servers, a process that typically completes in under 100 milliseconds.
The delegation chain from the root zone through TLD nameservers to the domain's authoritative nameserver is what makes these records reachable from anywhere on the internet. Every DNS query follows this chain, and understanding it is a practical requirement for anyone configuring, troubleshooting, or auditing domain infrastructure.
DNS records are the control layer for a domain's entire online presence. They determine where web traffic is sent, which servers handle email, which third-party services are authorized to act on a domain's behalf, and whether the domain's DNS responses can be cryptographically verified.
A misconfigured A record takes down a website. A missing MX record stops email delivery. An incorrect NS record breaks DNS resolution for the entire domain. Attackers who can modify DNS records can redirect all traffic to servers they control. DNS records are not configuration details; they are the operational foundation of every public-facing internet service.
DNS records serve three core functions:

The table below lists the nine record types covered in this guide. Scroll down for full explanations and zone file examples for each.
| Record Type | Purpose | Example Value |
|---|---|---|
| A | Maps domain to IPv4 address | 192.0.2.1 |
| AAAA | Maps domain to IPv6 address | 2001:0db8::1 |
| CNAME | Alias pointing to another domain name | www.example.com → example.com |
| MX | Routes email to a mail server (with priority) | 10 mail.example.com |
| NS | Specifies the authoritative nameservers for the domain | ns1.nameserver.com |
| TXT | Stores text data (SPF, DKIM, DMARC, ownership verification) | v=spf1 include:_spf.example.com ~all |
| SOA | Zone authority metadata: primary NS, admin email, serial number, TTL settings | ns1.example.com admin.example.com 2024010101 |
| PTR | Reverse lookup: maps an IP address to a domain name | 1.2.0.192.in-addr.arpa → example.com |
| SRV | Defines location and port for specific services (VoIP, XMPP) | _sip._tcp 10 5 5060 sip.example.com |
example.com IN A 192.0.2.1example.com IN AAAA 2001:0db8:85a3:0000:0000:8a2e:0370:7334www.example.com IN CNAME example.comexample.com IN MX 10 mail.example.com
example.com IN MX 20 backupmail.example.comexample.com IN NS ns1.nameserver.com
example.com IN NS ns2.nameserver.comexample.com IN TXT "v=spf1 include:_spf.example.com ~all"default._domainkey.example.com IN TXT "v=DKIM1; k=rsa; p=MIGfMA0GCS..."_dmarc.example.com IN TXT "v=DMARC1; p=reject; rua=mailto:[email protected]"example.com IN SOA ns1.example.com admin.example.com 2024010101 3600 900 604800 864001.2.0.192.in-addr.arpa IN PTR example.com_sip._tcp.example.com 3600 IN SRV 10 60 5060 sipserver.example.comUse the WhoisFreaks DNS Lookup tool to obtain DNS records in a structured format and integrate them into your solutions.
Every DNS record follows a standard zone file format defined in RFC 1035. Understanding this format makes it easier to interpret records returned by DNS lookup tools and APIs.
A DNS resource record in zone file format looks like this:
example.com 3600 IN A 93.184.216.34
Each field has a specific meaning:
| Field | Value in Example | Meaning |
|---|---|---|
| Name | example.com | The domain or subdomain this record applies to |
| TTL | 3600 | Time-to-live in seconds: how long resolvers cache this record before re-querying |
| Class | IN | Record class, always IN (Internet) for public DNS records |
| Type | A | The record type (A, AAAA, CNAME, MX, NS, TXT, etc.) |
| Value | 93.184.216.34 | The data the record contains: an IP address, domain name, or text string depending on type |
For MX records, the value also includes a priority number: example.com 3600 IN MX 10 mail.example.com. Lower numbers have higher priority. When the primary mail server (priority 10) is unreachable, the resolver falls back to the next-lowest priority server.
To understand how DNS records work, it's essential to grasp the DNS lookup process:
This multistep process, typically completed in milliseconds, enables users to browse the internet smoothly. You can utilize tools such as WhoisFreaks free DNS lookup tool to get a holistic view of your DNS records.

DNS records have various applications that extend beyond simply routing traffic:
DNS records can be exploited if not adequately secured. Cyberattacks such as DNS spoofing and cache poisoning can redirect users to malicious sites. Implementing DNSSEC (DNS Security Extensions) helps protect DNS infrastructure by adding digital signatures to DNS data to verify its authenticity.
Standard DNS has no built-in mechanism to verify that a response is authentic. A resolver that receives an A record for example.com has no way to confirm the response actually came from the authoritative nameserver and was not modified in transit. DNSSEC solves this by adding cryptographic signatures to DNS responses.
DNSSEC uses a chain of trust built on public-key cryptography. The process involves three record types that do not exist in unsigned zones:
RRSIG (Resource Record Signature): Every record set (for example, all A records for a domain) gets a corresponding RRSIG record containing a digital signature generated using the zone's private key. Resolvers use the matching public key to verify the signature before accepting the response.
DNSKEY: Stores the public keys used to verify RRSIG signatures. Each signed zone publishes at least two keys: a Zone Signing Key (ZSK) that signs individual record sets, and a Key Signing Key (KSK) that signs the DNSKEY record set itself.
DS (Delegation Signer): Published in the parent zone (for example, the .com zone for example.com). The DS record contains a hash of the child zone's KSK. This is the link that connects the child zone's signatures to the parent zone's trust, forming the chain of trust from the root zone down to the individual domain.
DNSSEC protects against cache poisoning attacks where an attacker injects forged DNS responses into a resolver's cache, redirecting traffic to a malicious server. It also prevents on-path (man-in-the-middle) modification of DNS responses in transit.
DNSSEC does not encrypt DNS queries or responses. It only authenticates them. For encryption, DNS over HTTPS (DoH) and DNS over TLS (DoT) are separate mechanisms that protect query privacy.
As of 2024, DNSSEC validation is enabled on approximately 30% of DNS resolvers worldwide according to APNIC measurement data. Adoption varies significantly by country and by TLD. Some TLDs like .se (Sweden) and .nl (Netherlands) have DNSSEC signing rates above 50%, while others remain below 5%. Checking whether a domain's zone is signed is a standard step in domain security audits.
Administrators typically use web interfaces provided by hosting companies or dedicated DNS management tools to edit and manage DNS records. Changes to DNS records often require propagation time, ranging from a few minutes to 48 hours, for updates to take effect globally.
The time it takes for DNS changes to propagate depends on the Time-to-Live (TTL) setting in the DNS record. Lower TTL values allow faster propagation but can increase server load due to more frequent queries.
DNS records are the operational layer that makes domain names functional. An A record connects a browser to a server. An MX record connects a sender to the right mail infrastructure. TXT records carrying SPF, DKIM, and DMARC tell the internet whether email from your domain is legitimate. SOA and PTR records provide the authority metadata and reverse-lookup data that security tools rely on for verification.
Knowing what each record type does and how to read zone file format is a practical skill for anyone managing domains, troubleshooting infrastructure, or investigating security incidents.
To check the live DNS records for any domain, use the WhoisFreaks DNS lookup tool, which queries authoritative nameservers directly and returns results across all major record types. For teams that need programmatic access to live, historical, and reverse DNS records at scale, the WhoisFreaks DNS API supports bulk lookups and structured JSON responses across all record types.

Discover essential insights on DNS poisoning and learn practical steps to safeguard your online presence. Read the article for vital protection tips.
9 min read

Learn how a DNS flooder can threaten your network security and discover practical measures to protect your systems. Read more to safeguard your network.
9 min read

Discover the essential role of DNS servers in internet functionality and learn how they enhance your online experience. Read the article for insights.
11 min read