pricing background

How to Check DNS History and Historical DNS Records for Any Domain names

Profile

By Qasim

Posted on April 02, 2026 | 12 min read

Introduction

Every domain has a hidden timeline of past IPs, mail servers, nameservers, and configuration changes; this is its DNS history. It provides critical context beyond current records, helping cybersecurity analysts investigate attacks, businesses perform domain due diligence, IT teams troubleshoot issues, and OSINT researchers map infrastructure. It also supports brand protection by exposing risks like hijacking, phishing, or unauthorized changes.

Although the Domain Name System wasn't designed to store historical data, its value led vendors to build DNS history databases. These tools continuously capture DNS snapshots, preserving records that would otherwise be lost when changes occur. This historical intelligence helps security teams detect risks, track infrastructure evolution, and improve attack surface visibility.

In this post, you will learn:

  • What DNS history is and why it matters
  • The types of DNS records you can track historically
  • How to perform a DNS history lookup step by step (free tool + API)
  • Real-world use cases across cybersecurity, business, and research
  • Best practices for working with historical DNS data

What Is DNS History?

DNS history is a record of a domain's past configurations, including changes to IP addresses, nameservers, mail servers, and other DNS records. It shows how a domain's infrastructure evolved over time and can reveal migrations, ownership shifts, or potential misuse, making it essential for DNS forensics and fraud detection.

It acts like a paper trail, allowing analysts to trace infrastructure pivots, correlate related domains, and build attack timelines. Widely used in threat intelligence, DNS history is highly accessible and transparent, providing valuable insights that current DNS records alone cannot offer.

Types of DNS Records You Can Track Historically

Before performing a DNS history lookup, it helps to understand the types of records that are captured and what each one reveals. The Historical DNS Lookup tool surfaces past DNS records for any domain, showing exactly how A, AAAA, MX, NS, TXT, CNAME, and SOA records changed over time. In addition to these, other records such as PTR and SPF play important roles in DNS management and troubleshooting, including IP-to-domain mapping and service location.

DNS records map domain names to specific resources such as IP addresses, mail servers, and other services.

How to Check DNS History: Step-by-Step Guide

You can retrieve DNS history using passive DNS (pDNS) databases, specialized lookup tools, and API integrations. There are two primary ways to look up DNS history with WhoisFreaks: the free web-based tool and the Historical DNS Lookup API.

Method 1: Using the WhoisFreaks Historical DNS Lookup Tool (Free)

The Historical DNS Lookup tool retrieves the history of domain DNS records from WhoisFreaks' continuously updated 24/7 database. You can access up to 5 historical DNS records freely; no credit card required to use this free tool.

Step 1: Navigate to the Tool

Go to https://whoisfreaks.com/tools/dns/history/lookup.

Step 2: Select the Record Type

Begin by selecting the specific record type you wish to review or opt for a comprehensive overview by choosing "all." You can select from: A, AAAA, MX, NS, TXT, CNAME, or other records such as SOA and SPF.

Step 3: Enter the Domain Name

Type the domain (e.g., google.com) or a website URL (e.g., https://google.com) into the search box.

Step 4: Click Search and Review Results

Enter the domain name or website URL and initiate the search to access up to 5 historical DNS records freely.

The results will display a chronological timeline of DNS record snapshots with timestamps showing when each record was observed.

Step 5: Upgrade for Full Data Access

For a more extensive dataset beyond the initial 5 records, you can signup now and get 500 API credits for free or you can either consider securing API credits or subscribing to our API credits subscription. This premium access ensures a comprehensive and thorough exploration of all available historical records and grants you access to the API.

Screenshot of the WhoisFreaks Historical DNS Lookup tool interface

Method 2: Bulk Historical DNS Lookup for multiple domains (WhoisFreaks Dashboard)

The Bulk Historical DNS Lookup feature on the WhoisFreaks dashboard allows users to retrieve DNS history for multiple domains at once. You can upload file with greater than 100 and maximum 3,000,000 domains. This is ideal for researchers, analysts, and security teams handling large datasets, enabling efficient analysis of DNS changes across numerous domains in a single workflow.

Step 1: Log in to the Dashboard

Go to https://billing.whoisfreaks.com and log in to your account to access the dashboard. If you don't have an account yet you can signup.

Step 2: Navigate to Utility tab

From the dashboard menu, locate and click on the Utility tab.

Step 3: Upload file

Upload a file (CSV/TXT―preferred or any other extension) containing a list of domains you want to analyze in bulk. Ensure each domain is properly formatted with one domain per line.

Step 4: Select Record Type

Choose the DNS record type you want to retrieve (A, AAAA, MX, NS, TXT, CNAME, etc.) or select "ALL" for all 8 records.

Submit the request to begin processing. The system will fetch historical DNS data for all provided domains.

SS of Bulk DNS utility on WhoisFreaks' Dashboard

Step 6: Review and Download Results

Once processing is complete, review the results directly on the dashboard or download them for further analysis. The output typically includes timestamps and historical record changes for each domain. A table is shown with the uploaded files with two statuses (handled and uploaded). You can download the processed file containing the historical data.

Table containing the processed file for Bulk DNS Lookup

Method 3: Using the WhoisFreaks Historical DNS API (Programmatic)

For automation, bulk analysis, or integration into security platforms, APIs are the preferred approach. The WhoisFreaks DNS history API enables seamless integration with popular programming languages and tools, allowing users to easily retrieve historical DNS A and AAAA records for any domain. It can also be incorporated into existing security workflows that rely on passive DNS intelligence to strengthen monitoring and analysis.

The Historical DNS Lookup API provides access to past DNS configurations, helping researchers, cybersecurity professionals, and businesses analyze domain history, track infrastructure changes, detect threats, and make more informed decisions.

API Endpoint:

GET https://api.whoisfreaks.com/v1.0/dns/historical?apiKey=YOUR_API_KEY&domainName=google.com&type=ns&format=json&page=1

Key Parameters:

Parameter

Description

Example

domainName

The domain to query

google.com

type

DNS record type (a, aaaa, mx, ns, txt, cname, soa, spf, or all -> to get all 8 record types)

ns

page

Page number for paginated results

1

apiKey

Your WhoisFreaks API key

YOUR_API_KEY

format

xml, json (default)

json

Sample Response Structure:

{
  "totalRecords": 8,
  "totalPages": 1,
  "currentPage": 1,
  "historicalDnsRecords": [
    {
      "queryTime": "2024-01-05",
      "domainName": "google.com.",
      "dnsTypes": {
        "NS": 2
      },
      "dnsRecords": [
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns3.google.com.",
          "rRsetType": 2,
          "singleName": "ns3.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns4.google.com.",
          "rRsetType": 2,
          "singleName": "ns4.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns2.google.com.",
          "rRsetType": 2,
          "singleName": "ns2.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns1.google.com.",
          "rRsetType": 2,
          "singleName": "ns1.google.com."
        }
      ]
    },
    {
      "queryTime": "2026-03-26",
      "domainName": "google.com.",
      "dnsTypes": {
        "NS": 2
      },
      "dnsRecords": [
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns4.google.com.",
          "rRsetType": 2,
          "singleName": "ns4.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns3.google.com.",
          "rRsetType": 2,
          "singleName": "ns3.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns2.google.com.",
          "rRsetType": 2,
          "singleName": "ns2.google.com."
        },
        {
          "name": "google.com",
          "type": 2,
          "dnsType": "NS",
          "ttl": 21600,
          "rawText": "google.com.\t\t21600\tIN\tNS\tns1.google.com.",
          "rRsetType": 2,
          "singleName": "ns1.google.com."
        }
      ]
    }
  ]
}

Our DNS History Lookup API delivers results in a paginated format, ensuring efficient management of large datasets by dividing them into easily navigable pages. This feature optimizes the retrieval and viewing process by breaking down extensive historical DNS records into manageable chunks. With each page containing up to 100 unique records, users can navigate and analyze data with greater ease and precision. The DNS History API returns paginated records with timestamps, suitable for integration into threat intelligence platforms, OSINT workflows, and security automation pipelines.

Method 4: Downloading the Full DNS Database

For enterprise-scale use cases, such as building your own threat intelligence platform, running machine learning models, or performing large-scale research; WhoisFreaks provides access to a complete domain DNS database with coverage across 1,528+ TLDs and billions of historical DNS records.

Download full or daily updates of DNS database via our billing dashboard or you can contact support for further details. Integrate DNS data seamlessly to improve workflows and reporting, with compatibility for SIEM and SOAR platforms. DNS security services can also track domain expirations and WHOIS changes to prevent service outages and maintain reliable services.

How WhoisFreaks DNS History Compares

WhoisFreaks maintains a database of 15+ billion DNS records collected continuously since its founding, making it one of the deepest historical DNS databases available.

In addition to historical data, WhoisFreaks offers DNS performance monitoring across multiple monitored domains, allowing users to track DNS response times and resolution performance to proactively identify potential issues. DNS monitoring services also provide real-time alerts for unauthorized modifications to DNS records.

Here's what makes it stand out:

Feature

WhoisFreaks

Database Size

15+ billion DNS records

Hostnames Tracked

5+ billion

Record Types

A, AAAA, MX, NS, TXT, CNAME, SOA, SPF

Free Tier

Up to 5 historical records per query

API Access

RESTful API with JSON/XML response

Pagination

Up to 100 records per page

Bulk Lookup

File upload up to 3M domains

Database Download

Full + daily/weekly/monthly updates (CSV/JSON)

Understanding DNS History Results: What to Look For

Once you have the historical DNS records in front of you, here is what to analyze:

Understanding DNS propagation is essential when analyzing historical DNS records, as it helps you track how DNS record changes spread across the internet and when those changes became effective worldwide. Additionally, tools like Complete DNS offer a timeline of domain changes, which is crucial for historical analysis of DNS records.

IP Address Changes (A/AAAA Records)

Look for sudden shifts in IP addresses. A domain that jumps between dozens of IPs across different hosting providers in a short period could indicate:

  • Malicious activity (fast-flux DNS used by botnets)
  • CDN migrations or load balancer updates (benign)
  • Hosting provider changes during company transitions

Nameserver Shifts (NS Records)

Nameserver changes are among the most significant signals in DNS history. A change in NS records means control of the entire DNS zone has shifted, this could indicate:

  • Legitimate domain transfer or registrar migration
  • Domain hijacking or unauthorized transfers
  • Transition to a DNS protection service (e.g., Cloudflare)

Mail Server Changes (MX Records)

MX record history reveals how a domain's email infrastructure has evolved. Look for:

  • Periods where MX records were missing (no email configured, suspicious for active business domains)
  • Changes from enterprise mail providers to unknown servers (potential compromise)
  • Sudden addition of MX records to a domain that previously had none (could indicate phishing setup)

TXT/SPF Record History

SPF and DKIM records in TXT fields show the evolution of a domain's email authentication. Gaps in SPF coverage represent windows where the domain was vulnerable to spoofing.

CNAME Record Changes

CNAME changes reveal CDN migrations, SaaS platform changes, and potential dangling CNAME vulnerabilities. Correlate DNS history to spot dangling DNS targets to deprovisioned cloud resources and confirm takeover risks.

Annotated timeline graphic showing different types of DNS changes (IP swap, NS migration, MX addition) on a sample domain timeline.

Best Practices for Working with DNS History

To get the most out of DNS history lookups, follow these proven best practices:

  • Regularly monitor DNS changes for suspicious activities to detect potential security threats, especially those linked to third-party vendors and infrastructure.
  • Use advanced brand protection features in DNS monitoring services via automation, which can detect phishing domain variants.
  • Schedule periodic reviews of DNS records to ensure accuracy and consistency.
  • Compare historical DNS data to identify unauthorized modifications or anomalies.
  • Integrate DNS history tools with your cybersecurity workflow for real-time alerts and faster incident response.

1. Combine DNS History with WHOIS History

Pair with Historical WHOIS Lookup for complete domain attribution. DNS history tells you where a domain pointed; WHOIS history tells you who owned it. Together, they give you the full picture.

2. Use Reverse DNS to Pivot on Findings

When you find a suspicious IP in a domain's A record history, use the Reverse DNS Lookup to discover all other domains that pointed to the same IP during the same time window. This is the foundation of threat infrastructure mapping.

3. Track All Record Types, Not Just A Records

Many analysts default to looking at A records only. MX, NS, and TXT records often contain the most revealing intelligence, especially for phishing investigations and email security audits.

4. Establish Baselines

Before a security event occurs, establish a baseline of your own organization's DNS records. When something changes unexpectedly, historical records let you immediately see what was there before and when the change happened.

5. Automate with the API

For continuous monitoring, use the WhoisFreaks Historical DNS API to programmatically poll DNS history on a schedule. Feed the results into your SIEM or SOAR platform for automated alerting.

6. Check DNS History Before Purchasing Domains

Always look up the DNS history of a domain before purchasing it. Domains previously associated with malware, phishing, or spam may carry a damaged reputation that takes months or years to repair with search engines and email providers.

Why DNS History Matters: Key Use Cases

DNS history is not just an academic exercise, it serves mission-critical purposes across multiple domains. Here are the most impactful use cases:

1. Cybersecurity Incident Response

Helps reconstruct attack timelines by showing when domains resolved to malicious IPs and tracking infrastructure changes during a breach.

2. Threat Intelligence and Actor Tracking

Reveals how threat actors shift infrastructure over time, enabling clustering of related domains across campaigns.

3. Malware C2 and Phishing Analysis

Preserves mappings of takedown domains to past IPs, helping identify hosting providers and related malicious assets.

4. Domain Acquisition Due Diligence

Allows buyers to assess a domain’s past usage (e.g., malware, spam, PBNs) before making a purchase.

5. Attack Surface Discovery & Pen testing

Uncovers forgotten or hidden infrastructure, aiding in mapping the full attack surface of a target.

6. Competitive Intelligence

Tracks competitor infrastructure changes like CDNs, subdomains, or service providers to infer product or strategy shifts.

7. Email Security Auditing

Analyzes historical MX/SPF/DKIM records to detect misconfigurations and verify email security posture over time.

A diagram or flowchart showing "7 Use Cases for DNS History"

Conclusion

DNS history is one of the most powerful and underutilized sources of domain intelligence available today. Every IP change, every nameserver migration, every mail server swap tells a story, and those stories matter whether you are investigating a cyberattack, protecting your brand, auditing email security, or buying a domain.

This tool is used everywhere from SOC investigations to infrastructure audits to pre-acquisition due diligence.

With WhoisFreaks maintaining a database of 15+ billion DNS records collected continuously since its founding, you have access to one of the deepest historical DNS databases on the planet, available through a free web tool, a powerful REST API, and full database downloads.

For more in-depth information on DNS history and infrastructure security, check out our related blog post.

Ready to start looking up DNS history?

FAQs

What is DNS history?

DNS History catalogs and stores the evolution of domain names within the DNS, including their changes in IP addresses and settings, which is essential for cybersecurity analysis and domain tracking.

How do I check DNS history for a domain?

You can use the free WhoisFreaks Historical DNS Lookup tool. Simply enter the domain name, select the record type (or choose "all"), and click search. You will receive up to 5 historical DNS records for free. For full access, sign in and get 500 free API credits or buy a plan and use the API.

What DNS record types can I look up historically?

WhoisFreaks supports live, historical, and reverse DNS APIs for A, AAAA, CNAME, MX, NS, TXT, SPF, and SOA records. Also, you can get PTR records for an IP address.

How far back does DNS history go?

WhoisFreaks continuously collects DNS data, and the historical depth varies by domain popularity and TLD. High-traffic domains tend to have longer coverage. The database contains 15+ billion DNS records across 5+ billion hostnames.

What is the difference between live DNS lookup and historical DNS lookup?

Current DNS Lookup queries live resolvers for today's records. Historical DNS Lookup retrieves archived snapshots from WhoisFreaks' database, showing what the records looked like at various points in the past, even if those records have since changed or been deleted.

Can I use DNS history via an API?

Yes. The DNS History API returns paginated records with timestamps, suitable for integration into threat intelligence platforms, OSINT workflows, and security automation pipelines.

Is DNS history data affected by GDPR privacy redaction?

Unlike a sizable portion of WHOIS data, DNS data is not redacted for privacy, so historical DNS records can be quite useful for cybersecurity purposes. This makes DNS history a uniquely transparent data source compared to WHOIS.

Related Posts