Logo
Logo

PRODUCTS

TOOLS

pricing background

Reverse DNS Lookup

Find every domain that resolves to a given IP, points to a specific nameserver, or aliases to a CNAME target. Includes reverse CNAME, reverse NS, and reverse MX - capabilities that no DNS resolver can answer natively.
16B+
DNS Records
5290M+
Hostnames Tracked

Perform a Reverse DNS Lookup by IP, CNAME, NS, MX or TXT

Try these examples:

What is a Reverse DNS Lookup?

A reverse DNS lookup inverts the standard DNS query. Instead of asking "what IP does this domain resolve to?", it asks "what domains resolve to this IP, point to this nameserver, or alias to this CNAME target?". A standard OS-level reverse lookup (PTR) returns a single hostname configured by the IP owner. WhoisFreaks searches a database of 5290M+ hostnames to return all matching domains - including reverse CNAME and reverse NS lookups that no resolver can answer natively.

Reverse IP (A & AAAA)
Reverse CNAME
Reverse NS & MX
Reverse TXT & SPF

Feature: Find every domain that resolves to a given IPv4 or IPv6 address - far beyond a single PTR record

Feature: Reverse CNAME lookup: find all domains pointing to a SaaS endpoint, CDN target, or specific hostname

Feature: Reverse NS lookup: find every domain using a given nameserver - useful for hosting-provider mapping

Feature: Pattern matching with wildcards for partial-match queries; CSV export for full result sets

For continuous infrastructure mapping, threat-hunting pivots from log files, and bulk reverse-lookup pipelines, the DNS Checker API with reverse search support returns all matching domains in JSON with pagination and rate-limit controls.

Who uses Reverse DNS Lookup?

Reverse DNS shows up in three very different work patterns: pivoting from a single suspicious IP to all domains it hosts, finding every tenant of a SaaS platform via reverse CNAME, and verifying PTR-record configuration for email deliverability. The four use cases below are where this matters most.

Threat Intelligence & OSINT

Finding all domains hosted on a malicious IP is one of the most effective threat investigation pivots. A single attacker-controlled server frequently hosts dozens of phishing pages, C2 endpoints, or malware distribution sites under different domain names. Reverse DNS reveals the complete picture. Combine with the Historical DNS Lookup to surface domains that have since moved off the IP.

Reverse CNAME Lookup

One of the most distinctive features of WhoisFreaks' Reverse DNS tool is reverse CNAME lookup - finding all domains that have a CNAME record pointing to a specific hostname. This is invaluable for: mapping all tenants of a SaaS platform (finding all CNAMEs pointed to a provider's endpoint), detecting subdomain takeover risks (finding abandoned CNAMEs pointing to decommissioned services), and competitive intelligence (identifying all websites using a specific platform).

Email Security & PTR Verification

Mail server administrators use reverse DNS to verify that sending IPs have properly configured PTR records - a basic requirement for email deliverability. Mismatched forward-confirmed reverse DNS (FCrDNS) is a common spam filter trigger. Use alongside the MX Lookup for complete mail server validation.

Shared Hosting & Data Center Mapping

Shared hosting servers can host hundreds or thousands of websites on a single IP. Reverse DNS lookup maps every domain co-hosted on a server - useful for security research (identifying malicious neighbors), compliance (verifying no sanctioned entities share your IP), and business intelligence (seeing which competitors use the same hosting infrastructure).

Why Use WhoisFreaks Reverse DNS?

WhoisFreaks searches a database of 5,289M+ hostnames - far beyond what a simple PTR lookup from a DNS resolver can return. Reverse CNAME and reverse NS in particular are capabilities that no public resolver supports natively; they require an indexed historical-DNS database, which is why few free tools offer them.

  • Reverse lookup by IP, nameserver, CNAME target, MX server, TXT value, or SPF include - all 7 reverse search types in one tool
  • Pattern matching with wildcards for flexible queries (e.g., find all CNAMEs pointing to *.cloudfront.net)
  • CSV export for full result sets; programmatic access via the DNS Checker API for high-volume reverse searches
Tip

Use wildcard patterns to surface entire SaaS-tenant ecosystems in one query - for example, searching cname/*.azurewebsites.net finds every domain pointing to a Microsoft Azure App Service. The same pattern works for *.cloudfront.net, *.herokuapp.com, and any other shared SaaS endpoint. For full-batch reverse lookups across thousands of IPs, use the DNS Checker API.

Recent Reverse DNS Lookup

Use wildcard patterns to surface entire SaaS-tenant ecosystems in one query - for example, searching cname/*.azurewebsites.net finds every domain pointing to a Microsoft Azure App Service. The same pattern works for *.cloudfront.net, *.herokuapp.com, and any other shared SaaS endpoint. For full-batch reverse lookups across thousands of IPs, use the DNS Checker API.

DNS Reverse Faqs

Common questions about CNAME, NS, and MX reverse search, wildcards, and record coverage.

What is Reverse DNS Lookup?

How is Reverse DNS different from a PTR record lookup?

What are common use cases for Reverse DNS Lookup?

Can Reverse DNS Lookup identify shared hosting environments?

Does Reverse DNS work for all IP addresses?

How current is the reverse DNS data?

How do I look up the CNAME record of a domain (forward CNAME lookup)?