Websites are great for an online presence but can also be your secret marketing weapon when it comes to learning about your visitors.
Your website probably gets decent traffic whether you sell products or services, but only some of these visitors are decision-makers looking to buy. What if you could figure out which domains these potential customers come from?
You absolutely can because your website stores visitors’ internet protocol (IP) addresses, and with reverse domain name system (DNS) lookup, you can query these IP addresses for internet hosts or domain names. Businesses generally use IP address intelligence software to identify visitor IP addresses and de-anonymize web traffic.
Reverse DNS lookup helps you with network security and management too. IT teams and system admins backtrack IP addresses to spot malicious sites and troubleshoot network issues. You can also use reverse DNS for email address whitelisting, which prevents important emails from being marked as spam.
A reverse DNS lookup or reverse IP lookup is a DNS querying technique for finding the domain name or internet host associated with an IP address. This type of DNS lookup request is the opposite of a forward DNS lookup, which finds an IP address from a domain name.
The reverse DNS lookup process involves reverse resolving an IP address using registrar tables and pointer records (PTR) from the domain name registry. That’s why it’s also known as reverse DNS resolution (rDNS).
The internet stores reverse DNS entries or PTR records on the address and routing parameter area (ARPA), commonly known as .arpa top-level domain. The format of a DNS record varies depending on whether it’s an IPv4 A record or IPv6 AAAA record. Reverse lookup IP address queries can be performed using command-line tools like dig, which allows for a dig reverse lookup of PTR records.
“A” records live on the .in-addr.arpa subdomain, while “AAAA” records are on .ip6.arpa. Additionally, for specific use cases, a reverse URL lookup can help identify the associated IP address for a given domain.
IPv4 address:
A DNS record for the IPv4 address 193.1.3.2 is 3.2.1.193.in-addr.arpa.
IPv6 address:
A reverse DNS record for the IPv6 address 2001:3f00:1:: is 0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.1.0.0.0.0.0.f.3.2.0.0.1.ip6.arpa.
A reverse DNS lookup queries a DNS server for domain name pointer records that contain the list of IP addresses and corresponding domain names. When a PTR record is on the server, the query returns the hostname associated with the IP address. Reverse DNS lookup can’t provide the domain name when there’s no PTR record on the server.
PTR syntax: (name)(ttl)(class)(type)(rdata)
Below is a breakdown of the different syntax fields:
For example, a domain with an IP address of 194.0.1.2 stores the PTR record information under 2.1.0.194.in-addr.arpa domain. Ipv6, the latest internet protocol version, uses .ip6.arpa instead of .in-addr.arpa. PTR records follow a structure similar to DNS records.
Mail servers use the reverse DNS information to verify a message’s source domain against the IP address. That’s why so many incoming emails from IP addresses without reverse DNS get rejected. Companies managing their mail servers must set up reverse DNS for the IP addresses that send outgoing emails.
You can perform a reverse DNS query using Windows Command Line, Linux terminal, and reverse DNS lookup tools.
Windows 10 or previous version users must run the nslookup command prompt to perform rDNS lookup and find reverse DNS records in a Windows server. It’s not solely a reverse DNS lookup command—it’s a versatile DNS query tool that can perform both forward and reverse lookups.
Opening the Start menu in Windows. Use the search bar to find the command prompt. Type nslookup followed by the IP address and run the command. You should be able to see a domain’s A records, the start of authority (SOA) records, and nameserver (NS) records.
Linux system users can perform reverse IP lookup using dig, host, or nslookup commands.
Domain information groper or dig command returns name servers as you manually look up rDNS through the Linux terminal. It’s mainly used for checking and resolving DNS issues. Host command converts IP addresses to host names and vice versa.
The nslookup command is the most widely used network administration tool. It uses interactive or non-interactive mode to query domain name servers. The interactive mode lets you find and print host and domain information, whereas the non-interactive mode only shows the requested details.
Pro tip: As mentioned, you can also use DNS checkers or lookup tools like Valimail, MXToolbox, and EasyDMARC to look up information behind an IP address.
IT departments use reverse lookup to track website visitors, filter spam emails, and troubleshoot internet protocols, just to name a few applications.
Forward lookup is more common in DNS resolution because it's simpler to translate domain names to IP addresses. However, reverse DNS lookup is the best bet for organizations that want to boost email deliverability and de-anonymize web traffic.
The following solutions use IP addresses to provide device-specific geolocation data and find information from domain databases.
*These are the five leading IP address intelligence tools based on G2 data collected in November 2024.
Many website owners don’t consider reverse DNS as critical as the classic DNS. They neglect it because visitors can still visit a website that doesn’t have reverse DNS records, but things get tricky when they try to send emails. Most email servers reject mail from servers without reverse DNS entries and label them as spam. That’s why it’s best to ask your internet service provider (ISP) to enable rDNS.
Reverse DNS checks are also necessary for deanonymizing web traffic, troubleshooting internet protocols, and logging IP addresses. Without them, you may face difficulties keeping spammers away or even understanding who visits your website.
Looking for secure DNS solutions to power traffic across the web, apps, and networks? Check out the top managed DNS providers to get started.
This article was originally published in 2023. It has been updated with new information.