DNS Lookup Tool
Look up DNS records for any domain. Check A, AAAA, MX, CNAME, NS, TXT, and SOA records.
DNS Record Types Explained
A Record
Maps a domain to an IPv4 address. The most fundamental DNS record type.
AAAA Record
Maps a domain to an IPv6 address. Essential for IPv6-enabled networks.
MX Record
Specifies mail servers responsible for receiving email for the domain.
CNAME Record
Creates an alias from one domain name to another (canonical name).
NS Record
Specifies the authoritative name servers for the domain.
TXT Record
Holds text information. Used for SPF, DKIM, domain verification, etc.
Best DNS Providers & Services Compared (2026)
Your DNS provider directly impacts website speed, uptime, and security. A fast, reliable DNS service ensures visitors reach your site quickly while protecting against DDoS attacks and DNS hijacking.
| Provider | Type | Price | Key Features | Link |
|---|---|---|---|---|
Cloudflare DNS Recommended | DNS + CDN | Free / $20/mo | Free DNS hosting, 1.1.1.1 resolver, DDoS protection, DNSSEC, analytics | Visit |
AWS Route 53 Amazon Web Services | Cloud DNS | $0.50/zone/mo | Cloud DNS, health checks, traffic flow, latency-based routing | Visit |
Google Cloud DNS Google Cloud Platform | Cloud DNS | $0.20/zone/mo | 100% SLA, global anycast, auto-scaling, DNSSEC support | Visit |
Namecheap DNS Domain Registrar | Registrar DNS | Free / $3.88/yr | Free with domains, dynamic DNS, URL forwarding, email forwarding | Visit |
DNSimple Developer-Focused | Managed DNS | From $5/mo | Developer-friendly API, Let's Encrypt integration, DNS analytics | Visit |
Our recommendation: For most websites, Cloudflare DNS offers the best combination of speed, security, and value. Their free tier includes DDoS protection, DNSSEC, and a global anycast network with sub-20ms response times. For enterprise workloads requiring advanced routing and health checks, AWS Route 53 or Google Cloud DNS are excellent choices.
Common DNS Issues & How to Fix Them
DNS Propagation Delays
DNS propagation is the time it takes for DNS changes to spread across all DNS servers worldwide. After updating DNS records, some users may see the old records while others see the new ones, leading to inconsistent behavior that can last up to 48 hours.
How to fix:
- 1. Lower the TTL value to 300 seconds (5 minutes) at least 24 hours before making DNS changes
- 2. Flush your local DNS cache using
ipconfig /flushdns(Windows) orsudo dscacheutil -flushcache(macOS) - 3. Check propagation status with multiple resolvers (Google 8.8.8.8, Cloudflare 1.1.1.1, OpenDNS 208.67.222.222)
- 4. After propagation completes, restore the TTL to a higher value (3600 or 86400 seconds)
Missing MX Records
If your domain cannot receive email, the most common cause is missing or misconfigured MX (Mail Exchange) records. Without proper MX records, mail servers have no way to know where to deliver messages destined for your domain.
How to fix:
- 1. Add MX records pointing to your email provider's mail servers (e.g.,
aspmx.l.google.comfor Google Workspace) - 2. Verify the priority values are set correctly — lower numbers indicate higher priority
- 3. Use the DNS Lookup tool above to query MX records and confirm they resolve correctly
- 4. Ensure SPF and DKIM TXT records are also configured to prevent emails from being marked as spam
DNSSEC Validation Failures
DNSSEC validation failures occur when the cryptographic chain of trust is broken between the parent zone and your domain. This can cause your domain to become completely unreachable for users behind DNSSEC-validating resolvers, including major public resolvers like Google and Cloudflare.
How to fix:
- 1. Verify the DS (Delegation Signer) records at your domain registrar match the DNSKEY records on your authoritative nameservers
- 2. Check DNSKEY records for correct key tags, algorithms, and digest types using a DNSSEC analyzer
- 3. Use diagnostic tools like
dnsviz.netordnssec-debugger.verisignlabs.comto trace the chain of trust - 4. If switching DNS providers, remove the old DS records from the registrar before migrating and add new ones after
DNS Zone Transfer Issues
DNS zone transfers (AXFR) replicate DNS data between primary and secondary nameservers. If zone transfers are misconfigured, secondary servers may serve stale records. Worse, unrestricted zone transfers expose your entire DNS zone to attackers, revealing internal network structure.
How to fix:
- 1. Restrict AXFR (zone transfer) requests to only authorized secondary nameserver IP addresses
- 2. Use TSIG (Transaction Signature) authentication to cryptographically secure zone transfers between servers
- 3. Monitor zone transfer logs for unauthorized attempts, which may indicate reconnaissance activity
- 4. Consider using DNS NOTIFY to ensure secondary servers are promptly updated when zone data changes