Date First Published: 24th April 2022
Topic: Computer Networking
Subtopic: Internet Protocols
Article Type: Computer Terms & Definitions
Difficulty: AdvancedDifficulty Level: 9/10
Learn more about what a reverse DNS lookup is in this article.
As suggested in the name, a reverse DNS lookup, also known as an rDNS, is the opposite of a forwards lookup. It works by first looking up the IP address and then returning the domain name mapped to that IP address. A forwards DNS lookup works in the opposite way. In order for a reverse DNS lookup to properly work, it is necessary for a PTR record to be configured. These records store IP addresses with their segments reversed and ‘.in-addr.arpa’ is added to that. For example, a domain name with the IP address ‘173.245.58.63’ would have its information stored as ‘173.245.58.63. in-addr.arpa’.
PTR records are stored with ‘.ip6.arpa’ in IPv6, the more recent and advanced version of an IP address.
Reverse DNS lookups are not crucial to the normal functioning of the internet and are not used universally. In accordance with the standards of the IETF, it is suggested that every domain name should be capable of performing a reverse DNS lookup.
Reverse DNS lookups are mostly used by email servers for the purposes of spam filtering and validating incoming messages. This is performed by checking the IP address of the sender’s mail server in order to find out whether the mail server is legitimate. If the reverse DNS lookup resolver matches the IP address to the domain name of the email address, the mail server is legitimate. Due to this, it is very important that PTR records are configured on mail servers.
If so, it is important that you tell me as soon as possible on this page.
Network Services Network Setups Network Standards Network Hardware Network Identifiers Network Software Internet Protocols Internet Organisations Data Transmission Technologies Web Development Web Design Web Advertising Web Applications Web Organisations Web Technologies Web Services SEO Threats To Systems, Data & Information Security Mechanisms & Technologies Computer Hardware Computer Software Ethics & Sustainability Legislation & User Data Protection