Every domain on the internet relies on DNS records to function. These records map human-readable domain names to IP addresses, mail servers, and configuration data. For OSINT investigators, DNS records are often the first place to look when investigating a domain's infrastructure, ownership clues, and security posture.
This guide covers what each DNS record type reveals, how to detect CDN and email providers from DNS data, and how to use DNS findings as a starting point for deeper investigation.
Domain to IP Lookup
Resolve all six DNS record types for any domain, auto-detect CDN providers and email infrastructure, and parse SPF/DMARC policies — all processed client-side via DNS-over-HTTPS.
Open Domain to IP LookupWhat DNS Records Tell Investigators
DNS is the internet's directory service. When you type a domain into a browser, DNS translates it into the IP address of the server hosting that website. But DNS does more than just map domains to IPs. The full set of DNS records reveals:
- Where the website is hosted — A and AAAA records point to the server's IP address
- Whether a CDN is in use — CNAME records often chain through CDN providers like Cloudflare or CloudFront
- Who handles email — MX records identify the email service (Google Workspace, Microsoft 365, etc.)
- Who manages DNS — NS records show the authoritative nameservers
- Security and verification — TXT records contain SPF, DMARC, and domain verification entries
Each of these data points is publicly queryable and available without authentication, making DNS one of the most accessible sources of infrastructure intelligence.
Record Types Explained
A Records
A records map a domain to one or more IPv4 addresses. This is the most basic DNS record and tells you where the website's server is located. Multiple A records typically indicate load balancing or failover configurations. If the IP belongs to a CDN (like Cloudflare's IP ranges), it means the origin server is hidden behind a proxy.
AAAA Records
AAAA records are the IPv6 equivalent of A records. Their presence indicates the domain supports IPv6 connectivity. In practice, most investigators focus on A records, but AAAA records can occasionally reveal different infrastructure or hosting providers.
CNAME Records
CNAME (Canonical Name) records create aliases that point one domain to another. They are especially useful for investigations because they reveal the chain of services between a domain and its actual hosting. A CNAME pointing to d1234.cloudfront.net tells you the site uses AWS CloudFront. A CNAME pointing to shops.myshopify.com tells you it's a Shopify store.
Investigation tip: CNAME chains can reveal the actual hosting platform even when the domain appears to be independently hosted. Follow the chain to its end to find the real infrastructure.
MX Records
MX (Mail Exchange) records specify which servers handle email for a domain. They include a priority value — lower numbers indicate higher priority. MX records are one of the most useful record types for investigators because they immediately tell you what email service an organization uses.
Common MX patterns:
*.google.comor*.googlemail.com→ Google Workspace*.outlook.comor*.protection.outlook.com→ Microsoft 365*.pphosted.com→ Proofpoint (email security gateway)*.mimecast.com→ Mimecast (email security)
NS Records
NS (Name Server) records identify which DNS servers are authoritative for a domain. The nameserver provider can tell you about the domain's infrastructure choices. For example, ns.cloudflare.com nameservers indicate the domain uses Cloudflare for DNS management and likely has their proxy and DDoS protection enabled.
TXT Records
TXT records store arbitrary text data and serve multiple purposes. For investigators, the most important TXT records are:
- SPF records (starting with
v=spf1) — list servers authorized to send email for the domain - DMARC records (starting with
v=DMARC1) — specify how to handle emails that fail authentication - Domain verification — entries like
google-site-verificationorfacebook-domain-verificationconfirm the domain owner has verified ownership with those services
CDN and Reverse Proxy Detection
Content Delivery Networks (CDNs) and reverse proxies sit between a domain and its origin server. When a domain uses a CDN, the A record points to the CDN's edge server rather than the actual web server. This means the IP address you get from a DNS lookup belongs to the CDN, not the organization hosting the website.
Detecting CDN usage is important for two reasons:
- The IP address does not represent the organization's server. Running an IP lookup on a CDN IP tells you about Cloudflare's or Amazon's infrastructure, not the target's.
- The real origin IP may be discoverable through other means. Historical DNS records, certificate transparency logs, or misconfigured subdomains may reveal the origin IP.
CDN detection from DNS data relies primarily on CNAME records and nameservers:
- CNAME containing
cloudfront.net→ AWS CloudFront - CNAME containing
akamai→ Akamai CDN - CNAME containing
fastly→ Fastly - NS records at
ns.cloudflare.com→ Cloudflare (DNS proxy with DDoS protection)
Email Infrastructure from MX and TXT Records
MX records tell you who handles incoming email, but TXT records fill in the rest of the picture. Together, they reveal not just the email provider but the entire email security posture of a domain.
Reading SPF Records
An SPF record lists every server and service authorized to send email on behalf of a domain. When you see include:_spf.google.com, it means Google Workspace is authorized. Multiple include: entries often reveal the full stack of email-related services an organization uses — their primary email provider, marketing email platform (SendGrid, Mailchimp), CRM system (Salesforce, HubSpot), and support desk (Zendesk).
Investigation tip: SPF records are one of the richest single sources of technology intelligence. A single TXT record can reveal 5-10 different services an organization uses for email communication.
Reading DMARC Records
DMARC builds on SPF and DKIM to tell receiving mail servers what to do when authentication fails. The key field is the policy (p=):
p=reject— the domain takes email security seriously; unauthorized emails are blockedp=quarantine— unauthorized emails go to spam; the domain is moving toward enforcementp=none— monitoring only; the domain is not enforcing email authentication
A domain with p=none or no DMARC record at all is more vulnerable to email spoofing. This is relevant in phishing investigations and business email compromise cases.
Pivoting from DNS to Deeper Investigation
DNS data rarely stands alone in an investigation. It serves as a starting point for further research:
- IP Lookup: Take the resolved A record IPs and run them through an IP lookup tool to get geolocation, ISP, ASN, and VPN/proxy detection. This reveals where the server is physically hosted.
- WHOIS: The IP from DNS can be used to query WHOIS databases for IP block ownership, abuse contacts, and registration details.
- Reverse DNS: Look up what other domains point to the same IP address. Shared hosting often means shared IP, which can reveal related domains.
- Historical DNS: Services that archive DNS records over time can show when a domain changed hosting providers, added CDN protection, or modified email infrastructure.
- Certificate Transparency: SSL certificates issued for a domain are logged publicly. These logs can reveal subdomains and sometimes the origin IP behind a CDN.
IP Lookup
Take any IP address from your DNS lookup results and get geolocation, ISP details, VPN/proxy detection, and a digitally signed PDF report.
Open IP LookupLimitations of Public DNS
Public DNS lookups are useful but have clear boundaries:
- CDN masking: When a domain uses Cloudflare or similar services, the A record shows the CDN's IP, not the origin server. You cannot determine the actual hosting location from public DNS alone.
- No historical data: A standard DNS query returns only the current records. It does not tell you what the records were last week or last year. For historical data, you need dedicated services that archive DNS records over time.
- Private DNS zones: Internal DNS records (like those used inside a corporate network) are not publicly queryable.
- TTL and caching: DNS records are cached at multiple levels. The results you see may not reflect changes made minutes ago. Check the TTL value to understand how long records are cached.
- Split-horizon DNS: Some organizations serve different DNS responses depending on where the query comes from. Your results may differ from what someone on a different network sees.
Key Takeaway
DNS records are the starting point, not the conclusion. They tell you what infrastructure a domain uses, but they need to be cross-referenced with IP lookups, WHOIS data, and other sources to build a complete picture. A single DNS query can reveal a domain's CDN provider, email service, authorized senders, and security posture — all from publicly available data that requires no authentication to access.

