How to defend against Account Takeovers
Learn about account takeover threats, protection strategies, and detection methods to secure your digital accounts and prevent unauthorised access.
A reverse DNS (rDNS) lookup is the process of resolving an IP address back to its associated domain name. This is the opposite of a standard "forward" DNS lookup, which resolves a domain name to an IP address. While forward DNS lookups are what happen every time you visit a website, reverse DNS lookups serve specialized purposes in networking, security, and system administration.
For example, a forward DNS lookup converts google.com
→ 142.250.191.14
, while a reverse DNS lookup converts 142.250.191.14
→ google.com
(or more specifically, to whatever hostname the IP owner has configured).
Reverse DNS lookups use a special type of DNS record called a PTR (Pointer) record. These records work differently from standard DNS records and use a special domain structure.
in-addr.arpa
Domain for IPv4For IPv4 addresses, reverse DNS uses the special in-addr.arpa
domain. The IP address is reversed and appended to this domain. Here's how it works:
IP Address: 192.168.1.100
Reverse DNS Query: 100.1.168.192.in-addr.arpa
The process:
1. Take the IP address: 192.168.1.100
2. Reverse the octets: 100.1.168.192
3. Append .in-addr.arpa
: 100.1.168.192.in-addr.arpa
4. Query for the PTR record of this domain
A PTR record might look like this:
100.1.168.192.in-addr.arpa. 3600 IN PTR server.example.com.
This tells us that IP address 192.168.1.100
has the hostname server.example.com
.
IPv6 uses a similar but more complex system with the ip6.arpa
domain, where each hexadecimal digit of the IPv6 address becomes a separate label.
You can perform reverse DNS lookups using various tools:
# Using nslookup
nslookup 8.8.8.8
# Using dig
dig -x 8.8.8.8
# Using host
host 8.8.8.8
These commands might return something like:
8.8.8.8.in-addr.arpa domain name pointer dns.google.
The primary and most critical use case for reverse DNS is email delivery. This is where rDNS becomes essential for maintaining good email deliverability:
How Email Servers Use rDNS: 1. When your email server connects to Gmail's servers to deliver an email, Gmail sees your server's IP address 2. Gmail performs a reverse DNS lookup on that IP address 3. If the rDNS doesn't resolve, or if it doesn't match the domain in your email headers, Gmail may:
Best Practice for Email:
If your email server uses IP 203.0.113.10
, you should configure:
10.113.0.203.in-addr.arpa
→ mail.yourdomain.com
mail.yourdomain.com
→ 203.0.113.10
This creates a "forward-confirmed reverse DNS" setup that email providers trust.
Network diagnostic tools often use reverse DNS to provide more readable output:
traceroute Example: Instead of showing just IP addresses:
1 192.168.1.1
2 203.0.113.1
3 198.51.100.1
With reverse DNS, you get more helpful information:
1 router.local (192.168.1.1)
2 gateway.isp.com (203.0.113.1)
3 core-router-nyc.backbone.net (198.51.100.1)
This makes it much easier to understand the network path and identify where issues might be occurring.
System administrators use reverse DNS to enrich log files:
Without rDNS (less useful):
203.0.113.25 - - [27/Aug/2024:10:15:32 +0000] "GET /index.html HTTP/1.1" 200 1234
With rDNS (more informative):
googlebot.google.com (203.0.113.25) - - [27/Aug/2024:10:15:32 +0000] "GET /index.html HTTP/1.1" 200 1234
This helps administrators quickly identify:
Reverse DNS helps in security investigations:
Many monitoring and analysis tools use reverse DNS:
Not all IP addresses have reverse DNS records configured. This is particularly common with:
While DNS records are generally trustworthy, they can be controlled by whoever owns the IP address range. For security-critical applications, don't rely solely on reverse DNS for authentication.
Reverse DNS lookups add latency to operations. Many applications perform them asynchronously or cache results to minimize impact.
To configure reverse DNS for your IP addresses:
dig -x
to confirm the setup is workingWhile less common than forward DNS lookups, reverse DNS is a useful tool for network diagnostics and a key component of email infrastructure. It bridges the gap between the numeric world of IP addresses and the human-readable world of domain names.
For email server administrators, proper reverse DNS configuration is essential for deliverability. For network administrators and security professionals, reverse DNS provides valuable context that makes logs more readable and troubleshooting more effective.
Understanding reverse DNS helps you better manage network infrastructure, improve email deliverability, and gain deeper insights into network traffic and security events.
Learn about account takeover threats, protection strategies, and detection methods to secure your digital accounts and prevent unauthorised access.
An overview of Account Takeover Attacks
A step-by-step breakdown of how credential stuffing attacks are carried out, from obtaining stolen credentials to bypassing defenses and taking over accounts.
An introduction to Anycast DNS
A quick description about what an Apex Domain is.
Learn the essential best practices for managing and rotating API keys to enhance security, prevent unauthorized access, and minimize the impact of key compromise.
© PEAKHOUR.IO PTY LTD 2025 ABN 76 619 930 826 All rights reserved.