You don't have javascript enabled. Please enable javascript to use this website.
CNAME Lookup

CNAME Lookup

Check CNAME records of a given domain (Using Forward DNS Lookup)

     

You might also be interested in:


What is a CNAME Record ?

A CNAME (Canonical Name) Record is a type of DNS (Domain Name System) record that maps one domain name to another domain name. It is commonly used to create an alias or nickname for a domain, allowing multiple domain names to resolve to the same IP address.

For example, suppose you have a website with the domain name "example.com", but you also want visitors to be able to access your site using the domain name "www.example.com". Instead of creating a separate DNS record for "www.example.com" with its own IP address, you can create a CNAME record that maps "www.example.com" to "example.com". When a user enters "www.example.com" in their browser, the DNS resolver will look up the CNAME record and redirect the request to "example.com".

CNAME Records can also be used to point a subdomain to another domain or to redirect a domain to a completely different domain. For example, you can create a CNAME record that maps "blog.example.com" to "wordpress.com", or a record that maps "shop.example.com" to "shopify.com".

CNAME Records can be created and managed through a domain registrar or a DNS management tool. It is important to note that CNAME Records should not be used for the root domain (i.e. the domain name without a subdomain, such as "example.com"), as this can cause issues with email delivery and other DNS functions.


What is a CNAME Records Lookup Tool ?

A CNAME Records Lookup Tool is an online utility that allows users to query the DNS (Domain Name System) database to retrieve information about CNAME (Canonical Name) records for a specific domain name. This tool can be used to look up information about the DNS configuration for a domain, including all of the CNAME records associated with that domain.

To use a CNAME Records Lookup Tool, you simply enter the domain name you want to query and click "Lookup" or "Search". The tool will then retrieve and display all of the CNAME records associated with that domain, including the target domain names to which they point.


What can a CNAME Records Lookup Tool be used for ?

CNAME Records Lookup Tools can be useful for a variety of purposes, including:

  1. Troubleshooting DNS issues: A CNAME Records Lookup Tool can help identify DNS configuration issues that may be causing website or email delivery problems. Checking the CNAME records can ensure that all of the records are properly configured and pointing to the correct domains.

  2. Website migration: When migrating a website to a new domain name or hosting provider, it is important to update all of the CNAME records associated with the domain to ensure that visitors are properly redirected to the new site. A CNAME Records Lookup Tool can be used to identify all of the CNAME records associated with the domain and verify that they have been updated correctly.

  3. Domain name management: A CNAME Records Lookup Tool can be a useful tool for verifying that all of the CNAME records for the domain are properly configured and up-to-date. This is especially important if you are responsible for managing DNS configuration for a domain.

  4. Network administration: CNAME Records Lookup Tools can be used by network administrators to troubleshoot network connectivity issues and ensure that all DNS configurations are properly configured across the network.

  5. Identifying domain ownership: CNAME Records Lookup Tools can help identify the owner of a domain by providing information about the CNAME records associated with the domain.

  6. Identifying third-party services: Many third-party services use CNAME records to point to their own domains. By using a CNAME Records Lookup Tool, you can identify which third-party services are being used by a website or domain.

  7. Preventing phishing attacks: CNAME Records Lookup Tools can help prevent phishing attacks by identifying any unauthorized CNAME records associated with a domain. By identifying and removing unauthorized CNAME records, you can prevent attackers from redirecting visitors to malicious sites.

  8. Monitoring DNS changes: CNAME Records Lookup Tools can be used to monitor changes to DNS configurations for a domain, allowing you to quickly identify any unauthorized changes or errors in the configuration.

  9. Verifying SSL certificate configurations: SSL certificates require a valid CNAME record to be set up in order to work correctly. By using a CNAME Records Lookup Tool, you can verify that the CNAME record is set up correctly and that the SSL certificate is valid.

  10. Researching competitors: CNAME Records Lookup Tools can be used to research the domain configurations of competitors in order to identify potential opportunities or vulnerabilities. By analyzing the CNAME records of competitors, you can gain insights into their hosting providers, third-party services, and other key aspects of their online presence.


List of Commonly Used DNS Record types:


TypeDescriptionFunction
A IPv4 Address record Returns a 32-bit IPv4 address, most commonly used to map hostnames to an IP address of the host, but it is also used for DNSBLs, storing subnet masks in RFC 1101, etc.
AAAA IPv6 address record Returns a 128-bit IPv6 address, most commonly used to map hostnames to an IP address of the host.
AFSDB AFS database record Location of database servers of an AFS cell. This record is commonly used by AFS clients to contact AFS cells outside their local domain. A subtype of this record is used by the obsolete DCE/DFS file system.
APL APL
CAA Certification Authority Authorization DNS Certification Authority Authorization, constraining acceptable CAs for a host/domain
CERT Certificate record Stores PKIX, SPKI, PGP, etc.
CNAME Canonical name record Alias of one name to another: the DNS lookup will continue by retrying the lookup with the new name.
DHCID DHCP identifier Used in conjunction with the FQDN option to DHCP
DNAME Delegation name record Alias for a name and all its subnames, unlike CNAME, which is an alias for only the exact name. Like a CNAME record, the DNS lookup will continue by retrying the lookup with the new name.
DNSKEY DNS Key record The key record used in DNSSEC. Uses the same format as the KEY record.
DS Delegation signer The record used to identify the DNSSEC signing key of a delegated zone
IPSECKEY IPsec Key Key record that can be used with IPsec
LOC Location record Specifies a geographical location associated with a domain name
MX Mail exchange record Maps a domain name to a list of message transfer agents for that domain
NAPTR Naming Authority Pointer Allows regular-expression-based rewriting of domain names which can then be used as URIs, further domain names to lookups, etc.
NS Name server record Delegates a DNS zone to use the given authoritative name servers
NSEC Next Secure record Part of DNSSEC—used to prove a name does not exist. Uses the same format as the (obsolete) NXT record.
NSEC3 Next Secure record version 3 An extension to DNSSEC that allows proof of nonexistence for a name without permitting zonewalking
NSEC3PARAM NSEC3 parameters Parameter record for use with NSEC3
PTR PTR Resource Record Pointer to a canonical name. Unlike a CNAME, DNS processing stops and just the name is returned. The most common use is for implementing reverse DNS lookups, but other uses include such things as DNS-SD.
RP Responsible Person Information about the responsible person(s) for the domain. Usually an email address with the @ replaced by a .
RRSIG DNSSEC signature Signature for a DNSSEC-secured record set. Uses the same format as the SIG record.
SOA Start of [a zone of] authority record Specifies authoritative information about a DNS zone, including the primary name server, the email of the domain administrator, the domain serial number, and several timers relating to refreshing the zone.
SRV Service locator Generalized service location record, used for newer protocols instead of creating protocol-specific records such as MX.
SSHFP SSH Public Key Fingerprint Resource record for publishing SSH public host key fingerprints in the DNS System, in order to aid in verifying the authenticity of the host. RFC 6594 defines ECC SSH keys and SHA-256 hashes. See the IANA SSHFP RR parameters registry for details.
TLSA TLSA certificate association A record for DANE. RFC 6698 defines "The TLSA DNS resource record is used to associate a TLS server certificate or public key with the domain name where the record is found, thus forming a 'TLSA certificate association'".
TSIG Transaction Signature Can be used to authenticate dynamic updates as coming from an approved client, or to authenticate responses as coming from an approved recursive name server[13] similar to DNSSEC.
TXT Text record Originally for arbitrary human-readable text in a DNS record. Since the early 1990s, however, this record more often carries machine-readable data, such as specified by RFC 1464, opportunistic encryption, Sender Policy Framework, DKIM, DMARC, DNS-SD, etc.
URI Uniform Resource Identifier Can be used for publishing mappings from hostnames to URIs.