How to Check DNS Records for Any Domain (3 Free Methods)
You changed a DNS record and your site went down. You migrated email providers and messages stopped arriving. You set up a new subdomain and it doesn't resolve. The first step in fixing all of these is the same: check your DNS records.
DNS lookups aren't just for debugging. They're a routine part of domain management, email troubleshooting, security auditing, and migration planning. Here are three free methods — from the fastest (zero setup) to the most powerful (command line).
Method 1: exit1.dev DNS Lookup Tool
Best for: Quick checks, email security auditing, DNS health overview.
Our free DNS Lookup Tool resolves all record types in one click and gives you a health grade.
What you get:
- All record types — A, AAAA, CNAME, MX, NS, TXT, SOA, and CAA
- TTL values — See how long each record is cached
- Email security analysis — SPF and DMARC detection with full record display
- DNS health grade — A+ through F based on completeness and security
- Shareable URL — Results are bookmarkable via URL parameters
- Copy & download — Export full report as text
How to use it:
- Go to exit1.dev/tools/dns-checker
- Enter any domain (e.g.,
github.com) - Click "Lookup DNS"
Results show in seconds. No signup, no rate limits.
When to use this method: When you want a comprehensive overview without touching a terminal. The health grade immediately tells you if something important is missing — no need to interpret raw records yourself.
Method 2: Command Line (dig & nslookup)
Best for: Targeted queries, scripting, querying specific nameservers, advanced debugging.
Every developer should know dig (Linux/macOS) and nslookup (all platforms). They're already installed on most systems.
Using dig
dig is the go-to DNS tool for sysadmins. It gives detailed, parseable output.
Basic A record lookup:
dig example.com A
Query specific record types:
dig example.com MX # Mail servers
dig example.com TXT # Text records (SPF, DMARC, etc.)
dig example.com NS # Nameservers
dig example.com SOA # Start of authority
dig example.com CAA # Certificate authority restrictions
dig example.com AAAA # IPv6 addresses
dig example.com ANY # All records (often blocked by providers)
Query a specific nameserver:
dig @8.8.8.8 example.com A # Query Google DNS
dig @1.1.1.1 example.com A # Query Cloudflare DNS
dig @ns1.example.com example.com A # Query authoritative directly
This is essential for DNS propagation checking — you can query different resolvers to see if they've picked up your changes.
Show only the answer (short output):
dig +short example.com A
# Output: 93.184.216.34
Check DMARC:
dig +short _dmarc.example.com TXT
Trace the full resolution path:
dig +trace example.com A
This follows the resolution chain from root servers → TLD servers → authoritative nameservers. Invaluable for debugging delegation issues.
Using nslookup
nslookup is simpler than dig and available on Windows, macOS, and Linux.
nslookup example.com # Basic lookup
nslookup -type=MX example.com # MX records
nslookup -type=TXT example.com # TXT records
nslookup -type=NS example.com # Nameservers
nslookup example.com 8.8.8.8 # Query specific server
When to use command line: When you need to query a specific nameserver, check propagation across multiple resolvers, automate lookups in scripts, or debug resolution chains. The command line gives you control that web tools can't match.
Method 3: Google Public DNS Lookup
Best for: A quick web-based check against Google's global resolvers.
Google offers a free DNS lookup at dns.google. Enter a domain, select a record type, and see what Google's resolvers return.
What you get:
- Raw DNS response data
- DNSSEC validation status
- Response code (NOERROR, NXDOMAIN, SERVFAIL)
- TTL for each record
Limitations: You can only query one record type at a time. No health grading, no email security analysis, no copy/download. It's a raw resolver query — useful for confirming what Google sees, but not for a comprehensive audit.
When to use this method: When you specifically want to know what Google's DNS resolvers return. Useful after a DNS change to check if Google has picked up the update.
What to Look For in DNS Results
The basics
Every production domain should have:
| Check | Why |
|---|---|
| A record exists | Your domain resolves to an IP address |
| Multiple NS records | Redundancy — if one nameserver goes down, others serve |
| MX records (if email is used) | Email delivery requires MX records |
| SPF record | Prevents email spoofing |
| DMARC record | Enforces email authentication policy |
Red flags
- No A or AAAA record — Domain doesn't resolve. Check your DNS provider.
- CNAME on the root domain with other records — Invalid. CNAME can't coexist with MX or TXT at the same name.
- Single nameserver — No redundancy. If it goes down, your entire domain is offline.
- Missing SPF — Anyone can send email as your domain. See our SPF, DKIM, and DMARC guide.
- SPF with
+all— Allows literally anyone to send email for your domain. Should be-allor~all. - No CAA records — Any certificate authority can issue certs for your domain.
- High TTL before a migration — If you're about to change DNS, lower TTLs to 300 first.
Email-specific checks
If you're troubleshooting email delivery:
- Check MX records — Do they point to the right mail servers?
- Check SPF — Does the TXT record include all your sending services?
- Check DMARC — Is there a
_dmarc.yourdomain.comTXT record? - Check DKIM — Use
dig +short selector._domainkey.yourdomain.com TXT(replaceselectorwith your provider's DKIM selector)
When to Check DNS Records
DNS isn't "set it and forget it." Check your records:
- Before and after DNS changes — Verify the change took effect
- After migrating email providers — Confirm MX, SPF, and DKIM are updated
- After migrating hosting/CDN — Confirm A records point to the new provider
- When email delivery fails — SPF/DMARC misconfiguration is the #1 cause
- When SSL renewal fails — CAA records might block your CA
- During security audits — Check for unauthorized changes or missing security records
- Periodically — DNS records can be changed accidentally. Regular checks catch drift.
From One-Time Checks to Continuous Monitoring
Manual DNS checks are fine for troubleshooting. But for production domains, you want continuous monitoring.
exit1.dev is rolling out DNS monitoring that tracks your records around the clock. When a record changes — whether it's an accidental deletion, a misconfigured migration, or a hijacking attempt — you get an alert before your users are affected.
Start with a free DNS check to see where you stand today.
Recommended Resources
- Free DNS Lookup Tool — Check all records for any domain
- DNS Record Types Explained — What every record type means
- SPF, DKIM, and DMARC Guide — Set up email authentication
- DNS Propagation Guide — How long changes take and how to check
- Free SSL Certificate Checker — Verify your certificate configuration
- Free Domain Expiration Checker — Check registration and WHOIS data
Morten Pradsgaard is the founder of exit1.dev — the free uptime monitor for people who actually ship. He writes no-bullshit guides on monitoring, reliability, and building software that doesn't crumble under pressure.