DNS Record Types Explained
A complete reference guide to every DNS record type — what each one does, when to use it, and real-world examples.
What Are DNS Records?
DNS records are individual entries stored in the Domain Name System that define how a domain behaves. Each record has a type (what kind of information it holds), a name (which domain or subdomain it applies to), a value (the actual data), and a TTL (how long it can be cached). Together, these records make up a domain's complete DNS configuration — controlling everything from which server hosts the website to how email is delivered and authenticated.
Understanding the different record types is essential for setting up websites, configuring email, securing domains, and troubleshooting connectivity problems. The sections below cover every major record type with detailed explanations and practical guidance on when and why to use each one.
Quick Reference
| Type | Full Name |
|---|---|
A | Address Record |
AAAA | IPv6 Address Record |
CNAME | Canonical Name Record |
MX | Mail Exchange Record |
TXT | Text Record |
NS | Nameserver Record |
SOA | Start of Authority Record |
PTR | Pointer Record (Reverse DNS) |
SRV | Service Record |
CAA | Certificate Authority Authorization |
Detailed Record Explanations
AAddress Record
Maps a domain or subdomain to an IPv4 address.
The A record is the most fundamental DNS record. It answers the question: 'What IP address does this domain point to?' When you set up a website, you create an A record pointing your domain to your web server's IPv4 address. You can have multiple A records for the same domain to distribute traffic across multiple servers — a technique called round-robin DNS load balancing. The A record is also what controls where subdomains like www.example.com or app.example.com resolve. Every domain serving a website needs at least one A record.
Example
example.com → 93.184.216.34Common Use Cases
Setting up a website, pointing a domain to a server, load balancing across multiple IPs.
AAAAIPv6 Address Record
Maps a domain to an IPv6 address.
The AAAA record is the IPv6 equivalent of the A record. As the internet transitions from IPv4 (which only provides ~4.3 billion addresses) to IPv6 (which provides 340 undecillion addresses), adding AAAA records alongside A records ensures your site is accessible to users on IPv6-only networks. Major ISPs in many countries have largely moved to IPv6 for residential customers. Modern web servers and CDNs support both protocols simultaneously. If a visitor's device prefers IPv6, it will use the AAAA record; otherwise, it falls back to the A record.
Example
example.com → 2606:2800:220:1:248:1893:25c8:1946Common Use Cases
Supporting IPv6 users, future-proofing domain configuration, modern hosting environments.
CNAMECanonical Name Record
Creates an alias pointing to another domain name.
A CNAME record creates an alias — it says 'this name is the same as that other name'. The most common use is making www.example.com point to example.com, so both work. CNAMEs are also extensively used by SaaS platforms: when you set up a custom domain on Shopify, Netlify, GitHub Pages, or HubSpot, they give you a CNAME record to create. Important limitation: a CNAME record cannot coexist with other records at the same name. This means you cannot create a CNAME for the root domain (example.com) because the root must also have NS and SOA records — use an ALIAS or ANAME record (supported by some providers) for root domain aliasing.
Example
www.example.com → example.comCommon Use Cases
www subdomain, custom domain setup for SaaS platforms, CDN integration, subdomains for services.
MXMail Exchange Record
Specifies which mail servers handle email for the domain.
The MX record is what allows your domain to receive email. When someone sends an email to you@example.com, the sending mail server looks up the MX record for example.com to find where to deliver it. Each MX record includes a mail server hostname and a priority number. Lower priority numbers are preferred — if priority 10 is available, it is tried before priority 20. Having multiple MX records with different priorities creates redundancy: if the primary mail server is unavailable, email queues at the backup server instead of bouncing. Without valid MX records, your domain cannot receive email at all.
Example
example.com → aspmx.l.google.com (priority 1)Common Use Cases
Email delivery, Google Workspace setup, Microsoft 365 configuration, any email hosting.
TXTText Record
Stores arbitrary text data — widely used for email authentication and domain verification.
TXT records are multipurpose text records that hold human-readable or machine-readable string data. Originally intended for informational notes, TXT records have become critical for email deliverability and domain ownership verification. Three email authentication systems all rely on TXT records: SPF (Sender Policy Framework) lists which mail servers are authorized to send email for your domain; DKIM (DomainKeys Identified Mail) publishes a public cryptographic key used to verify email signatures; DMARC (Domain-based Message Authentication) defines the policy for handling emails that fail SPF or DKIM. TXT records are also used by Google Search Console, Microsoft, and hundreds of other platforms to prove you control a domain.
Example
example.com → "v=spf1 include:_spf.google.com ~all"Common Use Cases
SPF, DKIM, DMARC email authentication, Google/Microsoft domain verification, general domain ownership proof.
NSNameserver Record
Identifies which DNS servers are authoritative for the domain.
NS records are among the most important in your DNS configuration. They tell the rest of the internet which DNS servers hold the authoritative records for your domain. NS records are set at your domain registrar (the company you bought the domain from) and point to your DNS provider's nameservers. When you switch DNS providers — for example, from GoDaddy DNS to Cloudflare DNS — you update the NS records at your registrar. Until the NS records propagate, your new DNS configuration will not be active. Every domain must have at least two NS records for redundancy, and most providers assign four. NS records cannot be changed at the DNS provider level — they must be changed at the registrar.
Example
example.com → ns1.cloudflare.com, ns2.cloudflare.comCommon Use Cases
Switching DNS providers, setting up domain DNS management, domain transfers.
SOAStart of Authority Record
Contains administrative information about the DNS zone.
The SOA (Start of Authority) record is automatically created by your DNS provider and contains administrative metadata about the DNS zone. It includes the primary nameserver hostname, the zone administrator's email address (written with a dot instead of @), a serial number that increments with every zone change, and several timing parameters: refresh interval (how often secondary nameservers check for updates), retry interval (how long to wait after a failed refresh), expire time (when secondary data becomes invalid if primary is unreachable), and minimum TTL for negative caching. You typically do not edit SOA records manually — your DNS provider manages them automatically. However, seeing the serial number can help verify whether a DNS change was published.
Example
ns1.example.com. admin.example.com. 2024010101 3600 900 604800 300Common Use Cases
Zone administration, DNS provider management — typically managed automatically.
PTRPointer Record (Reverse DNS)
Maps an IP address back to a domain name — reverse DNS.
PTR records perform the opposite function of A records: instead of mapping a domain to an IP, they map an IP address to a domain name. This is called reverse DNS lookup. PTR records are stored in a special zone called in-addr.arpa (for IPv4) or ip6.arpa (for IPv6). They are set by whoever controls the IP address — typically your hosting provider or ISP, not your domain registrar. PTR records are critical for email deliverability: receiving mail servers verify that the IP address your mail server sends from has a PTR record pointing to a hostname, and that hostname's A record points back to the same IP. Mail servers without proper PTR records are frequently blocked or spam-filtered.
Example
93.184.216.34 → example.comCommon Use Cases
Email server configuration, reverse DNS for servers, network diagnostics.
SRVService Record
Defines the location and port of a specific service.
SRV records specify the hostname and port number of servers for specific services and protocols. They follow a naming convention: _service._protocol.domain. The record includes a priority, weight (for load balancing among equal-priority records), port number, and target hostname. SRV records are commonly used for VoIP (SIP protocol), XMPP instant messaging, Microsoft Teams and Skype for Business, and various other services. When setting up Microsoft 365 or Google Workspace, your email provider may require SRV records in addition to MX records for services like Autodiscover (email client configuration) or Federation.
Example
_sip._tcp.example.com → sipserver.example.com:5060 (priority 10, weight 100)Common Use Cases
VoIP/SIP services, Microsoft 365 Autodiscover, XMPP messaging, any port-specific service.
CAACertificate Authority Authorization
Restricts which certificate authorities can issue SSL certificates for the domain.
CAA records are a security mechanism that tells certificate authorities (CAs) whether they are permitted to issue SSL/TLS certificates for your domain. This prevents unauthorized SSL certificate issuance — a known attack vector where an attacker tricks a CA into issuing a certificate for a domain they do not own. A CAA record specifying only Let's Encrypt means no other CA can issue a certificate for your domain. Without any CAA record, any accredited CA can issue certificates, which is the default behavior. The tag 'issue' restricts which CA can issue standard certificates, 'issuewild' restricts wildcard certificates, and 'iodef' specifies a URL or email for violation reports.
Example
example.com → 0 issue "letsencrypt.org"Common Use Cases
Security hardening, restricting certificate issuance, preventing certificate misissuance attacks.
Email DNS Records: SPF, DKIM, and DMARC
Email authentication is one of the most important and frequently misconfigured aspects of DNS. Three TXT records work together to verify your email is legitimate and prevent spoofing:
SPF (Sender Policy Framework)
An SPF record lists all servers authorized to send email for your domain. It prevents spammers from forging your domain in the From address. Example: v=spf1 include:_spf.google.com include:sendgrid.net ~all. The ~all means soft-fail for unauthorized senders; -all means hard-fail (reject). Enter your domain in our TXT Record Lookup to see your current SPF record.
DKIM (DomainKeys Identified Mail)
DKIM adds a cryptographic signature to outgoing emails. Your mail server signs each email with a private key, and the public key is published as a TXT record at selector._domainkey.yourdomain.com. Receiving servers fetch this public key to verify the signature, confirming the email genuinely came from your domain and was not modified in transit.
DMARC (Domain-based Message Authentication)
DMARC ties SPF and DKIM together with a policy stored at _dmarc.yourdomain.com. It tells receiving servers what to do with emails that fail authentication: p=none (monitor only), p=quarantine (spam folder), or p=reject (block entirely). DMARC also provides reporting — receiving servers send aggregate reports to your specified email so you can monitor who is sending email using your domain.
Verify Your DNS Records Now
Use our free tools to check any DNS record type for any domain instantly.
