What this tool does
The DNS Lookup tool queries seven record types for any domain in a single request: A (IPv4 address), AAAA (IPv6 address), MX (mail exchange), TXT (text records used for SPF, DKIM, DMARC, and various verification tokens), NS (authoritative nameservers), CNAME (alias to another hostname), and SOA (Start of Authority — zone metadata including the primary nameserver and the responsible-party email). Each record type renders in its own table with the host, TTL, and value columns. The check uses PHP's native dns_get_record() function which talks to your server's configured resolvers — no third-party API, no rate limits.
What is different about this tool: all seven record types in one query. Most free DNS lookups make you select a single record type and submit again for each one — you're three submissions in before you have the basic picture (A + MX + NS). This tool returns everything at once so you see the full DNS posture of a domain in two seconds. Useful for migration audits, mail-deliverability debugging, and incident-response triage where you need to understand what a domain is configured to do.
How it works under the hood
When you submit a domain, the tool extracts the registrable hostname (stripping protocol and path) and runs dns_get_record() seven times with each of the requested record-type constants — DNS_A, DNS_AAAA, DNS_MX, DNS_TXT, DNS_NS, DNS_CNAME, DNS_SOA. Each call queries the server's configured DNS resolver chain (typically the upstream resolver of our hosting provider) which in turn walks the DNS hierarchy from the root servers down to the domain's authoritative nameservers.
Per-record-type rendering. Records that exist render as tables; record types with no entries are silently skipped (most domains don't have CNAME at the apex, for example, so those tables won't appear). Each row shows the host (the FQDN being resolved), the TTL (how long the resolver caches the answer in seconds), and the value field — IP for A/AAAA, target hostname for CNAME/NS, priority+target for MX, full text for TXT, mname+rname for SOA.
TTL is information, not noise. The TTL field shows how long resolvers cache the answer. Low TTLs (under 60 seconds) signal high-availability infrastructure or fast-flux DNS used by attacker infrastructure. Standard TTLs (3600 = 1 hour, 86400 = 24 hours) signal stable infrastructure.
TXT records are the most information-dense. TXT records store free-form text and have become the standard way to attest various things about a domain. Look for SPF (v=spf1 ... — authorises which servers can send mail for the domain), DMARC (v=DMARC1 ..., lives at _dmarc.domain.com — declares how recipient mail servers should handle SPF/DKIM failures), DKIM keys (live at selector._domainkey.domain.com), domain-verification tokens (Google Workspace, Microsoft 365, Atlassian, Notion, etc. all drop verification TXT records), and BIMI records for branded inbox logos. The presence and configuration of these records tells you a lot about the operational maturity of the domain.
What this tool does NOT do. It queries through your server's configured resolver, not directly against the domain's authoritative nameservers — so the answer can occasionally be cached-stale during DNS migrations. For authoritative-direct queries, use dig +trace or dnschecker.org. The tool also doesn't query CAA, DS, DNSKEY, or other less-common record types. Results cache for one hour via WordPress transients keyed by domain.