← Back to Home

Reverse DNS: The Network Admin's Secret Weapon

Reverse DNS: The Network Admin's Secret Weapon

Posted by NetworkWhois on

   

Reverse DNS Lookups: Free /24 Subnet Scanning

       

Let me guess - you've got firewall logs full of IPs, and no idea what half of them actually are. That's where reverse DNS (rDNS) comes in. I use it daily to separate the legit traffic from the sketchy stuff.

       
        Try it free: Our reverse DNS tool lets you check single IPs or entire /24 subnets with one click. No limits, no paywalls.    
       

Reverse DNS in 30 Seconds

       

Normal DNS: domain → IP address
    Reverse DNS: IP address → domain

       

When configured right (and that's a big "if"), rDNS tells you what an IP calls itself. Crucial for:

   
           
  • Spotting spoofed traffic (when the IP and name don't match)
  •        
  • Identifying legitimate services (mail servers should always have rDNS)
  •        
  • Finding forgotten devices on your network
  •    
       
        192.0.2.45 → mail-server-01.example.com
        203.0.113.22 → customer-pool-nyc-22.provider.net    
       

Why Check Entire /24 Subnets?

       

Single IP lookups are fine, but scanning a whole /24 (256 addresses) reveals patterns:

                                                                                                                                                                                                                   
What You'll FindWhy It Matters
Mail server naming conventionsIdentify legitimate vs suspicious senders
ISP customer IP rangesSpot compromised residential accounts
Hosting provider blocksRecognize cloud/VPS traffic patterns
Your own forgotten devicesClean up stale DNS entries
       
        Warning: Some networks rate-limit rDNS queries. Our tool spaces out requests to avoid triggering blocks.    
       

Real-World Uses That Actually Help

       

1. Email Server Configuration

       

Proper mail servers must have matching forward and reverse DNS. I reject mail from any IP where:

   
           
  • rDNS is missing completely
  •        
  • The name doesn't resolve back to the original IP
  •        
  • It uses generic ISP names (like "dynamic-45-22.provider.net")
  •    
       

2. Network Inventory

       

Ran a /24 scan on our own IPs last month and found:

   
           
  • 3 test VMs we forgot to decomission
  •        
  • An old load balancer still responding
  •        
  • 2 IPs with misconfigured rDNS pointing to dept names instead of functions
  •    
       

3. Security Investigations

       

When investigating brute force attacks:

   
           
  1. Run the offender's IP through rDNS
  2.        
  3. Check if the naming matches the owner (from WHOIS)
  4.        
  5. Look for patterns across multiple attacks
  6.    
       
        Pro Tip: Attackers often neglect rDNS. Well-configured names suggest more sophisticated operators.    
       

How Our Free Tool Works

       

Unlike some "free" tools that limit you to 5 lookups/day:

   
           
  • Single IP lookups: Instant results with TTL info
  •        
  • /24 subnet scans: Returns all responsive PTR records
  •        
  • Bulk processing: Paste in multiple IPs at once
  •        
  • No registration: Just use it
  •    
       
        Enter: 203.0.113.0/24
        Returns:
        203.0.113.1 → router.nyc.location.net
        203.0.113.45 → web-server-03.prod.net
        203.0.113.78 → (no PTR record)
        ...and all other live records    
       

Common rDNS Problems (And Fixes)

                                                                                                                                                                                                                                                                               
ProblemHow to SpotHow to Fix
Missing PTR"No reverse DNS" resultContact your ISP or hosting provider
MismatchrDNS name doesn't resolve back to IPUpdate either forward or reverse record
Generic namesContains "dynamic", "pool", or "customer"Request descriptive names from provider
Slow lookupsTimeout errors during scansSpace out queries or use our bulk tool
       

Try It Right Now

       

Test with these common IPs to see how rDNS works:

   
           
  • 8.8.8.8 (Google DNS)
  •        
  • 1.1.1.1 (Cloudflare)
  •        
  • Your own public IP
  •    
        Scan a /24 Subnet Free        

Found something weird in your rDNS? Hit reply and I'll help interpret it. No sales crap - just straight answers.