Reverse DNS (PTR) lookup: confirm the hostname behind any IP
Reverse DNS is the mirror image of a normal DNS query. A normal forward lookup turns `mail.example.com` into the IP `85.118.219.232`. A reverse lookup goes the other way: you hand DNS the IP, and it returns a PTR record with the hostname.
This sounds academic until you run a mail server. Gmail, Outlook and Yahoo all check the PTR of every IP that tries to deliver SMTP traffic to them. No PTR, or a PTR that does not match the forward record, equals silent rejection or a one-way trip to the spam folder.
This tool queries the PTR through Node's `dns/promises` (the same resolver `dig` uses, no DoH proxy in between) and then verifies FCrDNS by resolving the PTR target's A and AAAA records back. You get a green check when both directions agree, a red flag when they do not, and a step-by-step fix when something is broken.
How to use it
- Enter an IP: plain IPv4 (`8.8.8.8`) or IPv6 (`2606:4700:4700::1111`). No port, no CIDR prefix.
- Click Check. The result usually arrives in under a second, sometimes 2 to 3 seconds for IPv6 addresses with slow upstream resolvers.
- Read the PTR record at the top: this is the hostname the IP claims to be (e.g. `dns.google` for `8.8.8.8`).
- Below that, see the forward A and AAAA records of that hostname. This is the round-trip check.
- FCrDNS badge: green Pass means the round-trip matches, red Fail means PTR exists but forward records do not point back to your IP.
- If FCrDNS fails, read the Suggested action: it tells you exactly what to ask your hosting provider to fix.
- No PTR at all? Common for residential ISPs and small VPS plans. The action box explains how to request one.
When this is useful
Seven typical situations where a reverse DNS check saves your sanity:
- Setting up a new mail server before you flip the DNS for production. Verify PTR matches before sending the first message, otherwise Gmail will route everything to spam from day one.
- Debugging deliverability: clients complain your emails do not arrive. You check the IP your MTA uses for outbound SMTP, you discover the PTR points to the generic hosting hostname (`ec2-54-203-xxx.compute.amazonaws.com`) instead of `mail.your-domain.com`. The fix is one ticket.
- Auditing a third-party SMTP relay: you pay SendGrid / Mailgun / Postmark to send for you. You spot-check the sending IP. PTR matches their public mail domain, all good.
- Investigating an abuse complaint: a log line says "abuse from 185.220.101.7". You PTR it. The hostname says TOR exit node in plain English, so you know what you are dealing with.
- Verifying an SSL certificate's host: some self-signed certs encode the server IP only. PTR confirms which hostname is the canonical owner.
- Network forensics on inbound traffic: a request hits your server from an unknown IP. PTR shows `crawl-66-249-66-1.googlebot.com`. Now you know it is real Googlebot and not someone spoofing the user agent.
- Confirming residential vs datacenter: a TLS handshake from a "browser" comes from an IP with PTR `example.linode.com`. That is not a browser, it is a script on a VPS.
Related: DNS lookup, What's my IP, IP info / ASN lookup, email DNS checker.