DNS Fingerprint

NS/SOA Hostname Recognition

Quickly identify which DNS hosting provider manages a domain's nameservers. Enter any nameserver hostname or SOA record and this table matches it against 50+ known DNS providers including Cloudflare, AWS Route 53, Google Cloud DNS, Azure DNS, GoDaddy, Namecheap, and Akamai. Essential for DNS reconnaissance, migration planning, and understanding a domain's infrastructure at a glance.

Fingerprint (NS/SOA) Provider Notes / Examples
Tip: Match the suffix from dig NS domain or dig SOA domain to identify the DNS provider.

Frequently Asked Questions

What is DNS fingerprinting?

DNS fingerprinting is the process of identifying which DNS hosting provider manages a domain by examining its nameserver (NS) and SOA (Start of Authority) records. Each provider uses distinctive hostname patterns — for example, nameservers ending in .awsdns- indicate AWS Route 53, while .ns.cloudflare.com indicates Cloudflare. This technique is commonly used in security reconnaissance, infrastructure auditing, and migration planning.

How do I find a domain's nameservers?

You can query a domain's nameservers using the command dig NS example.com on Linux/macOS or nslookup -type=NS example.com on Windows. The response will show hostnames like ns1.example.com — paste that hostname into the search box above to identify the DNS provider. You can also use our Domain Inspector tool to retrieve NS records automatically.

What is the difference between NS and SOA records?

NS (Name Server) records define which servers are authoritative for a domain — they handle DNS queries. SOA (Start of Authority) records contain administrative information about the DNS zone, including the primary nameserver, the responsible party's email, serial number, and timing parameters for zone transfers. Both record types can reveal the DNS provider, but NS records are the primary indicator used for fingerprinting.