Skip to main content
DNS Checker(beta)

Reverse IP Domain Check

Find all websites hosted on a single IP address — powered by weekly DNS scans across 1,100+ TLD zones.

1 credit

One IP, many domains. Reverse IP lookup shows you who else is sharing the server.

What Is a Reverse IP Domain Check?

A reverse IP domain check maps a single IP address to every domain currently pointing at it. Where a standard forward DNS lookup answers "what IP does this domain resolve to?", a reverse IP check answers the inverse: "what domains resolve to this IP?" The result is built from a passive DNS dataset — a reverse index derived from scanning millions of authoritative DNS records.

This technique is foundational in security research, penetration testing, and OSINT workflows. An IP flagged for abuse — check if an IP is blacklisted — may host dozens of co-resident malicious domains. A competitor's infrastructure may share a server with sites that reveal hosting patterns or affiliate relationships. A single CDN IP may surface thousands of distinct organizations sharing the same edge node.

DNS Checker indexes A records observed across 1,100+ TLD zones — every major gTLD plus several open ccTLDs — approximately 258 million apex domains and 700 million+ DNS observations, refreshed on a weekly scan cycle.

Reverse IP Domain Check vs Reverse IP Lookup vs Reverse DNS Lookup

These three terms are often used interchangeably, but they refer to technically distinct operations. Understanding the difference helps set expectations when using this tool.

Reverse IP Domain Check

Returns all domains pointing to an IP, sourced from a passive DNS scan dataset. This is what this tool does.

Reverse DNS Lookup

Queries the in-addr.arpa PTR record for an IP address. Returns a single canonical hostname assigned by the IP owner — typically one record per IP.

Reverse IP Lookup

Ambiguous — in casual usage this means the same as reverse IP domain check. Technically it can refer to PTR queries. This tool serves the dominant interpretation.

PTR records are set by the IP owner (typically an ISP or hosting provider) and reflect a single administrative hostname — like ec2-54-235-89-97.compute-1.amazonaws.com. That PTR name has no relationship to the hundreds of customer domains that may resolve to the same IP via A records. A reverse IP domain check reads those A records directly.

How DNS Checker's Reverse IP Domain Check Works

The dataset is built by a distributed DNS scanner that processes TLD zone files for 1,100+ TLDs — every major gTLD plus several open ccTLDs. Zone files enumerate every registered domain within a TLD. For each domain, A record lookups are performed and the results — hostname, resolved IP, record type, and observation timestamp — are stored in a multi-hundred-million-row dataset.

A reverse index maps each observed IP to the set of hostnames whose last A record pointed to it. The "currently mapped" filter shown in results means the last observation fell within the past 7 days, matching the weekly scan cadence. Domains that have moved off an IP since the last scan will not appear in results.

When a domain name is entered instead of a raw IP, DNS Checker first resolves the domain to its current A record, then performs the reverse lookup against that IP. The resolved IP is shown in the results header so it is clear which address was queried.

Common Use Cases for Reverse IP Domain Check

Reverse IP lookups appear in a wide range of security and investigative workflows. Some of the most common applications:

  • Penetration testing reconnaissanceExpand the attack surface by discovering all domains co-hosted with a primary target. Shared hosting environments may expose other applications running on the same server.
  • Blue-team triageWhen an IP is flagged in a SIEM alert or threat feed, a reverse IP check quickly surfaces other domains associated with the same infrastructure — useful for scoping an incident.
  • Brand protectionMonitor IPs historically associated with your organization or identify typosquatting campaigns hosted on the same server cluster as known phishing infrastructure.
  • Fraud investigationFraud rings often share hosting infrastructure. Tracing co-resident domains on an IP linked to one fraudulent site frequently reveals related operations.
  • ASN and hosting provider correlationThe IP context card surfaces the ASN and hosting provider for the queried address, enabling analysis of which providers host the most domains within a category.

Limits and Edge Cases

CDN IPs — IP addresses belonging to large content delivery networks (Cloudflare, Akamai, Fastly, AWS CloudFront) may host millions of unrelated domains. A reverse IP check on a CDN IP returns a list that is useful for ASN correlation but not for identifying organizational relationships. DNS Checker shows a CDN warning banner in this case. For CDN IPs with over 10,000 co-resident domains, in-browser display is capped and a bulk export option is offered.

Virtual hosting — Many web servers use name-based virtual hosting, meaning the same IP address serves multiple distinct websites based on the HTTP Host header. A reverse IP check identifies which domains share the IP, but does not confirm that all those domains share the same web server process or application. To discover what services are actually running, scan the IP for open ports.

IPv6 — The current dataset indexes IPv4 A records only. AAAA record coverage is planned but not yet available. IPv6 addresses entered into the tool will return an unsupported error.

Freshness — Results reflect the most recent weekly scan. Domains that changed IP since the last scan will appear under the old IP until the next scan cycle completes. For real-time resolution, use the DNS Inspector to query live authoritative records.

Need this in code?

Every check this tool runs is also available via the reverse IP API with examples in cURL, JavaScript, Python, PHP, Ruby, and Java.

API docs

Built and maintained alongside this tool. Free, no signup required.

Frequently Asked Questions