
DNS monitoring is usually framed as a reliability concern — catch the misconfigured record before it breaks your site. But DNS is also one of the most valuable security signals you have. Attackers who compromise a domain or hijack traffic almost always leave a DNS fingerprint. Monitoring DNS changes gives you a detection layer that sits upstream of your application stack.
DNS changes that aren't planned by your team are rarely benign. The DNS layer is involved in:
Most of these attacks have observable DNS characteristics. Monitoring for them is the first line of detection.
A nameserver (NS record) change means control of your entire DNS zone has potentially shifted. If your nameservers change without your authorisation, an attacker may control where all traffic for your domain goes.
What to watch:
Nameserver change monitoring should alert immediately — within minutes — on any NS record modification. This is not an alert that can wait for a daily digest.
Your MX records control where email for your domain is delivered. An attacker who changes your MX records can redirect all inbound email — including password reset messages, authentication codes, and sensitive communications — to their own mail server.
What to watch:
See how to monitor MX, SPF, DKIM, and DMARC for monitoring your full email authentication stack.
CNAME records that point to external services are subdomain takeover risks when those services are decommissioned but the DNS record remains. Monitoring for CNAME changes helps in two ways:
See what is a subdomain takeover for the full attack pattern.
An A record change shifts where your domain resolves to at the IP level. Legitimate causes include server migrations, CDN changes, and infrastructure updates. Illegitimate causes include:
What to watch:
TXT records carry SPF, DKIM, and DMARC policies. An attacker who can modify TXT records can:
Baseline: Record your current DNS state for all zones. Any deviation from baseline is worth investigating.
Alert on: All record type changes — NS, MX, A, AAAA, CNAME, TXT. Alert immediately for NS changes; alert within minutes for all others.
Review cadence: Beyond automated alerts, conduct a manual DNS audit quarterly. See how to audit your DNS records for security issues.
Complement with DNSSEC: DNSSEC adds cryptographic verification that DNS responses haven't been tampered with in transit.
Domain Monitor monitors all DNS record types and alerts immediately on any change. Create a free account.
A subdomain takeover lets an attacker claim your subdomain by exploiting dangling DNS records. Learn how it happens, real-world examples, and how DNS monitoring detects it.
Read moreMean time to detect (MTTD) measures how long it takes to discover an incident after it starts. Reducing MTTD is one of the highest-leverage improvements in reliability engineering.
Read moreBlack box monitoring tests your systems from the outside, the way users experience them — without access to internal code or infrastructure. Learn how it works and when to use it.
Read moreLooking to monitor your website and domains? Join our platform and start today.