DNS
Contents
    Loading
Support DNS DNS

DNS

Does DNSPod support wildcard for third-level domains?

Yes. Different plans support different number of domain levels. For more information, please see Wildcard Description.

Does DNSPod provide domain name registration or hosting services?

Yes.

How does DNSPod tell different search engines from one another?

DNSPod has an library of search engine spider IPs.

Does DNSPod support domain 301 redirect?

Yes. DNSPod's URL is 301 redirect.

Can I make a website inaccessible to specified regions?

This can be achieved by configuring more than one split zone.

What are the common ways of DNS hijacking? How should webmasters and netizens respond?

There are two service roles in DNS: recursive DNS and authoritative DNS. Authoritative DNS controls website resolution, while recursive DNS only acts as a cache. Therefore, what matters to webmasters is authoritative DNS, i.e., the DNS address entered in the domain registrar, while the netizens use recursive DNS.
There are two types of DNS hijacking:

  • Hijacking of authoritative DNS
    There are two forms of this kind of attacks. The first is to control the account at the domain registrar. For example, a few years ago, a hacker attacked a company's account at the domain registrar and modified the NS record of xx.com, which was like changing the authoritative DNS. That was control of the content at the source, so all recursive DNS servers were contaminated and all netizens were redirected to the wrong page. At that point, if we checked with tools such as dig or nslookup, we would have found that all the content of the DNS server was incorrect. To resolve that issue, we need to not only change the NS record back to our own authoritative DNS server, but also wait for all recursive DNS servers' caches to expire and the data to be refreshed before we can access the correct website. The second is to invade the authoritative server to fully control it, which is more difficult to do.
  • Hijacking of recursive DNS
    If the DNS uses unreliable UDP packets for communication, an attacker may have the opportunity to impersonate an authoritative DNS server and use fake data to deceive the recursive DNS. Attacks against the recursive DNS are usually regional. For example, if a hacker attacks one or several recursive DNS servers, only access using those servers is affected. In this case, using dig or nslookup for testing will reveal that some recursive DNS servers are incorrect but some work properly.

For ordinary netizens, it is recommended to use a more secure recursive DNS server, such as the public DNS 119.29.29.29 of DNSPod. Usually, it is less likely that a public DNS will be hijacked, so if the result returned by 119.29.29.29 is correct, the authoritative DNS service is normal. For most webmasters, it is recommended to keep the account registered at the domain registrar secure and use an authoritative DNS service provider with strong technical expertise.

What if I am prompted that "The DNS of your domain is not modified"?

This is generally caused by the following reasons:

  • Your newly registered domain has not been synced to the system. Please wait patiently.
  • The DNS of your domain is not the DNS server address of DNSPod. You need to change it to the DNSPod server address. For more information, please see [Modifying DNS Server](Modifying DNS Server).
  • Your domain has been deactivated by the registrar. Please contact the domain registrar for assistance.
  • DNS server changes will take effect globally in 0–72 hours. Please wait patiently.

Which well-known websites use DNSPod's DNS service?

Below is a list:

Note:
Only certain websites are listed below in no particular order.

Industry Brand
Traditional enterprises Huawei Lenovo Changhong Jiannanchun Hyundai Motors
Gaming 4399 37wan Duowan 7k7k Game China
Ecommerce Meituan 55tuan Jumei Beingmate
Entertainment VeryCD HUPU Meitu
Internet/IT 58.com Zhihu Kingdee Youshang 36Kr onlinedown.net
Finance China UnionPay AVIC Trust YeePay Capital Securities
Mobile phone OPPO Mi Meizu iMobile
Pharmaceutical Chongqing Union Hospital www.99.com.cn DXY.cn Boohee
Education 566.com Mars Era GaoFen.com University of Electronic Science and Technology of China
Travel LY.com tuniu.com pintour.com
Literature www.zhulang.com www.xxsy.net www.hongxiu.com www.jjwxc.net

What technologies does paid DNSPod services rely on to achieve website access acceleration? What about CDN cache acceleration?

DNSPod specializes in accurate intelligent DNS and offers IP libraries for various split zones. When recursively fetching an address, the server will determine the recursive split zone and return the IP of the corresponding record. CDN is based on intelligent DNS.

What are the differences between general DNS and intelligent DNS?

  • General DNS
    General DNS is only responsible for resolving the IP record for the user, but not for determining where the user is coming from. This will cause all users to be resolved to a fixed IP address.

  • Intelligent DNS
    Intelligent DNS determines the user's origin and then returns the optimal IP to the user after intelligent processing.

DNSPod's intelligent DNS automatically determines whether the user's internet connection is from China Netcom or China Telecom, and then intelligently returns the IP of the corresponding server.

What are the DNS addresses in the plans offered by DNSPod?

The DNS server addresses and number of DNS servers vary by plan as shown below:

New Plan DNS Addresses Number of Servers Original Plan DNS Addresses
Free f1g1ns1.dnspod.net ; f1g1ns2.dnspod.net Over 10 Individual Plus Plan ns1.dnsv2.com ; ns2.dnsv2.com
Individual Professional ns3.dnsv2.com ; ns4.dnsv2.com Over 12 Enterprise Plan I ns1.dnsv3.com ; ns2.dnsv3.com
Enterprise Startup ns3.dnsv3.com ; ns4.dnsv3.com Over 14 Enterprise Plan II ns1.dnsv4.com ; ns2.dnsv4.com
Enterprise Standard ns3.dnsv4.com ; ns4.dnsv4.com Over 16 Enterprise Plan III ns1.dnsv5.com ; ns2.dnsv5.com
Enterprise Ultimate ns3.dnsv5.com ; ns4.dnsv5.com Over 18

Do I need to add "." to my DNSPod DNS domain?

No. You don't need to add "." when modifying your DNS at the registrar.

Last updated on 2021-01-28 08:28