Your brand is likely already being impersonated somewhere online.
In the demo we show you:
How many active threats target your brand right now
How quickly Astra detects them
How fast they can be removed with instant approval
DNS monitoring is the practice of continuously tracking Domain Name System records and changes to detect potential brand threats — including new domain registrations that impersonate a brand, DNS record changes that signal malicious activity, and infrastructure patterns associated with phishing and counterfeit operations.
The Domain Name System (DNS) translates human-readable domain names (like example.com) into IP addresses that computers use to communicate. Every domain name has a set of DNS records that define how it operates — where it's hosted, where its email goes, and what services are associated with it.
For brand protection, DNS data is one of the earliest signals that a threat is emerging. A new domain registration that resembles your brand, a DNS change pointing a previously parked domain to a web server, or an MX record being added to enable phishing emails — these are all detectable through DNS monitoring before the attack reaches your customers.
| Record Type | What It Contains | Brand Protection Relevance |
|---|---|---|
| A / AAAA | IPv4 / IPv6 address of the domain | Reveals hosting location; shared IPs can link related threat domains |
| MX | Mail server configuration | Indicates the domain can send/receive email (phishing risk) |
| NS | Authoritative nameservers | Identifies DNS provider; certain providers are associated with abuse |
| TXT | Arbitrary text (often SPF, DKIM, DMARC) | Presence of email authentication records signals intent to send email |
| CNAME | Alias to another domain | Can reveal domain infrastructure chains |
| SOA | Start of Authority metadata | Contains serial numbers and refresh intervals useful for change tracking |
ICANN's Centralized Zone Data Service (CZDS) provides access to zone files for most generic top-level domains (gTLDs). A zone file is a complete list of all registered domains within a TLD. By comparing daily zone file snapshots, monitoring systems can identify newly registered domains that resemble a protected brand.
CZDS access is available to qualifying organizations through an application process. Coverage includes over 1,200 gTLDs but does not include country-code TLDs (ccTLDs) like .uk, .de, or .fr, which are managed by their respective registries.
Certificate Transparency (CT) is a public logging system for SSL/TLS certificates, required by major browsers since 2018. When a domain obtains an SSL certificate, the issuance is recorded in publicly accessible CT logs.
Monitoring CT logs provides near-real-time visibility into domains that are preparing to serve HTTPS content — which increasingly includes phishing sites. Services like crt.sh (operated by Sectigo) provide free search access to CT log data.
Passive DNS systems collect DNS resolution data by observing actual DNS traffic at recursive resolvers or network sensors. Unlike active scanning (which queries DNS servers directly), passive DNS records what domains are being resolved in real-world traffic.
Major passive DNS databases include Farsight DNSDB (containing over 100 billion DNS observations as of 2024), which is widely used in threat intelligence. Passive DNS is particularly valuable for:
DNS monitoring is effective because threat domains follow a predictable lifecycle with detectable signals at each stage:
The goal of DNS monitoring is to detect threats at stages 1-3, before they reach stage 4 and cause harm to customers.
Beyond individual domain monitoring, DNS data reveals infrastructure patterns that indicate organized abuse:
DNS monitoring is a foundational layer but is not sufficient on its own for comprehensive brand protection:
Effective brand protection combines DNS monitoring with web content analysis, image recognition, and threat intelligence enrichment to minimize both false positives and missed threats.
In the demo we show you:
How many active threats target your brand right now
How quickly Astra detects them
How fast they can be removed with instant approval
Cookies on Astra
We use a small set of cookies to run this site and understand how it's used. Essentials are always on. Privacy details.