Find cheap domain names for your website - namesilo.com
Namesilo Blog
Blog
DNS11 min

Reverse DNS (PTR) for Custom Mail Servers: Deliverability Done Right

NS
NameSilo Staff

10/2/2025
Share
Running your own mail server gives you complete control over your email infrastructure, but with that control comes responsibility. One of the most critical yet frequently overlooked aspects of email deliverability is reverse DNS. Get it wrong, and your legitimate emails might never reach the inbox. Get it right, and you've cleared one of the most important hurdles in email reputation.

Understanding Reverse DNS

Most people are familiar with regular DNS lookups. You type a domain name, and DNS returns an IP address. Reverse DNS works in the opposite direction. Given an IP address, it returns the associated hostname through a PTR (pointer) record.
For email, reverse DNS serves as a fundamental identity check. When your mail server connects to a recipient's server to deliver email, one of the first things the receiving server does is look up the IP address your mail server is connecting from. It checks whether that IP address has a PTR record and whether that PTR record makes sense in the context of the email being sent.
This verification happens before the receiving server even looks at the email content. It's a basic sanity check: Does this mail server's IP address have a properly configured reverse DNS entry? If not, many receiving servers will reject the connection immediately or severely penalize the sender's reputation score.

Why PTR Records Matter for Deliverability

Email providers use multiple signals to determine whether incoming messages are legitimate or spam. Reverse DNS is one of the oldest and most universally checked signals. Its importance comes from several factors:
Universal checking. Nearly every major email provider checks reverse DNS. Google, Microsoft, Yahoo, and smaller providers all consider it a basic requirement. Missing or misconfigured reverse DNS affects deliverability across the board.
Early filtering. PTR checks happen during the initial SMTP connection, before the receiving server invests resources in processing the message. Failed reverse DNS checks often result in immediate rejection, saving the receiving server from analyzing obvious spam sources.
Reputation indicator. Legitimate mail servers almost always have proper reverse DNS. Spammers and compromised systems often don't. The presence of correct reverse DNS separates professional mail operations from amateur or malicious ones.
Protocol expectations. Email RFCs (Request for Comments) have long recommended reverse DNS for mail servers. Following these standards signals that your mail operation is professionally managed.
Correlation with forward DNS. The relationship between your mail server's IP address, its PTR record, and your domain's MX records creates a web of verification. Consistency across these records builds trust.
Missing or incorrect reverse DNS doesn't necessarily mean your email will always be rejected, but it significantly increases the chances. Major providers might accept the email but route it to spam folders. Smaller organizations might reject it outright. Why take that risk when the fix is straightforward?

How Reverse DNS Verification Works

The verification process follows a predictable pattern. Understanding this helps you configure your mail server correctly.
When your mail server at IP address 203.0.113.50 connects to deliver email, the receiving server performs these checks:
Reverse DNS lookup. The receiving server queries DNS for the PTR record associated with 203.0.113.50. Ideally, this returns something like mail.yourdomain.com.
Forward confirmation. The receiving server then does a forward DNS lookup for mail.yourdomain.com to verify it resolves back to 203.0.113.50. This forward-confirmed reverse DNS (FCrDNS) provides stronger validation than reverse DNS alone.
HELO/EHLO verification. When your mail server initially connects, it identifies itself with a HELO or EHLO command, stating its hostname. The receiving server checks whether this hostname matches the PTR record.
MX record correlation. The receiving server may also check whether the PTR hostname appears in the MX records for your domain, creating another layer of consistency verification.
This multi-layered checking process explains why proper reverse DNS requires coordination across several configuration points: your IP address PTR record, your domain's A records, your HELO hostname, and your MX records.

Who Controls PTR Records

Here's where reverse DNS gets tricky for some organizations. Unlike regular DNS records, which you control through your domain registration and DNS hosting, PTR records are controlled by whoever owns the IP address block.
If you're using a dedicated server from a hosting provider, that provider typically controls the reverse DNS zone for their IP addresses. You'll need to request that they set up the PTR record for your mail server's IP address. Most hosting providers have a process for this, often through a control panel or support ticket.
If you're using a VPS or cloud server, you might have a self-service interface for setting reverse DNS. Providers like AWS, Google Cloud, and DigitalOcean allow customers to configure their own PTR records through the provider's console.
For organizations with their own IP address allocations (typically /24 or larger), you have direct control over the reverse DNS zone and can configure PTR records yourself through your Regional Internet Registry.
Regardless of who has control, the key point is that PTR record configuration happens outside your normal DNS management interface. You can't set PTR records in the same place you set your domain's A records or MX records.

Setting Up Reverse DNS Correctly

Proper configuration requires coordinating several pieces. Let's work through a complete example.
Suppose you're setting up a mail server for example.com with these details:
  • Mail server IP: 203.0.113.50
  • Mail server hostname: mail.example.com
  • Domain MX record points to: mail.example.com
Your configuration checklist should include:
Request PTR record setup. Contact your hosting provider or use their interface to set the PTR record for 203.0.113.50 to point to mail.example.com. The exact syntax varies by provider, but you're essentially saying "when someone looks up 203.0.113.50 in reverse, return mail.example.com".
Verify A record exists. Ensure mail.example.com has an A record pointing to 203.0.113.50 in your regular DNS zone. This establishes the forward DNS that confirms the reverse lookup.
Configure HELO hostname. Set your mail server software to identify itself as mail.example.com in SMTP HELO/EHLO commands. In Postfix, this is the myhostname parameter. In Exim, it's primary_hostname. Other mail server software has equivalent settings.
Set MX records. Your domain's MX records should point to mail.example.com. This isn't strictly required for PTR validation, but it creates consistency across your mail infrastructure.
Test the configuration. Use command-line tools or online services to verify everything resolves correctly.
The goal is creating a consistent identity story: your mail server says it's mail.example.com, that hostname resolves to 203.0.113.50, and that IP address's PTR record confirms it's mail.example.com.

Common Configuration Mistakes

Several patterns lead to reverse DNS problems:
Mismatched hostnames. Your PTR record says mail.example.com, but your mail server identifies itself as server.hostingprovider.com in HELO. This inconsistency raises red flags.
Generic PTR records. Some hosting providers set default PTR records like vps12345.provider.com. If you don't change this to your actual mail server hostname, verification fails.
Missing forward DNS. Your PTR record points to mail.example.com, but that hostname doesn't exist in DNS or points to a different IP address. Forward-confirmed reverse DNS fails.
Wrong hostname in PTR. Setting the PTR record to your domain's apex (example.com) instead of your mail server's specific hostname (mail.example.com). While this might seem logical, it creates problems if your web server and mail server use different IPs.
Multiple IPs without corresponding PTRs. If your mail server can send from multiple IP addresses (common with larger operations), each IP needs its own correct PTR record.
Forgetting to update after migrations. You move to a new server with a new IP address but forget to set up reverse DNS for the new IP. Your old IP's PTR record becomes irrelevant.

Testing Your Configuration

After setting up reverse DNS, thorough testing prevents deliverability surprises. Several approaches help verify your configuration:
Command-line tools. On Linux or Mac, host or dig can check both forward and reverse DNS:
dig -x 203.0.113.50
dig mail.example.com
The first command should return mail.example.com, and the second should return 203.0.113.50.
Online verification tools. Multiple websites offer reverse DNS checking. These tools often check not just the PTR record but also forward confirmation and overall consistency.
Test email delivery. Send test messages to addresses at Gmail, Outlook, Yahoo, and other major providers. Check whether messages reach the inbox and examine headers for any reverse DNS warnings.
SMTP session testing. Tools like telnet or specialized SMTP testing services let you simulate the connection your mail server makes and see how receiving servers respond to your reverse DNS setup.
Mail server logs. Your own mail server logs can reveal issues. Look for entries where remote servers reject connections or note reverse DNS problems.
Pay particular attention to forward-confirmed reverse DNS. Simple reverse DNS checks might pass, but FCrDNS provides stronger validation that many providers require.

Reverse DNS and Authentication Protocols

Reverse DNS doesn't operate in isolation. It works alongside other email authentication mechanisms to build a complete picture of sender legitimacy.
SPF records. SPF (Sender Policy Framework) authorizes specific IP addresses to send email for your domain. Proper reverse DNS on those IP addresses reinforces that authorization. When a receiving server sees that an IP is both SPF-authorized and has matching reverse DNS, it increases confidence in the sender.
DKIM signatures. DKIM (DomainKeys Identified Mail) cryptographically signs your messages. While DKIM doesn't directly interact with reverse DNS, having both properly configured creates multiple independent verification methods. If an attacker somehow spoofs your DKIM signature, reverse DNS provides an additional check.
DMARC policies. DMARC (Domain-based Message Authentication, Reporting and Conformance) builds on SPF and DKIM. A domain with proper reverse DNS, passing SPF, valid DKIM, and published DMARC policy demonstrates serious attention to email authentication. Receiving servers notice this comprehensive approach.
Reputation systems. Email reputation services consider multiple factors. They note whether an IP address has proper reverse DNS as part of their scoring. An IP sending email with correct reverse DNS, passing SPF, and valid DKIM signatures builds positive reputation faster than one with any of these elements missing.
Think of reverse DNS as the foundation of email authentication. SPF, DKIM, and DMARC build on this foundation, but without proper reverse DNS, the entire structure is weaker. Implementing these email security measures together provides comprehensive protection and optimal deliverability.

Multiple Mail Servers and IP Addresses

Organizations with higher email volumes often run multiple mail servers or use multiple IP addresses for sending. Each IP address needs its own correct reverse DNS configuration.
The approach is straightforward: each IP gets a unique PTR record pointing to a unique hostname. For example:
  • 203.0.113.50 → mail1.example.com
  • 203.0.113.51 → mail2.example.com
  • 203.0.113.52 → mail3.example.com
Each hostname then needs an A record pointing back to its respective IP address. Your SPF record should authorize all three IPs, and each mail server should identify itself with its correct hostname in HELO.
Some organizations use a single hostname with multiple A records (round-robin DNS), but for mail servers, distinct hostnames per IP address provides clearer identity verification and easier troubleshooting.

Shared Hosting Considerations

Organizations using shared hosting face unique challenges with reverse DNS. Multiple customers share the same IP address, so the hosting provider typically sets one PTR record for that IP, often pointing to a generic hostname under the provider's domain.
This creates a fundamental mismatch. Your mail identifies itself as mail.yourdomain.com, but the PTR record says something like mail.hostingprovider.com. Many receiving servers are lenient about this scenario, recognizing that shared hosting is common, but it still impacts deliverability negatively.
If email is important to your business and you're on shared hosting, consider these options:
Upgrade to a dedicated IP. Many hosting providers offer dedicated IP addresses as an add-on. With your own IP, you can request proper reverse DNS configuration.
Use a dedicated email service. Services specifically designed for email handling have proper reverse DNS configured and maintained.
Implement SPF, DKIM, and DMARC. While these don't fix reverse DNS issues, they provide alternative authentication that can partially compensate for shared hosting limitations.
Contact your hosting provider. Some providers will set PTR records to customer domains even on shared IPs if requested, though policies vary.
The reality is that serious email operations need proper reverse DNS, which typically requires a dedicated IP address. Factor this into your hosting decisions if email deliverability matters to your organization.

Troubleshooting Deliverability Issues

When emails aren't reaching their destination, reverse DNS is one of the first things to check. Here's a systematic troubleshooting approach:
Verify PTR record exists. Use reverse DNS lookup tools to confirm the IP address has a PTR record at all. Missing PTR records cause obvious problems.
Check forward confirmation. Ensure the hostname in your PTR record resolves forward to your IP address. This bidirectional confirmation is critical.
Examine HELO hostname. Look at your mail server logs to see what hostname it's sending in HELO commands. This must match your PTR record.
Review email headers. Headers from test messages often contain clues about authentication failures. Look for lines mentioning reverse DNS or FCrDNS.
Test from your IP. Online tools that test mail server configuration from your IP address can identify specific issues with your setup.
Check blacklists. Sometimes deliverability issues stem from IP reputation problems rather than configuration. Verify your IP isn't on major blacklists.
Compare with working servers. If you have another mail server that delivers successfully, compare its reverse DNS configuration to identify differences.
Many deliverability issues come down to simple inconsistencies. Your mail server identifies itself as one hostname, but reverse DNS returns another, or forward DNS doesn't match. Finding and fixing these mismatches resolves the majority of problems.

Maintaining Reverse DNS Over Time

Reverse DNS isn't a set-and-forget configuration. Several scenarios require updates:
Server migrations. Moving to a new server with a new IP address means requesting new PTR records. Plan this as part of your migration checklist.
IP address changes. If your hosting provider changes your IP address, update both your forward DNS and reverse DNS to match.
Mail server hostname changes. If you rename your mail server, update PTR records accordingly.
Infrastructure expansions. Adding additional mail servers or IP addresses requires configuring reverse DNS for each new IP.
Provider changes. Switching hosting providers often means new IP addresses and new reverse DNS configurations.
Document your reverse DNS configuration as part of your mail server documentation. Note which IP addresses have PTR records, what they point to, and how to request changes from your hosting provider. This documentation becomes invaluable during migrations or when troubleshooting deliverability issues.

The Bigger Picture

Reverse DNS represents one component of professional mail server operation. By itself, it won't guarantee inbox placement, but its absence will almost certainly hurt deliverability. Combined with proper authentication protocols, good sending practices, and careful reputation management, correct reverse DNS contributes to a robust email infrastructure.
Email deliverability is increasingly complex, with receiving servers using sophisticated algorithms to evaluate sender reputation. Every positive signal matters. Proper reverse DNS is one of the easiest positive signals to provide. It requires coordination with your hosting provider and careful configuration, but the investment pays off in improved deliverability.
For organizations running their own mail servers, treating reverse DNS as a core requirement rather than an optional nicety reflects the reality of modern email. Receiving servers expect it, reputation systems consider it, and your legitimate emails deserve every advantage in reaching their intended recipients. Taking the time to configure reverse DNS properly demonstrates commitment to running a professional, trustworthy mail operation.
ns
NameSilo StaffThe NameSilo staff of writers worked together on this post. It was a combination of efforts from our passionate writers that produce content to educate and provide insights for all our readers.
More articleswritten by NameSilo
Jump to
Smiling person asking you to sign up for newsletter
Namesilo Blog
Crafted with Care by Professionals

Millions of customers rely on our domains and web hosting to get their ideas online. We know what we do and like to share them with you.

This newsletter may contain advertising, deals, or affiliate links. Subscribing to a newsletter indicates your consent to our Terms of Use and Privacy Policy. You may unsubscribe from the newsletters at any time.