DNS A Record IP Address Changed

DNS A record changes redirect your traffic to a different server. This is expected during hosting migrations, but an unexpected change could mean your domain has been compromised or your hosting provider changed infrastructure without notice. Monitor A record changes to catch problems before users experience downtime or are redirected to malicious servers.

Start here

Before You Fix It: What This Check Means

A-record changes directly alter destination infrastructure for the host being monitored. In plain terms, this confirms whether your domain routing changed and needs a security/operations check. Scavo resolves current A records and compares them with the previous stored baseline.

Why this matters in practice: operational drift here often causes hard-to-debug regressions across environments.

How to use this result: treat this as directional evidence, not final truth. Registry and DNS states can change outside release cycles and may propagate asynchronously. First, confirm the issue in live output: confirm authoritative registrar or DNS provider records directly Then ship one controlled change: Compare authoritative DNS output with infrastructure source-of-truth. Finally, re-scan the same URL to confirm the result improves.

TL;DR: Your domain now points to a different IP address than expected, which may indicate a hosting change or compromise.

DNS A record changes redirect your traffic to a different server. This is expected during hosting migrations, but an unexpected change could mean your domain has been compromised or your hosting provider changed infrastructure without notice. Monitor A record changes to catch problems before users experience downtime or are redirected to malicious servers.

What Scavo checks (plain English)

Scavo resolves current A records and compares them with the previous stored baseline.

Current logic:

  • Warning: domain cannot be derived from scanned URL
  • Warning: no A records retrieved
  • Info: first successful run stores baseline
  • Warning: A-record set changed from prior baseline
  • Pass: A-record set unchanged

How Scavo scores this check

Scavo assigns one result state for this check on the tested page:

  • Pass: baseline signals for this check were found.
  • Warning: partial coverage or risk signals were found and should be reviewed.
  • Fail: required signals were missing or risky behavior was confirmed.
  • Info: Scavo could not gather enough reliable evidence on this run to score pass/fail confidently.

In your scan report, this appears under What failed / What needs attention / What is working for dns_a_record_change, followed by Recommended next steps and Technical evidence (for developers) when needed.

  • Scan key: dns_a_record_change
  • Category: TECHNICAL

Why fixing this matters

Unplanned A-record changes can reroute traffic, break uptime, or indicate unauthorized DNS edits.

Even planned changes deserve monitoring because propagation and misconfiguration issues are common during cutovers.

If you are not technical

  1. Confirm whether a DNS change was planned.
  2. If not planned, escalate immediately.
  3. Ask for before/after A-record values and change ticket.
  4. Re-run Scavo once records stabilize.

Technical handoff message

Copy and share this with your developer.

Scavo flagged DNS A record monitoring (dns_a_record_change). Please verify current A records against approved baseline, investigate unexpected deltas, and confirm intended origin routing. Share DNS evidence and re-run the scan.

If you are technical

  1. Compare authoritative DNS output with infrastructure source-of-truth.
  2. Validate cutover intent and rollback readiness.
  3. Confirm TLS/certificate validity on new destinations.
  4. Lock down DNS edit permissions and enable audit logs.
  5. Monitor during propagation windows for mixed resolver results.

How to verify

  • Query A records via authoritative and public resolvers.
  • Confirm records match approved values.
  • Confirm origin endpoints serve expected application.
  • Re-run Scavo and confirm stable state.

What this scan cannot confirm

  • It does not evaluate AAAA/CNAME in this specific check.
  • It cannot infer business intent from technical deltas.
  • DNS propagation can temporarily present mixed snapshots.

Owner checklist

  • [ ] Assign owner for DNS change governance.
  • [ ] Maintain approved A-record baseline.
  • [ ] Require ticketed approvals for production DNS edits.
  • [ ] Re-validate after registrar/DNS provider changes.

FAQ

Why is first run info?

Because Scavo needs a baseline before it can classify future changes.

Can planned migrations still warn?

Yes. Warnings indicate detected change, not whether it was authorized.

What if DNS lookup fails intermittently?

Scavo warns because it cannot produce a reliable comparison.

Do we need separate checks for subdomains?

Yes, scan each critical hostname you want monitored.

Sources


Need a DNS cutover runbook with rollback checkpoints? Send support your current and target records.

More checks in this area

redirect_chain_hygiene

Redirect Chain Too Long — Multiple Hops Before the Real Page Loads

Learn how Scavo measures redirect hops, why chains slow users and crawlers down, and how to flatten protocol, host, and legacy URL redirects into cleaner routes.

Open guide
not_found_status

404 Page Returns Wrong HTTP Status Code

When a deleted or broken URL returns HTTP 200, search engines index it as a real page — polluting your index with dead content and wasting crawl budget. This is called a "soft 404" and Google specifically warns against it. Your 404 page should return a proper 404 status code while still showing a helpful message to users.

Open guide
analytics_instrumentation

Analytics Not Installed or Not Firing

Without analytics, every business decision about your website becomes a guess. You can't see which pages convert, where users drop off, which channels drive traffic, or whether changes improve performance. This is the foundation of data-driven optimization — if it's missing, you're flying blind.

Open guide