Root Nameservers
The apex of the DNS hierarchy. Thirteen root server addresses — operated by 12 independent organizations across hundreds of anycast nodes — form the authoritative starting point for every DNS resolution on the internet.
The Top of the Delegation Tree
Root nameservers don't know the IP address of thedns.guru. What they do know is which nameservers are responsible for every top-level domain — .com, .net, .guru, and the hundreds of others. Their job is purely referral.
Despite the "13 addresses" constraint (imposed by the 512-byte UDP limit of early DNS), the root server infrastructure today spans over 1,600 physical nodes across more than 170 countries, all reachable via anycast routing. This means a "query to a.root-servers.net" is answered by whichever physical node is closest to you — not one server in Virginia.
Root zone content is maintained by IANA (a function of ICANN) and distributed to all root server operators. The root zone contains about 1,500 TLD delegations and is updated multiple times per day.
The 13 Root Server Addresses
A through M — each operated independently by a different organization
2001:503:ba3e::2:30. The root zone has been fully DNSSEC-signed since July 2010.How Anycast Makes Root Servers Resilient
One IP address, many physical locations
Anycast is a routing technique where multiple physical servers share the same IP address. BGP routing protocols direct each query to the topologically nearest node. If one node goes offline, BGP automatically reroutes traffic to the next-closest instance — with no change needed at the resolver or client.
This architecture means a DDoS attack targeting a single root server address affects only the nodes serving that attack's traffic. The 2016 Mirai botnet attack sent 1+ Tbps at several root operators — the attacks were largely absorbed by anycast spreading the load across hundreds of nodes.
Recursive resolvers also mitigate root server load heavily: modern resolvers cache root NS records for up to 6 hours (518,400 seconds — the root zone's NS TTL). In practice, a busy resolver may go days without querying a root server.
The root hints file is bundled with resolver software (BIND, Unbound, PowerDNS) and tells the resolver how to reach root servers before any queries have been made. It is refreshed periodically via priming queries.
The Root Key Signing Key (KSK)
The trust anchor at the top of the DNSSEC chain
DNSSEC relies on a chain of cryptographic signatures from child zones up to the parent. The root zone is the ultimate trust anchor — its KSK (Key Signing Key) is the single point of truth that validating resolvers trust implicitly.
ICANN manages the root KSK through a formal, ceremony-based process held in a controlled facility. The private key material is stored on Hardware Security Modules (HSMs) in two geographically separated locations (El Segundo, CA and Culpeper, VA). Key ceremonies are live-streamed and audited by independent "Trusted Community Representatives."
The root KSK was first generated in 2010 (KSK-2010). The first root key rollover occurred in October 2018 (KSK-2017), replacing the 8-year-old KSK — the largest coordinated key rollover in internet history, affecting all DNSSEC-validating resolvers globally.
dig . DNSKEY +dnssecQuerying Root Servers Directly
Tools and commands for inspecting root server behavior
Query a root server directly
Check root DNSSEC
Identify closest anycast node
Root zone statistics
Related Topics
Root servers delegate to TLD nameservers, which hold NS records for every registered domain.
Recursive ResolverRecursive resolvers query root servers at the start of iterative resolution for uncached names.
Authoritative NameserverThe end of the referral chain — authoritative servers hold the actual zone records.