Skip to content
SysTutorials
  • SysTutorialsExpand
    • Linux & Systems Administration Academy
    • Web3 & Crypto Academy
    • Programming Academy
    • Systems & Architecture Academy
  • Subscribe
  • Linux Manuals
  • Search
SysTutorials
Programming Languages

Looking up Hostnames from IP Addresses in /etc/hosts on Linux

ByDavid Yang Posted onMar 24, 2018Apr 13, 2026 Updated onApr 13, 2026

When you need to reverse-lookup an IP address against your local /etc/hosts file, several tools can help. This is different from a full DNS reverse lookup — you’re checking only against the static mappings on your local system.

Why this matters

By default, most hostname resolution tools check /etc/hosts first before querying DNS servers. If you have an entry like 192.0.2.1 webserver.local in your /etc/hosts, you can reverse that lookup to find which hostname maps to a given IP.

Using getent

getent queries the local system’s name service switch (NSS) databases, including /etc/hosts:

$ getent hosts 192.0.2.1
192.0.2.1       webserver.local

This works for both IPv4 and IPv6:

$ getent hosts 2001:db8::1
2001:db8::1     ipv6-host.local

The advantage of getent is that it respects your system’s NSS configuration in /etc/nsswitch.conf. If you have multiple sources configured (local files, LDAP, NIS, etc.), it will check them in order.

You can also query by hostname:

$ getent hosts webserver.local
192.0.2.1       webserver.local

Using host command

The host utility performs reverse DNS lookups. When given an IP address, it automatically detects whether you’ve provided IPv4 or IPv6 and does a reverse lookup:

$ host 192.0.2.1
1.2.0.192.in-addr.arpa domain name pointer webserver.local.

For IPv6:

$ host 2001:db8::1
1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.d.b.0.0.1.ip6.arpa domain name pointer ipv6-host.local.

Important note: host performs full DNS reverse lookups by default. If you want it to check only /etc/hosts without querying nameservers, use getent instead.

Using grep directly

For simple cases, you can grep /etc/hosts directly:

$ grep "192.0.2.1" /etc/hosts
192.0.2.1       webserver.local another-alias

This approach is fast and doesn’t depend on NSS configuration, but it’s limited to simple string matching. It won’t handle CNAME records or DNS aliases, only the literal entries in the file.

To extract just the hostname(s):

$ grep "192.0.2.1" /etc/hosts | awk '{print $2, $3, $4}'
webserver.local another-alias

Using dig with +short

The dig command can also perform reverse lookups, though it queries DNS servers by default:

$ dig +short -x 192.0.2.1
webserver.local.

To force dig to use only /etc/hosts, you’d need to configure it to use localhost as a nameserver, which isn’t practical in most setups.

Handling multiple aliases

If an IP has multiple hostnames in /etc/hosts, all methods will show them:

# /etc/hosts entry
192.0.2.1   webserver.local web.internal.company.com api-server
$ getent hosts 192.0.2.1
192.0.2.1       webserver.local web.internal.company.com api-server

Practical recommendation

  • Use getent hosts for reverse lookups that respect your system’s NSS configuration. It’s the most portable and predictable method.
  • Use grep + awk for quick one-off checks or in scripts where you want to avoid any daemon dependencies.
  • Avoid host if you specifically want to check only /etc/hosts, since it performs full DNS queries by default.

2026 Best Practices and Advanced Techniques

For Looking up Hostnames from IP Addresses in /etc/hosts on Linux, understanding both fundamentals and modern practices ensures you can work efficiently and avoid common pitfalls. This guide extends the core article with practical advice for 2026 workflows.

Troubleshooting and Debugging

When issues arise, a systematic approach saves time. Start by checking logs for error messages or warnings. Test individual components in isolation before integrating them. Use verbose modes and debug flags to gather more information when standard output is not enough to diagnose the problem.

Performance Optimization

  • Monitor system resources to identify bottlenecks
  • Use caching strategies to reduce redundant computation
  • Keep software updated for security patches and performance improvements
  • Profile code before applying optimizations
  • Use connection pooling for network operations

Security Considerations

Security should be built into workflows from the start. Use strong authentication methods, encrypt sensitive data in transit, and follow the principle of least privilege for access controls. Regular security audits and penetration testing help maintain system integrity.

Related Tools and Commands

These complementary tools expand your capabilities:

  • Monitoring: top, htop, iotop, vmstat for resources
  • Networking: ping, traceroute, ss, tcpdump for connectivity
  • Files: find, locate, fd for searching; rsync for syncing
  • Logs: journalctl, dmesg, tail -f for monitoring
  • Testing: curl for HTTP requests, nc for ports, openssl for crypto

Integration with Modern Workflows

Consider automation and containerization for consistency across environments. Infrastructure as code tools enable reproducible deployments. CI/CD pipelines automate testing and deployment, reducing human error and speeding up delivery cycles.

Quick Reference

This extended guide covers the topic beyond the original article scope. For specialized needs, refer to official documentation or community resources. Practice in test environments before production deployment.

Read more:
  • Automatically Adding New SSH Hosts to Known Hosts
  • Configuring Multiple Static IP Addresses on a Xen VM
  • Retrieving VM IP Addresses in KVM with virsh
  • Configuring /etc/fstab: Mount Options and Boot Behavior
  • Adding Bind Mounts to /etc/fstab
  • SSH to Internal Hosts via Gateway
  • Hosting Multiple Websites on Apache with Virtual Hosts
  • Spoofing MAC Addresses in Linux
Post Tags: #Bash#Command#configuration#DNS#hostname#How to#ipv6#Linux#Programming#Server#System#Tutorial#Web#www#X

Post navigation

Previous Previous
Which HDFS Filesystem Operations Are Atomic?
NextContinue
How to Reload fstab Changes in systemd on Linux

Tutorials

  • Systems & Architecture Academy
    • Advanced Systems Path
    • Security & Cryptography Path
  • Linux & Systems Administration Academy
    • Linux Essentials Path
    • Linux System Administration Path
  • Programming Academy
  • Web3 & Crypto Academy
  • AI Engineering Hub

Categories

  • AI Engineering (4)
  • Algorithms & Data Structures (14)
  • Code Optimization (7)
  • Databases & Storage (11)
  • Design Patterns (4)
  • Design Patterns & Architecture (18)
  • Development Best Practices (104)
  • Functional Programming (4)
  • Languages & Frameworks (97)
  • Linux & Systems Administration (727)
  • Linux System Configuration (32)
  • Object-Oriented Programming (4)
  • Programming Languages (131)
  • Scripting & Utilities (65)
  • Security & Encryption (16)
  • Software Architecture (3)
  • System Administration & Cloud (33)
  • Systems & Architecture (46)
  • Testing & DevOps (33)
  • Web Development (25)
  • Web3 & Crypto (1)

SysTutorials, Terms, Privacy

  • SysTutorials
    • Linux & Systems Administration Academy
    • Web3 & Crypto Academy
    • Programming Academy
    • Systems & Architecture Academy
  • Subscribe
  • Linux Manuals
  • Search