What is a TLD?

Understanding Top-Level Domains in the DNS Hierarchy

A TLD (Top-Level Domain) is the last segment of a domain name — the part after the final dot. Common TLDs include .com, .org, .edu, and .net. Some TLDs are associated with higher-risk content and can be filtered at the DNS level.

Explore the Learn Hub

Step 1: What is a TLD?

A Top-Level Domain (TLD) is the rightmost part of a domain name. In cleanbrowsing.org, the TLD is .org. TLDs sit at the top of the DNS hierarchy, just below the root zone.

TLDs are managed by designated registries under the authority of ICANN (Internet Corporation for Assigned Names and Numbers). There are over 1,500 TLDs in use today, ranging from familiar ones like .com to newer ones like .app, .dev, and country-code TLDs like .uk and .de.

Step 2: Types of TLDs

  • Generic TLDs (gTLDs): Open to anyone — .com, .net, .org, .info, plus newer ones like .blog, .shop, .xyz
  • Country-code TLDs (ccTLDs): Assigned to countries — .us, .uk, .de, .jp, .br. Some are used generically (e.g., .io, .co)
  • Sponsored TLDs (sTLDs): Restricted to specific communities — .edu (education), .gov (government), .mil (military)
  • Infrastructure TLD: .arpa — used for reverse DNS lookups and other infrastructure purposes

Step 3: TLDs in the DNS Hierarchy

The DNS hierarchy works from right to left:

  • Root zone: The starting point (represented by a dot). Root nameservers know where to find TLD nameservers
  • TLD zone: Each TLD has its own nameservers that know where to find authoritative nameservers for domains registered under that TLD
  • Domain zone: The authoritative nameserver for a specific domain (e.g., cleanbrowsing.org) provides the final answer

When CleanBrowsing's recursive resolver looks up a domain, it follows this hierarchy — querying root, TLD, and authoritative nameservers in sequence. On the authoritative side, services like NOC.org host DNS zones for domain owners.

Step 4: TLD-Level Filtering

Some TLDs have higher concentrations of malicious or unwanted content. DNS filtering can block entire TLDs when they're predominantly used for abuse:

  • High-risk TLDs: Certain newer gTLDs have been associated with high rates of malware, phishing, and spam domains
  • Category filtering: CleanBrowsing's Categorify engine classifies domains individually, but TLD reputation data informs the classification process
  • Custom blocking: Organizations can block specific TLDs through their CleanBrowsing dashboard if those TLDs aren't relevant to their users

Learn more about DNS and filtering

Explore the Learn Hub