{"id":2316,"date":"2015-10-14T21:04:34","date_gmt":"2015-10-14T21:04:34","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2316"},"modified":"2020-05-06T10:30:08","modified_gmt":"2020-05-06T17:30:08","slug":"how-dangerous-can-an-open-dns-resolver-be-part-iii","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/","title":{"rendered":"How Dangerous Can An Open DNS Resolver Be? Part III"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2317\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/DNS-resolver.jpg\" alt=\"\" width=\"660\" height=\"454\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg 660w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver-300x206.jpg 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/p>\n<p><em>The beginning of the article you can read in\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Community-Blog\/HOW-DANGEROUS-CAN-AN-OPEN-DNS-RESOLVER-BE-Part-I\/ba-p\/4017\" target=\"_blank\" rel=\"noopener noreferrer\">Part I<\/a>\u00a0and\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Community-Blog\/HOW-DANGEROUS-CAN-AN-OPEN-DNS-RESOLVER-BE-Part-II\/ba-p\/4015\" target=\"_blank\" rel=\"noopener noreferrer\">Part II<\/a>.<\/em><\/p>\n<p><span style=\"font-size: large;\"><strong>Results<\/strong><\/span><\/p>\n<p>Just for the first week my server received 416k requests for 63 domains from 1169 IPs. \u00a0During 5 months (3 months it was open) it received about 46 millions requests. Below you can see the graph for the first week.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2319\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/QPS.png\" alt=\"\" width=\"599\" height=\"161\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/QPS.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/QPS-300x81.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<h2 id=\"toc-hId-649814971\"><strong><span style=\"font-size: medium;\">How fast will my DNS server\u00a0receive first recursive query<\/span><\/strong><\/h2>\n<p>My DNS received first recursive request from China only after <strong>1 hour 20 minutes<\/strong>\u00a0(domain:\u00a0<a href=\"http:\/\/www.google.it%29.\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">www.google.it).<\/a>\u00a0I\u2019ve checked log-files and found that my server periodically received such recursive requests before.\u00a0<strong><em>So attackers periodically scan networks and search for new vulnerable devices<\/em><\/strong>.<\/p>\n<h2 id=\"toc-hId-678444122\"><span style=\"font-size: medium;\"><strong>How fast will it receive inappropriate requests<\/strong><\/span><\/h2>\n<p>First DNS-amplification attack was fixed after <strong>1 day<\/strong>\u00a0(domain: webpanel.sk, 300 requests).<\/p>\n<h2 id=\"toc-hId-707073273\"><strong><span style=\"font-size: medium;\">Measure medium and maximum QPS under attack<\/span><\/strong><\/h2>\n<p>Maximum QPS is limited only by server capacity. The maximum QPS was 3080 during the study. All requests were sent with amplification. So at this moment my server utilized about 96Mb\/s (3080X4Kb =96Mb\/s).<\/p>\n<p>The graph, which you can see below, was produced in my analytical system. It shows\u00a0maximum QPS.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2320\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/MaxQPS.png\" alt=\"\" width=\"600\" height=\"148\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MaxQPS.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/MaxQPS-300x74.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h2 id=\"toc-hId-735702424\"><strong><span style=\"font-size: medium;\">Find victims and infected networks<\/span><\/strong><\/h2>\n<p>I\u2019m sure that 99% of requests were spoofed and used for DrDoS attacks. Some domains (doleta.gov, energystar.gov, ebay.de) were used for attacks and were under attack at the same time . Below you can see details about attacked countries and cities. Information about countries and cities was extracted from MaxMind IP GEO database.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2321\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Open_Resolver_P6.png\" alt=\"\" width=\"599\" height=\"146\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P6.png 599w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P6-300x73.png 300w\" sizes=\"auto, (max-width: 599px) 100vw, 599px\" \/><\/p>\n<p>In table below you can find details about attacked companies. This information was extracted from Whois service and RIPE database.<\/p>\n<p>The most interesting rows in the table are \u201cTime Warner Cable Internet LLC\u201d, \u201cAkamai Technologies, Inc.\u201d and \u201cAT&amp;T Internet Services\u201d. The quantity of the requests is relatively small but the quantity of the IP-addresses is very high. It can mean that the networks of these organizations were infected with a malware or\/and a botnet.<\/p>\n<table width=\"547\">\n<thead>\n<tr>\n<td>Country<\/td>\n<td>Company<\/td>\n<td>Q-ty requests<\/td>\n<td>Q-ty\u00a0IPs<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>United States<\/td>\n<td>SoftLayer Technologies Inc.<\/td>\n<td>3965202<\/td>\n<td>36<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>SingleHop, Inc.<\/td>\n<td>2617987<\/td>\n<td>27<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>PSINet, Inc.<\/td>\n<td>1994461<\/td>\n<td>22<\/td>\n<\/tr>\n<tr>\n<td>France<\/td>\n<td>OVH SAS<\/td>\n<td>1051080<\/td>\n<td>304<\/td>\n<\/tr>\n<tr>\n<td>United Kingdom<\/td>\n<td>Hosting Services Inc<\/td>\n<td>938367<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td>Germany<\/td>\n<td>1&amp;1 Internet AG<\/td>\n<td>761020<\/td>\n<td>12<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>PrivateSystems Networks<\/td>\n<td>748641<\/td>\n<td>4<\/td>\n<\/tr>\n<tr>\n<td>Russian Federation<\/td>\n<td>OJSC Rostelecom Ticket 09-39331, RISS 15440, UrF<\/td>\n<td>687028<\/td>\n<td>1<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>Time Warner Cable Internet LLC<\/td>\n<td>671211<\/td>\n<td>1568<\/td>\n<\/tr>\n<tr>\n<td>Canada<\/td>\n<td>OVH Hosting, Inc.<\/td>\n<td>592920<\/td>\n<td>213<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>Akamai Technologies, Inc.<\/td>\n<td>176327<\/td>\n<td>4410<\/td>\n<\/tr>\n<tr>\n<td>China<\/td>\n<td>China Telecom<\/td>\n<td>51565<\/td>\n<td>207<\/td>\n<\/tr>\n<tr>\n<td>United States<\/td>\n<td>AT&amp;T Internet Services<\/td>\n<td>27502<\/td>\n<td>854<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2 id=\"toc-hId-792960726\"><strong><span style=\"font-size: medium;\">Find out domains and requests which are used for attacks<\/span><\/strong><\/h2>\n<p>Attackers used about 15 different domains. So it is relatively simple to identify and block such domains. Information about domains and requests are available in table below.<\/p>\n<table width=\"547\">\n<thead>\n<tr>\n<td>Domain<\/td>\n<td>Query<\/td>\n<td>Flags<\/td>\n<td>Q-ty requests<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>webpanel.sk<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>14962032<\/td>\n<\/tr>\n<tr>\n<td>oggr.ru<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>8300693<\/td>\n<\/tr>\n<tr>\n<td>energystar.gov<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>6676350<\/td>\n<\/tr>\n<tr>\n<td>doleta.gov<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>6326853<\/td>\n<\/tr>\n<tr>\n<td>067.cz<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>2463053<\/td>\n<\/tr>\n<tr>\n<td>sema.cz<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>1251206<\/td>\n<\/tr>\n<tr>\n<td>GUESSINFOSYS.COM<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>690320<\/td>\n<\/tr>\n<tr>\n<td>jerusalem.netfirms.com<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>587534<\/td>\n<\/tr>\n<tr>\n<td>paypal.de<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>454756<\/td>\n<\/tr>\n<tr>\n<td>nlhosting.nl<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>414113<\/td>\n<\/tr>\n<tr>\n<td>freeinfosys.com<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>352233<\/td>\n<\/tr>\n<tr>\n<td>krasti.us<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>333806<\/td>\n<\/tr>\n<tr>\n<td>doc.gov<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>259248<\/td>\n<\/tr>\n<tr>\n<td>svist21.cz<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>231946<\/td>\n<\/tr>\n<tr>\n<td>wradish.com<\/td>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>117294<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><\/h2>\n<h2 id=\"toc-hId-821589877\"><strong><span style=\"font-size: medium;\">Try to identify types of the attacks<\/span><\/strong><\/h2>\n<p>During the study I identified DrDoS, Random subdomain\/Phantom domain attack, NXDOMAIN attack, protocol anomalies. A graph below clearly shows an amplification attack. Blue line is an incoming traffic and yellow is an outgoing traffic.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2322\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/Open_Resolver_P7.png\" alt=\"\" width=\"600\" height=\"177\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P7.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/Open_Resolver_P7-300x89.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>For DrDoS attacks \u201cANY\u201d request with EDNS was used. Below you can see details about request types and used flags.<\/p>\n<table width=\"547\">\n<thead>\n<tr>\n<td>Request<\/td>\n<td>Flags<\/td>\n<td>Q-ty requests<\/td>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>ANY<\/td>\n<td>+E<\/td>\n<td>43500439<\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>-ED<\/td>\n<td>17339<\/td>\n<\/tr>\n<tr>\n<td>ANY<\/td>\n<td>+<\/td>\n<td>11932<\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>\u2013<\/td>\n<td>9853<\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>-EDC<\/td>\n<td>8956<\/td>\n<\/tr>\n<tr>\n<td>AAAA<\/td>\n<td>-EDC<\/td>\n<td>4749<\/td>\n<\/tr>\n<tr>\n<td>AAAA<\/td>\n<td>-ED<\/td>\n<td>4467<\/td>\n<\/tr>\n<tr>\n<td>ANY<\/td>\n<td>\u2013<\/td>\n<td>2289<\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>+E<\/td>\n<td>1899<\/td>\n<\/tr>\n<tr>\n<td>RRSIG<\/td>\n<td>+E<\/td>\n<td>1124<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>These requests are related to Random subdomain attack (on Caching server) and NXDOMAIN attack on Authoritative (energystar.gov, doleta.gov):<\/p>\n<ul>\n<li>energystar.gov;<\/li>\n<li>doleta.gov;<\/li>\n<li>webpanel.sk;<\/li>\n<li>cnklipaaaaesh0000claaabbaaabfgoa;<\/li>\n<li>2d852aba-7d5f-11e4-b763-d89d67232680.ipvm.biz.<\/li>\n<\/ul>\n<h2 id=\"toc-hId-850219028\"><strong><span style=\"font-size: medium;\">How long my server will be used when I turn off my open resolver<\/span><\/strong><\/h2>\n<p>When I turned off open resolver it received inappropriate requests during next 1.5 months.<\/p>\n<p>Conclusions:<\/p>\n<ul>\n<li>Any DNS server is a cool tool for analyzing users and malware behavior<\/li>\n<li>Permanent or periodical analysis of DNS-logs can improve quality of DNS service<\/li>\n<li>A lot of requests\u00a0\u00abANY +E\u00bb shows that your server is under an attack\/participate in an attack<\/li>\n<li>Small quantity of domains may be used for attacks. You can block attacks with blacklists or DNS Firewall and decrease the load on DNS Servers and network utilization.<\/li>\n<\/ul>\n<p>And in the end of the post I want to share my short video about DNS attacks. Have fun!<\/p>\n<div class=\"video-embed-center video-embed\"><iframe loading=\"lazy\" class=\"embedly-embed bf_frame_init\" title=\"Video\" src=\"https:\/\/cdn.embedly.com\/widgets\/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FmI1p0VjalTg%3Fstart%3D1%26feature%3Doembed%26start%3D1&amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DmI1p0VjalTg&amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FmI1p0VjalTg%2Fhqdefault.jpg&amp;key=b0d40caa4f094c68be7c29880b16f56e&amp;type=text%2Fhtml&amp;schema=youtube\" width=\"600\" height=\"337\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/div>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The beginning of the article you can read in\u00a0Part I\u00a0and\u00a0Part II. Results Just for the first week my server received 416k requests for 63 domains from 1169 IPs. \u00a0During 5 months (3 months it was open) it received about 46 millions requests. Below you can see the graph for the first week. How fast will [&hellip;]<\/p>\n","protected":false},"author":283,"featured_media":2317,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[3],"tags":[28,30,16,32,15],"class_list":{"0":"post-2316","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-community","8":"tag-ddi","9":"tag-dns","10":"tag-infoblox","11":"tag-malware","12":"tag-security","13":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Dangerous Can An Open DNS Resolver Be? Part III<\/title>\n<meta name=\"description\" content=\"Just for the first week my server received 416k requests for 63 domains from 1169 IPs\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Dangerous Can An Open DNS Resolver Be? Part III\" \/>\n<meta property=\"og:description\" content=\"Just for the first week my server received 416k requests for 63 domains from 1169 IPs\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-14T21:04:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:30:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vadim Pavlov\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vadim Pavlov\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/\"},\"author\":{\"name\":\"Vadim Pavlov\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\"},\"headline\":\"How Dangerous Can An Open DNS Resolver Be? Part III\",\"datePublished\":\"2015-10-14T21:04:34+00:00\",\"dateModified\":\"2020-05-06T17:30:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/\"},\"wordCount\":736,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"keywords\":[\"DDI\",\"DNS\",\"Infoblox\",\"Malware\",\"Security\"],\"articleSection\":[\"Community\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/\",\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part III\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"datePublished\":\"2015-10-14T21:04:34+00:00\",\"dateModified\":\"2020-05-06T17:30:08+00:00\",\"description\":\"Just for the first week my server received 416k requests for 63 domains from 1169 IPs\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/DNS-resolver.jpg\",\"width\":660,\"height\":454},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/community\\\/how-dangerous-can-an-open-dns-resolver-be-part-iii\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Community\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/community\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Dangerous Can An Open DNS Resolver Be? Part III\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/d94c7b52c9309b7ab694e709bcb82974\",\"name\":\"Vadim Pavlov\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g\",\"caption\":\"Vadim Pavlov\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/vadim-pavlov\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Dangerous Can An Open DNS Resolver Be? Part III","description":"Just for the first week my server received 416k requests for 63 domains from 1169 IPs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/","og_locale":"en_US","og_type":"article","og_title":"How Dangerous Can An Open DNS Resolver Be? Part III","og_description":"Just for the first week my server received 416k requests for 63 domains from 1169 IPs","og_url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/","og_site_name":"Infoblox Blog","article_published_time":"2015-10-14T21:04:34+00:00","article_modified_time":"2020-05-06T17:30:08+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","type":"image\/jpeg"}],"author":"Vadim Pavlov","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vadim Pavlov","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/"},"author":{"name":"Vadim Pavlov","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974"},"headline":"How Dangerous Can An Open DNS Resolver Be? Part III","datePublished":"2015-10-14T21:04:34+00:00","dateModified":"2020-05-06T17:30:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/"},"wordCount":736,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","keywords":["DDI","DNS","Infoblox","Malware","Security"],"articleSection":["Community"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/","url":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/","name":"How Dangerous Can An Open DNS Resolver Be? Part III","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","datePublished":"2015-10-14T21:04:34+00:00","dateModified":"2020-05-06T17:30:08+00:00","description":"Just for the first week my server received 416k requests for 63 domains from 1169 IPs","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/DNS-resolver.jpg","width":660,"height":454},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/community\/how-dangerous-can-an-open-dns-resolver-be-part-iii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Community","item":"https:\/\/www.infoblox.com\/blog\/category\/community\/"},{"@type":"ListItem","position":3,"name":"How Dangerous Can An Open DNS Resolver Be? Part III"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/d94c7b52c9309b7ab694e709bcb82974","name":"Vadim Pavlov","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5953dd194cba8fac3d1c7e1850847002a8b6f6d268f280277851c84d8b801c6b?s=96&d=blank&r=g","caption":"Vadim Pavlov"},"url":"https:\/\/www.infoblox.com\/blog\/author\/vadim-pavlov\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/283"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2316"}],"version-history":[{"count":4,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2316\/revisions"}],"predecessor-version":[{"id":2326,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2316\/revisions\/2326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/2317"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}