On Wed, 13 Jan 2021 10:21:19 +0100
Alessandro Vesely <ves...@tana.it> wrote:

> Yesterday I got 42639 of those, from 41 different IPs, the most frequent 
> clients looking like so:
> 821-north:~$ sed -rn 's/^.{15} 30 north named[^:]*: client @0x[0-91-f]* 
> ([0-9.]*)#[0-9]* ...: view external: query failed .REFUSED. for ..IN.ANY at 
> .........bin.named.query.c:7144/\1/p' < /var/log/daemon.log.0 |sort |uniq -c 
> |sort -rn |head
>     4957 68.42.225.19
>     2914 73.73.73.73
>     2868 24.21.125.251
>     2783 193.70.81.112
>     2440 73.73.3.73
>     2273 101.71.138.9
>     2032 74.74.74.8
>     1814 98.25.235.45
>     1785 209.94.134.20
>     1756 73.109.143.81

Through a side project I report on IN ANY queries and have seen all of
those addresses and more as you can examine here:

  <https://dataplane.org/dnsrdany.txt>

Some may be sourced from a security/research survey project, but some
sources performing this may be for more nefarious purposes - building a
list of open resolvers that will answer for the purposes of maintaining
an amplication/reflection hit list.

Unfortunately there are many open resolvers that answer, but perhaps
except for a name you are authoritative for, responding with a REFUSED
response is generally considered reasonable and appropriate.

John
_______________________________________________
Please visit https://lists.isc.org/mailman/listinfo/bind-users to unsubscribe 
from this list

ISC funds the development of this software with paid support subscriptions. 
Contact us at https://www.isc.org/contact/ for more information.


bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to