Author Topic: Open DNS abuse, adware & malware on website...  (Read 1606 times)

0 Members and 1 Guest are viewing this topic.

Offline polonus

  • Avast Überevangelist
  • Probably Bot
  • *****
  • Posts: 33900
  • malware fighter
Open DNS abuse, adware & malware on website...
« on: November 29, 2015, 04:39:37 PM »
Re: https://urlquery.net/report.php?id=1448810667856
Blocked for me with adblocker: -http://ad.zanox.com/ppc/?22021236C994899906T
See: http://zulu.zscaler.com/submission/show/0dfc211b6993fa2572767c1046245070-1448810932
WARNING: The following name servers announces themselves as open DNS servers:
udp4:95.110.220.5
udp4:62.149.128.2
udp4:62.149.132.2
udp4:81.2.199.73
On all name servers which acts as caching name servers recursive queries should be restricted to local networks. Having open DNS servers can lead to abuses such as cache poisoning and DOS (denial of service) attacks. Cache poisoning attacks allows under certain conditions to redirect legitimate web traffic, email and other traffic to malicious hosts compromising security.
 Found mail servers with inconsistent reverse DNS entries. You should fix them if you are using those servers to send email.

malware reported: https://cymon.io/62.149.142.56 and IP badness history: https://www.virustotal.com/nl/ip-address/62.149.142.56/information/

polonus
Cybersecurity is more of an attitude than anything else. Avast Evangelists.

Use NoScript, a limited user account and a virtual machine and be safe(r)!