[61893] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: dns.exe virus?

daemon@ATHENA.MIT.EDU (bmanning@karoshi.com)
Mon Sep 8 17:37:29 2003

From: bmanning@karoshi.com
To: clewis@nortelnetworks.com (Chris Lewis)
Date: Mon, 8 Sep 2003 14:36:47 -0700 (PDT)
Cc: nanog@merit.edu
In-Reply-To: <3F5CF4F4.4030108@americasm01.nt.com> from "Chris Lewis" at Sep 08, 2003 05:30:28 PM
Errors-To: owner-nanog-outgoing@merit.edu


> Christopher J. Wolff wrote:
> 
> > Chris,
> > 
> > It was really odd.  Here is an example of what the two hosts .3 and .4
> > were up to.
> 
> For grins, I ran that through our blacklist tool to see what it coughed up.
> 
> Nothing was on our blacklists.
> 
> Had rDNS's like *.google.com, *.akamai.com, sprintbbsd, 
> ns2.granitecanyon.com, DNS root servers and a few non-resolving IPs.
> 
> DNS resolution loop perchance?

	From here, they all show up in the logs attemptin
	dynamic updates of  the in-addr.arpa domain. :)
	Time to suck pkts...  although I 'spect they are
	trying to perform stupid DNS tricks like:

	floss.local.in-addr.arpa.  A  10.10.10.10

--bill

home help back first fref pref prev next nref lref last post