I am getting regular DNS lookups to '82.81.53.202-in-addr.arpa-nettlinx.com' on my local Domain Controllers which the ATP is blocking as a C&C . Has anyone else come across this before?
This thread was automatically locked due to age.
I am getting regular DNS lookups to '82.81.53.202-in-addr.arpa-nettlinx.com' on my local Domain Controllers which the ATP is blocking as a C&C . Has anyone else come across this before?
Yeah, see it now and then.
The ATP actually just matches traffic to well known abuse sources ( including dns lookups / rRNS ) and flags these.
Since the source is your DC, it >should< be safe to ignore this as a false positive for botnet infection.
The real question here is really, who is querying your DC's and is the request from the outside ( reply to well known abuse host ) - then it might be an attempt to poison your DNS.
If you are absolutely sure everything is ok, then you can except for DC in the ATP from warnings.