I am getting regular DNS lookups to '82.81.53.202-in-addr.arpa-nettlinx.com' on my local Domain Controllers which the ATP is blocking as a C&C . Has anyone else come across this before?
This thread was automatically locked due to age.
I am getting regular DNS lookups to '82.81.53.202-in-addr.arpa-nettlinx.com' on my local Domain Controllers which the ATP is blocking as a C&C . Has anyone else come across this before?
Yeah, see it now and then.
The ATP actually just matches traffic to well known abuse sources ( including dns lookups / rRNS ) and flags these.
Since the source is your DC, it >should< be safe to ignore this as a false positive for botnet infection.
The real question here is really, who is querying your DC's and is the request from the outside ( reply to well known abuse host ) - then it might be an attempt to poison your DNS.
If you are absolutely sure everything is ok, then you can except for DC in the ATP from warnings.
Yeah, see it now and then.
The ATP actually just matches traffic to well known abuse sources ( including dns lookups / rRNS ) and flags these.
Since the source is your DC, it >should< be safe to ignore this as a false positive for botnet infection.
The real question here is really, who is querying your DC's and is the request from the outside ( reply to well known abuse host ) - then it might be an attempt to poison your DNS.
If you are absolutely sure everything is ok, then you can except for DC in the ATP from warnings.