If you are seeing queries for this domain, than you are likely participating in DNS Amplification attacks and your DNS server is probably reachable from the internet and has recursion enabled.
If you are seeing responses for this domain.. unlucky. You are currently beeing DDOS-ed! Good luck.
IPtables:
There are two iptable rules available. If your distribution supports Iptables 'u32' module pick this one, otherwise use the 'string' rule.
U32:
iptables --insert INPUT -p udp --dport 53 -m u32 --u32 "0x28&0xFFDFDFDF=0x0d535550 && 0x2c&0xDFDFDFDF=0x45524d45 && 0x30&0xDFDFDFDF=0x47415452 && 0x34&0xDFDFFFDF=0x5545054d && 0x28&0xDFDFDFDF=0x43444952 && 0x3c&0xFFDFDFFF=0x02525500" -j DROP -m comment --comment "DROP DNS Q supermegatrue.mcdir.ru"
More U32 rules can be found here:
https://github.com/smurfmonitor/dns-iptables-rules/blob/master/domain-blacklist.txt
String:
iptables --insert INPUT -p udp --dport 53 -m string --from 40 --to 64 --algo bm --hex-string '|0D73757065726d65676174727565056d6364697202727500|' -j DROP -m comment --comment "DROP DNS Q supermegatrue.mcdir.ru"
More Iptables rules for the STRING module can be found here:
https://github.com/smurfmonitor/dns-iptables-rules/blob/master/domain-blacklist-string.txt
Source:
186.2.166.135
Name server:
;; ANSWER SECTION:
supermegatrue.mcdir.ru. 477 IN NS ns4.mchost.ru.
supermegatrue.mcdir.ru. 477 IN NS ns2.mchost.ru.
supermegatrue.mcdir.ru. 477 IN NS ns1.mchost.ru.
supermegatrue.mcdir.ru. 477 IN NS ns3.mchost.ru.
;; ADDITIONAL SECTION:
ns1.mchost.ru. 477 IN A 178.208.73.21
ns2.mchost.ru. 477 IN A 85.17.176.6
ns3.mchost.ru. 477 IN A 95.211.62.212
ns4.mchost.ru. 477 IN A 188.40.249.239
Response:
A 2
MX 2
NS 4
SOA 1
TXT 1
Rsize 301
Whois
% By submitting a query to RIPN's Whois Service
% you agree to abide by the following terms of use:
% http://www.ripn.net/about/servpol.html#3.2 (in Russian)
% http://www.ripn.net/about/en/servpol.html#3.2 (in English).
No entries found for the selected source(s).
Last updated on 2013.10.10 22:01:38 MSK
No comments:
Post a Comment