These people should run Split-horizon DNS;
Host | Wrong IP address | Reason |
---|---|---|
49-158-163-72.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-158-209-21.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-158-216-10.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-158-216-25.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-158-216-97.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-159-185-17.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-159-196-203.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
49-159-197-224.dynamic.elinx.com.tw | 0.0.0.0 | Unconfigured |
dbserver41.x26.nl | 192.168.3.41 | RFC 1918 |
ns2.bofinet.co.bw | 172.21.41.10 | RFC 1918 |
ns2.ip1.co.id | 172.16.212.50 | RFC 1918 |
supermicro1.x26.nl | 192.168.2.71 | RFC 1918 |
Last update: Wed 5 Feb 07:02:02 UTC 2025
You can block answers like these with Bind's 'deny-answer-addresses' feature;
deny-answer-addresses { // Unconfigured 0.0.0.0; // RFC 1918 10.0.0.0/8; 172.16.0.0/12; 192.168.0.0/16; // RFC 3927 169.254.0.0/16; // IPv6 // :: to ::ffff:ffff:ffff. // Includes ::, ::1, IPv4-Compatible IPv6 Addresses ::/96, // and IPv4-mapped IPv6 addresses ::ffff:0:0/96 ::/80; // RFC 6052 64:ff9b::/96; // Reserved for Documentation 2001:db8::/32; // IPv6 Unique Local fc00::/7; // IPv6 Link local fe80::/10; // IPv6 Site local fec0::/10; // Your IPv6 address range(s) Net/Mask } except-from { "Your.Domain"; }; deny-answer-aliases { "Your.Domain"; };
The produces log entries like;
Aug 21 19:31:01 sput named[1601]: answer address 10.0.0.100 denied for spacefon.com/A/IN
Not blocking these addresses can be a serious security risk.