Death of the Internet, Film at 11

David Conrad drc at
Sat Oct 22 18:21:49 UTC 2016


On October 22, 2016 at 8:09:34 AM, Mike Hammett (nanog at wrote:

How can I as a network operator seek out and eliminate the sources of these attacks? 
Maybe (not sure) one way would be to examine your resolver query logs to look for queries for names that fit domain generation algorithm patterns, then tracking down the customers/devices that are issuing those queries and politely suggest they remove the malware on their systems? 



-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 490 bytes
Desc: Message signed with OpenPGP using AMPGpg
URL: <>

More information about the NANOG mailing list