{"id":4298,"date":"2023-04-13T16:56:43","date_gmt":"2023-04-13T16:56:43","guid":{"rendered":"https:\/\/shreshtait.com\/blog\/?p=4298"},"modified":"2025-09-30T12:26:16","modified_gmt":"2025-09-30T06:56:16","slug":"open-resolvers-understanding-security-risks-and-best-practices","status":"publish","type":"post","link":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/","title":{"rendered":"Open Resolvers: Understanding security risks and best practices"},"content":{"rendered":"\n<p>An &#8220;open resolver&#8221; is a DNS server that accepts and resolves a domain name recursively for anyone on the internet. In this blog post, we will share the security risks of open resolvers and best practices. <\/p>\n\n\n\n<p>At the time of writing, there were 192920 open resolvers in India with recursion enabled. While most of these are broken consumer premise equipment (CPE), few are open probably due to misconfiguration on the part of the DNS administrators.<\/p>\n\n\n\n<p>Out of the total count, 114521 were running dnsmasq. A popular DNS server software found in CPE firmware. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"640\" height=\"480\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/Open-resolvers-India.png\" alt=\"Open resolvers in India using dnsmasq and other software\" class=\"wp-image-4300\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/Open-resolvers-India.png 640w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/Open-resolvers-India-300x225.png 300w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-what-security-risks-do-open-resolvers-pose\"><strong>What security risks do open resolvers pose?<\/strong><\/h4>\n\n\n\n<p>An open resolver can be abused by threat actors to initiate a Denial of Service(DoS) attack. Simply put, running an open resolver is a bad security practice.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-case-in-point-dns-amplification-attack-or-a-denial-of-service-attack-using-an-open-resolver\"><strong>Case in point<\/strong> &#8211; DNS amplification attack or a <strong>Denial of Service attack using an open resolver <\/strong>?<\/h4>\n\n\n\n<p>A Domain Name Server (DNS) amplification attack is a popular form of distributed denial of service (DDoS) that relies on the use of publically accessible open DNS servers to overwhelm a victim system with DNS response traffic.<sup><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2013\/03\/29\/dns-amplification-attacks\" target=\"_blank\" rel=\"noreferrer noopener\">1<\/a><\/sup><\/p>\n\n\n\n<p>Between Jan 15, 15:01:17 and Apr 10, 01:28:31, a single instance of our honeypot, received 135972316 DNS queries from Brazil for the domain higi[.]com<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/as-count.png\" alt=\"Open resolvers distribution  of DNS queries across autonomous systems\" class=\"wp-image-4346\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/as-count.png 1000w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/as-count-300x150.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/as-count-768x384.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"500\" src=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/country-code.png\" alt=\"DNS query distribution to higi.com  per country\" class=\"wp-image-4347\" srcset=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/country-code.png 1000w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/country-code-300x150.png 300w, https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/country-code-768x384.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>According to https[:]\/\/www[.]higi.com, <\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>Higi is a consumer health engagement company that combines physical access via a network of digital Smart Health Stations with complementary web and mobile tools that enable a consumer\u2019s health engagement, making it easier for them to understand and act on their health and healthcare needs.<\/em><\/p>\n<\/blockquote>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-objective-of-the-attack\">Objective of the attack<\/h4>\n\n\n\n<p>On primary evidence, it is most likely that the objective of the attack is to send a large influx of DNS query traffic to the authoritative name servers of higi[.]com. When writing the DNS A record of higi[.]com had a TTL value of 600 seconds.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-a-global-coffee-chain-serving-an-open-resolver\">A global coffee chain serving an open resolver \u2615<\/h4>\n\n\n\n<p>It&#8217;s not just CPE boxes with broken firmware\/configuration which have the problem of open resolvers, <a href=\"https:\/\/shreshtait.com\" target=\"_blank\" rel=\"noreferrer noopener\">Shreshta<\/a> threat analysts have detected enterprise DNS resolvers, resolvers part of network operators and even a global coffee chain running an open resolver!<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-best-practices\">Best practices <\/h4>\n\n\n\n<p>As a recursive resolver operator, below are some of the best practices that you should follow<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Allow access to the recursive resolver only to authorised IP addresses\/netblock<\/li>\n\n\n\n<li>Response rate limiting<\/li>\n\n\n\n<li>On an authoritative only name server, disable recursion<\/li>\n\n\n\n<li>For network operators &#8211; Implement <a href=\"https:\/\/www.ietf.org\/rfc\/bcp\/bcp38.html\" target=\"_blank\" rel=\"noreferrer noopener\">BCP38<\/a> (Network Ingress Filtering)<\/li>\n<\/ul>\n\n\n\n<p>We also urge recursive resolver &amp; authoritative name server operators to explore <a href=\"https:\/\/kindns.org\" target=\"_blank\" rel=\"noreferrer noopener\">KINDNS<\/a> &#8211; Stands for Knowledge-Sharing and Instantiating Norms for DNS and Naming Security. It&#8217;s a program supported by ICANN to develop and promote a framework that focuses on the most important operational best practices or concrete instances of DNS security best practices.<\/p>\n\n\n\n<p>We have contacted higi[.]com as well as the DNS administrators of the global coffee chain to share our findings. <\/p>\n\n\n\n<p>As seen in this post, it&#8217;s important to follow best practices to eliminate the risks of running an open resolver.   <\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-reading\">Recommended reading<\/h2>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-dns-security-amp-threat-intelligence-blog-shreshta wp-block-embed-dns-security-amp-threat-intelligence-blog-shreshta\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"FuzClZHSEG\"><a href=\"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/\">DNS KeyTrap vulnerability<\/a><\/blockquote><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; visibility: hidden;\" title=\"&#8220;DNS KeyTrap vulnerability&#8221; &#8212; DNS Security &amp; Threat Intelligence Blog | Shreshta\" src=\"https:\/\/shreshtait.com\/blog\/2024\/02\/dns-keytrap-vulnerability\/embed\/#?secret=LyijL1xgpC#?secret=FuzClZHSEG\" data-secret=\"FuzClZHSEG\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>An &#8220;open resolver&#8221; is a DNS server that accepts and resolves a domain name recursively for anyone on the internet. In this blog post, we will share the security risks of open resolvers and best practices. At the time of writing, there were 192920 open resolvers in India with recursion enabled. While most of these [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4370,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[43,42],"tags":[85,84,45,87,76,86,82,83,47],"class_list":["post-4298","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dns","category-threat-intelligence","tag-bcp38","tag-best-practices","tag-dns","tag-icann","tag-india","tag-kindns","tag-open-resolver","tag-security-risks","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>DNS Security &amp; Threat Intelligence Blog | Shreshta<\/title>\n<meta name=\"description\" content=\"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Resolvers: Understanding security risks and best practices\" \/>\n<meta property=\"og:description\" content=\"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"DNS Security &amp; Threat Intelligence Blog | Shreshta\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-13T16:56:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T06:56:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1278\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Swapneel Patnekar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:site\" content=\"@shreshtait\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Swapneel Patnekar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/\"},\"author\":{\"name\":\"Swapneel Patnekar\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\"},\"headline\":\"Open Resolvers: Understanding security risks and best practices\",\"datePublished\":\"2023-04-13T16:56:43+00:00\",\"dateModified\":\"2025-09-30T06:56:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/\"},\"wordCount\":512,\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/dns-open-resolver.png\",\"keywords\":[\"bcp38\",\"best practices\",\"dns\",\"ICANN\",\"india\",\"KINDNS\",\"open resolver\",\"security risks\",\"threat intelligence\"],\"articleSection\":[\"DNS\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/\",\"name\":\"\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/dns-open-resolver.png\",\"datePublished\":\"2023-04-13T16:56:43+00:00\",\"dateModified\":\"2025-09-30T06:56:16+00:00\",\"description\":\"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/dns-open-resolver.png\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/dns-open-resolver.png\",\"width\":1920,\"height\":1278},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/2023\\\/04\\\/open-resolvers-understanding-security-risks-and-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Open Resolvers: Understanding security risks and best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"name\":\"DNS Security &amp; Threat Intelligence Blog | Shreshta\",\"description\":\"DNS Security &amp; Threat Intelligence\",\"publisher\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#organization\",\"name\":\"Shreshta IT Technologies Pvt. Ltd.\",\"alternateName\":\"Shreshta\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"contentUrl\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/03\\\/Shreshta.svg\",\"width\":330,\"height\":76,\"caption\":\"Shreshta IT Technologies Pvt. Ltd.\"},\"image\":{\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/shreshtait\",\"https:\\\/\\\/infosec.exchange\\\/@shreshta\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/shreshta\\\/\"],\"description\":\"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.\",\"email\":\"sales@shreshtait.com\",\"legalName\":\"Shreshta IT Technologies Pvt. Ltd.\",\"foundingDate\":\"2014-01-22\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"},\"publishingPrinciples\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/blog\\\/\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/#\\\/schema\\\/person\\\/9193d733c00e1d16e59261d57c852484\",\"name\":\"Swapneel Patnekar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g\",\"caption\":\"Swapneel Patnekar\"},\"sameAs\":[\"https:\\\/\\\/shreshtait.com\\\/blog\"],\"url\":\"https:\\\/\\\/shreshtait.com\\\/blog\\\/author\\\/pswapneel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Open Resolvers: Understanding security risks and best practices","og_description":"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.","og_url":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/","og_site_name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","article_published_time":"2023-04-13T16:56:43+00:00","article_modified_time":"2025-09-30T06:56:16+00:00","og_image":[{"width":1920,"height":1278,"url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png","type":"image\/png"}],"author":"Swapneel Patnekar","twitter_card":"summary_large_image","twitter_creator":"@shreshtait","twitter_site":"@shreshtait","twitter_misc":{"Written by":"Swapneel Patnekar","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#article","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/"},"author":{"name":"Swapneel Patnekar","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484"},"headline":"Open Resolvers: Understanding security risks and best practices","datePublished":"2023-04-13T16:56:43+00:00","dateModified":"2025-09-30T06:56:16+00:00","mainEntityOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/"},"wordCount":512,"publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png","keywords":["bcp38","best practices","dns","ICANN","india","KINDNS","open resolver","security risks","threat intelligence"],"articleSection":["DNS","Threat Intelligence"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/","url":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/","name":"","isPartOf":{"@id":"https:\/\/shreshtait.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png","datePublished":"2023-04-13T16:56:43+00:00","dateModified":"2025-09-30T06:56:16+00:00","description":"In this blog post, we will share the security risks of open resolvers and best practices. Our analysis is in the context of India.","breadcrumb":{"@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#primaryimage","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/04\/dns-open-resolver.png","width":1920,"height":1278},{"@type":"BreadcrumbList","@id":"https:\/\/shreshtait.com\/blog\/2023\/04\/open-resolvers-understanding-security-risks-and-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/shreshtait.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Open Resolvers: Understanding security risks and best practices"}]},{"@type":"WebSite","@id":"https:\/\/shreshtait.com\/blog\/#website","url":"https:\/\/shreshtait.com\/blog\/","name":"DNS Security &amp; Threat Intelligence Blog | Shreshta","description":"DNS Security &amp; Threat Intelligence","publisher":{"@id":"https:\/\/shreshtait.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/shreshtait.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/shreshtait.com\/blog\/#organization","name":"Shreshta IT Technologies Pvt. Ltd.","alternateName":"Shreshta","url":"https:\/\/shreshtait.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","contentUrl":"https:\/\/shreshtait.com\/blog\/wp-content\/uploads\/2023\/03\/Shreshta.svg","width":330,"height":76,"caption":"Shreshta IT Technologies Pvt. Ltd."},"image":{"@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/shreshtait","https:\/\/infosec.exchange\/@shreshta","https:\/\/www.linkedin.com\/company\/shreshta\/"],"description":"DNS security and threat intelligence company providing real-time threat protection for organizations worldwide. Our solutions include DNS Shield (Protective DNS), DNS Watchtower (Passive DNS), and comprehensive threat intelligence feeds. Trusted by enterprises to detect, prevent, and investigate cyber threats at the DNS layer.","email":"sales@shreshtait.com","legalName":"Shreshta IT Technologies Pvt. Ltd.","foundingDate":"2014-01-22","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"},"publishingPrinciples":"https:\/\/shreshtait.com\/blog\/blog\/"},{"@type":"Person","@id":"https:\/\/shreshtait.com\/blog\/#\/schema\/person\/9193d733c00e1d16e59261d57c852484","name":"Swapneel Patnekar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b8a02ca124e85d2be9710cbbca4d5e3abdaeac895af98732bc4b2bd953879e78?s=96&d=mm&r=g","caption":"Swapneel Patnekar"},"sameAs":["https:\/\/shreshtait.com\/blog"],"url":"https:\/\/shreshtait.com\/blog\/author\/pswapneel\/"}]}},"_links":{"self":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4298","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/comments?post=4298"}],"version-history":[{"count":32,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4298\/revisions"}],"predecessor-version":[{"id":7874,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/posts\/4298\/revisions\/7874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media\/4370"}],"wp:attachment":[{"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/media?parent=4298"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/categories?post=4298"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/shreshtait.com\/blog\/wp-json\/wp\/v2\/tags?post=4298"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}