Skip to content

Hosting provider warns our DNS server was used in an amplification attack

In DNS amplification an attacker sends small queries with a spoofed source IP to an open recursive resolver, which returns a much larger response to the victim. If your server is in that chain, lock it down for public traffic immediately.

Try this first

  1. 1Restrict the recursive resolver to your own network: in BIND allow-recursion {trusted;}, in Windows DNS the equivalent scope restriction.
  2. 2Disable large EDNS responses to unknown sources, or enable Response Rate Limiting (RRL) on your authoritative server.
  3. 3Set firewall rate-limits on inbound UDP port 53 from the public internet, a few hundred queries per second max.
  4. 4Check with openresolver.com or dnsinspect.com whether your IP is still on a list of open resolvers.
  5. 5Where possible move to a managed Anycast DNS (Cloudflare, NS1) so amplification mitigation is no longer your problem.

When to bring us in

If you are a target or source of DNS abuse and abuse emails keep coming, we can help lock down the resolver and clean up the relationship with hosting.

See also

None of the above fits?

Describe your situation below. We pass your input plus the steps you already saw to our AI and return tailored next-step advice. If it's too risky to DIY, we'll say so.

Who are you?

For the AI question we need your email and company, so we can follow up if the AI gets stuck, and to prevent abuse.

Limited to 2 questions per hour and 5 per day, kept lean so the AI stays useful. For more, contacting us directly works better for you and us.

Or skip the DIY entirely

Our Managed IT clients do not look these things up. One point of contact, a fixed monthly price, resolved within working hours.