LAST UPDATED: 2023-02-20
This report identifies DNS servers that have the potential to be used in DNS amplification attacks by malicious actors that wish to perform denial of service attacks.
The DNS servers are checked with a command equivalent to:
Items that are tagged with “openresolver” indicate that the host responded to the request with the proper name and the proper IP address associated with that DNS name. Items that are tagged with “openresolver;bogusresolver” indicate that the host responded to the request with the proper name, but with an IP address that is NOT associated with that DNS name.
You can view our scan results on our Dashboard.
You can learn more on the report in our DNS Open Resolvers Report tutorial.
You can learn more on our reports in general in our Overview of Free Public Benefit Shadowserver Reports presentation, which also explains example Use Cases.
For more information on our scanning efforts, check out our Internet scanning summary page.
This report comes in 2 versions: IPv4 and IPv6.
Filename(s): scan_dns, scan6_dns