Every transaction on the Internet – good or bad – leaves a trail in the Domain Name system (DNS). This means that cyber criminals also rely on the DNS. For fraudulent websites to exist online, the criminals rely on DNS to help make those sites available. Security teams need the power to use a single indicator to uncover key DNS relationships and expose the entire fraudulent network.
Located other domains which are also using that same IP address and track not only what, but when.
Look at larger IP netblock(s) that surround an initial IP amplifying and magnifying an initial clue into hundreds or thousands.
Trace the DNS history of a domain and uncover: What addresses has a domain used over time? How have a domain's name servers evolved over time?
Farsight Security’s DNSDB® is a Passive DNS historical database that provides a unique, fact-based, multifaceted view of the configuration of the global Internet infrastructure.
NOD leverages Farsight’s real-time Passive DNS sensor array and cross-references that data with its industry-leading DNSDB® historical Passive DNS database.
Farsight’s Newly Observed Hostnames (NOH) Provides organizations with visibility of new hostnames or Fully Qualified Domain Names (FQDNs) – when they are first active.
Overview
Overview
Overview
Infographic
Case Study
Case Study