<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic BotNet Filter and OpenDNS in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/botnet-filter-and-opendns/m-p/1380268#M748209</link>
    <description>&lt;P&gt;We are running a trial of the ASA 8.2 BotNet Filter on our production ASA.&amp;nbsp; In the alerts we keep getting notices of a Very High alert for 208.69.36.132.&amp;nbsp; When we look it up we end up seeing that it resolves as hit-nxdomain.opendns.com.&amp;nbsp; Our hunch is that this is traffic that would have been malicious, but that since we use OpenDNS to do some filtering it's returning its own address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else ran into this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 17:19:39 GMT</pubDate>
    <dc:creator>Benjamin Story</dc:creator>
    <dc:date>2019-03-11T17:19:39Z</dc:date>
    <item>
      <title>BotNet Filter and OpenDNS</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-and-opendns/m-p/1380268#M748209</link>
      <description>&lt;P&gt;We are running a trial of the ASA 8.2 BotNet Filter on our production ASA.&amp;nbsp; In the alerts we keep getting notices of a Very High alert for 208.69.36.132.&amp;nbsp; When we look it up we end up seeing that it resolves as hit-nxdomain.opendns.com.&amp;nbsp; Our hunch is that this is traffic that would have been malicious, but that since we use OpenDNS to do some filtering it's returning its own address. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone else ran into this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:19:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-and-opendns/m-p/1380268#M748209</guid>
      <dc:creator>Benjamin Story</dc:creator>
      <dc:date>2019-03-11T17:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: BotNet Filter and OpenDNS</title>
      <link>https://community.cisco.com/t5/network-security/botnet-filter-and-opendns/m-p/1380269#M748217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using opendns and you have your bots dns-ing out to it for some bad sites that opendns doesn't know it will send back its own ip (and then show you its "block/don't know" page). When the ASA sees that ip it flags it for the url that the dns went out for and thus open dns will be flagged as malicious. There is not much hope if you use open dns because whenever a bot accesses a site that open dns doesn't know it will be flagged and blocked which will then block your open dns.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Mar 2010 21:46:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/botnet-filter-and-opendns/m-p/1380269#M748217</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-03-10T21:46:53Z</dc:date>
    </item>
  </channel>
</rss>

