If this is your domain name, please visit this page to see how to register it as DNS zone into your account.
Note: If you already have registered the DNS zone for your domain name, please wait for DNS propagation. Your web site will be displayed soon. It may take few minutes.
* Do you know what DNS Tunneling is?
Suggested article: DNS Tunneling attack – What is it, and how to protect ourselves?
DNS tunneling attack exploits the DNS (Domain Name System). The cybercriminals manage to execute tunneling malware or data through a client-server model.
The attack is triggered when a regular user downloads malware or the attacker uses for its purpose a vulnerability of the compromised device to transfer a malicious payload. In the majority of cases, the attackers want to persist in connection with the compromised device. That way, they have the ability to run different commands on the target device or exfiltrate data. For that reason, usually, they use a command-and-control (C2) connection.
What can you do?
If you are curious to learn more about this cyber threat, take a look at additional information about how to detect a DNS Tunneling attack!