So are you tapping the traffic between the LAN and your DNS servers? If not you'd either need to tap there, or enable logging on the servers to see what internal host made the request.
> So are you tapping the traffic between the LAN and your DNS servers? If not you'd either need to tap there, or enable logging on the servers to see what internal host made the request.
Thanks for the reply, Michael. Yes, I am tapping each port going to our DNS servers and filtering that traffic for only DNS (through the use of an access-list on a Cisco device). I know that I am getting the internal traffic because I can do a tcpdump on the SecurityOnion Sensor interface and see all of it, I am just having trouble correlating these alerts to the original requests that led to them. Obviously the end user machine (or possibly server) that is responsible is not requesting "ns1.no-ip.com", but it's requesting something that nameserver handles, and I am trying to find out the best way to pinpoint that.
--
Follow Security Onion on Twitter!
https://twitter.com/securityonion
---
You received this message because you are subscribed to the Google Groups "security-onion" group.
To unsubscribe from this group and stop receiving emails from it, send an email to security-onion+unsubscribe@googlegroups.com.
To post to this group, send email to security-onion@googlegroups.com.
Visit this group at https://groups.google.com/group/security-onion.
For more options, visit https://groups.google.com/d/optout.