Passive DNS (PADNS) queries enable security teams to analyze DNS records and Domain Density to uncover attacker infrastructure, establish links between records, and identify malicious patterns. Forward lookups and domain density analysis provide granular insights into DNS record types and their associations.
Search Passive DNS Data (Forward Lookup)
Search Silent Push’s passive DNS data to link records to global attacker infrastructure using various record types.
How to Run the Query
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Forward lookup.
Select a record type (
qtype): A, AAAA, CNAME, MX, NS, PTR4, PTR6, ANY, SOA, TXT.Specify a record name in
qname.Optional parameters:
For PTR4 or PTR6, specify a netmask.
For A or AAAA, include/exclude subdomains.
Include/exclude metadata.
Use a regular expression (re2) to override
qname.Set timestamps:
first_seen_before/after,last_seen_before/after,as_of.Sort by columns (
last_seen,first_seen,query,answer) in asc or desc order.Limit or skip results.
Click Search.
Map Relationships Between Domains and IPs to Track Phishing or Malware Infrastructure
Forward lookups reveal historical and current resolutions for a domain or pattern, helping you pivot from a known malicious domain to its IPs, CNAME chains, or related records.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Forward lookup.
Start with
AorAAAAfor IP addresses,CNAMEfor alias records, orTXTfor SPF/DMARC records, which are often abused in phishing.Enter a specific domain (e.g.,
malicious-phish.com) or use regex for broader hunting (e.g.,.*login.*\.comto catch login-themed phishing domains).Include subdomains if investigating a brand (e.g., all subdomains of
yourbrand.com).Use
first_seen_after:"2025-01-01"to focus on newly observed infrastructure.Check with_metadata to pull Whois and geolocation data.
Sort by
last_seen descto prioritize currently active resolutions.
Click Search. Look for sudden IP changes (possible fast-flux), shared IPs across multiple suspicious domains, or CNAMEs pointing to known bulletproof hosting.
Export IPs to block via Firewall rules. Feed related domains into threat intel platforms. Chain results into reverse lookups for deeper Infrastructure mapping.
Search Passive DNS Data (Reverse Lookup)
Reverse lookups map IPs or other DNS records back to associated domains or records, using data from trusted third parties to identify attacker infrastructure.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > reverse lookup.
Select a record type (
qtype): A, AAAA, CNAME, MX, NS, PTR4, PTR6, ANY, SOA, TXT, MXHASH, NSHASH, SOAHASH, TXTHASH.Specify a record name in
qname(e.g., an IP address for A/AAAA or a hash for MXHASH/NSHASH).Optional parameters:
For PTR4 or PTR6, specify a netmask.
For A or AAAA, include/exclude subdomains.
Include/exclude metadata.
Use a regular expression (re2) to override
qname.Set timestamps:
first_seen_before/after,last_seen_before/after,as_of.Sort by columns in asc or desc order (use semi-colons for nested sorting).
Limit or skip results.
Click Search.
Identify Domains Associated with a Specific IP or Hash to Uncover Attacker-Controlled Infrastructure
Reverse lookups are essential for pivoting from a single indicator (e.g., a malicious IP address from a sandbox report) to all domains historically and currently associated with it.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > reverse lookup.
Use
Afor IPv4 reverse,AAAAfor IPv6, or hash types (MXHASH,NSHASH) to find domains sharing the same mail or nameserver setup.Input a known malicious IP (e.g.,
192.168.1.100) or a hash from a previous investigation.Use
last_seen_after:"2025-07-01"to focus on active infrastructure.Include with_metadata for registrar and ASN details.
Sort by
first_seen ascto see the oldest domains (often the attacker’s primary ones).Set a reasonable Limit (e.g., 500) to handle high-density IPs.
Click Search. High-volume results often indicate bulletproof hosting or compromised servers.
Cluster domains by theme (e.g., phishing pages, C2). Submit for takedown. Block the IP Range if the density is extreme.
Establish Domain Density
Domain density measures the number of unique domains associated with a network element (e.g., a DNS record, an IP, an ASN). High density may indicate malicious activity.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > density lookup.
Select a query type: Nameserver, MX server, Nameserver hash, MX hash, IPv4 address, IPv6 address, ASN.
Enter a query value.
Choose a scope:
For IPv4: IP (exact match), subnet, subnet_ips, asn, asn_subnets.
For ASN: asn, asn_subnets.
For NSSRV or MXSRV: host (exact match), domain, Subdomain.
Click Search.
Identify Patterns of Malicious Activity by Analyzing Domain Concentration
High domain density on a single IP, subnet, or ASN is a classic indicator of bulletproof hosting, phishing kits, or malware distribution networks.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > density lookup.
Start with
IPv4 addressand an IP from a reverse lookup, orASNfor broader network analysis.Use
subnetorasn_subnetsto expand beyond a single IP.For nameserver analysis, use
Nameserver+domainscope to see all domains under a specific NS.
Click Search. Results show unique domain counts and lists.
>500 domains on a single IP are very likely malicious.
An ASN with 10,000 domains is a potential bulletproof provider.
Review the domain list for thematic clustering (e.g., all banking phishing).
Flag the IP/subnet/ASN in your threat intel feeds. Share with hosting providers or CERTs for takedown coordination.
Save Query
Specify query parameters.
Click Save Query.
Provide a Name and Description for context.
Click Save. The query appears in Private Queries.