Silent Push enables security teams to query self-hosted domains and Start of Authority (SOA) records to detect malicious infrastructure and track DNS changes. These tools help identify domains controlled by threat actors and monitor zone updates that may indicate suspicious activity.
Search for Self-Hosted Domains
Self-hosted domains, where nameservers are in the same domain and hosted on the same IP as the domain’s A record (active within 30 days), are often used for phishing or malware distribution.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Search Self-hosted Domains.
Specify a domain or pattern (or use a regular expression to override).
Optional parameters:
domain_asnumornssrv_asnumfor ASNs of domain/nameserver A records.asname,asname_starts_with, orasname_containsto filter by AS names.asn_matchoptions: Any, All, Limit (with min/max).Include
with_metadata.Limit or skip results.
Click Search.
Detect Attacker-Controlled Infrastructure Using Self-Hosted Domains Search
Self-hosted domains are a strong indicator of threat actor control. They are frequently used in phishing kits, fake login pages, and malware distribution because attackers can fully manage DNS without relying on legitimate providers.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Search Self-hosted Domains.
In the main search field, enter a specific domain (e.g.,
example-malicious.com) or a pattern (e.g.,*.bank*to catch banking-related phishing). For broader hunting, use a regular expression such as.*(login|secure|account).*\.comto target common phishing keywords.Add ASN filters:
domain_asnumornssrv_asnum→ enter known bulletproof or suspicious ASNs (e.g., AS62240, AS206216).Use
asname_contains:"Russia"orasname_contains:"hosting"to focus on high-risk providers.Set
asn_match: Allif you want results only where both the domain and nameserver A records match your criteria.Check with_metadata to include Whois, registration dates, and historical IP data.
Set Limit to 100–500 for initial scans. Use Skip for pagination.
Click Search. Review results for domains where the nameserver column lists subdomains of the target pointing to the same IP address.
Sort by most recent activity. Export high-confidence matches to your ticketing system or blocklist. Submit abusive domains for takedown and feed IPs into firewalls/EDR.
Scan for SOA Records
SOA records provide administrative details about a DNS zone, such as primary nameservers and timing parameters. Monitoring changes helps detect malicious updates.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Search SOA Records.
Specify a domain (wildcards supported) or regular expression.
Optional parameters:
nsormbox(nameserver/mbox component, with “self” option for domain matching).serial,refresh,retry,expire, orTTLvalues (exact or min/max).Timestamps:
first_seen_before/after,last_seen_before/after,as_of.Sort by columns (
last_seen,first_seen,query,answer) in asc or desc order.Limit, skip, or restrict results per domain with
limit_by_n.
Click Search.
Track Malicious DNS Zone Changes Using SOA Records Search
Sudden changes, such as serial number increases, new primary nameservers, or shortened TTLs, often signal domain hijacking, Subdomain creation, or fast-flux evasion tactics.
From the left navigation menu, select Advanced Query Builder > PADNS Queries > Search SOA Records.
Enter a specific domain (e.g.,
compromised-corp.com) or use wildcards (e.g.,*.corp.com). For advanced pattern matching, enable regex (e.g.,.*(dev|api|staging)\.corp\.com).Look for recent zone updates:
serial > 2026010100.Flag self-hosted nameservers:
ns:"self".Detect fast-flux:
TTL < 3600.Filter by timing:
first_seen_after:"2026-01-01"orlast_seen_after:"2025-12-01".
Sort by
serial descorlast_seen desc. Uselimit_by_n: 10to return only the most recent records per domain.Click Search. Examine the results for unexpected serial jumps, new mbox values, or name server changes.
Compare current SOA against historical baselines. Correlate new subdomains/IPs with threat intel. Alert domain owners or registrars if hijacking indicators are present.
Save Query
Specify query parameters.
Click Save Query.
Provide a Name and Description for context.
Click Save. The query appears in Private Queries.