Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape Free Certifications NEW
Popular Guides
memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners White Label Referral Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs — see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs Small Operators
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

Free Security Tool

Open DNS Resolver Checker

Check if a DNS server is configured as an open resolver. Open resolvers can be abused for devastating DNS amplification DDoS attacks with up to 54x amplification.

Note: Browser-based checks cannot directly test DNS resolver status. This tool provides an educational assessment based on the IP you enter. To definitively test your server, use the command-line tests shown below.

How the Attack Works

DNS Amplification Attack Explained

In a DNS amplification attack, the attacker sends small DNS queries (typically ~60 bytes) with a spoofed source IP (the victim's IP) to open DNS resolvers. The resolvers respond with much larger DNS responses (up to ~3,400 bytes) directed at the victim.

Because the response is 28-54x larger than the query, a small amount of attacker bandwidth becomes a massive flood at the victim's server. A botnet of just 1,000 machines can generate hundreds of Gbps of attack traffic.

54x
Maximum
Amplification Factor
Attack Flow
AttackerSpoofed query (60 bytes)
Open ResolverLarge response (~3,400 bytes)
Victim ServerOverwhelmed by traffic
Source IP is forged → response goes to victim

Historical Record

Largest DNS Amplification Attacks

YearTargetPeak SizeNotes
2024Unnamed CDN321 GbpsMixed DNS + NTP amplification vector
2023European Bank260 GbpsSustained 48-hour multi-vector attack
2016Dyn DNS1.2 TbpsMirai botnet + DNS amplification disrupted major sites
2013Spamhaus300 GbpsLargest attack at the time, primarily DNS amplification
2012US Banks60 GbpsOperation Ababil, itsoknoproblembro toolkit

Test Your Server

Commands to Check Your DNS Server

# Test if your server responds to external recursive queries
dig @YOUR_SERVER_IP example.com A +short

# If this returns an IP address, your server is an open resolver

# Test with nslookup
nslookup example.com YOUR_SERVER_IP

# Check for recursion-available flag
dig @YOUR_SERVER_IP example.com A +recurse
# Look for "ra" flag in response (recursion available)

# Test ANY query (used in amplification)
dig @YOUR_SERVER_IP isc.org ANY
# If this returns a large response, amplification is possible

Fix It

How to Secure Your DNS Resolver

1

Disable recursion for external queries

In BIND (named.conf), set allow-recursion { localhost; your-network/24; }; to only allow recursion from your own networks. This is the single most important fix.

2

Implement Response Rate Limiting (RRL)

In BIND 9.9+, add rate-limit { responses-per-second 5; }; to the options block. This limits the number of identical responses sent per second, dramatically reducing amplification effectiveness.

3

Block ANY queries

ANY queries produce the largest responses. Consider blocking them: in BIND, use minimal-any yes; (BIND 9.11+) to return minimal responses to ANY queries.

4

Implement BCP38 (Source Address Validation)

Work with your upstream provider to implement ingress filtering that blocks packets with spoofed source addresses. This prevents your network from being used to launch amplification attacks.

5

Use firewall rules as a safety net

Block incoming DNS queries (port 53 UDP/TCP) from the internet if you don't need to serve external DNS. Use iptables or your cloud provider's security groups.

# Allow DNS only from trusted networks
iptables -A INPUT -p udp --dport 53 -s YOUR_NETWORK/24 -j ACCEPT
iptables -A INPUT -p udp --dport 53 -j DROP

Protect Your Infrastructure with Flowtriq

Detect DNS amplification attacks and every other DDoS vector in under 1 second. Get real-time alerts before your users notice.

Start Your Free Trial
7-day free trial · No credit card required · $9.99/node/month
Export your results