Suspicious DNS Query - how to find source computer?

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Suspicious DNS Query - how to find source computer?

L4 Transporter


Since I upgraded to 5.0.3 from 4.1.10 I started getting such entry in Treat log:

Suspicious DNS Query ( 4009473 spyware medium drop-all-packets 74

Suspicious DNS Query ( 4008620 spyware medium drop-all-packets 31

Suspicious DNS Query ( 4014899 spyware medium drop-all-packets 26

Bot: Torpig Phone Home DNS request 12657 spyware medium drop-all-packets 276

Suspicious DNS Query ( 4000032 spyware medium drop-all-packets 40

It's pointing to my two DNS servers for my local networks. I'm almost sure that this isnt a problem with this servers because last week was Eastern Christmas and during this time I never got such traffic. When my users back to work its started again.

Some of user's computers are in the same Zone as this two DNS servers. How in this case catch sources of this traffic?

For other network I will enable strict Tread profile on allow DNS traffic rules, I hope that this will give me information about real sources of this dns requests.

With regards



L0 Member


Please find the below document for the same.

DNS Sinkhole Process with Internal DNS Server



L3 Networker

I have configured DNS sinkole, but it does not sinkhole these DNS requests (torpig):

Bot: Torpig Phone Home DNS request


I believe sinkhole threat IDs can be between 4000000 and 4999999 on paloalto.

I don't know why torpig is not included.

  • 16 replies
  • 101 Subscriptions
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!