How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
According to a third-party database, the remote host is using
a DNS server that is listed as part of a botnet.
The remote host is using one or more DNS servers that are listed in a
public database as part of a botnet. This could cause requests for
legitimate websites and hostnames to be routed to attacker-controlled
machines. This also suggests that this host may have been
See also :
Investigate the DNS server settings and reinstall the remote system from
scratch if appropriate.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 6.9
Public Exploit Available : false
Nessus Plugin ID: 58429 ()
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.