DNS Sinkhole Logs
NetworkDNS AnalysisNetwork CaptureSIEM / Log Aggregator
Location
DNS sinkhole server logs (Response Policy Zones, Pi-hole block logs, Infoblox RPZ)Description
Logs from DNS sinkholes or Response Policy Zones (RPZ) recording queries that were intercepted and redirected to a sinkhole IP instead of the actual malicious destination.
Forensic Value
Sinkhole logs provide a definitive list of internal hosts attempting to contact known-malicious domains. Unlike general DNS logs, every sinkholed query represents a blocked threat -- the host is confirmed infected but the C2 communication was prevented. Recurring sinkhole hits from the same host after remediation indicate incomplete cleanup. Time-series analysis of sinkhole hits quantifies the scope of an infection across the environment.
Tools Required
SIEM (Splunk, Elastic)DNS server logsgrepRPZ configuration tools
Collection Commands
Pi-hole
pihole -t | tee pihole_live_log.txt && sqlite3 /etc/pihole/pihole-FTL.db "SELECT timestamp,domain,client FROM queries WHERE status IN (1,4,5,6,7,8,9,10,11) ORDER BY timestamp DESC LIMIT 5000;" > sinkholed_queries.csv
BIND RPZ
grep "QNAME redirect" /var/log/named/rpz.log | awk '{print $1, $2, $NF}' > rpz_redirects.txtSplunk
index=dns sourcetype=sinkhole earliest=-30d | stats count by src_ip, query | sort -count | head 100
MITRE ATT&CK Techniques
T1071.004T1568.002T1568T1583.001T1048.003