DNS Morons

These people should run Split-horizon DNS;

HostWrong IP addressReason
block.proxy.umbrella.opendns.com::ffff:208.69.35.152IPv4-mapped IPv6 addresses
block.proxy.umbrella.opendns.com::ffff:208.69.35.157IPv4-mapped IPv6 addresses
ibauhns3.duhosting.ae10.79.128.18RFC 1918
ibauhns4.duhosting.ae10.79.128.22RFC 1918
ibdxbns3.duhosting.ae10.198.18.10RFC 1918
ibdxbns4.duhosting.ae10.198.18.14RFC 1918
ns1.comeconnect.com64:ff9b::caa4:2051RFC 6052
ns1.motianya.com192.168.1.1RFC 1918
ns1.redcondor.net172.27.134.21RFC 1918
ns2.cmt.net.br10.1.0.54RFC 1918
ns2.comeconnect.com64:ff9b::caa4:2052RFC 6052
ns2.motianya.com192.168.1.1RFC 1918
ns3.tataidc.co.in64:ff9b::6708:2d05RFC 6052
ns4.tataidc.co.in64:ff9b::6708:2e05RFC 6052
ns5.tataidc.co.in64:ff9b::6708:2c05RFC 6052
nsan.tcc.edu172.29.240.36RFC 1918
nsav.tcc.edu172.27.240.36RFC 1918
win2003.iim.ncku.edu.tw192.168.123.1RFC 1918

Last update: Tue 22 Oct 06:02:02 UTC 2019

Block

You can block answers like these with Bind's 'deny-answer-addresses' feature;

    deny-answer-addresses {
        // Unconfigured
        0.0.0.0;
        // RFC 1918
        10.0.0.0/8;
        172.16.0.0/12;
        192.168.0.0/16;
        // RFC 3927
        169.254.0.0/16;
        // IPv6
        // :: to ::ffff:ffff:ffff.
        // Includes ::, ::1, IPv4-Compatible IPv6 Addresses ::/96,
        // and IPv4-mapped IPv6 addresses ::ffff:0:0/96
        ::/80;
        // RFC 6052
        64:ff9b::/96;
        // Reserved for Documentation
        2001:db8::/32;
        // IPv6 Unique Local
        fc00::/7;
        // IPv6 Link local
        fe80::/10;
        // IPv6 Site local
        fec0::/10;
        // Your IPv6 address range(s)
        Net/Mask
    } except-from { "Your.Domain"; };
    deny-answer-aliases { "Your.Domain"; };

The produces log entries like;

  Aug 21 19:31:01 sput named[1601]: answer address 10.0.0.100 denied for spacefon.com/A/IN

Not blocking these addresses can be a serious security risk.