| ▲ | daneel_w 2 hours ago | |
I'm not sure you read the OP's comment in full. They are talking about inbound traffic from the Internet. It's certainly a lot more common a case to self-host an MX than running an open DNS resolver or authorative name server. | ||
| ▲ | B1FIDO an hour ago | parent [-] | |
You may be surprised to learn that there are many types of botnets out there, and many use DNS queries for the C&C. Although the GP wrote "53/tcp" that is a weird situation, because most (not all) DNS is over UDP. One day I suddenly found my DNS resolver logs were very active with veritable gibberish. And it seems that my router had been pwned and joined some sort of nefarious botnet. I only found this out because I was using NextDNS at the time, and my router's own resolver was pointed there, and NextDNS was keeping meticulous, detailed logs of every query. So I nipped it in the bud, by determining which device it was, by ruling out other devices, and by replacing the infected demon router with a safe one. But yeah, if your 53/udp or 25/tcp is open, you can pretty much expect to join a botnet of the DNS or SMTP-spam varieties. | ||