Created
August 29, 2025 01:51
-
-
Save itsnikolayy/20cf3ee316f2952c93b73ef4ad3b37c6 to your computer and use it in GitHub Desktop.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # Akamai Public Recursive DNS (Observed) | |
| It appears that **Akamai may be running a public recursive DNS service**. | |
| --- | |
| ## IP Ranges | |
| The following IP ranges have been observed: | |
| - `96.7.136.0/24` | |
| - `96.7.137.0/24` | |
| --- | |
| ## Notes from Testing | |
| - Some of the IPs do not respond, and some take a long time to respond. | |
| - From basic testing, `96.7.136.0` seems to have the fastest responses. | |
| - Akamai appears to **advertise** the following IPs: | |
| - `96.7.136.4` | |
| - `96.7.137.4` | |
| --- | |
| ## Reference | |
| The advertised IPs were found in a CIS (Center for Internet Security) PDF: | |
| *(Not directly linked here because it will automatically download.)* | |
| - Google search link (safe to click): | |
| [Search for the PDF on cisecurity.org](https://www.google.com/search?q=inurl%3A%22Malicious-Domain-Blocking-and-Reporting-Setup-Instructions.pdf%22+site%3Acisecurity.org) | |
| - Archived version (safe, static view): | |
| [Wayback Machine link](https://web.archive.org/web/20250829014424/https://www.cisecurity.org/-/media/project/cisecurity/cisecurity/data/media/files/uploads/2020/09/Malicious-Domain-Blocking-and-Reporting-Setup-Instructions.pdf) | |
| --- | |
| thanks to chatgpt for better formatting LOL |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment