Sinkhole
A technique that redirects traffic destined for a malicious domain or IP to a defender-controlled server, cutting off botnet command-and-control and collecting victim telemetry.
Last updated:
What is a sinkhole?
Sinkholing is the practice of redirecting traffic that was heading to an attacker-controlled destination so it lands on a defender-controlled server instead. Two common implementations are used:
- DNS sinkhole — a DNS resolver (ISP, enterprise, or authoritative registrar) returns a controlled IP for a blocked domain. Every infected host that tries to resolve the C2 hostname ends up talking to the sinkhole instead of the attacker.
- BGP sinkhole — an upstream announces a more-specific route for the attacker's IP to pull traffic away; common for mitigating DDoS and for law-enforcement takedowns
Either way, the infected clients are still running their malware, but it is now talking to defenders instead of to its command-and-control server.
What sinkholes are used for
- Botnet takedowns — seizing a C2 domain and sinkholing it cuts the attacker's control over the bots and gives defenders a census of infected hosts. The 2011 Coreflood takedown, the 2014 GameOver Zeus seizure, and the 2021 Emotet disruption all used sinkholing to enumerate and notify victims.
- ISP-level safe browsing — Quad9 and similar public resolvers sinkhole known malicious domains for all their users
- WannaCry kill-switch — researcher Marcus Hutchins' accidental sinkhole of WannaCry's kill-switch domain effectively stopped the worm in May 2017
Telemetry value
A sinkhole receives every beacon from every infected host on the internet, producing one of the richest sources of victim IP data. Those feeds power the notifications defenders send to compromised organizations and the reputation signals for infected IPs.
Check whether an IP has been observed checking into sinkholed C2 infrastructure with our IP abuse report checker.