SecurityTrails Blog SecurityTrails Blog · Sep 04 · SecurityTrails team How to use name server records to locate malicious domains en masse Malicious domains often come in the form of phishing sites looking to steal usernames, passwords, and other sensitive information by impersonating a well-known brand. Mitigating phishing threats requires constant attention by information security teams. In this post we’ll demonstrate the value of DNS records, specifically name server (NS) records to locate phishing and other malicious sites en masse. SecurityTrails Blog · Aug 29 · SecurityTrails team Mitigating SSH based attacks – Top 15 Best SSH Security Practices SSH is one of the most popular communication protocols on the Internet. It's widely used by developers, webmasters, and sysadmins. It allows you to gain remote access to your new Cloud or Dedicated box in just seconds using an encrypted communication channel. SecurityTrails Blog · Aug 20 · SecurityTrails team DNS records and types you didn’t know about DNS records are an important part of internet. It is from DNS records that DNS servers know which domain is associated with what IP address. To simplify, we can turn to an analogy: your home address has coordinates that helps locate them in GPS. Since nobody can really remember that string of number precisely, you would tell them your street name and number. The same concept exists with domains and IP addresses, domains being street names and numbers, IP addresses being longitude points. SecurityTrails Blog · Jul 04 · SecurityTrails team 8 tips to prevent DNS attacks The DNS is the heart and soul of the internet. It's like a giant phonebook that your computer uses to map hostnames to IP addresses in order to interact with public services such as websites.