High Reverse DNS queries

Posted by olivia_0721@reddit | sysadmin | View on Reddit | 4 comments

Hi,

We’ve identified a single Windows device generating a high volume of reverse DNS (PTR) queries. This activity was flagged by sentinel? but there is no indication of connections to external IPs

Also to clarify, this does not appear to be related to any previously known activity (e.g., Malaysia-based alerts). At this stage, it looks more like excessive DNS querying rather than confirmed outbound communication.

The key challenge right now is pinpointing the exact process responsible on that device. Standard checks (Task Manager, Resource Monitor, basic logs) haven’t clearly identified the source.

Has anyone dealt with similar behavior?

What’s the most effective way to trace DNS queries back to the originating process on Windows.

Thanks.