Skip to content

Passive DNS/TLS Guide

Passive DNS/TLS helps analysts reconstruct historical DNS changes and discover adjacent infrastructure (IPs, nameservers, MX, and certificate subjects) related to a domain. This is useful for understanding hosting moves, provider changes, and relationships between suspicious domains.

As an analyst it’s also helpful in understanding the history of a Domain. How recent is it? What activity has been occurring, are they switching IPs frequently? All of this helps you better understand not only the Domain at this point in time, but its past behavior as well.

  • Timeline analysis: Review A/AAAA, NS, MX, TXT, and CNAME changes over time
  • Infrastructure mapping: Identify IPs, nameservers, and TLS subjects historically associated with a domain
  • Change detection: Spot significant flips (e.g., NS churn, MX changes)
  • Context building: Correlate passive signals with lookup results, rules, and alerts

Passive DNS/TLS panel

  1. KPIs: First/last seen, IP churn, MX/NS flips, TXT/SPF health, CNAME hops
  2. Filters: Toggle record types (A/AAAA, NS, MX, TXT, CNAME)
  3. Timeline: Historical observations grouped by record type
  4. Legends & details: Hover to see timestamps and counts; switch single-lane for compact view
  5. Context cards: Top IPs, TLS subjects, and nameservers seen

The timeline condenses all observed DNS changes into a single visual so you can quickly spot bursts, gaps, and pivots in infrastructure. Use it to correlate record flips with registration events, hosting moves, or certificate subject shifts.

Passive DNS/TLS timeline
  • Filter: Toggle A/AAAA, NS, MX, TXT, CNAME to focus the series
  • Details: Hover points to see timestamp and count
  • Compact: Use single‑lane for a compressed timeline
  • Filter to A/AAAA and review points on the timeline
  • Compare with TLS subjects to see certificate continuity across hosting moves
  • Enable MX and TXT to validate SPF/DKIM posture changes
  • Multiple MX flips in short time windows can indicate staging or abuse
  • Enable NS and review churn
  • Cross-reference with other suspicious permutations to find shared providers
  • In lookup results, Passive DNS/TLS augments each permutation’s context
  • In the Rules Engine, combine passive signals with infrastructure and registration data to raise confidence

Open the detailed events view to browse all passive observations.

  • Type filters: Quickly scope to A, AAAA, NS, MX, TXT, or CNAME
  • Filter by IP / host: Free-text filters to narrow results
  • Chronological list: Each row shows the record, value, and timestamp
  • Clear: Resets all filters

Use this view to audit exact changes and pivot into specific infrastructure items.

Passive DNS/TLS events

When streaming results from the API, Passive DNS/TLS events appear as operations:

{"op":"PassiveDns","data":[{"rrtype":"NS","rrname":"ns1.example.com","rdata":"example.com","time_first":1751627704,"time_last":1751627704,"count":1}]}
  • Use the single-lane toggle for compact investigations in wide tables
  • Focus on bursts of change (e.g., multiple NS/MX flips) as triage signals
  • Pair passive data with classification and whois/rdap to strengthen confidence