Anonymous IP more secure than one with DNS Record?

Posted on 2011-04-21
Last Modified: 2012-05-11
Most of our user workstations use the same general NAT'd address of x.x.x.10 for their external IP.  We have a group of users that would like to access a service that requires a DNS pointer with a certain domain (in this case government).  I've always assumed it was more secure to have an anonymous IP without a DNS record pointing any port scanners right to us.  The other alternatives are to ask the service to put in a static pointer for us or make an exception for our IP.  

Do you think there a significant vulnerability increase if I request a DNS record?  
Question by:dslntadmin
    LVL 3

    Expert Comment

    there is no extra vulnerability if you have dns, it just makes is look more legit comparing with an ip without dns
    LVL 7

    Accepted Solution

    A DNS record would only add security risk if a hacker got ahold of the DNS records and you had computers named:


    By using an arbitrary name, you can have DNS resolve the DHCP to make it easier for people to connect to their computers and just have names that dont give out information like:


    Regarding your question on DNS pointing a hacker right to you, its not hard to have a computer find all available IPs.

    Author Closing Comment

    Thank you, your answer adds clarity to the issue.  I know it's not hard to find available IPs, just didn't want to add one more way!  


    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Malicious software is nothing new. Viruses have been created and spread since before physical networks became popular; back then viruses spread via floppy disk and modem connections with shared systems. Viruses weren't so rampant and protecting your…
    This article summarizes using a simple matrix to map the different type of phishing attempts and its targeted victims. It also run through many scam scheme scenario with "real" phished emails. There are safeguards highlighted to stay vigilance and h…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    737 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now