Skip to main content

Fast-Flux Detection

developer
GET/v1/dns/fast-flux

Detects fast-flux DNS behavior — a technique used by botnets, phishing infrastructure, and malware command-and-control servers to evade takedowns by rotating through many IPs with very short TTLs. Performs multiple rounds of A and AAAA queries across multiple DoH resolvers with delays between rounds, comparing IP sets and TTLs to flag rotation patterns.

What It Does

Executes 3–5 rounds of A and AAAA queries with configurable delays. For each round, records the unique IP set and minimum TTL. Flags fast-flux when minimum TTL is below 300 seconds AND at least one round observes a different IP set than the preceding round. Rotates across multiple public DoH resolvers (Cloudflare, Google, Quad9) to reduce resolver-side caching from masking rotation. Returns per-round metrics, aggregated IP set, and a verdict with supporting evidence.

Why It's Useful

Fast-flux detection is a key input for blocking phishing and malware C2 traffic. Unlike static threat feeds that list known-bad domains, fast-flux detection catches active infrastructure before it lands in a feed. Complements the domain-threat check by adding behavioral analysis to reputation-based lookup.

Use Cases

Threat Intelligence Analyst

Phishing Infrastructure Detection

Confirm a newly reported suspicious domain is using fast-flux hosting, strengthening the case for blocking and takedown.

Corroborate threat-feed hits with behavioral evidence of rotating infrastructure.

SOC Analyst

SOC Triage

Investigate a domain observed in SIEM alerts — confirm whether it uses fast-flux before escalating the alert.

Higher-confidence triage decisions with automated behavioral signals.

Network Security Engineer

Protective DNS Tuning

Identify fast-flux domains passing through your protective DNS resolver to tune detection rules.

Reduce dwell time for fast-flux-hosted malware in your environment.

Parameters

NameTypeRequiredDescription
domainstringRequiredThe domain to probe for fast-flux behaviorExample: example.com
samplesnumberOptionalNumber of query rounds (2–5, default 3). More rounds give stronger signal at cost of longer response time.Example: 3

Response Fields

FieldTypeDescription
domainstringThe queried domain
is_fast_fluxbooleanWhether fast-flux behavior is detected
confidencestringConfidence: low, medium, high
roundsnumberNumber of query rounds executed
total_unique_ipsnumberTotal distinct IPs observed across all rounds
min_ttlnumberMinimum TTL observed
ip_set_changesnumberNumber of rounds where IP set differed from prior round
rounds_detailarrayPer-round breakdown: IPs, TTL, resolver, elapsed ms
findingsarrayHuman-readable findings
limitationsarrayCaveats — e.g., DoH resolver caching may mask rotation

Code Examples

cURL
curl "https://api.edgedns.dev/v1/dns/fast-flux" \
  -H "Authorization: Bearer YOUR_API_KEY" \
  -d "domain=example.com"
JavaScript
const response = await fetch(
  'https://api.edgedns.dev/v1/dns/fast-flux?domain=example.com',
  {
    headers: {
      'Authorization': 'Bearer YOUR_API_KEY'
    }
  }
);

const data = await response.json();
console.log(data);
Python
import requests

response = requests.get(
    'https://api.edgedns.dev/v1/dns/fast-flux',
    headers={'Authorization': 'Bearer YOUR_API_KEY'},
    params={
    'domain': 'example.com'
    }
)

data = response.json()
print(data)

Read the full Fast-Flux Detection guide

Why it matters, real-world use cases, parameters, response fields, and how to call it from Claude, ChatGPT, or Gemini via MCP.

Read the guide →

Related Endpoints

External References

Learn more about the standards and protocols behind this endpoint.

Try This Endpoint

Test the Fast-Flux Detection endpoint live in the playground.