- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Detects when a Windows host makes DNS queries to Tor onion addresses.
This detection monitors DNS event logs where the query name contains “.onion” domains, which are specific to Tor hidden services. The detection looks for Event ID 3008 containing *.onion*
in the QueryName
field.
DNS queries for these addresses could indicate the presence of Tor software or specially configured applications attempting to access hidden services. This activity is notable as Tor can be leveraged by threat actors to hide command and control communications, or access underground marketplaces.
{{host}}
system that made DNS queries to Tor onion addresses.