---
title: DNS lookup for paste service
description: Datadog, the leading service for cloud-scale monitoring.
breadcrumbs: Docs > Datadog Security > OOTB Rules > DNS lookup for paste service
---

# DNS lookup for paste service
Classification:attackTactic:[TA0011-command-and-control](https://attack.mitre.org/tactics/TA0011)Technique:[T1105-ingress-tool-transfer](https://attack.mitre.org/techniques/T1105) 
**Deprecation Notice (June 5, 2026):** This rule is deprecated in favor of the [Malware command and control attack](https://docs.datadoghq.com/security/default_rules/def-000-7zw.md) correlation rule, which combines multiple malware command and control signals into a single, higher-fidelity detection. Customers will automatically benefit from the improved correlation-based detection without any action required.

## What happened{% #what-happened %}

`{{ @process.comm }}` made a DNS lookup for the domain `{{ @dns.question.name }}`, potentially to download malicious tools or to exfiltrate data.

## Goal{% #goal %}

Paste sites such as pastebin.com can be used by attackers to host malicious scripts, configuration files, and other text data. The files are then downloaded to the host using a network utility such as `wget` or `curl`. These sites may also be used to exfiltrate data.

## Strategy{% #strategy %}

Detect when a process performs a DNS lookup for a paste site.

## Triage and response{% #triage-and-response %}

1. Check if the application `{{@process.executable.name}}` is expected to make connections to `{{@dns.question.name}}`.
1. If the DNS lookup is unexpected, contain the host or container and roll back to a known good configuration.
1. Follow your organization's internal processes for investigating and remediating compromised systems.

*Requires Agent version 7.36 or greater*
