The Shadowserver Foundation

Open MS-SQL Server Resolution Service Scanning Project

If you are looking at this page, then more than likely, you noticed a scan coming from this server across your network and/or poking at the MS-SQL Server Resolution service.

The Shadowserver Foundation is currently undertaking a project to search for publicly accessible devices that have the MS-SQL Server Resolution Service running. The goal of this project is to identify openly accessible systems that have the MS-SQL Server Resolution service running and report them back to the network owners for remediation.

In addition to having the potential to be used in UDP amplification attacks, the MS-SQL Server Resolution Service exposes information about the physical SQL server name and the SQL service name. If at all possible, we would like to see these services made un-available to miscreants that would misuse these resources.

Servers that are configured this way have been incorporated into our reports and are being reported on a daily basis.

Information on UDP-based amplification attacks in general can be found in US-CERT alert TA14-017A at: https://www.us-cert.gov/ncas/alerts/TA14-017A

Methodology

We are querying all computers with routable IPv4 addresses that are not firewalled from the internet on port 1434/udp with an STX character (0x02 in hex) and capturing the response. We intend no harm, but if we are causing problems, please contact us at: dnsscan [at] shadowserver [dot] org.

If you would like to test your own device to see if it has the MS-SQL Server Resolution Service accessible, try the command: "nc -u [IP] 1434" and enter the control character ^B [CTRL-b] followed by a carriage return. If the MS-SQL Server Resolution Service is accessible, expect to see information about your SQL server returned, including the NetBIOS name of your server. If your system does not have the command "nc", it may also be called "netcat".

Whitelisting

To be removed from this set of scanning you will need to send an email to dnsscan [at] shadowserver [dot] org with the specific CIDR's that you would like to have removed. You will have to be the verifiable owner of these CIDR's and be able to prove that fact. Any address space that is whitelisted will be publicly available here: https://mssqlscan.shadowserver.org/exclude.html

Useful Links

Scan Status

Statistics on current run

Other Statistics

If you would like other statistics and information on historical trends, please take a look at: https://mssqlscan.shadowserver.org/stats/. Otherwise, stats from the most current scan are listed below.

Stats from the most current scan are listed below.


All Devices with the MS-SQL Server Resolution Service Accessible

All MS-SQL

(Click image to enlarge)

If you would like to see more regions click here

All Devices with the MS-SQL Server Resolution Service Accessible

All MS-SQL

(Click image to enlarge)



If you would like us to not scan your network, please let us know and we will remove your networks from the scan.

Likewise, if you have anymore questions please feel free to send us an email at: gro [tod] revfooreswodahs [ta] nacbarssnd

The Shadowserver Foundation