ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Suspicious Top-level Domain

Risk Factors

Attackers might evade detection by cycling through numerous domain names for their malicious command-and-control (C&C) server. Instead of choosing a standard top-level domain (TLD) for their malicious server, attackers might choose non-standard TLDs. These TLDs are often free and can offer more anonymity than standard TLDs, such as .com, which are registered to owner accounts. Frequent visits to suspicious, non-standard TLDs can indicate malware on a device or malicious activity on the network.

Category

Caution
Detection diagram
Next in Caution: Suspicious User Agent

Attack Background

N/A

Mitigation Options

Configure all workstations to send queries to approved DNS servers that filter or block suspicious domains

Block inbound and outbound traffic from non-approved DNS servers or suspicious non-standard TLDs at the network perimeter

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?