Open
Description
- [ x] I have checked the existing issues to avoid duplicates
- [x ] I have redacted any info hashes and content metadata from any logs or screenshots attached to this issue
I used the sample docker to use this app. when I run this docker app my dnscrypt throws errors about
daemon.warn dnsmasq[1]: Maximum number of concurrent DNS queries reached (max: 150)
daemon.err dnscrypt-proxy[ [WARNING] Too many incoming connections
it seems that this app floods the router dns server with dns request about IPs of IPs (instead of domains)
192.168.1.101/52376 query[PTR] 146.214.167.91.in-addr.arpa from 192.168.1.101
192.168.1.101/52376 forwarded 146.214.167.91.in-addr.arpa to 192.168.1.1#55
192.168.1.101/61512 query[PTR] 53.194.97.177.in-addr.arpa from 192.168.1.101
192.168.1.101/61512 forwarded 53.194.97.177.in-addr.arpa to 192.168.1.1#55
192.168.1.101/55319 query[PTR] 166.248.102.183.in-addr.arpa from 192.168.1.101
192.168.1.101/55319 forwarded 166.248.102.183.in-addr.arpa to 192.168.1.1#55
192.168.1.101/57711 query[PTR] 149.174.162.178.in-addr.arpa from 192.168.1.101
192.168.1.101/57711 forwarded 149.174.162.178.in-addr.arpa to 192.168.1.1#55
192.168.1.101/64067 query[PTR] 196.41.104.223.in-addr.arpa from 192.168.1.101
192.168.1.101/64067 forwarded 196.41.104.223.in-addr.arpa to 192.168.1.1#55
192.168.1.101/63038 query[PTR] 119.160.99.113.in-addr.arpa from 192.168.1.101
192.168.1.101/63038 forwarded 119.160.99.113.in-addr.arpa to 192.168.1.1#55
192.168.1.101/61814 query[PTR] 37.234.162.112.in-addr.arpa from 192.168.1.101
192.168.1.101/61814 forwarded 37.234.162.112.in-addr.arpa to 192.168.1.1#55
192.168.1.101/51985 query[PTR] 244.40.92.153.in-addr.arpa from 192.168.1.101
192.168.1.101/51985 forwarded 244.40.92.153.in-addr.arpa to 192.168.1.1#55
192.168.1.101/56061 query[PTR] 252.30.227.5.in-addr.arpa from 192.168.1.101
192.168.1.101/56061 forwarded 252.30.227.5.in-addr.arpa to 192.168.1.1#55
192.168.1.101/64486 query[PTR] 206.8.189.117.in-addr.arpa from 192.168.1.101
192.168.1.101/64486 forwarded 206.8.189.117.in-addr.arpa to 192.168.1.1#55
192.168.1.101/49290 query[PTR] 230.93.68.208.in-addr.arpa from 192.168.1.101
192.168.1.101/49290 forwarded 230.93.68.208.in-addr.arpa to 192.168.1.1#55
192.168.1.101/62256 query[PTR] 29.157.159.185.in-addr.arpa from 192.168.1.101
192.168.1.101/62256 forwarded 29.157.159.185.in-addr.arpa to 192.168.1.1#55
192.168.1.101/60732 query[PTR] 184.174.162.178.in-addr.arpa from 192.168.1.101
192.168.1.101/60732 forwarded 184.174.162.178.in-addr.arpa to 192.168.1.1#55
192.168.1.101/49173 query[PTR] 107.130.66.178.in-addr.arpa from 192.168.1.101
192.168.1.101/49173 forwarded 107.130.66.178.in-addr.arpa to 192.168.1.1#55
192.168.1.101/53000 query[PTR] 219.132.187.188.in-addr.arpa from 192.168.1.101
192.168.1.101/53000 forwarded 219.132.187.188.in-addr.arpa to 192.168.1.1#55
192.168.1.101/59901 query[PTR] 82.54.62.92.in-addr.arpa from 192.168.1.101
192.168.1.101/59901 forwarded 82.54.62.92.in-addr.arpa to 192.168.1.1#55
192.168.1.101/57042 query[PTR] 145.173.233.193.in-addr.arpa from 192.168.1.101
192.168.1.101/57042 forwarded 145.173.233.193.in-addr.arpa to 192.168.1.1#55
192.168.1.101/49696 query[PTR] 189.10.239.120.in-addr.arpa from 192.168.1.101
192.168.1.101/49696 forwarded 189.10.239.120.in-addr.arpa to 192.168.1.1#55
192.168.1.101/50442 query[PTR] 9.153.94.113.in-addr.arpa from 192.168.1.101
and this flood of equerries causes the dns-server to refuse serving dns answers.
- Bitmagnet version:
[latest docker version]
- OS and version:
[archlinux]