Over 100,000 devices can be used to amplify DDoS attacks via multicast DNS
Some implementations of the multicast DNS protocol are configured to accept queries from the Internet, which is a risky behavior
Some implementations of the multicast DNS protocol are configured to accept queries from the Internet, which is a risky behavior