• Skip to primary navigation
  • Skip to main content
  • Skip to footer

Cisco Umbrella

Enterprise network security

  • Contact Sales
  • Login
    • Umbrella Login
    • Cloudlock Login
  • Why Us
    • Why Cisco Umbrella
      • Why Try Umbrella
      • Why DNS Security
      • Why Umbrella SASE
      • Our Customers
      • Customer Stories
      • Why Cisco Secure
    • Fast Reliable Cloud
      • Global Cloud Architecture
      • Cloud Network Status
      • Global Cloud Network Activity
    • Unmatched Intelligence
      • A New Approach to Cybersecurity
      • Interactive Intelligence
      • Cyber Attack Prevention
      • Umbrella and Cisco Talos Threat Intelligence
    • Extensive Integrations
      • IT Security Integrations
      • Hardware Integrations
      • Meraki Integration
      • Cisco Umbrella and SecureX
  • Products
    • Cisco Umbrella Products
      • Cisco Umbrella Cloud Security Service
      • Recursive DNS Services
      • Cisco Umbrella SIG
      • Umbrella Investigate
      • What’s New
    • Product Packages
      • Cisco Umbrella Package Comparison
      • – DNS Security Essentials Package
      • – DNS Security Advantage Package
      • – SIG Essentials Package
      • – SIG Advantage Package
      • Umbrella Support Packages
    • Functionality
      • DNS-Layer Security
      • Secure Web Gateway
      • Cloud Access Security Broker (CASB)
      • Cloud Data Loss Prevention (DLP)
      • Cloud-Delivered Firewall
      • Cloud Malware Protection
      • Remote Browser Isolation (RBI)
    • Man on a laptop with headphones on. He is attending a Cisco Umbrella Live Demo
  • Solutions
    • SASE & SSE Solutions
      • Cisco Umbrella SASE
      • Secure Access Service Edge (SASE)
      • What is SASE
      • What is Security Service Edge (SSE)
    • Functionality Solutions
      • Web Content Filtering
      • Secure Direct Internet Access
      • Shadow IT Discovery & App Blocking
      • Fast Incident Response
      • Unified Threat Management
      • Protect Mobile Users
      • Securing Remote and Roaming Users
    • Network Solutions
      • Guest Wi-Fi Security
      • SD-WAN Security
      • Off-Network Endpoint Security
    • Industry Solutions
      • Government and Public Sector Cybersecurity
      • Financial Services Security
      • Cybersecurity for Manufacturing
      • Higher Education Security
      • K-12 Schools Security
      • Healthcare, Retail and Hospitality Security
      • Enterprise Cloud Security
      • Small Business Cybersecurity
  • Resources
    • Content Library
      • Top Resources
      • Cybersecurity Webinars
      • Events
      • Research Reports
      • Case Studies
      • Videos
      • Datasheets
      • eBooks
      • Solution Briefs
    • International Documents
      • Deutsch/German
      • Español/Spanish
      • Français/French
      • Italiano/Italian
      • 日本語/Japanese
    • For Customers
      • Support
      • Customer Success Webinars
      • Cisco Umbrella Studio
    • Get the 2022 Cloud Scurity Comparison Guide
  • Trends & Threats
    • Market Trends
      • Hybrid Workforce
      • Rise of Remote Workers
      • Secure Internet Gateway (SIG)
    • Security Threats
      • How to Stop Phishing Attacks
      • Malware Detection and Protection
      • Ransomware is on the Rise
      • Cryptomining Malware Protection
      • Cybersecurity Threat Landscape
      • Global Cyber Threat Intelligence
      • Cyber Threat Categories and Definitions
    •  
    • Woman connecting confidently to any device anywhere
  • Partners
    • Channel Partners
      • Partner Program
      • Become a Partner
    • Service Providers
      • Secure Connectivity
      • Managed Security for MSSPs
      • Managed IT for MSPs
    •  
    • Person looking down at laptop. They are connecting and working securely
  • Blog
    • News & Product Posts
      • Latest Posts
      • Products & Services
      • Customer Focus
      • Feature Spotlight
    • Cybersecurity Posts
      • Security
      • Threats
      • Cybersecurity Threat Spotlight
      • Research
    •  
    • Register for a webinar - with illustration of connecting securely to the cloud
  • Contact Us
  • Umbrella Login
  • Cloudlock Login
  • Free Trial
Security

Does Your Domain Have Bad Neighbors?

By Kevin Bottomley
Posted on August 21, 2014
Updated on August 3, 2020

Share

FacebookTweetLinkedIn

What’s the big deal about bad neighbors?
Bad neighbors are found in all types of places. Often times, when people begin the process of setting up a website or server (a.k.a. property),Bad neighbors little
research is done into exactly where they will be hosted at, who they are registering the domain name through, other sites nearby, and other subtle variables – such as a dedicated or shared server. Many decide to go with the inexpensive hosting provider to save costs, choose an inexpensive domain registrar, and use default packages to get their site rolling, all with little regard on the area they will be residing in. This is much like buying or renting a home with little or no insight into the neighborhood you are about to move into.
While usually this can work out with little problem, one can end up moving into a less than reputable area of the Internet. The result can have a negative valuation on your site in many ways, from SEO to unexpectedly being put onto a blocklist due to who you share space with.
Much like metropolitan areas throughout the world, the Internet has it’s own rough parts of town. These can include hosting providers who care more about money then their reputation, registrars who do not fully follow the rules set forth by ICANN’s Registrar Accreditation Agreement (RAA), domains that have been compromised without the owners knowledge and are being used for malicious purposes, or, on the flip side of that, known malicious domains hosting nefarious content by the owner for the purpose of infecting visitors computers for various reasons. All of these can affect you or your company’s presence on the web in different ways, and usually not for the better.

How does it all connect together?

On the outset, your domain name is resolved to a Internet Protocol (IP) address through the use of the Domain Name System (DNS). Without this, you would have to remember a string of numbers every time you wanted to visit a site, and those numbers don’t always stay the same, adding some complication to the process. This usually is not a problem for bigger companies that pay for a dedicated IP, but for smaller budgets, this is not always an option.
IP addresses that send spam, host malware, or are Command and Control (C&C) servers for botnets can end up on so called blocklists. When this happens any information sent from them will no longer make it to the intended target and will likely be inaccessible by inbound traffic. This is usually done for the greater good of the users of the Internet, but can be bad if your IP address ends up on one of these lists, even though you have not done anything wrong yourself. Getting your product to customers or message across to readers can become next to impossible if they can not get to you.
All of these IP addresses are a subset of a bigger sphere called the Autonomous System (AS). These AS’ are a set of routes that are distributed among network operators so that every computer can talk to every other computer that is reachable on the Internet. Above the AS’ come Autonomous System Networks (ASNs) that are run by ISPs and are registered officially and identify each network on the Internet. These AS’ represent the city in which you are going to live in. For a more detailed breakdown of what an AS is, you can read this OpenDNS whitepaper here.

Why does it matter?

Much like any city, there is always some extent of crime going on. Obtaining an IP address is essentially nothing more than then moving into a region of a city. Depending on the neighborhood, the value of your property will go up or down given what is going on around it. Bad neighbors can greatly cause the value of your property to go down. This is where a little research can go a long way in deciding if you will be affected by SEO page rankings, potential for compromise, getting blocklisted due to someone hosting malicious software on the same server/IP as you, getting a reused IP that once was considered to be dangerous and blocked by numerous companies, and more.

Who can help me?

Attempting to figure this out all on your own can turn into quite the daunting task. Luckily, I’m here to help you. In my next blog post I will show how some of the powerful tools we use here at OpenDNS can make this task much easier by narrowing down some of the more unruly parts of the web using both Investigate, and our newly released open-source visualization tool, OpenGraphiti.

Previous Post:

Previous Article

Next Post:

Next Article

Follow Us

  • Twitter
  • Facebook
  • LinkedIn
  • YouTube

Footer Sections

What we make

  • Cloud Security Service
  • DNS-Layer Network Security
  • Secure Web Gateway
  • Security Packages

Who we are

  • Global Cloud Architecture
  • Cloud Network Status
  • Cloud Network Activity
  • OpenDNS is now Umbrella
  • Cisco Umbrella Blog

Learn more

  • Webinars
  • Careers
  • Support
  • Cisco Umbrella Live Demo
  • Contact Sales
Umbrella by Cisco
208.67.222.222+208.67.220.220
2620:119:35::35+2620:119:53::53
Sign up for a Free Trial
  • Cisco Online Privacy Statement
  • Terms of Service
  • Sitemap

© 2023 Cisco Umbrella