- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
The checkpoint gateway in a standby state is sending DNS requests to configured DNS server for malicious URLs. What can be the reason behind this?
Version - Gaia 80.40 on both GWs.
Malicious URLs - yearinesents.xyz, siswoyo.co.id
I do not think there is any reason to do that. I would start investigating, to see if that is indeed traffic originating from standby GW and not something else.
On an active GW, however, that would be okay if someone is trying to reach out to any of those domains through the GW on HTTPS. That would be part of the SNI verification process.
Thanks for your reply. what investigation we can do here? This is a standby gateway. Please share if there are any troubleshooting steps that I can check.
tcpdump, for starters. Where do you see the requests, on your internal DNS server? Somewhere else? It is hard to give you any advise if you do not provide any retails.
We got the below alert on our Qrdar SIEM server. I have removed IPs from the log and used X,Y,Z instead. The source is standby firewall but the origin and originsicname are showing as active firewall details.
Alert - Checkpoint AntiVirus or AntiMalware Alert Detected
LEEF:2.0|Check Point|Anti Malware|1.0|Detect|devTime=1690067244 srcPort=33516 url=yearinesents.xyz signature=Maze.TC.ov malware=Maze policyName=DCFirewallPolicy cat=Anti Malware sev=8 action=Detect ifdir=outbound ifname=Sync loguid={0xa79f6f9e,0xcdebc05b,0x4a8f2902,0x14c2509a} origin=X.X.X.X originsicname=CN\=PHY-NWK-DC-FRW-02,O\=CLUSTER..zzn8zj sequencenum=880 version=5 confidence_level=1 dst=Y.Y.Y.Y log_id=2 malware_action=DNS query for a C&C site malware_rule_id={CE6C83BD-AB76-4B53-819F-98CEC479FD68} policy_time=1689944558 protection_id=00340173A protection_type=DNS reputation proto=17 rule_name=Internet access to Manager and Gateway rule_uid=3947ba36-03d7-4ada-b748-90ee083d1200 scope=Z.Z.Z.Z service=53 session_id={0x64bc544c,0xc,0xa2a3aaca,0xc69bb62e} smartdefense_profile=Optimized Threat Prevention src=Z.Z.Z.Z layer_uuid={269BAA7D-91DD-4356-A634-594DD105B2FE} malware_rule_id={CE6C83BD-AB76-4B53-819F-98CEC479FD68} smartdefense_profile=Optimized Threat Prevention vendor_list=Check Point ThreatCloud
Which JHF and enabled blades does this cluster have?
JHF:- HOTFIX_R80_40_JUMBO_HF_MAIN Take: 192
Enabled blades:- fw vpn cvpn urlf av aspm appi ips identityServer anti_bot mon
Did you or your time put those malicious URLs on security policy?
Had experience before, my teammate put 1 malicious URL on policy to prevent communication to it, and CP will query to the internet to solving domain lookup.
since CP querying it, then detected on SIEM that CP has communication with malicous url.
These URLs were blocked in policy a long time back. Why it would query for them now? and that is also from the standby firewall.
need to involved TAC i think for better explanation.
but for now, could try to delete it first on policy and check on SIEM again?
There are multiple malicious URLs in that policy but only these 2 are getting queried. I don't think deleting these URLs will help.
Hello Ashish,
did you found any solution for this as we are also facing the same issue on our Qradar with Checkpoint firewall.
This is a very old post. @harshnagar I would suggest you start a completely new thread about your own issue.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 9 | |
| 8 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY