- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello all,
A few weeks ago, a suspicious communication towards the domain “4s.pm” was identified by Anti-Virus blade and DNS trap was successfully enforced.
Since then, what we notice and we can not explain is the fact that if we search for “DNS Trap” all the results refer as destination “4s.pm” (screenshot 1). This is weird and most possibly false because if we randomly open one of these logs (Screenshot 2), in the forensics section the actual domain is referred and it is not “4s.pm”.
Can somebody help us understand the behavior?
If you create a dummy object in your DB (example name: cp-dns-trap) for that IP does it make it clearer in the logs?
Alternatively you can disable object resolution with Ctrl-r or change the DNS trap IP.
Refer also: https://community.checkpoint.com/t5/Management/SMS-log-incorrect-name-resolution/td-p/128459
Refer to how the DNS Trap works here: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
The IP address listed (62.0.58.94) is the default configuration for DNS Trap and is expected behavior.
Hello PhoneBoy,
the question isn't related to the IP 62.0.58.94, which is the default DNS trap.
We do not have any actual traffic that is trying to reach 4s.pm (only one incident about a month ago). No DNS requests towards 4s.pm are logged in our DNS servers. So it is confusing to see this domain in the DNS trap logs. As you can see in the "screenshot2" the forensics details --> resource refers to a totally different domain. So why isn't the actual domain (digitaloceans.com in our example) translated to 62.0.58.94?
If you create a dummy object in your DB (example name: cp-dns-trap) for that IP does it make it clearer in the logs?
Alternatively you can disable object resolution with Ctrl-r or change the DNS trap IP.
Refer also: https://community.checkpoint.com/t5/Management/SMS-log-incorrect-name-resolution/td-p/128459
We actually opened a TAC case and we are awaiting on feedback.
You can also try adjusting the DNS cache, but that's probably the extent of it.
https://community.checkpoint.com/t5/Management/SMS-log-incorrect-name-resolution/td-p/128459#M31568
I run into a post somewhere (can't remember exactly where) that said that a cpstop;cpstart on SMS could resolve the issue.
Today we performed a hotfix installation on our SMS and currently we aren't facing the issue with the DNS trap.
Lets hope it fixed it!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 24 | |
| 20 | |
| 8 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 | |
| 4 | |
| 4 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY