DNS fast flux is a technique where the resource records of a domain are rapidly updated to avoid detection and takedown. Fast flux is used by botnets, command and control servers, to hide phishing sites, and generally to provide resilience to malicious resources.
IP reputation can be affected by fast flux. As an example, when a fully qualified domain name (FQDN) using fast flux resolves to IP addresses of well-known service providers, the domain gains a positive reputation score and is less likely to be blocked by DNS firewalls or other filtering techniques. The malware controllers can then temporarily resolve the FQDN to the IP address they use for their attack.
Fast flux is commonly used with other techniques such as CNAME chaining to create a malware distribution network or as a backup command and control (C2) server to regain control of their malware. Fast flux has some technical characteristics similar to valid DNS uses such as content distribution networks (CDNs) and other types of load balancing. However, there are certain technical features that are almost exclusively used in fast flux as opposed to similar benign use cases.
For example, fast flux networks use IP addresses on a variety of autonomous systems (AS) and effective second level domains whereas CDNs tend to own all the IP addresses they use, and therefore the IP addresses are in a small number of AS’s. Similarly, CDNs use a relatively small number of effective second level domains. Furthermore, the IP addresses in a CDN or load balancing setup are usually all active and not parked, whereas a fast flux network tends to use a large number of parked IP addresses. A parked domain is one on which no services are actually available on the target of the resource record.
One of the first notable attacks using a “domain-flux” network was the computer worm Conficker, first detected in late 2008.
Storm Worm Botnet used fast flux as a resiliency technique also in 2008.
Fast Flux remained a viable technique for Botnet resiliency through the 2010s, such as documented by Akamai in 2017:
https://www.akamai.com/newsroom/press-release/fast-flux-botnets-still-wreaking-havoc-on-internet-according-to-akamai-research
Another example from 2025 is the GammaDrop Malware is first reported to use fast flux in December 2024.
Fast flux was labeled a “national security threat” by cybersecurity agencies from the USA, Canada, and Australia in 2025.
Description of fast flux networks here: Open-source Measurement of Fast-flux Networks While Considering Domain-name Parking | USENIX
Detection via a network intrusion detection system:
Fast Flux 101: How Cybercriminals Improve the Resilience of Their Infrastructure to Evade Detection and Law Enforcement Takedowns: https://unit42.paloaltonetworks.com/fast-flux-101/
The topic received attention and recommendations from the ICANN security and stability advisory committee for advice to the DNS community as early as March 2008.