{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreibbhhofzq72yro6hdu47owwcycqanx6eg6ngkv5r2ye3tohn64uya",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mg27n7omke72"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreibjhrfrzwocwkewkkmnz27bvsolkun3wd5l4nmt7dgmds2g74ovni"
},
"mimeType": "image/webp",
"size": 29752
},
"path": "/hackers-abuse-arpa-tld-and-ipv6-tunnels-to-bypass-phishing-defenses/",
"publishedAt": "2026-03-01T17:09:33.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Uncategorized",
"Hackers Abuse .arpa TLD and IPv6 Tunnels to Bypass Phishing Defenses",
"VPN Central"
],
"textContent": "Phishing campaigns now exploit .arpa top-level domain and IPv6 tunnels to evade detection. Infoblox Threat Intel uncovered attackers creating A records in infrastructure-only .arpa namespace instead of expected PTR records. Security tools trust these reverse DNS domains automatically. Malicious content hosts on IPv6 tunnel services with clean reputations. Traditional blocklists fail completely. .arpa lacks WHOIS […]\n\nThe post Hackers Abuse .arpa TLD and IPv6 Tunnels to Bypass Phishing Defenses appeared first on VPN Central.",
"title": "Hackers Abuse .arpa TLD and IPv6 Tunnels to Bypass Phishing Defenses"
}