I was wondering why my personal firewall was asking me to allow ICMP packets to a public IPv4 address (45.76.93.104) from a remote access software client (that I only ever use to connect to private network ip addresses on a LAN or via VPN).
A reverse lookup shows the IP belongs to Vultr (?) and the associated domain name resolves to localhost via an A record pointing at 127.0.0.1. Great!
$dig 45.76.93.104.vultrusercontent.com @8.
8.8.8
; <<>> DiG 9.10.6 <<>> 45.76.93.104.vultrusercontent.com @8.8.8.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47154
;; flags: qr rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 1
;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 512
;; QUESTION SECTION:
;45.76.93.104.vultrusercontent.com. IN A
;; ANSWER SECTION:
45.76.93.104.vultrusercontent.com. 900 IN CNAME vultrusercontent.com.
vultrusercontent.com. 900 IN A 127.0.0.1
;; Query time: 1097 msec
;; SERVER: 8.8.8.8#53(8.8.8.8)
;; WHEN: Tue May 06 11:20:39 CEST 2025
;; MSG SIZE rcvd: 92
Pi-hole logs showed this:
2025-date 10:57:37.638 forwarded 127.0.0.1 to 9.9.9.9
2025-date 10:57:37.646 reply 127.0.0.1 is NXDOMAIN
2025-date 10:58:04.089 query[A] 45.76.93.104.vultrusercontent.com from 192.168.x.x
2025-date 10:58:04.091 forwarded 45.76.93.104.vultrusercontent.com to 9.9.9.9
2025-date 10:58:04.159 reply 45.76.93.104.vultrusercontent.com is <CNAME>
2025-date 10:58:04.160 reply vultrusercontent.com is 127.0.0.1
So I guess my question is: Shouldn't Pi-hole prevent reverse lookups of 127.0.0.1 to upstream DNS servers or is there any legitimate reason for this lookup? Am I missing something here?