DNS SPOOFING & SUSPICIOUS MIRROR . SECURITY BREACH

I`m experiencing DNS Spoofing and got this when I use dig deb.parrot.sh . Output is below.
; <<>> DiG 9.18.33-1~deb12u2-Debian <<>> deb.parrot.sh
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 15319
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;deb.parrot.sh. IN A

;; ANSWER SECTION:
deb.parrot.sh. 300 IN CNAME mordor.backbone.rfc2549.network.
mordor.backbone.rfc2549.network. 300 IN CNAME mumbai.mordor.rfc2549.network.
mumbai.mordor.rfc2549.network. 300 IN A 139.84.238.12

;; Query time: 436 msec
;; SERVER: 1.1.1.1#53(1.1.1.1) (UDP)
;; WHEN: Wed May 28 11:18:10 +0530 2025
;; MSG SIZE rcvd: 131

Kindly have a look immediately.

Why do you think dns spoofing is involved, your using cloudflare for your dns resolver (1.1.1.1) and that is a typical response;

my-nearest-host.mordor.rfc2549.network

Parrot is not hosted on any single server, it is distributed worldwide from a CDN network…

fred  ~  :heart: 17:02 
 dig deb.parrot.sh

; <<>> DiG 9.10.6 <<>> deb.parrot.sh
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 64206
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 1232
;; QUESTION SECTION:
;deb.parrot.sh. IN A

;; ANSWER SECTION:
deb.parrot.sh. 300 IN CNAME mordor.backbone.rfc2549.network.
mordor.backbone.rfc2549.network. 300 IN CNAME london.mordor.rfc2549.network.
london.mordor.rfc2549.network. 300 IN A 178.79.175.35

;; Query time: 154 msec
;; SERVER: 2a0a:ef40:bdf:ca01:3945:a3ed:cd4e:d5f5#53(2a0a:ef40:bdf:ca01:3945:a3ed:cd4e:d5f5)
;; WHEN: Wed May 28 17:03:07 BST 2025
;; MSG SIZE rcvd: 131

This has come up more than once recently, and so some research…

the .network TLd is operated by Binky Moon ;

and whilst initially there were many ‘companies’ cough, for tax reasons looking after many of the new TLd names, they were all consolidated under the Donut brand (owned by Binky Moon).

They are now called Identity Digital, with a mission to;

Maintain a safe and secure Internet.
We strive to immediately address and mitigate all forms of DNS abuse.
We stay vigilant and committed to eliminating harmful material on the Internet.
We work at the forefront of internet security to prevent and mitigate cyberattacks, such as phishing, malware, and botnets.

So as you can see, a DNS provider and service backend, hopefully this will stop being raised now?

interesting titbit, the rfc2549 part is a nod to the request for comments april fools release in 1990;

I’m sorry what the fuck?