The Query Classifications by Subnets plot shows
	a kind of "quality report" for each /24 subnet.   Queries are classified
	according to a number of known misbehaviors, shown in the legend:
	
	- Malformed - The DNS message was malformed and could not be entirely parsed
	
 - Src port 0 - The UDP query came from source port 0
	
 - Funny Qtype - Query type was not one of the documented types
	
 - Funny Qclass - Query class was not IN
	
 - RFC1918PTR - The query type was PTR and the name was in an in-addr.arpa zone covered by RFC1918 private address space
	
 - A-for-. - The query name was empty (equal to the root zone)
	
 - A-for-A - The query name was already an IPv4 address
	
 - localhost - The query was for localhost
	
 - root-servers.net - The query was for a root-servers.net name
	
 - Non-Authoritative TLD - The query was for a known-invalid TLD
	
 - Unclassified - the query did not fall into one of the other categories.
	
 
        Click on the legend to view the queries for a specific type.