Author Topic: PSA: Several servers are being DDoS attacked by a botnet.  (Read 34434 times)

So adding a password to the server would change nothing?


So adding a password to the server would change nothing?
Considering that hellspy's RP servers which are almost all of the time passworded never got hit, i can assume passwording your server could help.

Then again it might actually be a fanatic member of the servers and that passwording your server wont do anything.

Considering that hellspy's RP servers which are almost all of the time passworded never got hit, i can assume passwording your server could help.

Then again it might actually be a fanatic member of the servers and that passwording your server wont do anything.
call me crazy but I don't think a fanatic member of your server can generate 1.5 gbps of traffic

call me crazy but I don't think a fanatic member of your server can generate 1.5 gbps of traffic
There are botnets for hire out there, which you are obviously aware of.

viso's getting hit again, i'm not being hit yet

I think we should correlate attack times and position on server list when they happen. I’m thinking (from nature of traffic logs) that there’s only one attack at any given time and it’s on a top server, persisting until it crashes or disappears from the server list.

viso's getting hit again, i'm not being hit yet
I'm not sure if it was a hit, I did not get any emails or anything about the attack during that time, the CPU was very high and it was at a constant percentage for some reason (25% - blockland never hits it that high on the VPS, max is usually 20% when it starts up) when I checked it a few minutes ago but nothing was coming out of trace other than a loop - but that can't be the problem.
« Last Edit: August 31, 2017, 10:39:35 AM by Kyuande »

I'm not sure if it was a hit, I did not get any emails or anything about the attack during that time, the CPU was very high and it was at a constant percentage for some reason (25% - blockland never hits it that high on the VPS, max is usually 20% when it starts up) when I checked it a few minutes ago but nothing was coming out of trace other than a loop - but that can't be the problem.
this was at 3:07AM central, not a few minutes ago lol

No I am saying I checked the vps usuage a few minutes ago during that post and it still did not change the cpu usuage of the server

The first DDoS protected server is currently experiencing a DDoS attack with no drop in latency. 90k packets per second, 409.99 Mbps. Attack would need to be 24x as large to impact the server.

All attack traffic is originating from port 111. Sample traffic below:

Code: [Select]
2017-08-31 18:51:06 UTC IP 14.102.147.147:111 > 104.207.133.58:28000 UDP, length 4554780, packets 8192
2017-08-31 18:51:06 UTC IP 45.125.247.197:111 > 104.207.133.58:28000 UDP, length 4554780, packets 8192
2017-08-31 18:51:06 UTC IP 37.48.125.223:111 > 104.207.133.58:28000 UDP, length 4554780, packets 8192
2017-08-31 18:51:06 UTC IP 58.141.87.16:111 > 104.207.133.58:28000 UDP, length 4227100, packets 8192
2017-08-31 18:51:06 UTC IP 58.251.132.25:111 > 104.207.133.58:28000 UDP, length 5537820, packets 8192
2017-08-31 18:51:07 UTC IP 45.46.76.13:111 > 104.207.133.58:28000 UDP, length 4390940, packets 8192
2017-08-31 18:51:07 UTC IP 14.42.40.251:111 > 104.207.133.58:28000 UDP, length 4227100, packets 8192


Trying to find who's doing it will be a waste of time. There's likely zero evidence other than a confession that would be useful.

False confessions exist. God knows who would falsely confess to DDoSing us, but god also knew who would hire a botnet to attack us. Are keys more expensive than a DDoS attack?

Trying to find who's doing it will be a waste of time.

I find it ironic that the BLID daprogs website is down.
And yes looking up BLID 111 shows 2 people, one who hasn't been online in 2 years (dimper) and the other one appariently has never been on (None).
¯\_(ツ)_/¯

Guess we just wait.

Really don't think this belongs in the drama section. This isn't a set of personal attacks, it's targeted at Blockland as a whole. Visibility of GD would help communicate the issue.

I find it ironic that the BLID daprogs website is down.
And yes looking up BLID 111 shows 2 people, one who hasn't been online in 2 years (dimper) and the other one appariently has never been on (None).
¯\_(ツ)_/¯

Guess we just wait.

Port 111, not BLID 111.