[tor-relays] OVH Warnings
Dr Gerard Bulger
gerard at bulger.co.uk
Tue Sep 15 23:44:22 UTC 2020
OVH seemed to have upped their game with more information than just
throwing all traffic into "mitigation" which can result in bad exit status,
with no information as to what their systems are detecting as a threat of
denial of service attack.
For the first time I got an email.no mitigation.
Dear Customer,
Abnormal activity has been detected on your VPS
Attack detail : 4Kpps/2Mbps
dateTime srcIp:srcPort dstIp:dstPort
protocol flags bytes reason
2020.09.15 19:02:21 CEST <http://51.38.64.136:42845/> my ip:42845
<http://212.22.93.124:25565/> 212.22.93.124:25565 TCP SYN
60 ATTACK:TCP_SYN
2020.09.15 19:02:21 CEST <http://51.38.64.136:39673/> my ip:39673
<http://212.22.93.124:25565/> 212.22.93.124:25565 TCP SYN
60 ATTACK:TCP_SYN
Etc
Gerry
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20200916/cc2f6fd6/attachment.htm>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 43 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-relays/attachments/20200916/cc2f6fd6/attachment.gif>
More information about the tor-relays
mailing list