Advertisement
Guest User

Untitled

a guest
Dec 22nd, 2014
169
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.51 KB | None | 0 0
  1. This ticket was created due to an Incoming Severity 2 network event for IP address 96.43.131.74, which is currently assigned to you. This event was detected on 2014-12-22 at 9:20:00 CST. Included in this ticket is a summary of the event.
  2.  
  3. Please note our policy for network events that affect other customers:
  4. Network events that affect other customers on our network are considered a violation of our AUP and TOS. We understand that you may not have directly cause the event, however you are still responsible for any and all traffic from or directed at the IP addresses we have assigned to you. If this event affects other customers, corrective or preventative action needs to be taken or we reserve the right to terminate your service.
  5.  
  6. Each network event has a severity level and corresponding number:
  7. Severity 1 - warning sent
  8. Severity 2 - warning sent / 2 hour null route put in place
  9. Severity 3 - warning sent / 12 hour null route put in place
  10. Severity 4 - warning sent / 24 hour null route put in place / Account review by security analyst
  11.  
  12. Based on the severity of the event, the following action was taken:
  13. The IP address has been null routed for 2 hours.
  14.  
  15.  
  16. Here is a summary of the flows to your IP during the event:
  17. ================================================
  18.  
  19. Top 10 flows by packets per pecond for dst IP: 96.43.131.74
  20. Duration Proto Src IP Addr Src Pt Dst Pt Packets pps bps
  21. 0.005 UDP 110.103.67.175 1900 80 3072 614400 1.7 G
  22. 0.006 UDP 182.41.77.104 1900 80 3072 512000 1.4 G
  23. 0.006 UDP 59.187.223.218 1900 80 3072 512000 1.4 G
  24. 0.006 UDP 106.125.145.210 1900 80 3072 512000 1.5 G
  25. 0.004 UDP 124.236.104.195 1900 80 2048 512000 1.4 G
  26. 0.004 UDP 92.97.235.164 1900 80 2048 512000 1.5 G
  27. 0.007 UDP 111.132.63.125 1900 80 3072 438857 1.2 G
  28. 0.007 UDP 222.173.120.202 1900 80 3072 438857 1.2 G
  29. 0.005 UDP 113.124.166.99 1900 80 2048 409600 1.2 G
  30. 0.005 UDP 24.43.5.178 1900 80 2048 409600 1.2 G
  31.  
  32. Top 10 flows by flows per second for dst IP: 96.43.131.74
  33. Duration Proto Src IP Addr Src Pt Dst Pt Packets pps bps
  34. 35.085 UDP 66.42.151.223 1900 80 8192 233 657975
  35. 0.641 UDP 87.103.193.191 1900 80 8192 12780 35.8 M
  36. 218.288 UDP 216.196.192.138 1900 80 8192 37 107068
  37. 201.621 UDP 96.61.98.52 1900 80 8192 40 114050
  38. 219.065 UDP 69.131.245.206 1900 80 7168 32 96517
  39. 221.794 UDP 85.109.131.163 1900 80 7168 32 83436
  40. 221.303 UDP 64.144.93.150 1900 80 7168 32 91432
  41. 221.386 UDP 85.99.100.102 1900 80 7168 32 86069
  42. 224.429 UDP 67.141.50.225 1900 80 6144 27 79025
  43. 1.300 UDP 50.121.101.20 1900 80 6144 4726 12.7 M
  44.  
  45. Top 10 flows by bits per second for dst IP: 96.43.131.74
  46. Duration Proto Src IP Addr Src Pt Dst Pt Packets pps bps
  47. 0.005 UDP 110.103.67.175 1900 80 3072 614400 1.7 G
  48. 0.004 UDP 92.97.235.164 1900 80 2048 512000 1.5 G
  49. 0.006 UDP 106.125.145.210 1900 80 3072 512000 1.5 G
  50. 0.004 UDP 124.236.104.195 1900 80 2048 512000 1.4 G
  51. 0.006 UDP 182.41.77.104 1900 80 3072 512000 1.4 G
  52. 0.006 UDP 59.187.223.218 1900 80 3072 512000 1.4 G
  53. 0.007 UDP 111.132.63.125 1900 80 3072 438857 1.2 G
  54. 0.007 UDP 222.173.120.202 1900 80 3072 438857 1.2 G
  55. 0.005 UDP 106.114.192.15 1900 80 2048 409600 1.2 G
  56. 0.005 UDP 42.2.27.211 1900 80 2048 409600 1.2 G
  57.  
  58. ================================================
  59.  
  60.  
  61. Additional Resources:
  62.  
  63. What is a DDoS attack?
  64. http://en.wikipedia.org/wiki/Distributed_denial_of_service#Distributed_attack
  65.  
  66. What is a null route?
  67. http://en.wikipedia.org/wiki/Distributed_denial_of_service#Blackholing_and_sinkholing
  68.  
  69. What are network flows?
  70. http://en.wikipedia.org/wiki/Packet_flow
  71.  
  72. What can be done to prevent this?
  73. If you are receiving attacks we recommend that you purchase reverse proxy protection services. This product would have to be purchased and configured through a third party company.
  74. http://en.wikipedia.org/wiki/Reverse_proxy
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement