Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- documented the following attacks coming from your owned adresses on 18 april 2019 10:53 PM (UTC -05:00 Easten Time us/can) on my dedicated server (192.99.197.75)
- duration of tcpdump 8436 secondes. Detais of each address ip is a counter packets for icmp and tcp
- the majority of the attack is a mass brute force port 22 and icmp syn flood
- EmailForm: https://drive.google.com/open?id=10XND69I8rfg8YKGg8a5FabM83LbiRcgf
- Original tcpdump log: https://drive.google.com/open?id=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
- Range IpAddress Icmp IcmpR SYN SYN/ACK FirstPacketDetails
- 173.176.0.0 - 173.179.255.255 173.179.205.19 0 0 1 0 29100 > 5555 [SYN] Seq=0 Win=11620 Len=0 MSS=1460
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement