Advertisement
Guest User

Untitled

a guest
Jul 6th, 2018
370
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.07 KB | None | 0 0
  1.  
  2. Below are other notable recorded events for your server from the last 14 days.
  3.  
  4. Subject and date Description
  5. (D)DoS attack against your service
  6. Jul 06 2018 05:16:23 PM PT Our system responded to a (D)DoS against your service with a filter.
  7.  
  8.  
  9. Attack: a Source Engine Query flood with certain other attributes
  10. Filter duration: about 10 minutes
  11.  
  12. Example positive match
  13.  
  14.  
  15. 17:16:10.385617 IP (tos 0x0, ttl 50, id 12250, offset 0, flags [none], proto UDP (17), length 53) 206.189.171.113.44614 > 192.223.27.159.27015: UDP, payload 25
  16. 0x0000: 4500 0035 2fda 0000 3211 0231 cebd ab71 E..5/...2..1...q
  17. 0x0010: c0df 1b9f ae46 6987 0021 d276 ffff ffff .....Fi..!.v....
  18. 0x0020: 5453 6f75 7263 6520 456e 6769 6e65 2051 TSource.Engine.Q
  19. 0x0030: 7565 7279 00 uery.
  20.  
  21. What does this mean?
  22. (D)DoS attack against your service
  23. Jul 06 2018 04:38:05 PM PT Our system responded to a (D)DoS against your service with a filter.
  24.  
  25. Target address: 192.223.27.159
  26. Attack: a Source Engine Query flood with certain other attributes
  27. Filter duration: about 10 minutes
  28.  
  29. Example positive match
  30.  
  31.  
  32. 16:38:00.364357 IP (tos 0x0, ttl 50, id 50634, offset 0, flags [none], proto UDP (17), length 53) 206.189.167.101.17759 > 192.223.27.159.27015: UDP, payload 25
  33. 0x0000: 4500 0035 c5ca 0000 3211 704c cebd a765 E..5....2.pL...e
  34. 0x0010: c0df 1b9f 455f 6987 0021 3f6a ffff ffff ....E_i..!?j....
  35. 0x0020: 5453 6f75 7263 6520 456e 6769 6e65 2051 TSource.Engine.Q
  36. 0x0030: 7565 7279 00 uery.
  37.  
  38. What does this mean?
  39. (D)DoS attack against your service
  40. Jul 06 2018 02:39:34 PM PT Our system responded to a (D)DoS against your service with a filter.
  41.  
  42. Target address: 192.223.27.159
  43. Attack: a Source Engine Query flood with certain other attributes
  44. Filter duration: about 10 minutes
  45.  
  46. Example positive match
  47.  
  48.  
  49. 14:39:20.528774 IP (tos 0x0, ttl 50, id 41316, offset 0, flags [none], proto UDP (17), length 53) 206.189.169.205.65056 > 192.223.27.159.27015: UDP, payload 25
  50. 0x0000: 4500 0035 a164 0000 3211 924a cebd a9cd E..5.d..2..J....
  51. 0x0010: c0df 1b9f fe20 6987 0021 8440 ffff ffff ......i..!.@....
  52. 0x0020: 5453 6f75 7263 6520 456e 6769 6e65 2051 TSource.Engine.Q
  53. 0x0030: 7565 7279 00 uery.
  54.  
  55. What does this mean?
  56.  
  57. A DoS attack is an intentional malicious action that is designed to temporarily disable a service. We have systems in place that respond to common attacks for our clients, filtering them for durations that are chosen based on the likelihood of false positives and the level of damage typically caused by the specific attack.
  58.  
  59. Depending on the size and characteristics of the attack, and the nature of your software, you may or may not have seen effects from the attack before it was filtered.
  60.  
  61. Most attacks are spoofed (use random fake IPs). This means that it is usually not possible to examine the traffic and determine the attacker. We will likely not be able to provide further information on this attack.
  62.  
  63. (D)DoS attack against your service
  64. Jul 06 2018 12:24:04 PM PT Our system responded to a (D)DoS against your service with a filter.
  65.  
  66. Target address: 192.223.27.159
  67. Attack: a UDP flood of length-540 packets/3
  68. Filter duration: about 2 days
  69.  
  70. Example positive match
  71.  
  72.  
  73. 12:23:50.424302 IP (tos 0x0, ttl 50, id 19571, offset 0, flags [none], proto UDP (17), length 540) 206.189.213.127.43344 > 192.223.27.159.27015: UDP, payload 512
  74. 0x0000: 4500 021c 4c73 0000 3211 b9a2 cebd d57f E...Ls..2.......
  75. 0x0010: c0df 1b9f a950 6987 0208 1c48 f00e 359d .....Pi....H..5.
  76. 0x0020: 7833 0011 076b 6a32 fb5f 3e4c 029a 4979 x3...kj2._>L..Iy
  77. 0x0030: a0fd c269 cc91 9108 a2d6 eeb6 f7d3 4283 ...i..........B.
  78. 0x0040: c211 13fd 5de0 8879 0872 13b9 b6d3 5b2c ....]..y.r....[,
  79. 0x0050: fe4a .J
  80.  
  81. What does this mean?
  82. (D)DoS attack against your service
  83. Jul 06 2018 11:02:04 AM PT Our system responded to a (D)DoS against your service with a filter.
  84.  
  85. Target address: 192.223.27.159
  86. Attack: a flood of TCP traffic from port 8080
  87. Filter duration: about 60 minutes
  88.  
  89. Example positive match
  90.  
  91.  
  92. 11:01:50.372206 IP (tos 0x0, ttl 57, id 16112, offset 0, flags [DF], proto TCP (6), length 1500) 99.24.18.25.8080 > 192.223.27.159.49580: . 1800514612:1800516072(1460) ack 4052876170 win 16
  93. 0x0000: 4500 05dc 3ef0 4000 3906 ab7c 6318 1219 E...>.@.9..|c...
  94. 0x0010: c0df 1b9f 1f90 c1ac 6b51 ac34 f191 fb8a ........kQ.4....
  95. 0x0020: 5010 0010 e81f 0000 4142 4344 4546 4748 P.......ABCDEFGH
  96. 0x0030: 494a 4142 4344 4546 4748 494a 4142 4344 IJABCDEFGHIJABCD
  97. 0x0040: 4546 4748 494a 4142 4344 4546 4748 494a EFGHIJABCDEFGHIJ
  98. 0x0050: 4142 AB
  99.  
  100. What does this mean?
  101. (D)DoS attack against your service
  102. Jul 05 2018 02:05:24 PM PT Our system responded to a (D)DoS against your service with a filter.
  103.  
  104. Target address: 192.223.27.159
  105. Attack: a flood of TCP traffic from port 8080
  106. Filter duration: about 60 minutes
  107.  
  108. Example positive match
  109.  
  110.  
  111. 14:05:10.464104 IP (tos 0x0, ttl 57, id 12026, offset 0, flags [DF], proto TCP (6), length 1500) 23.128.129.19.8080 > 192.223.27.159.65143: . 2256387005:2256388465(1460) ack 3422947084 win 262
  112. 0x0000: 4500 05dc 2efa 4000 3906 9810 1780 8113 E.....@.9.......
  113. 0x0010: c0df 1b9f 1f90 fe77 867d bbbd cc06 070c .......w.}......
  114. 0x0020: 5010 0106 be09 0000 347a 5829 534b 3e44 P.......4zX)SK>D
  115. 0x0030: 7646 3a41 6e44 7f7b 4122 3427 7057 2f23 vF:AnD.{A"4'pW/#
  116. 0x0040: 794b 7652 2d5c 7e79 365d 2f36 2649 267d yKvR-\~y6]/6&I&}
  117. 0x0050: 4f5a OZ
  118.  
  119. What does this mean?
  120. (D)DoS attack against your service
  121. Jul 04 2018 06:05:32 PM PT Our system responded to a (D)DoS against your service with a filter.
  122.  
  123. Target address: 192.223.27.159
  124. Attack: a flood of TCP traffic from port 8080
  125. Filter duration: about 60 minutes
  126.  
  127. Example positive match
  128.  
  129.  
  130. 18:05:20.359669 IP (tos 0x0, ttl 56, id 12250, offset 0, flags [DF], proto TCP (6), length 1500) 173.244.223.106.8080 > 192.223.27.159.63674: . 677733337:677734797(1460) ack 2326548131 win 32
  131. 0x0000: 4500 05dc 2fda 4000 3806 a364 adf4 df6a E.../.@.8..d...j
  132. 0x0010: c0df 1b9f 1f90 f8ba 2865 63d9 8aac 4ea3 ........(ec...N.
  133. 0x0020: 5010 0020 2371 0000 7a63 7223 2a50 7a4d P...#q..zcr#*PzM
  134. 0x0030: 5a31 707b 686e 3d6f 3e6a 2837 7328 7552 Z1p{hn=o>j(7s(uR
  135. 0x0040: 3137 4058 4c66 6620 306a 3127 6e5b 535d 17@XLff.0j1'n[S]
  136. 0x0050: 7d62 }b
  137.  
  138. What does this mean?
  139. (D)DoS attack against your service
  140. Jul 03 2018 08:46:04 PM PT Our system responded to a (D)DoS against your service with a filter.
  141.  
  142. Target address: 192.223.27.159
  143. Attack: a flood of TCP traffic from port 8080
  144. Filter duration: about 60 minutes
  145.  
  146. Example positive match
  147.  
  148.  
  149. 20:45:50.473442 IP (tos 0x0, ttl 57, id 449, offset 0, flags [DF], proto TCP (6), length 1500) 173.244.223.106.8080 > 192.223.27.159.60725: . 3654290921:3654292381(1460) ack 700435566 win 33
  150. 0x0000: 4500 05dc 01c1 4000 3906 d07d adf4 df6a E.....@.9..}...j
  151. 0x0010: c0df 1b9f 1f90 ed35 d9d0 0de9 29bf cc6e .......5....)..n
  152. 0x0020: 5010 0021 413d 0000 7027 756f 4847 553e P..!A=..p'uoHGU>
  153. 0x0030: 2370 3f69 7927 5d2e 4922 4d6b 3e43 4a67 #p?iy'].I"Mk>CJg
  154. 0x0040: 654f 526c 486e 434a 3b69 4f23 5a34 7250 eORlHnCJ;iO#Z4rP
  155. 0x0050: 2c2f ,/
  156.  
  157. What does this mean?
  158. (D)DoS attack against your service
  159. Jul 03 2018 12:20:03 PM PT Our system responded to a (D)DoS against your service with a filter.
  160.  
  161. Target address: 192.223.27.159
  162. Attack: a UDP flood of length-540 packets/2
  163. Filter duration: about 7 days
  164.  
  165. Example positive match
  166.  
  167.  
  168. 12:19:50.618740 IP (tos 0x28, ttl 43, id 57942, offset 0, flags [DF], proto UDP (17), length 540) 115.214.107.74.10053 > 192.223.27.159.45761: UDP, payload 512
  169. 0x0000: 4528 021c e256 4000 2b11 afb3 73d6 6b4a E(...V@.+...s.kJ
  170. 0x0010: c0df 1b9f 2745 b2c1 0208 3657 5318 783d ....'E....6WS.x=
  171. 0x0020: 9509 f409 3a21 a5ae 2d4e af2a ab71 e8d7 ....:!..-N.*.q..
  172. 0x0030: 6272 f97e 7620 d2f9 47c7 5ca9 ee9e ad3d br.~v...G.\....=
  173. 0x0040: 5b91 7288 b3c1 cbe0 1244 e2af eee5 e9fe [.r......D......
  174. 0x0050: 214b !K
  175.  
  176. What does this mean?
  177. (D)DoS attack against your service
  178. Jul 03 2018 11:46:34 AM PT Our system responded to a (D)DoS against your service with a filter.
  179.  
  180. Target address: 192.223.27.159
  181. Attack: a flood of TCP traffic from port 8080
  182. Filter duration: about 60 minutes
  183.  
  184. Example positive match
  185.  
  186.  
  187. 11:46:20.357870 IP (tos 0x0, ttl 56, id 30023, offset 0, flags [DF], proto TCP (6), length 1500) 208.18.91.6.8080 > 192.223.27.159.56153: . 1813342612:1813344072(1460) ack 2644211107 win 11
  188. 0x0000: 4500 05dc 7547 4000 3806 c03d d012 5b06 E...uG@.8..=..[.
  189. 0x0010: c0df 1b9f 1f90 db59 6c15 6994 9d9b 75a3 .......Yl.i...u.
  190. 0x0020: 5010 000b 5ff3 0000 205b 3879 3663 6c37 P..._....[8y6cl7
  191. 0x0030: 7324 254e 4a53 225e 7135 4c6b 655d 402c s$%NJS"^q5Lke]@,
  192. 0x0040: 5f55 714b 293f 6d59 2441 5f2d 2451 7f51 _UqK)?mY$A_-$Q.Q
  193. 0x0050: 3453 4S
  194.  
  195. What does this mean?
  196. Access change
  197. Jul 02 2018 08:31:43 PM PT itzbutterzz@gmail.com was deleted as a secondary user.
  198. Access change
  199. Jul 02 2018 08:31:43 PM PT Parrykap@yahoo.com was deleted as a secondary user.
  200. Access change
  201. Jul 02 2018 08:29:22 PM PT itzbutterzz@gmail.com was added as a secondary user.
  202. Access change
  203. Jul 02 2018 08:29:00 PM PT Parrykap@yahoo.com was added as a secondary user.
  204. Server creation
  205. Jul 02 2018 08:15:07 PM PT This marks the initial creation of your server.
  206.  
  207. Below are service interruption/degradation events (connection interruptions, DDoS attacks, etc) pertaining to servers at your location, from the last 5 days.
  208.  
  209. Subject and date Description
  210. (No bandwidth events recorded)
  211.  
  212. Notify me by email if a new maintenance event is posted
  213. Notify me by email if a new standard event is posted
  214. Notify me by email if a new service interruption event is posted
  215.  
  216.  
  217. Click here for information on other maintenance-related events that regularly occur and are not posted individually to the log.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement