[nsp-sec] DoS Earlier Today
Matthew.Swaar at us-cert.gov
Matthew.Swaar at us-cert.gov
Tue Sep 29 16:35:20 EDT 2009
We got some packet love between 0100 and 0800 GMT today (29 Sep).
Host 130.14.29.110 was the recipient. The traffic was from a single
source IP (218.58.75.201, China Unicom AS4837 I think) and didn't appear
to be spoofed. Traffic was TCP-80 and a 3-way handshake appeared to be
completed.
Date| Records| Bytes|
Packets|
2009/09/29T01:00:00| 74137.00| 5644255475.00|
108553818.00|
2009/09/29T02:00:00| 18258.00| 5766887546.00|
110888968.00|
2009/09/29T03:00:00| 35179.63| 12459525330.16|
239599986.82|
2009/09/29T04:00:00| 149362.49| 16072069084.85|
309253919.94|
2009/09/29T05:00:00| 452678.75| 16485612549.58|
318279842.17|
2009/09/29T06:00:00| 19768.72| 6485693206.25|
124719271.90|
2009/09/29T07:00:00| 241759.07| 8737336838.94|
168047947.36|
2009/09/29T08:00:00| 199669.34| 8826816560.23|
169787748.80|
The traffic/attack has ceased, but I was curious if anyone saw any
commands/etc that related to this.
Very Respectfully,
US-CERT Ops Center
703-235-5111
POC: Matt Swaar - Analyst
More information about the nsp-security
mailing list