[nsp-sec] DDoS help for Freenode
Dave Monnier
dmonnier at cymru.com
Mon Feb 3 17:15:05 EST 2014
Team,
The folks at Freenode have requested help in stopping a ~10Gb UDP-based
attack affecting them. They ask that people willing to help look for
UDP attack traffic going to the servers in this list to ID compromised
web servers.
203.30.57.15
110.173.227.184
218.100.43.174
110.173.227.184
206.190.157.76
203.30.57.15
94.125.182.252
78.40.125.4
213.92.8.4
84.240.3.129
213.179.58.83
93.152.160.101
62.231.75.133
83.170.73.249
82.96.64.4
130.239.18.172
86.65.39.15
195.148.124.79
193.219.128.49
174.143.119.91
38.229.70.20
208.80.155.68
128.237.157.136
68.68.97.74
64.32.24.176
403:9000:1000::15
2403:9000:1000::15
2a01:270:0:666f::1
2a03:280:0:1::1
2001:820:2::6
2a02:2f0c:8000:19:62:231:75:133
2001:6b0:e:2018::172
2001:708:40:2001:a822:baff:fec4:2428
2001:41c8:0:3ee::2
2001:4800:7802:53::b075
2620::861:52:208:80:155:68
2610:150:2c68::d0:dab:1de5
Additionally, if people are interested in filtering UDP to those IP the
help is apreciated.
Lastly, the controller is here:
hXXp://tcp.mn/h.txt
AS | IP | AS Name
50613 | 82.221.102.179 | THORDC-AS THOR Data Center ehf
CERT-IS has been notified but if anyone has a direct contact and can get
the control script taken down that would be great. Even better, if
anyone can pull the logs for the script we can start notifying on the
compromised servers.
Thanks!
-Dave
--
Dave Monnier
Team Cymru Fellow
https://www.team-cymru.org/
PGP: https://www.cymru.com/dmonnier/0x7C1AAE55_pub.asc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 163 bytes
Desc: OpenPGP digital signature
URL: <https://puck.nether.net/mailman/private/nsp-security/attachments/20140203/1ced1c18/attachment-0001.sig>
More information about the nsp-security
mailing list