[nsp-sec] 50Gbps NTP Attack, 23377 Source IP addresses
Sean Crandall
sean at megapath.com
Tue Feb 25 10:29:22 EST 2014
From: nsp-security [mailto:nsp-security-bounces at puck.nether.net] On Behalf Of Phil Rosenthal
Sent: Tuesday, February 25, 2014 2:21 AM
To: nsp-security at puck.nether.net
Subject: [nsp-sec] 50Gbps NTP Attack, 23377 Source IP addresses
----------- nsp-security Confidential --------
Hello all,
We have had a reoccuring NTP Reflected DDoS attack against one of our customers, and would love it if we could get some of these open NTP servers could be closed up.
ACK for 4565 and 18566.
-Sean
Sean Crandall
VP, Network Architecture
MegaPath
W: 408.434.4830 C: 408.781.7979 **** PLEASE NOTE MY NEW WORK NUMBER ****
http://www.megapath.com<http://www.megapath.com/> sean at megapath.com<mailto:sean at megapath.com>
Voice • Data • Security
Privileged/Confidential Information may be contained in this message. It is not for use or disclosure outside MegaPath Inc. without a written proprietary agreement. If you are not the addressee indicated in this message, or agent responsible for delivery, you may not copy or deliver this message to anyone. Please notify the sender as soon as possible and immediately destroy this message and its attachments in its entirety.
More information about the nsp-security
mailing list