About ddos-response at nfoservers.com

Alain Hebert ahebert at pubnix.net
Fri Jan 24 20:50:06 UTC 2014


    Well the abusers started to use burst and then switching targeted IP.

    Last time I opened a ticket with GT-T/nLayer for a ~120Mbps NTP DDoS
Amplification "attempt" toward 2 of my IP's.

        . after 2h, I called them directly to be told they lost my
original request;

        . after 4h, got told it wasn't assigned yet;

        . after 12h, they finally applied the filter as the amp attempt

    Based on that experience... why bother.

    To give you an idea, in the past 4 days and 30m queries, I'm up to
1100 blocked targets on one of my DNS Servers.

Alain Hebert                                ahebert at pubnix.net   
PubNIX Inc.        
50 boul. St-Charles
P.O. Box 26770     Beaconsfield, Quebec     H9W 6G7
Tel: 514-990-5911  http://www.pubnix.net    Fax: 514-990-9443

On 01/24/14 09:36, Jared Mauch wrote:
> On Jan 24, 2014, at 9:22 AM, Alain Hebert <ahebert at pubnix.net> wrote:
>>    Is there a [Spoofing Tracking Squad] out there?
>>    ( We're on GT-T/nLayer/Tinet )
> You haven’t been able to get GTT/nLayer/TINet to track the traffic back?
> Details are welcome, either here or in private.  There are plenty of people who will chase and fix this stuff when they’re aware of it.
> - Jared

More information about the NANOG mailing list