[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

[tor-relays] OVH Warnings



OVH  seemed to have upped their game with more information than just throwing all traffic into “mitigation” which can result in bad exit status, with no information as to what their systems are detecting as a threat of denial of service attack.

 

For the first time I got an email…no mitigation.

 

 

 

Dear Customer,

Abnormal activity has been detected on your VPS


Attack detail : 4Kpps/2Mbps
dateTime                   srcIp:srcPort           dstIp:dstPort           protocol flags       bytes reason               
2020.09.15 19:02:21 CEST   
my ip:42845      212.22.93.124:25565     TCP      SYN            60 ATTACK:TCP_SYN       
2020.09.15 19:02:21 CEST   
my ip:39673      212.22.93.124:25565     TCP      SYN            60 ATTACK:TCP_SYN  

Etc

 

Gerry

_______________________________________________
tor-relays mailing list
tor-relays@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-relays