ips that have tried/are trying to
DoS nyc.indy:
24.185.151.175
24.185.151.175
24.195.42.140
24.208.128.254
24.218.125.149
24.49.18.54
24.62.152.241
65.37.52.221
65.43.225.103
66.229.150.11
66.26.193.74
68.2.162.200
68.202.162.34
68.203.189.145
68.237.239.154
68.39.190.87
68.65.128.234
69.208.92.157
To list what you currently have in your firewall:
iptables -L
if you dont have a complex firewall setup, you can probably drop IPs by doing this, but be warned, if you do this wrong, you could cut your connection to your machine so type carefully:
iptables -A INPUT -s ip.address.here -j DROP
if you want to see what is hitting your squid and how hard, use:
netstat -an | grep tcp | awk '{print $5 $6;}' | sed 's/:[0-9]*/ /'| sort | uniq -c | sort -r
large number of connections (greater than 40 or so) in the state SYN_RECV that are not to the publish.nyc server are
suspicious.....
--
MicahA - 30 Aug 2004