[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Host.us DDOS attack
- Subject: Host.us DDOS attack
- From: tony at wicks.co.nz (Tony Wicks)
- Date: Thu, 4 Aug 2016 09:27:57 +1200
- In-reply-to: <[email protected]>
- References: <CALapM4AiohBo-EHgqa4ubTLHoE1y59=fXXQSLYy2EaWz4L3PEA@mail.gmail.com> <[email protected]>
Further to that, and I would suggest it should be part of the overall discussion here. It appears the IPv4 IP block my VM is in is not currently advertised on the world route table. I assume hostus.us's transit provider has dropped their ipv4 BGP to save themselves. This is really the ultimate reward for the extortionists as they don't even need to sustain the DDOS to attack their target. While I see the transit providers point of view, it?s a pretty shitty situation for their customer, and their customers/customers.
From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of Tony Wicks
Sent: Thursday, 4 August 2016 9:10 AM
To: 'NANOG list' <nanog at nanog.org>
Subject: RE: Host.us DDOS attack
Interestingly my VM (LA) with them has been effectively down for half a day as far as IPv4 is concerned. IPv6 traffic seems unaffected.