[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Host.us DDOS attack
- Subject: Host.us DDOS attack
- From: jason at unlimitednet.us (Jason Canady)
- Date: Wed, 3 Aug 2016 17:31:27 -0400
- In-reply-to: <[email protected]>
- References: <CALapM4AiohBo-EHgqa4ubTLHoE1y59=fXXQSLYy2EaWz4L3PEA@mail.gmail.com> <[email protected]> <[email protected]>
Strange that they cannot send a BGP blackhole upstream to keep everyone
else online within their advertised route.
On 8/3/16 5:27 PM, Tony Wicks wrote:
> Further to that, and I would suggest it should be part of the overall discussion here. It appears the IPv4 IP block my VM is in is not currently advertised on the world route table. I assume hostus.us's transit provider has dropped their ipv4 BGP to save themselves. This is really the ultimate reward for the extortionists as they don't even need to sustain the DDOS to attack their target. While I see the transit providers point of view, it?s a pretty shitty situation for their customer, and their customers/customers.
>
>
>
> -----Original Message-----
> From: NANOG [mailto:nanog-bounces at nanog.org] On Behalf Of Tony Wicks
> Sent: Thursday, 4 August 2016 9:10 AM
> To: 'NANOG list' <nanog at nanog.org>
> Subject: RE: Host.us DDOS attack
>
> Interestingly my VM (LA) with them has been effectively down for half a day as far as IPv4 is concerned. IPv6 traffic seems unaffected.
>
>
>
>
>
>