On Mon, Dec 9, 2019 at 3:42 PM Michael Sherlock
<[email protected]> wrote:
>
> Cristopher,
>
> Ip addresses that are not currently in use, and IP addresses that is 
> currently used for CGNAT for end users
>

I'm 100% sure that those words mean something to you.. but not
operating your network they don't mean anything to me.


>
> Regards,
>
> Michael Sherlock
> Mobile: +44 75070 92392
>
> Sent from my iPhone
>
> On Dec 9, 2019, at 8:36 PM, "[email protected]" 
> <[email protected]> wrote:
>
> 
>
> Begin forwarded message:
>
> From: Christopher Morrow <[email protected]>
> Subject: Re: DDoS attack
> Date: December 9, 2019 at 11:11:31 PM GMT+3
> To: "[email protected]" <[email protected]>
> Cc: nanog list <[email protected]>
>
> I'd note that: "what prefixes?" isn't answered here... like: "what is
> the thing on your network which is being attacked?"
>
> On Mon, Dec 9, 2019 at 3:08 PM [email protected]
> <[email protected]> wrote:
>
>
> Dear All,
>
> My network is being flooded with UDP packets, Denial of Service attack, 
> soucing from Cloud flare and Google IP Addresses, with 200-300 mbps minimum 
> traffic, the destination in my network are IP prefixes that is currnetly not 
> used but still getting traffic with high volume.
> The traffic is being generated with high intervals between 10-30 Minutes for 
> each time, maxing to 800 mbps
> When reached out cloudflare support, they mentioned that there services are 
> running on Nat so they can’t pin out which server is attacking based on ip 
> address alone, as a single IP has more than 5000 server behind it, providing 
> 1 source IP and UDP source port, didn’t help either
> Any suggestions?
>
> Regards,
> Ahmed Dala Ali
>
>

Reply via email to