Jump to content
Sign in to follow this  
Duplolas

So im being ddosed

Recommended Posts

Heres the log. Help if you can.

 

 

Security log:

Wed Sep 19 06:41:25 2012

=>Found attack from 212.109.49.206.

Source port is 8844 and destination port is 22 which use the TCP protocol.

Wed Sep 19 06:51:44 2012

=>Found attack from 79.140.235.235.

Source port is 42521 and destination port is 23 which use the TCP protocol.

Wed Sep 19 07:18:04 2012

=>Found attack from 1.202.148.70.

Source port is 39523 and destination port is 5900 which use the TCP protocol.

Wed Sep 19 08:04:03 2012

=>Found attack from 221.123.162.77.

Source port is 6000 and destination port is 6666 which use the TCP protocol.

Wed Sep 19 08:41:45 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 9090 which use the TCP protocol.

Wed Sep 19 08:41:45 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 808 which use the TCP protocol.

Wed Sep 19 08:51:02 2012

=>Found attack from 64.31.45.61.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 08:51:02 2012

=>Found attack from 64.31.45.61.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 08:51:02 2012

=>Found attack from 64.31.45.61.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 09:12:13 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 8085 which use the TCP protocol.

Wed Sep 19 09:12:13 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 9000 which use the TCP protocol.

Wed Sep 19 09:12:13 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 2479 which use the TCP protocol.

Wed Sep 19 09:26:40 2012

=>Found attack from 74.55.87.138.

Source port is 35100 and destination port is 25 which use the TCP protocol.

Wed Sep 19 09:50:56 2012

=>Found attack from 201.57.40.70.

Source port is 28830 and destination port is 22 which use the TCP protocol.

Wed Sep 19 10:20:53 2012

=>Found attack from 64.31.45.58.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 10:20:53 2012

=>Found attack from 64.31.45.58.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 10:20:53 2012

=>Found attack from 64.31.45.58.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 11:07:23 2012

=>Found attack from 222.236.46.212.

Source port is 6000 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 11:07:53 2012

=>Found attack from 122.228.161.226.

Source port is 4935 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 11:16:39 2012

=>Found attack from 14.8.249.132.

Use the ICMP protocol.

Wed Sep 19 11:29:33 2012

=>Found attack from 71.209.231.129.

Source port is 3265 and destination port is 23 which use the TCP protocol.

Wed Sep 19 11:42:27 2012

=>Found attack from 210.5.153.130.

Source port is 4935 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 11:45:01 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 27977 which use the TCP protocol.

Wed Sep 19 11:45:01 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 2301 which use the TCP protocol.

Wed Sep 19 11:45:01 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 7212 which use the TCP protocol.

Wed Sep 19 11:50:42 2012

=>Found attack from 59.127.188.37.

Source port is 2024 and destination port is 23 which use the TCP protocol.

Wed Sep 19 11:51:43 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 11:51:43 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 11:51:43 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 11:53:46 2012

=>Found attack from 71.38.115.209.

Source port is 1952 and destination port is 23 which use the TCP protocol.

Wed Sep 19 12:03:34 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 2479 which use the TCP protocol.

Wed Sep 19 12:03:34 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 8000 which use the TCP protocol.

Wed Sep 19 12:13:54 2012

=>Found attack from 71.208.38.16.

Source port is 4384 and destination port is 23 which use the TCP protocol.

Wed Sep 19 12:22:09 2012

=>Found attack from 222.236.46.212.

Source port is 6000 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 12:23:41 2012

=>Found attack from 213.111.233.132.

Use the ICMP protocol.

Wed Sep 19 12:36:04 2012

=>Found attack from 64.31.29.58.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 12:36:04 2012

=>Found attack from 64.31.29.58.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 12:36:04 2012

=>Found attack from 64.31.29.58.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 13:41:40 2012

=>Found attack from 220.181.168.156.

Source port is 6000 and destination port is 1433 which use the TCP protocol.

Wed Sep 19 13:49:56 2012

=>Found attack from 184.164.150.13.

Source port is 48641 and destination port is 65533 which use the TCP protocol.

Wed Sep 19 14:00:46 2012

=>Found attack from 93.37.144.237.

Source port is 4219 and destination port is 25 which use the TCP protocol.

Wed Sep 19 14:01:16 2012

=>Found attack from 93.37.144.237.

Source port is 4219 and destination port is 25 which use the TCP protocol.

Wed Sep 19 14:02:17 2012

=>Found attack from 64.31.29.60.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 9000 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 8088 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 8008 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 64.31.29.62.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 64.31.29.62.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 14:46:42 2012

=>Found attack from 64.31.29.62.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 14:55:29 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 8085 which use the TCP protocol.

Wed Sep 19 14:55:29 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 2479 which use the TCP protocol.

Wed Sep 19 14:55:29 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 9090 which use the TCP protocol.

Wed Sep 19 15:01:40 2012

=>Found attack from 50.9.134.250.

Source port is 4935 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 15:30:35 2012

=>Found attack from 27.122.12.130.

Source port is 14129 and destination port is 22 which use the TCP protocol.

Wed Sep 19 16:07:45 2012

=>Found attack from 77.222.40.20.

Source port is 2969 and destination port is 22 which use the TCP protocol.

Wed Sep 19 16:10:49 2012

=>Found attack from 116.6.210.181.

Source port is 10852 and destination port is 5900 which use the TCP protocol.

Wed Sep 19 16:20:06 2012

=>Found attack from 64.31.29.61.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 16:20:06 2012

=>Found attack from 64.31.29.61.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 16:20:06 2012

=>Found attack from 64.31.29.61.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 16:36:36 2012

=>Found attack from 142.217.7.61.

Source port is 51343 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 16:56:12 2012

=>Found attack from 87.106.31.37.

Source port is 3389 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 17:01:52 2012

=>Found attack from 195.244.62.206.

Source port is 4935 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 17:01:52 2012

=>Found attack from 60.190.63.62.

Source port is 36801 and destination port is 25 which use the TCP protocol.

Wed Sep 19 17:05:28 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 17:05:28 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 17:05:28 2012

=>Found attack from 64.31.29.59.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 17:25:06 2012

=>Found attack from 70.36.101.50.

Source port is 30664 and destination port is 3389 which use the TCP protocol.

Wed Sep 19 17:29:13 2012

=>Found attack from 117.211.92.122.

Source port is 22186 and destination port is 22 which use the TCP protocol.

Wed Sep 19 17:48:19 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 9415 which use the TCP protocol.

Wed Sep 19 17:48:19 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 9000 which use the TCP protocol.

Wed Sep 19 17:48:19 2012

=>Found attack from 58.218.199.227.

Source port is 12200 and destination port is 8000 which use the TCP protocol.

Wed Sep 19 17:49:51 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 9415 which use the TCP protocol.

Wed Sep 19 17:49:51 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 9000 which use the TCP protocol.

Wed Sep 19 17:49:51 2012

=>Found attack from 58.218.199.250.

Source port is 12200 and destination port is 8000 which use the TCP protocol.

Wed Sep 19 17:53:27 2012

=>Found attack from 64.31.45.62.

Source port is 12200 and destination port is 6515 which use the TCP protocol.

Wed Sep 19 17:53:27 2012

=>Found attack from 64.31.45.62.

Source port is 12200 and destination port is 36081 which use the TCP protocol.

Wed Sep 19 17:53:27 2012

=>Found attack from 64.31.45.62.

Source port is 12200 and destination port is 8123 which use the TCP protocol.

Wed Sep 19 17:54:59 2012

=>Found attack from 222.240.166.9.

Source port is 37627 and destination port is 21 which use the TCP protocol.

Wed Sep 19 18:05:49 2012

=>Found attack from 66.197.134.79.

Source port is 6000 and destination port is 3389 which use the TCP protocol.

Share this post


Link to post
Share on other sites

Lol russia, china, texas who dafuq did you piss off? call isp say your being ddosed. if you have one of those local companies goodluck at&t best ddos protextion to me.

Share this post


Link to post
Share on other sites

So, im still waiting on comcast. Only thing they are doing for me is blasting 70s music in my ear. So. Im probably going to be gone for a while guys until this gets fixed.

Share this post


Link to post
Share on other sites

Well you can at least change your i.p. while you are waiting. There may be better ways, and it also may depend on the type of router/modem you have but, turn off your router and modem for a good 20 minutes, and some brands change the i.p.

 

I was dosed about 6 times last month. It was a combination of crazy man and some other dude that I promised not to reveal -.- but unless you reeaaallly pissed them off, it'll hopefully stop soon. Whether the guy just gets tired of it, or if your isp can detect it.

Share this post


Link to post
Share on other sites

So, I went around comcast because they wanted to charge me $150 to fix it. And I went into my crawl space, disconnected the main Ethernet line for around 12 hours, and im getting atacked less. So, half full/half empty, have internet, still being atacked. Hopefully ill have this fixed by the weekend.

Share this post


Link to post
Share on other sites

Hey guise! I set up a honey pot ip! So basically all the attacks have swarmed to that dummy ip and little to none are getting to my computer!

 

So ill be playing this weekend!

Share this post


Link to post
Share on other sites

Please sign in to comment

You will be able to leave a comment after signing in



Sign In Now
Sign in to follow this