![]() |
TCP SYN Flooding
My friend was getting this yesterday and he didnt have logging on his router so from the best I could do (netstat at time of attack and afterwards) it seemed that vigilance.phaseburn.net was responsible.
Anyway today I found a lot of these in my router's logs... 2004/04/10 01:19:08 ** TCP SYN Flooding ** <IP/TCP> 66.101.19.2:45483 ->> 12.221.234.180:411 First IP address is his. That IP address translates into shazbot.phaseburn.net Anyway, I contacted the owner of phaseburn.net. And I sent him my logs. He replied with this... Quote:
Mainly, I'm wondering about if it is possible that someone spoofed his IP with theirs? |
There's an old backdoor virus called backage, that used port 411. Most likely, the infected computer was spoofing it's source IP. You might try looking up backage on one of the security webistes, like symantec, or Mcaffee.
|
It's internet background noise, ignore it. If you were being syn flooded, you probably would not be able to post.
|
All times are GMT -8. The time now is 08:55 PM. |
Powered by vBulletin® Version 3.8.7
Copyright ©2000 - 2025, vBulletin Solutions, Inc.
Search Engine Optimization by vBSEO 3.6.0 PL2
© 2002-2012 Tilted Forum Project