Skip to main content
Blocked attacks

Blocked attacks

You can view the history of DDoS attacks blocked by Servercore protection in the control panel.

Servercore protection works at the network and transport layer (L3-L4). If your monitoring systems have detected an application-level attack (L7) or other malicious activity — contact helpdesk.

View attack history

  1. In Control Panel, go to Network ServicesNetwork Incidents.

  2. Open the Blocked Attacks tab. For each attack, the network attacked, the period of the attack, and the response from the defense system are specified:

    • block — suspicious traffic was discarded;
    • detect — traffic was seen but was not discarded. A new attack detection rule is being tested on the system, or traffic blocking is disabled for the IP address.
  3. To see detailed information about the attack, including attack-type, its speed, power, total number of packets sent, and volume, in the attack row, click the IP address of the network.

  4. Optional: If you observe a prolonged attack that disables or reduces service availability, change the IP address of the server.

Types of attacks

fragment

DescriptionTarget of attack
UDP flood to service DST port 565 limitedAttack UDP traffic on destination port 565 Whoami
  • Exhaustion of bandwidth and computational resources of the attacked host;
  • Denial of service of the attacked application
UDP flood to service DST port 1194 limitedUDP traffic attack on destination port 1194 OpenVPNExhaustion of bandwidth and computational resources of the attacked host; denial of service of the attacked application
NTP Monlist ResponseAttack by reflected and amplified UDP traffic from source port 123 (NTP Moonlist response vulnerability)Bandwidth exhaustion
SSDP ReflectionReflection and amplified UDP attack on source port 1900 (SSDP and UPnP vulnerability)Bandwidth exhaustion
Empty UDP dataAttack of client IP address with Empty UDP datagrams Empty UDP FloodIncreased utilization of victim network
MemcacheAttack by reflected and amplified UDP traffic from source port 11211 (Memcache vulnerability)Bandwidth exhaustion
SSRP ReflectionReflected and amplified UDP traffic from source port 1434 SSRP (SQL Server Resolution Protocol) attackBandwidth exhaustion
WSD ReflectionReflection and amplified UDP traffic from source port 11211 (Memcache vulnerability)Bandwidth exhaustion
Net Assistant ReflectionReflection and amplified UDP traffic from source port 3283 (Apple Network Assistant vulnerability)Bandwidth exhaustion
LowShadyPorts/Reflection flood to server limited

Rejection and amplified UDP traffic from source ports:

  • 19 CHARGEN (Character Generator);
  • 111 SUNRPC (Sun Remote Procedure Call);
  • 137 NETBIOS-NS (NetBIOS Name Service);
  • 161 SNMP (Simple Network Management Protocol);
  • 389 LDAP (Lightweight Directory Access Protocol);
  • 520 ROUTER (used by routing protocols such as RIP)
Bandwidth exhaustion
Custom UDP amplifications

Attack by reflected and amplified UDP traffic from source ports:

  • 37810 DHCPDiscover for DVR devices;
  • 10074 TP240PhoneHome (Mitel systems);
  • 37020 SADP (Hikvision)
Bandwidth exhaustion
Custom UDP amplifications3Attack by reflected and amplified UDP traffic from source port 37021 SADP (Hikvision)Bandwidth exhaustion
Query Response/DNS query response reflection flood to server limited

DNS Response attack with traffic from public DNS servers with UDP DNS source port 53 and flags set from DNSSEC extension:

  • DNS Signature;
  • DNS Signature Recursive
Bandwidth exhaustion
Source Port 53/UDP source port 53 reflection flood to server limitedReflected and amplified UDP traffic from UDP DNS source port 53Bandwidth exhaustion
Source Port 4500/UDP source port 4500 reflection flood to server limitedReflection and amplified UDP traffic attack from source port 4500Bandwidth exhaustion
Any Source Port/UDP source port reflection flood to server limitedHigh volume UDP traffic attack from a specific source port to any destination port on the client IPBandwidth exhaustion
RST/TCP RST reflection flood to server limitedTCP traffic attack with TCP RST flag set from a specific source port to any destination port on client IP
  • Exhaustion of computational resources of the attacked host;
  • Disruption of TCP connection support on the attacked host (or group of hosts)
SYN/ACK/TCP SYN/ACK reflection flood to server limitedAttack TCP traffic with TCP RST flag set from a specific source port to any destination port on the client IP.Exhaustion of network and computational resources of the attacked host
PSH/ACK/TCP PSH/ACK reflection flood to server limitedAttack with TCP traffic with TCP RST or TCP PSH flags set from a specific source port to any destination port on the client IP.Exhaustion of computational resources of the attacked host
Failed Reflectors/ICMP Server flood to server limitedAttack of client host with large volume of ICMP response traffic from public servers, provoked by specific requests of attacker to public servers for availability of UDP ports, but with source address spoofing to client one.Exhaustion of bandwidth and computational resources of the attacked host
UDP flood to service DST port 53 limitedUDP traffic attack on destination port 53 DNS
  • Exhaustion of bandwidth and computational resources of the attacked host;
  • Denial of service of the attacked application
Any Destination Port/UDP service flood to a server port limitedHigh-volume UDP attack on any arbitrary victim port
  • Bandwidth exhaustion;
  • Denial of service of the attacked application
Any Type/ICMP/ICMPv6 service flood to a server limitedAttack with arbitrary ICMP traffic (including ICMPv6) of large volume on a specific destination port of the client.Exhaustion of bandwidth and computational resources of the attacked host
SYN/TCP SYN to a server port limitedAttack with TCP traffic with the TCP SYN flag set to a specific destination port on a client IP.
  • Exhaustion of network and computing resources of the attacked host;
  • Disruption of TCP connection establishment on the attacked host
RST/TCP RST to a server port limitedAttack with TCP traffic with TCP RST flag set to a specific destination port of a client IP.
  • Exhaustion of computing resources of the attacked host;
  • Disruption of TCP connection support on the attacked host or group of hosts
PSH/ACK/TCP PSH/ACK service flood to a server port limitedTCP traffic attack with TCP RST/PSH flags set on a specific destination port of a client IPExhaustion of computational resources of the attacked host
Any TCP/TCP to a server port limitedAttack with arbitrary TCP traffic of large volume to a specific client portExhaustion of computational resources and bandwidth of the attacked host
Fragment Under Attack/UDP server under attackto server limited Attack with fragmented UDP-datagrams. Usually accompanies other types of UDP attacks Bandwidth exhaustion
Any Port/UDP server flood to server limitedAttack with arbitrary high-volume UDP traffic in aggregate on any client portExhaustion of the attacked host's computational resources and bandwidth
Any Type/ICMP server flood to server limitedAttack with high-volume arbitrary ICMP traffic, including ICMPv6, any destination port of the clientBandwidth and computational resources of the attacked host exhausted
SYN/TCP SYN to server address limitedAttack with TCP traffic with TCP SYN flag set to any destination port of the client IP
  • Network and computational resources of the attacked host exhausted;
  • disruption of TCP connection establishment on the attacked host
RST/TCP RST to server address limitedAttack by TCP traffic with TCP RST flag set to any destination port of client IP
  • Exhaustion of computational resources of the attacked host;
  • Disruption of TCP connection support on the attacked host or host group
Any TCP/TCP to server address limitedAttack with arbitrary high-volume TCP traffic in aggregate on any destination port of the clientExhaustion of network, computational resources of the attacked host and bandwidth
IP protocol Any IP protocol Any IP protocol server flood to server limitedAttack with arbitrary high-volume IP traffic in aggregate on all transport protocols and all portsExhaustion of network and computational resources of the attacked host, computational resources of the attacked host and bandwidth
Flex Fragment/Flex matched IP fragment to destination IP under attackRule defining blocking of IP packet fragments for hosts that are already under attack. Accompanies other types of attacks-