[150909] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Increase of DOS attacks using TCP src and/or dst of 0

daemon@ATHENA.MIT.EDU (Mike Gatti)
Wed Mar 7 16:22:41 2012

From: Mike Gatti <ekim.ittag@gmail.com>
In-Reply-To: <483E6B0272B0284BA86D7596C40D29F901928959AA9D@PUR-EXCH07.ox.com>
Date: Wed, 7 Mar 2012 13:21:38 -0800
To: Matthew Huff <mhuff@ox.com>
Cc: 'NANOG' <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

I just scanned through the last 48 hours of logs and did not find anything. 
We are peering with Level3 (AS 3549) and Verizon (AS 11486). 

--
Michael Gatti  
main. 949.371.5474
(UTC -8)



On Mar 7, 2012, at 12:45 PM, Matthew Huff wrote:

> Anyone else see a massive increase of scanning/dos with TCP source and/or
> dst port of 0? We started seeing a massive increase today creating some
> issue with our firewalls.
> 
> 
> 
> 
> 
> 
> 
> ----
> 
> Matthew Huff             | 1 Manhattanville Rd
> 
> Director of Operations   | Purchase, NY 10577
> 
> OTA Management LLC       | Phone: 914-460-4039
> 
> aim: matthewbhuff        | Fax:   914-460-4139
> 
> 
> 



home help back first fref pref prev next nref lref last post