[151965] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: DNS noise

daemon@ATHENA.MIT.EDU (Michael Sinatra)
Fri Apr 6 13:52:26 2012

Date: Fri, 06 Apr 2012 10:51:50 -0700
From: Michael Sinatra <michael@rancid.berkeley.edu>
To: Keegan Holley <keegan.holley@sungard.com>
In-Reply-To: <CABO8Q6QrNbwe_Z-DV9xLVqF0gVBs1ntT=DtwDujSEZipoNSfkw@mail.gmail.com>
Cc: "nanog@nanog.org" <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On 04/06/12 10:47, Keegan Holley wrote:
> Have you tried contacting the owner of the IP?  A DDOS attack from that
> particular IP would be ironic.
>
> #
> # The following results may also be obtained via:
> #
> http://whois.arin.net/rest/nets;q=72.20.23.24?showDetails=true&showARIN=false&ext=netref2
> #
>
> Staminus Communications STAMINUS-COMMUNICATIONS (NET-72-20-0-0-1) 72.20.0.0
> - 72.20.63.255
> DDOSWIZ.COM STAMINUS-COMMUNICATIONS (NET-72-20-23-0-1) 72.20.23.0 -
> 72.20.23.63

If it's an attempt at a reflective DNS-based DDoS attack, then the 
source IP address making the query is likely spoofed.  The IP address in 
question is really the target, not the source of the attack.

That is, of course, if this is a standard reflective DDoS attack.

michael


home help back first fref pref prev next nref lref last post