Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


32+ THREAD DUAL CPU DEDIS STARTING @ $35.72/m ★ FIRST 10 BUYERS ONLY ★ IPMI ★ Double RAM ★ Double BW - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

32+ THREAD DUAL CPU DEDIS STARTING @ $35.72/m ★ FIRST 10 BUYERS ONLY ★ IPMI ★ Double RAM ★ Double BW

2»

Comments

  • taizitaizi Member
    edited July 2022

    @mosquitoguy said:

    @taizi said:
    no, the only thing I run is BOINC(primegrid), it won't connect to china, even myself connect RDP with VPN
    so no Chinese IP here

    It's probably just your bad luck that you got ddos'ed soon after you got the server. I must say the motivation on which you're being accused is pretty weak. Why would anyone "test" the server by ddos'ing themselves and then complain about it? I don't see the point or benefit.

    thx for your understand, i don't think anyone will test their server by ddos, even the provider not mention about what protection they have...
    if provider say i am trying spoof and ddos other server, ok, it is possible.but trying to ddos my own server? lol, this isn't the ovh...
    hope they can find out the reason, or just let me out

  • BrianHarrisonBrianHarrison Member, Patron Provider
    edited July 2022

    @taizi said:

    @mosquitoguy said:

    @taizi said:
    no, the only thing I run is BOINC(primegrid), it won't connect to china, even myself connect RDP with VPN
    so no Chinese IP here

    It's probably just your bad luck that you got ddos'ed soon after you got the server. I must say the motivation on which you're being accused is pretty weak. Why would anyone "test" the server by ddos'ing themselves and then complain about it? I don't see the point or benefit.

    thx for your understand, i don't think anyone will test their server by ddos, even the provider not mention about what protection they have...
    if provider say i am trying spoof and ddos other server, ok, it is possible.but trying to ddos my own server? lol, this isn't the ovh...
    hope they can find out the reason, or just let me out

    As long as there are no further DoS attacks against your server, then we'll have no problems.

    As I stated earlier, all that we know for certain is that your server was attacked with a ~5Gbps DoS attack, it was sustained for an hour and it occurred within 24 hours of your server delivery. Your IPs were not recently recycled from another cancellation -- they had been sitting unused for quite some time. It's very unlikely someone else was being targeted.

    We have had several customers in the past who stressed tested their own server with a DoS attack and then complained afterwards post-suspension that they were simply "making sure they're server can handle a DoS attack because [they] get attacked sometimes." Whether that's the case here, I have no way to confirm that, but it seems likely given that the server was attacked within 24 hours of delivery.

    Either way, the cause for the attack is not important. What's important is that your server does not continue to be a DDoS magnet.

  • @BrianHarrison said:
    Either way, the cause for the attack is not important. What's important is that your server does not continue to be a DDoS magnet.

    so you just advertised to everyone that you'll kick out your customers if they get ddos attacked. wow. I sense more deals coming. :)

  • BrianHarrisonBrianHarrison Member, Patron Provider
    edited July 2022

    @mosquitoguy said:

    @BrianHarrison said:
    Either way, the cause for the attack is not important. What's important is that your server does not continue to be a DDoS magnet.

    so you just advertised to everyone that you'll kick out your customers if they get ddos attacked. wow. I sense more deals coming. :)

    @mosquitoguy We have no problem removing DDoS magnets from our network and I'm more than happy for potential customers to know that. We do not want that type of clientele on our network.

    However, that's not what happened here. taizi was hit with a DDoS attack and his service still remains online. It didn't even go offline during the attack, but he did experience some weird network issues while the mitigation was active.

    So what this thread actually shows is:

    1. We have DDoS mitigation in place even though we don't advertise it nor specialize in it.
    2. We generally give our customers a warning before giving them the boot. Even under suspicious circumstances like this one.

    For a dedicated server under $40 per month server, that is more than fair.

    Thanked by 2MikeA fluffernutter
  • Halo11Halo11 Member
    edited July 2022

    The IPs not being recently recycled, does not mean they have a clean history.

    There are some bad actors and it's understandable to be defensive, but the customer gave you his money. Maybe give him the benefit of the doubt and be a bit more supportive; monitor the IP before issuing it to another unlucky person.

  • BrianHarrisonBrianHarrison Member, Patron Provider
    edited July 2022

    @Halo11 said:
    The IPs not being recently recycled, does not mean they have a clean history... monitor the IP before issuing it to another unlucky person.

    The IP address had not been in use for months and had never been attacked before. This means that there was virtually no possibility this his server was targeted by "mistaken identity". A case of "mistaken identity" is a laughably unlikely excuse to begin with. The IP address was turned on for this client and he was then DDoS attacked in under 24 hours. It doesn't require sophisticated powers of logic to deduce who attracted the DDoS attack.

    There are some bad actors and it's understandable to be defensive, but the customer gave you his money. Maybe give him the benefit of the doubt and be a bit more supportive

    I understand your perspective, but unfortunately you can't be optimistic and hopeful when managing a network of thousands of leased servers. When you host thousands of servers, particularly low-end budget servers, fighting back abuse, spam, fraud, etc is a daily non-stop battle. Any host here with a significant number of customers will tell you the same. Taking a no-nonsense approach to network abuse is the only way you can keep your network running smoothly. It would be a disservice to our other customers if we did anything but that. They deserve quality service.

    That said, we actually have given this customer the benefit of the doubt -- that's why he's still on our network. Most hosts would have simply terminated him and washed their hands of the problem. However, if the problem recurs, then we'll re-evaluate.

  • taizitaizi Member

    @BrianHarrison said: The IP address had not been in use for months

    do you sure? when I search my IP in riskiq, it shows Last Seen is 2022-06-22

    then I go to shodan and search again, last seen time is 2022-06-19

    not been in use for months? maybe just for two weeks...😅

  • taizitaizi Member

    @BrianHarrison said: Most hosts would have simply terminated him and washed their hands of the problem

    prerequisites:user not getting some random ddos

Sign In or Register to comment.