Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


Unusual packets hitting server
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

Unusual packets hitting server

I've been puzzeled with this for a day now, a ton of unusual packets hitting the server, all coming from public proxies (I googled a few ips), and TOR.

All carrying this message which I found by logging all POST data - access logs near end of post:

are%3Dyou%26prepared%3Dfor%26z3r0_d32tr0y3r%3Dv1%26imustdestroy%3D1

Which is (without URL encoding):

are=you&prepared=for&z3r0_d32tr0y3r=v1&imustdestroy=1

Which I can translate easily to:

Are you prepared for z3r0_d32tr0y3r v1 imustdestroy 1

And that's sent over POST. The attack isn't making the server become offline, but it's causing the occasional drop.

Suspect Traffic:

5.79.68.161 - - [28/Mar/2015:08:25:00 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+"
5.79.68.161 - - [28/Mar/2015:08:25:03 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
85.214.98.239 - - [28/Mar/2015:08:25:05 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
85.214.98.239 - - [28/Mar/2015:08:25:07 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (PLAYSTATION 3; 3.55)"
85.214.98.239 - - [28/Mar/2015:08:25:09 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Linux; U; Android 4.0.3; ko-kr; LG-L160L Build/IML74K) AppleWebkit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
85.214.98.239 - - [28/Mar/2015:08:25:10 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A"
85.214.98.239 - - [28/Mar/2015:08:25:12 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A"
85.214.98.239 - - [28/Mar/2015:08:25:14 -0400] "POST / HTTP/1.1" 200 14658 "-" "Opera/12.02 (Android 4.1; Linux; Opera Mobi/ADR-1111101157; U; en-US) Presto/2.9.201 Version/12.02"

91.213.8.236 - - [28/Mar/2015:08:24:34 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
188.226.139.158 - - [28/Mar/2015:08:24:34 -0400] "GET / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.4 (KHTML, like Gecko) Chrome/98 Safari/537.4 (StatusCake)"
194.150.168.79 - - [28/Mar/2015:08:24:37 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Linux; U; Android 4.0.3; ko-kr; LG-L160L Build/IML74K) AppleWebkit/534.30 (KHTML, like Gecko) Version/4.0 Mobile Safari/534.30"
194.150.168.79 - - [28/Mar/2015:08:24:40 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A"
194.150.168.79 - - [28/Mar/2015:08:24:44 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.36"
176.126.252.12 - - [28/Mar/2015:08:24:46 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (BlackBerry; U; BlackBerry 9850; en-US) AppleWebKit/534.11+ (KHTML, like Gecko) Version/7.0.0.254 Mobile Safari/534.11+"
176.126.252.12 - - [28/Mar/2015:08:24:48 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A"
176.126.252.12 - - [28/Mar/2015:08:24:50 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_3) AppleWebKit/537.75.14 (KHTML, like Gecko) Version/7.0.3 Safari/7046A194A"
176.126.252.12 - - [28/Mar/2015:08:24:52 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (PLAYSTATION 3; 3.55)"
176.126.252.12 - - [28/Mar/2015:08:24:54 -0400] "POST / HTTP/1.1" 200 14658 "-" "Mozilla/5.0 (PLAYSTATION 3; 1.00)"

One IP lookup:

IP: 176.126.252.12 Decimal: 2961112076 Hostname: aurora.enn.lu ISP: Alistar Security Srl Organization: Alistar Security Srl Services: Confirmed proxy server

Any idea what's going on and how to drop the requests without dropping actual users? Never seen this before. It's causing downtime on my server.

«1

Comments

  • BlazeMuisBlazeMuis Member
    edited March 2015

    Seems like a Layer7 (HTTP, POST) attack

  • joodle said: Seems like a Layer7 (HTTP, POST) attack

    On the surface it seems as such, however I've got filters already in place to rid out HTTP HEAD/POST attacks, and this is seeming to fly right through it.

  • I just received an attack on my website as well.. Seems like someone here is lurking and attacking websites -.-

  • @joodle said:
    I just received an attack on my website as well.. Seems like someone here is lurking and attacking websites -.-

    Seems like you're having a issue with GET requests, I'm getting hit with POST requests. Any idea to mitigate this? TOR is easy to block, just check with tor's atlas, if it exists, block, however it's the other open proxies which are a problem.

  • cociucociu Member
    edited March 2015

    "Alistar Security Srl" lol is a romanian company, and about atak ... firewall ?

  • IPTables drop is always a nice thing to do.

    Or you could log these weird requests and then send the IP to a database and if that IP is found again it will perma ban them from the site

  • 4n0nx4n0nx Member

    enn.lu hosts (a) tor node(s). I'd say block tor node IPs with nginx and/or get behind cloudflare.

  • 4n0nx said: enn.lu hosts (a) tor node(s). I'd say block tor node IPs with nginx and/or get behind cloudflare.

    It's more than TOR ip's, there's also public proxies in the access log, etc.

  • 4n0nx4n0nx Member

    KwiceroLTD said: It's more than TOR ip's, there's also public proxies in the access log, etc.

    yeh but blocking TOR would be a good start, don't you think? :p And then I'd take IPs from the hidemyass proxy list

    https://www.dan.me.uk/tornodes

  • Find their assigned blocks and block them?

  • @TheLonely said:
    Find their assigned blocks and block them?

    here you go @KwiceroLTD

    https://ipinfo.io/AS60118

  • Not very smart of them to put the ego URL stuff on there. This makes your task of finding their IPs a lot easier.

    Thanked by 1KwiceroLTD
  • Attack mitigated.

  • MunMun Member

    If you are running nginx my nginx ban list should help.
    https://www.qwdsa.com/converse/threads/nginx-ban-list-stopforumspam.63/

  • And more logs, causing the server to be completely blocked.
    http://pastebin.com/Yjy7t1Fi

  • MunMun Member

    @KwiceroLTD said:
    And more logs, causing the server to be completely blocked.
    http://pastebin.com/Yjy7t1Fi

    Yeah, now you are being hit by a ddos / botnet.

    Thanked by 1KwiceroLTD
  • geekalotgeekalot Member
    edited March 2015

    @KwiceroLTD, better to go after the attack signature and write a regex in fail2ban/IDS/IPS to deal with it (and then firewall larger subnets as necessary), IMHO.

    Going after IP's will be never ending and frustrating; better to go after the behavior/attack vector.

    If you need more specifics, PM me. ( @MeanServers should be able to vouch for my suggestions. I provided them a solution via PM so as not to publicize it to the attacker. )

  • Mun said: Yeah, now you are being hit by a ddos / botnet.

    Yep, and my site's blocked now by hosting provider, for minimum of 24 hours, and they refuse to give me a backup of data, only backup I have is from last night.

  • timnboystimnboys Member
    edited March 2015

    @KwiceroLTD said:
    Yep, and my site's blocked now by hosting provider, for minimum of 24 hours, and they refuse to give me a backup of data, only backup I have is from last night.

    Let me help you out I can host you on my ovh node that has ddos protection.
    by the way who is your hosting provider?
    send me a pm and I will give you access to a vps on my ovh node for free.
    sorry I don't discuss access details out in public for the safety and security of my nodes.

  • timnboys said: Let me help you out I can host you on my ovh node that has ddos protection.

    I have OVH servers already, working on migrating everything over currently, just wanting them to give me a latest backup copy before I put it live again.

  • @KwiceroLTD said:
    I have OVH servers already, working on migrating everything over currently, just wanting them to give me a latest backup copy before I put it live again.

    okay sure I wish you the best @KwiceroLTD and hope you get this sitution fixed.

  • BlazeMuisBlazeMuis Member
    edited March 2015

    And someone just attacked my image.tf server.. How low can people go really..

    RamNull, our automated DDoS mitigation system, has detected an attack against your IP xxx.x.xxx.xxx, assigned to "image.tf". Your IP will be nullrouted for 5-10 minutes. If the attack continues after this time, your IP will be nullrouted again.

    Edit:

    Joodle.nl is getting attacked as well, retards.

    Thanked by 1KwiceroLTD
  • @joodle said:
    And someone just attacked my image.tf server.. How low can people go really..

    RamNull, our automated DDoS mitigation system, has detected an attack against your IP xxx.x.xxx.xxx, assigned to "image.tf". Your IP will be nullrouted for 5-10 minutes. If the attack continues after this time, your IP will be nullrouted again.

    Edit:

    Joodle.nl is getting attacked as well, retards.

    Yeah, I'm nullrouted here. Just going to put it behind OVH or Voxility in a bit.

  • KwiceroLTD said: Just going to put it behind OVH or Voxility in a bit.

    Yep same here, currently reinstalling an OVH VPS with a fresh Debian 7 install

  • TrafficTraffic Member
    edited March 2015

    If you guys don't change the IPs of your current server after installing the reverse proxy, it's extremely easy for the attacker to keep attacking the backend server instead of the new one. Just my two cents...

  • Traffic said: If you guys don't change the IPs of your current server after installing the reverse proxy, it's extremely easy for the attacker to keep attacking the backend server instead of the new one. Just my two cents...

    Yeah, we are aware... I'm switching over to OVH, new IP's, everything.

  • @Traffic said:
    If you guys don't change the IPs of your current server after installing the reverse proxy, it's extremely easy for the attacker to keep attacking the backend server instead of the new one. Just my two cents...

    Switching totally to OVH, no reverse proxy here.

    Thanked by 1KwiceroLTD
  • @joodle said:
    Switching totally to OVH, no reverse proxy here.

    Yep, same. I'm getting tired of kids with nothing better to do attacking sites.

  • @KwiceroLTD said:
    Yeah, we are aware... I'm switching over to OVH, new IP's, everything.

    Take it easy :) Nothing personal!

  • I keep seeing this now.. Nothing is currently hosted on my domain (joodle.nl @ OVH)

    212.250.202.217|Sat 28 Mar 2015 22:02:39 +0100|200|180||GET /KS2008R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5|X-Original-URL: /KS2008R2.gz|X-Forwarded-For: 199.115.228.98:60341|X-ARR-LOG-ID: 0acc9adc-46ad-4c9b-8403-73cded296a92|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:02:40 +0100|200|180||GET /KS2012R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5|X-Original-URL: /KS2012R2.gz|X-Forwarded-For: 199.115.228.98:47004|X-ARR-LOG-ID: 98d3e5b7-b662-493b-8825-9a7dc9cf3467|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:02:45 +0100|200|180||GET /KS2012R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1|X-Original-URL: /KS2012R2.gz|X-Forwarded-For: 199.115.228.98:36140|X-ARR-LOG-ID: 06a8a937-5977-425c-ae9a-6a63df526d8f|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:02:47 +0100|200|180||GET /KS2008R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5|X-Original-URL: /KS2008R2.gz|X-Forwarded-For: 199.115.228.98:46310|X-ARR-LOG-ID: 6c227663-bd28-4daf-ac52-413d2dbd0f80|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:02:52 +0100|200|157||GET /KS2008R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5|X-Original-URL: /KS2008R2.gz|X-Forwarded-For: 199.115.228.98:55190|X-ARR-LOG-ID: c04d32aa-37ab-478b-8972-4c6775207d96|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:02:57 +0100|200|180||GET /KS2008R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/536.5 (KHTML, like Gecko) Chrome/19.0.1084.56 Safari/536.5|X-Original-URL: /KS2008R2.gz|X-Forwarded-For: 199.115.228.98:51685|X-ARR-LOG-ID: b969eb23-64e0-4a17-976b-6878a2740609|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:03:10 +0100|200|157||GET /KS2012R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:13.0) Gecko/20100101 Firefox/13.0.1|X-Original-URL: /KS2012R2.gz|X-Forwarded-For: 199.115.228.98:44673|X-ARR-LOG-ID: a0efb399-7de0-46bf-82ab-6edb66b79f26|Content-Length: 8
    212.250.202.217|Sat 28 Mar 2015 22:03:35 +0100|200|180||GET /KS2008R2.gz HTTP/1.1|Connection: keep-alive|Content-Type: application/x-www-form-urlencoded|Accept-Encoding: gzip, deflate|Host: joodle.nl|Max-Forwards: 10|User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322)|X-Original-URL: /KS2008R2.gz|X-Forwarded-For: 199.115.231.162:34198|X-ARR-LOG-ID: fa1c9ad8-ff8b-4c88-b740-89933352b3e6|Content-Length: 8
    

    Same IP over and over again.. And no, that file is not on the main domain he's accessing. (should be ktd.joodle.nl..)

    Thanked by 1KwiceroLTD
Sign In or Register to comment.