User Tools

Site Tools


internet:security:ddos

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
internet:security:ddos [2018/09/08 10:06]
gcooper
internet:security:ddos [2018/09/08 10:17] (current)
gcooper
Line 13: Line 13:
 http://365hostingsupport.com/blog/dos-how-to-check-it/ http://365hostingsupport.com/blog/dos-how-to-check-it/
  
-===== Linux Shell =====+===== Are You Under Attack? =====
  
-Are you under attack?+:!: You may want to change the port ''80'' to some other port.
  
 <file> <file>
 netstat -alpn | grep :80 | awk '{print $4}' |awk -F: '{print $(NF-1)}' |sort | uniq -c | sort -n netstat -alpn | grep :80 | awk '{print $4}' |awk -F: '{print $(NF-1)}' |sort | uniq -c | sort -n
 +</file>
 +
 +Which IP address of your server is targeted by the DDoS attack:
 +
 +<file>
 +netstat -plan  | grep  :80 | awk '{print $4}' | cut -d: -f1 |sort |uniq -c
 +</file>
 +
 +From which IPs the attack is coming:
 +
 +<file>
 +netstat -plan  | grep  :80 | awk '{print $5}' | cut -d: -f1 |sort |uniq -c
 </file> </file>
  
internet/security/ddos.1536422783.txt.gz · Last modified: 2018/09/08 10:06 by gcooper