Thanks for that link. My host is sitting in Atlanta and I believe that Atlanta hosts their main infrastructure.
I am seeing around a 12 or 13 hour outage at this point. Robert On Wed, Aug 3, 2016 at 11:08 AM, Soon Keat Neo <n...@soonke.at> wrote: > Back on topic about HostUS, I've been following a thread on LowEndTalk > where seemingly Alexander's been updating ( > https://www.lowendtalk.com/discussion/comment/1791998/#Comment_1791998) - > seems like Atlanta and LA are still down ATM based on latest reports - > nearly 10 hours now. > > Tks. > > Regards, > Neo Soon Keat > > > > 2016-08-03 22:28 GMT+08:00 Robert Webb <rwfireg...@gmail.com>: > >> Apologies to all as the hostname in my subject is incorrect. >> >> It should be hostus.us... >> >> >> >> On Wed, Aug 3, 2016 at 10:25 AM, Robert Webb <rwfireg...@gmail.com> >> wrote: >> >> > Not sure if it is related to the PokemonGO or not. This started around >> > 23:00 EDT last night per my monitoring. >> > >> > Seems like a pretty big attack at 300Gbps and to also temporarily take a >> > down a Tier 1 POP in a major city. >> > >> > I was interested as to if this might be a botnet or some type of >> > reflection attack. >> > >> > >> > Robert >> > >> > On Wed, Aug 3, 2016 at 10:16 AM, Alain Hebert <aheb...@pubnix.net> >> wrote: >> > >> >> Well, >> >> >> >> >> >> Could it be related to the last 2 days DDoS of PokemonGO (which >> >> failed) and some other gaming sites (Blizzard and Steam)? >> >> >> >> >> >> And on the subject of CloudFlare, I'm sorry for that CloudFlare >> >> person that defended their position earlier this week, but there may be >> >> more hints (unverified) against your statements: >> >> >> >> https://twitter.com/xotehpoodle/status/756850023896322048 >> >> >> >> That could be explored. >> >> >> >> >> >> On top of which there is hints (unverified) on which is the real >> bad >> >> actor behind that new DDoS service: >> >> >> >> >> >> >> >> >> http://news.softpedia.com/news/pokemon-go-ddos-attacks-postponed-as-poodlecorp-botnet-suffers-security-breach-506910.shtml >> >> >> >> >> >> And I quote: >> >> >> >> "One thing LeakedSource staff spotted was that the first >> payment >> >> recorded in the botnet's control panel was of $1, while payments for >> the >> >> same package plan were of $19.99." >> >> >> >> ( Paypal payments btw ) >> >> >> >> >> >> There is enough information, and damages, imho, to start looking >> for >> >> the people responsible from a legal standpoint. And hopefully the >> >> proper authorities are interested. >> >> >> >> PS: >> >> >> >> I will like to take this time to underline the lack of >> >> participation from a vast majority of ISPs into BCP38 and the like. We >> >> need to keep educating them at every occasion we have. >> >> >> >> For those that actually implemented some sort of tech against >> >> it, you are a beacon of hope in what is a ridiculous situation that has >> >> been happening for more than 15 years. >> >> >> >> ----- >> >> Alain Hebert aheb...@pubnix.net >> >> PubNIX Inc. >> >> 50 boul. St-Charles >> >> P.O. Box 26770 Beaconsfield, Quebec H9W 6G7 >> >> Tel: 514-990-5911 http://www.pubnix.net Fax: 514-990-9443 >> >> >> >> On 08/03/16 09:41, Robert Webb wrote: >> >> > Anyone have any additonal info on a DDOS attack hitting host.us? >> >> > >> >> > Woke up to no email this morning and the following from their web >> site: >> >> > >> >> > >> >> > >> >> > *Following an extortion attempt, HostUS is currently experiencing >> >> sustained >> >> > large-scale DDOS attacks against a number of locations. The attacks >> were >> >> > measured in one location at 300Gbps. In another location the attacks >> >> > temporarily knocked out the entire metropolitan POP for a Tier-1 >> >> provider. >> >> > Please be patient. We will return soon. Your understanding is >> >> appreciated. >> >> > * >> >> > >> >> > >> >> > >From my monitoring system, looks like my VPS went unavailable around >> >> 23:00 >> >> > EDT last night. >> >> > >> >> > Robert >> >> > >> >> >> >> >> > >> > >