我正在给定端口(比如说 1234)运行服务。有时它无法到达。当我检查 dmesg 时,我看到:
TCP:端口 1234 上可能出现 SYN 泛洪。正在发送 cookie。检查 SNMP 计数器
net.ipv4.tcp_max_syn_backlog 设置为 1024
当我检查 netstat 时,我看到:
tcp 0 0 示例域名.com:5008 ip190-5-138-234.i:56772 SYN_RECV
tcp 0 0 示例域名.com:5008 ip190-5-138-234.i:56771 SYN_RECV tcp 0 0 示例域名.com:1234
216.218。 222.14:18687 SYN_RECV
tcp 0 0 exampledomainname.com:1234 185.234.218.50:59848 SYN_RECV
tcp 0 0 exampledomainname.com:1234 tor-exit.r2.apx.p:45992 SYN_RECV
tcp 0 0 exampledomainname.com:1234 tor-exit signal.:42747 SYN_RECV
tcp 0 0 exampledomainname.com:1234 chulak.enn.lu:29545 SYN_RECV
tcp 0 0 exampledomainname.com:1234 chulak.enn.lu:19883 SYN_RECV
tcp 0 0 exampledomainname.com:1234 5.188.86.30:53106 SYN_RECV
tcp 0 0 exampledomainname.com:1234 lh28409.voxility.:59899 SYN_RECV
tcp 0 0 exampledomainname.com:1234 tor-exit1.signal.:40048 SYN_RECV
tcp 0 0 exampledomainname.com:1234 62.176.4.10:48546 SYN_RECV
tcp 0 .com:1234 chulak.enn.lu:52326 SYN_RECV
tcp 0 0 exampledomainname.com:1234 sunfire-cape.gate:44592 SYN_RECV
tcp 0 0 exampledomainname.com:1234 sunfire-cape.gate:44590 SYN_RECV
tcp 0 0 exampledomainname.com :1234 chomsky.torserver:45374 SYN_RECV
tcp 0 0 exampledomainname.com:1234 chulak.enn.lu:60156 SYN_RECV
tcp 0 0 exampledomainname.com:1234 chulak.enn.lu:47522 SYN_RECV
tcp 0 0 exampledomainname.com:1234 tor-exit.r2.apx.p:38568 SYN_RECV
tcp 0 0 exampledomainname.com:1234 chulak.enn.lu:34309 SYN_RECV
tcp 0 0 exampledomainname.com:1234 185.100.86.128:35623 SYN_RECV
tcp 0 0 exampledomainname.com:1234 tor-exit1.signal.:42921 ...
这些 SYN_RECV 连接中的大约 30 个。如果我的假设是正确的,它似乎是一个非常复杂的僵尸网络,它通过 Tor 网络。
我能做些什么来对抗这种攻击?任何帮助将不胜感激。