Skip to main content
Blocked attacks
Last update:

Blocked attacks

You can view the history of DDoS attacks blocked by Selectel protection in the control panel.

Selectel protection works at the network and transport layer (L3-L4). If your monitoring systems have detected an application-level (L7) attack or other malicious activity — contact helpdesk immediately and engage other defenses.

View attack history

  1. In Control Panel, go to Network ServicesNetwork Incidents.

  2. Open the Blocked Attacks tab. For each attack, the network attacked, the period of the attack, and the response from the defense system are specified:

    • block — suspicious traffic was discarded;
    • detect — traffic was seen but was not discarded. A new attack detection rule is being tested on the system, or traffic blocking is disabled for the IP address.
  3. To see detailed information about the attack, including attack-type, its speed, power, total number of packets sent, and volume, in the attack row, click the IP address of the network.

  4. Optional: If you observe a sustained attack that disables or reduces service availability, additionally protect the attacked server:

Types of attacks

DescriptionAttack target
UDP flood to service DST port 565 limitedAttack UDP traffic on destination port 565 Whoami
  • Exhaust bandwidth and computational resources of the attacked host;
  • denial of service
UDP flood to service DST port 1194 limitedUDP attack on destination port 1194 OpenVPNExhaustion of bandwidth and computational resources of the attacked host, denial of service
NTP Monlist ResponseReflected and amplified UDP traffic from source port 123 (NTP Moonlist response vulnerability)Bandwidth exhaustion
SSDP ReflectionReflected and amplified UDP traffic from source-port 1900 (SSDP and UPnP vulnerability)Bandwidth exhaustion
Empty UDP dataAttacking client IP address with empty UDP datagrams Empty UDP FloodIncreasing victim's network utilization
MemcacheReflected and amplified UDP traffic from source port 11211 (Memcache vulnerability).port 11211 (Memcache vulnerability)Bandwidth exhaustion
SSRP ReflectionReflected and amplified UDP traffic attack from source port 1434 SSRP (SQL Server Resolution Protocol)Bandwidth exhaustion
WSD ReflectionReflected and amplified UDP traffic attack from source-port 11211 (Memcache vulnerability)Bandwidth exhaustion
Net Assistant ReflectionReflected and amplified UDP traffic from source port 3283 (Apple Network Assistant vulnerability)Bandwidth exhaustion
LowShadyPorts/Reflection flood to server limited

Reflected and amplified UDP traffic from source ports:

  • 19 CHARGEN (Character Generator);
  • 111 SUNRPC (Sun Remote Procedure Call);
  • 137 NETBIOS-NS (NetBIOS Name Service);
  • 161 SNMP (Simple Network Management Protocol);
  • 389 LDAP (Lightweight Directory Access Protocol);
  • 520 ROUTER (used by routing protocols such as RIP)
Bandwidth exhaustion
Custom UDP amplifications

Reflected and amplified UDP traffic attack from source ports:

  • 37810 DHCPDiscover for DVR devices;
  • 10074 TP240PhoneHome (Mitel systems);
  • 37020 SADP (Hikvision)
Bandwidth exhaustion
Custom UDP amplifications3Attack by reflected and amplified UDP traffic from source-port 37021 SADP (Hikvision)Bandwidth exhaustion
Query Response/DNS query response reflection flood to server limited

DNS Response attack with traffic from public DNS servers with source port 53 UDP DNS and flags from DNSSEC extension set:

  • DNS Signature;
  • DNS Signature Recursive
Bandwidth exhaustion
Source Port 53/UDP source port 53 reflection flood to server limitedAttack by reflected and amplified UDP traffic from source-UDP DNS port 53Bandwidth exhaustion
Source Port 4500/UDP source port 4500 reflection flood to server limitedReflected and amplified UDP traffic from source port 4500Bandwidth exhaustion
Any Source Port/UDP source port reflection flood to server limitedAttack by UDP-high volume traffic from a specific source port to any destination port on client IPBandwidth exhaustion
RST/TCP RST reflection flood to server limitedAttack with TCP RST flagged traffic from a specific source port to any destination port on client IP
  • Exhaustion of computational resources of the attacked host;
  • disruption of TCP connection support on the attacked host (or group of hosts)
SYN/ACK/TCP SYN/ACK reflection flood to server limitedAttack with TCP RST flagged traffic from a specific source port to any destination port on the client IPExhaustion of network and computing resources of the attacked host
PSH/ACK/ACK/TCP PSH/ACK reflection flood to server limitedAttack with TCP-traffic with TCP RST or TCP PSH flags set from a specific source port to any destination port of the client IPExhaustion of computational resources of the attacked host
Failed Reflectors/ICMP Server flood to server limitedAttack of the client host by a large amount of ICMP response traffic from public servers, provoked by specific attacker's requests to public servers for UDP port availability, but with source address spoofing to client addressExhaustion of bandwidth and computational resources of the attacked host
UDP flood to service DST port 53 limitedAttack by UDP traffic to destination port 53 DNS
  • Exhaustion of bandwidth and computational resources of the attacked host;
  • denial of service
Any Destination Port/UDP service flood to a server port limitedHigh volume UDP traffic attack on any arbitrary victim port
  • Bandwidth exhaustion;
  • denial of service
Any Type/ICMP/ICMPv6 service flood to a server limitedHigh volume arbitrary ICMP traffic (including ICMPv6) attack on a specific destination-client portExhaustion of bandwidth and computational resources of the attacked host
SYN/TCP SYN to a server port limitedAttack with TCP traffic with TCP SYN flag set to a specific destination port of the client IP
  • Exhaustion of network and computational resources of the attacked host;
  • disruption of TCP connection establishment on the attacked host
RST/TCP RST to a server port limitedAttack by TCP traffic with TCP RST flag set to a specific destination port of the client IP
  • Exhaustion of computing resources of the attacked host;
  • disruption of TCP connection support on the attacked host or host group
PSH/ACK/TCP PSH/ACK service flood to a server port limitedAttack with TCP RST/PSH flagged TCP traffic to a specific destination port on client IPExhaustion of computational resources of the attacked host
Any TCP/TCP to a server port limitedAttack with random TCP-high volume traffic to a specific client portExhaustion of computational resources of the attacked host and bandwidth
Fragment Under Attack/UDP server under attack fragment to server limitedAttack with fragmented UDP datagrams. Usually accompanies other types of UDP attacksBandwidth exhaustion
Any Port/UDP server flood to server limitedAttack with arbitrary high-volume UDP traffic in aggregate on any client portExhaustion of the attacked host's computational resources and bandwidth
Any Type/ICMP server flood to server limitedAttack with high-volume arbitrary ICMP traffic, including ICMPv6, any destination port of the clientBandwidth and computational resources of the attacked host exhausted
SYN/TCP SYN to server address limitedAttack with TCP traffic with TCP SYN flag set to any destination port of the client IP
  • Network and computational resources of the attacked host exhausted;
  • disruption of TCP connection establishment on the attacked host
RST/TCP RST to server address limitedAttack by TCP traffic with TCP RST flag set to any destination port of client IP
  • Exhaustion of computational resources of the attacked host;
  • Disruption of TCP connection support on the attacked host or host group
Any TCP/TCP to server address limitedAttack with arbitrary high-volume TCP traffic in aggregate on any destination port of the clientExhaustion of network, computational resources of the attacked host and bandwidth
IP protocol Any IP protocol Any IP protocol server flood to server limitedAttack with arbitrary high-volume IP traffic in aggregate on all transport protocols and all portsExhaustion of network and computational resources of the attacked host, computational resources of the attacked host and bandwidth
Flex Fragment/Flex matched IP fragment to destination IP under attackRule defining blocking of IP packet fragments for hosts that are already under attack. Accompanies other types of attacks-