-
Notifications
You must be signed in to change notification settings - Fork 716
Open
Description
these are log i received on enet_protocol_handle_connect
they keep sending udp flood with botnet,
is there no way to actually limiting these connection?
cuz its all legitimate packet, they keep sending with different ip botnet
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 216.29.177.87:38882 -> len=44 comType=11 (0x0B) = THROTTLE_CONFIGURE
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 168.71.221.212:46017 -> len=44 comType=6 (0x06) = SEND_RELIABLE
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 136.166.67.199:2303 -> len=44 comType=3 (0x03) = VERIFY_CONNECT
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 36.17.59.15:60709 -> len=44 comType=7 (0x07) = SEND_UNRELIABLE
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 65.135.25.220:46460 -> len=44 comType=7 (0x07) = SEND_UNRELIABLE
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 187.5.204.140:34458 -> len=44 comType=9 (0x09) = SEND_UNSEQUENCED
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 6.52.80.182:28366 -> len=44 comType=5 (0x05) = PING
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 182.6.15.228:51479 -> len=44 comType=12 (0x0C) = SEND_UNRELIABLE_FRAGMENT
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2
[UDP] 160.93.120.136:3098 -> len=44 comType=14 (0x0E) = UNKNOWN
CON MTU: 1879375872 H COM: 130
CON MTU: 0x70050000 H COM: 0x82
CON MTU: 1392 H COM: 2```
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels