This is our old Q&A Site. Please post any new questions and answers at

Hello everybody.

I am running a small community private game server and in the last few days I got a ddos targeted at the application (tcp ports 10000,9958,5816)

The problem is that I don't know how to figure out who is the attacker.

My server application is made in c# and uses beginaccept for incoming connections and in the last few days the server was using 300-400 threads when normally it would use 25-30 at maximum.

I made several captures using wireshark, I tired uploading them to cloudshark but the limit is few mbs and I have captures of bigger size.

First (23mb):

Second (26mb):

Third (529mb):

Fourth (859mb):

Fifth (8mb):

I made my own filters at the application level (server) that took the last 10 connections from an ip and checked if the average frequency between connections is less than 5 seconds or the smallest frequency between to consequent connections is less than 1 second.

This filter only works for connections that were already accepted because there is no way to get the IP before using the endaccept and retrieving the socket.

This way I got to suspect some IPs (don't know if I got them right or they are spoofed or if it recorded anything at all, as if the connnections sent did not succeed the filter was in vain)

IPs suspected:

If I could get any help on this issue of mine I would appreciate.

Right now the server is hosted with leaseweb but they don't offer ddos protection or support, only hardware firewalls and I don't have one therefore I would like to move to ovh because they do offer ddos protection.

Thanks in advance for any help or response received.


asked 18 Oct '15, 05:33

Ryuchetval's gravatar image

accept rate: 0%

edited 18 Oct '15, 05:47

I have my game server hosted on a dedicated server with leaseweb so I can't access the router as there is none attached. Right now I moved to ovh and I hope they will be able to sort things out for me

(19 Oct '15, 07:04) Ryuchetval

Use this 192.168.I.I

permanent link

answered 19 Oct '15, 05:39

websunil007's gravatar image

accept rate: 0%

It appears that some clients are driving the server to be super busy.

Analyzed the 859mb pcap "Fourth" and found that there are a few clients that caused the server to send a huge number of TCP data packets. See the link for detail.

Please let me know if this help you.

permanent link

answered 19 Oct '15, 10:21

pktUser1001's gravatar image

accept rate: 12%

Thanks for your help, I appreciate it.

Could you let me know how you sorted/filtered the incoming/ongoing packets based on the client and the amount of packets? It might be useful on the future to figure out attacks on my own.

Thanks again.

(20 Oct '15, 06:36) Ryuchetval

Hi @Ryuchetval, here are some more info: Hope it helps.

(20 Oct '15, 15:08) pktUser1001
Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here



Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text]( "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:


question asked: 18 Oct '15, 05:33

question was seen: 1,365 times

last updated: 20 Oct '15, 15:08

p​o​w​e​r​e​d by O​S​Q​A