Solved

DDOS information about ip's, gateways and how it works

Posted on 2016-11-17
2
132 Views
1 Endorsement
Last Modified: 2016-11-30
Hi.

Lets say router 123.124.3.12 is under a DDOS attack.
I got another router 123.124.3.13.
The gatewaye for both is 123.124.3.11

If i disconnect router 123.124.3.12, will the attack then stop?

If the attack does not stop, what is under attack? Still 123.124.3.12? Or maybe the gateway 123.124.3.11?

Is there any way to be sure what ip is/gateway under the attack?




----- If some ip is under attack, does it even matter if some router is in the end of the ip's attack? Or will it just stop the whole gateway from working, even if nothing is connected?
1
Comment
Question by:Mike Kristensen
2 Comments
 
LVL 28

Assisted Solution

by:serialband
serialband earned 250 total points
ID: 41891769
It depends.

If they're targeting just the IP address, then, yes it will stop if you disconnect it.  The packets would have nowhere to go.

If they're targeting DNS names and you have redundant routes, then, no, it won't stop.  That's also assuming you're using an external DNS provider that has more capacity than your own systems.
1
 
LVL 23

Accepted Solution

by:
masnrock earned 250 total points
ID: 41896075
Sounds like your IPs are from a cable company.

But to answer your question, if you're noticing the router still having a considerable amount of traffic after changing the IP, the attackers be could attacking by IP range, subnet, or DNS name....

The only way you're going to know for sure how broad an attack is going on would probably by checking the with ISP. They will notice an abnormally high amount of traffic, but they will argue that it's your job to properly secure yourself.
0

Featured Post

Comprehensive Backup Solutions for Microsoft

Acronis protects the complete Microsoft technology stack: Windows Server, Windows PC, laptop and Surface data; Microsoft business applications; Microsoft Hyper-V; Azure VMs; Microsoft Windows Server 2016; Microsoft Exchange 2016 and SQL Server 2016.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

25 Experts available now in Live!

Get 1:1 Help Now