Bot attack ? - Printable Version
+- SA-MP Forums Archive (
https://sampforum.blast.hk)
+-- Forum: SA-MP Scripting and Plugins (
https://sampforum.blast.hk/forumdisplay.php?fid=8)
+--- Forum: Scripting Help (
https://sampforum.blast.hk/forumdisplay.php?fid=12)
+--- Thread: Bot attack ? (
/showthread.php?tid=519042)
Bot attack ? -
Johnson_Brooks - 12.06.2014
Well today i checked my server logs and i found out about this:
Код:
15:36:20] [join] Sunny has joined the server (0:139.190.200.94)
[15:42:43] [part] Sunny has left the server (0:0)
[15:42:51] Incoming connection: 139.190.200.94:2069
[15:42:57] Incoming connection: 139.190.200.94:2070
[15:43:03] Incoming connection: 139.190.200.94:2071
[15:43:09] Incoming connection: 139.190.200.94:2072
[15:43:15] Incoming connection: 139.190.200.94:2073
[15:43:21] Incoming connection: 139.190.200.94:2074
[15:43:27] Incoming connection: 139.190.200.94:2075
[15:43:33] Incoming connection: 139.190.200.94:2076
[15:43:39] Incoming connection: 139.190.200.94:2077
[15:43:46] Incoming connection: 139.190.200.94:2078
[15:43:52] Incoming connection: 139.190.200.94:2079
[15:43:58] Incoming connection: 139.190.200.94:2080
[15:44:04] Incoming connection: 139.190.200.94:2081
[15:44:10] Incoming connection: 139.190.200.94:2082
[15:44:16] Incoming connection: 139.190.200.94:2083
[15:44:22] Incoming connection: 139.190.200.94:2084
[15:44:28] Incoming connection: 139.190.200.94:2085
[15:44:34] Incoming connection: 139.190.200.94:2086
[15:44:41] Incoming connection: 139.190.200.94:2087
[15:44:47] Incoming connection: 139.190.200.94:2088
[15:44:53] Incoming connection: 139.190.200.94:2089
[15:44:59] Incoming connection: 139.190.200.94:2090
[15:45:05] Incoming connection: 139.190.200.94:2091
[15:45:11] Incoming connection: 139.190.200.94:2092
[15:45:17] Incoming connection: 139.190.200.94:2093
[15:45:23] Incoming connection: 139.190.200.94:2094
[15:45:29] Incoming connection: 139.190.200.94:2095
[15:45:36] Incoming connection: 139.190.200.94:2096
[15:45:42] Incoming connection: 139.190.200.94:2097
[15:45:48] Incoming connection: 139.190.200.94:2098
[15:45:54] Incoming connection: 139.190.200.94:2099
[15:46:00] Incoming connection: 139.190.200.94:2100
[15:46:06] Incoming connection: 139.190.200.94:2101
[15:46:12] Incoming connection: 139.190.200.94:2102
[15:46:18] Incoming connection: 139.190.200.94:2103
[15:46:24] Incoming connection: 139.190.200.94:2104
[15:46:30] Incoming connection: 139.190.200.94:2105
[15:46:37] Incoming connection: 139.190.200.94:2106
[15:46:43] Incoming connection: 139.190.200.94:2107
[15:46:49] Incoming connection: 139.190.200.94:2108
[15:46:55] Incoming connection: 139.190.200.94:2109
[15:47:01] Incoming connection: 139.190.200.94:2110
[15:47:07] Incoming connection: 139.190.200.94:2111
[15:47:13] Incoming connection: 139.190.200.94:2112
[15:47:19] Incoming connection: 139.190.200.94:2113
[15:47:25] Incoming connection: 139.190.200.94:2114
[15:47:31] Incoming connection: 139.190.200.94:2115
[15:47:37] Incoming connection: 139.190.200.94:2116
[15:47:44] Incoming connection: 139.190.200.94:2117
[15:47:50] Incoming connection: 139.190.200.94:2118
[15:47:56] Incoming connection: 139.190.200.94:2119
[15:48:02] Incoming connection: 139.190.200.94:2120
[15:48:08] Incoming connection: 139.190.200.94:2121
[15:48:14] Incoming connection: 139.190.200.94:2122
[15:48:20] Incoming connection: 139.190.200.94:2123
[15:48:27] Incoming connection: 139.190.200.94:2124
[15:48:33] Incoming connection: 139.190.200.94:2125
[15:48:39] Incoming connection: 139.190.200.94:2126
[15:48:45] Incoming connection: 139.190.200.94:2127
[15:48:51] Incoming connection: 139.190.200.94:2128
[15:48:57] Incoming connection: 139.190.200.94:2129
[15:49:03] Incoming connection: 139.190.200.94:2130
[15:49:09] Incoming connection: 139.190.200.94:2131
[15:49:15] Incoming connection: 139.190.200.94:2132
[15:49:22] Incoming connection: 139.190.200.94:2133
[15:49:28] Incoming connection: 139.190.200.94:2134
[15:49:34] Incoming connection: 139.190.200.94:2135
[15:49:40] Incoming connection: 139.190.200.94:2136
[15:49:46] Incoming connection: 139.190.200.94:2137
[15:49:52] Incoming connection: 139.190.200.94:2138
[15:49:58] Incoming connection: 139.190.200.94:2139
[15:50:04] Incoming connection: 139.190.200.94:2140
[15:50:10] Incoming connection: 139.190.200.94:2141
[15:50:17] Incoming connection: 139.190.200.94:2142
[15:50:23] Incoming connection: 139.190.200.94:2143
[15:50:29] Incoming connection: 139.190.200.94:2144
[15:50:35] Incoming connection: 139.190.200.94:2145
[15:50:41] Incoming connection: 139.190.200.94:2146
[15:50:47] Incoming connection: 139.190.200.94:2147
[15:50:53] Incoming connection: 139.190.200.94:2148
[15:50:59] Incoming connection: 139.190.200.94:2149
[15:51:05] Incoming connection: 139.190.200.94:2150
[15:51:12] Incoming connection: 139.190.200.94:2151
[15:51:18] Incoming connection: 139.190.200.94:2152
[15:51:24] Incoming connection: 139.190.200.94:2153
[15:51:30] Incoming connection: 139.190.200.94:2154
[15:51:36] Incoming connection: 139.190.200.94:2155
[15:51:42] Incoming connection: 139.190.200.94:2156
[15:51:48] Incoming connection: 139.190.200.94:2157
[15:51:54] Incoming connection: 139.190.200.94:2158
[15:52:00] Incoming connection: 139.190.200.94:2159
[15:52:07] Incoming connection: 139.190.200.94:2160
[15:52:13] Incoming connection: 139.190.200.94:2161
[15:52:19] Incoming connection: 139.190.200.94:2162
[15:52:25] Incoming connection: 139.190.200.94:2163
[15:52:31] Incoming connection: 139.190.200.94:2166
[15:52:37] Incoming connection: 139.190.200.94:2167
[15:52:43] Incoming connection: 139.190.200.94:2168
[15:52:49] Incoming connection: 139.190.200.94:2169
[15:52:56] Incoming connection: 139.190.200.94:2170
[15:53:02] Incoming connection: 139.190.200.94:2171
[15:53:08] Incoming connection: 139.190.200.94:2172
[15:53:14] Incoming connection: 139.190.200.94:2173
[15:53:20] Incoming connection: 139.190.200.94:2174
[15:53:26] Incoming connection: 139.190.200.94:2175
[15:53:32] Incoming connection: 139.190.200.94:2176
[15:53:38] Incoming connection: 139.190.200.94:2177
[15:53:44] Incoming connection: 139.190.200.94:2178
[15:53:50] Incoming connection: 139.190.200.94:2179
[15:53:57] Incoming connection: 139.190.200.94:2180
[15:54:03] Incoming connection: 139.190.200.94:2181
[15:54:09] Incoming connection: 139.190.200.94:2182
[15:54:15] Incoming connection: 139.190.200.94:2183
[15:54:21] Incoming connection: 139.190.200.94:2184
[15:54:27] Incoming connection: 139.190.200.94:2185
[15:54:33] Incoming connection: 139.190.200.94:2186
[15:54:39] Incoming connection: 139.190.200.94:2187
[15:54:45] Incoming connection: 139.190.200.94:2188
[15:54:51] Incoming connection: 139.190.200.94:2189
[15:54:58] Incoming connection: 139.190.200.94:2190
[15:55:04] Incoming connection: 139.190.200.94:2191
[15:55:10] Incoming connection: 139.190.200.94:2192
[15:55:16] Incoming connection: 139.190.200.94:2193
[15:55:22] Incoming connection: 139.190.200.94:2194
[15:55:28] Incoming connection: 139.190.200.94:2195
[15:55:34] Incoming connection: 139.190.200.94:2198
[15:55:40] Incoming connection: 139.190.200.94:2199
Can somebody explain to me what the hell is that?
Re: Bot attack ? -
nmader - 12.06.2014
It does appear as if it was a Fake Player attack to me, seeing as they're all based from the same IP, merely connecting with different ports. Did any of them successfully connect? (If not, then you're fine and they didn't make it through to your server.)
Re: Bot attack ? -
Johnson_Brooks - 12.06.2014
Nope they didn't connect.
Re: Bot attack ? -
Jefff - 12.06.2014
Try
https://sampwiki.blast.hk/wiki/OnIncomingConnection
and
https://sampwiki.blast.hk/wiki/BlockIpAddress
Re: Bot attack ? -
nmader - 12.06.2014
Quote:
Originally Posted by Johnson_Brooks
Nope they didn't connect.
|
Your server appears to have blocked them before they could do any severe damage. Did they cause any damage that you haven't informed us about? Such as lag, crashing, etc.?
Re: Bot attack ? -
Johnson_Brooks - 12.06.2014
No lag or crashing has occured .
Well i have a code here that might have blocked it:
Mostly it would be an outside rcon attack
pawn Код:
public OnRconLoginAttempt(ip[], password[], success)
{
new playerip[16];
new string[128];
new hacker[MAX_PLAYER_NAME];
for(new i = 0; i < MAX_PLAYERS; i++) //Foreach would be the better option.
{
if(!IsPlayerConnected(i)) continue; //Remove this if you are using foreach.
GetPlayerIp(i, playerip, sizeof(playerip)); //Get the player's ip
GetPlayerName(i,hacker,sizeof(hacker));
if(strcmp(playerip, ip, true)) continue; //This will compare the ip of the attempted RCON accesser and the player's ip
SendClientMessage(i, -1, "{FF0000}[BAN]{EEEEEE}James Bond has banned you for Failed RCON Login Attempts");
SetTimerEx("BanPlayer", 200, false, "i", i); //Set a timer to kick the player.
format(string,sizeof(string),"{FF0000}[BAN]{EEEEEE}James Bond has banned %s for Failed RCON Login Attempts");
SendClientMessageToAll(COLOR_RED,string);
}
return 1;
}
Re: Bot attack ? -
nmader - 12.06.2014
That would be if they attempted to connect to the Rcon. SAMP 0.3z has a ddos protection, do you have it enabled in your server.cfg?
Re: Bot attack ? -
Johnson_Brooks - 12.06.2014
DDoS protection ? I dont think so .
Re: Bot attack ? -
Threshold - 12.06.2014
They probably just have the wrong server version. This doesn't affect your server in any way, so just ignore it.
Re: Bot attack ? -
Johnson_Brooks - 12.06.2014
Ah ok . Nice to know that.