Bot attack ?
#1

Well today i checked my server logs and i found out about this:
Код:
15:36:20] [join] Sunny has joined the server (0:139.190.200.94)
[15:42:43] [part] Sunny has left the server (0:0)
[15:42:51] Incoming connection: 139.190.200.94:2069
[15:42:57] Incoming connection: 139.190.200.94:2070
[15:43:03] Incoming connection: 139.190.200.94:2071
[15:43:09] Incoming connection: 139.190.200.94:2072
[15:43:15] Incoming connection: 139.190.200.94:2073
[15:43:21] Incoming connection: 139.190.200.94:2074
[15:43:27] Incoming connection: 139.190.200.94:2075
[15:43:33] Incoming connection: 139.190.200.94:2076
[15:43:39] Incoming connection: 139.190.200.94:2077
[15:43:46] Incoming connection: 139.190.200.94:2078
[15:43:52] Incoming connection: 139.190.200.94:2079
[15:43:58] Incoming connection: 139.190.200.94:2080
[15:44:04] Incoming connection: 139.190.200.94:2081
[15:44:10] Incoming connection: 139.190.200.94:2082
[15:44:16] Incoming connection: 139.190.200.94:2083
[15:44:22] Incoming connection: 139.190.200.94:2084
[15:44:28] Incoming connection: 139.190.200.94:2085
[15:44:34] Incoming connection: 139.190.200.94:2086
[15:44:41] Incoming connection: 139.190.200.94:2087
[15:44:47] Incoming connection: 139.190.200.94:2088
[15:44:53] Incoming connection: 139.190.200.94:2089
[15:44:59] Incoming connection: 139.190.200.94:2090
[15:45:05] Incoming connection: 139.190.200.94:2091
[15:45:11] Incoming connection: 139.190.200.94:2092
[15:45:17] Incoming connection: 139.190.200.94:2093
[15:45:23] Incoming connection: 139.190.200.94:2094
[15:45:29] Incoming connection: 139.190.200.94:2095
[15:45:36] Incoming connection: 139.190.200.94:2096
[15:45:42] Incoming connection: 139.190.200.94:2097
[15:45:48] Incoming connection: 139.190.200.94:2098
[15:45:54] Incoming connection: 139.190.200.94:2099
[15:46:00] Incoming connection: 139.190.200.94:2100
[15:46:06] Incoming connection: 139.190.200.94:2101
[15:46:12] Incoming connection: 139.190.200.94:2102
[15:46:18] Incoming connection: 139.190.200.94:2103
[15:46:24] Incoming connection: 139.190.200.94:2104
[15:46:30] Incoming connection: 139.190.200.94:2105
[15:46:37] Incoming connection: 139.190.200.94:2106
[15:46:43] Incoming connection: 139.190.200.94:2107
[15:46:49] Incoming connection: 139.190.200.94:2108
[15:46:55] Incoming connection: 139.190.200.94:2109
[15:47:01] Incoming connection: 139.190.200.94:2110
[15:47:07] Incoming connection: 139.190.200.94:2111
[15:47:13] Incoming connection: 139.190.200.94:2112
[15:47:19] Incoming connection: 139.190.200.94:2113
[15:47:25] Incoming connection: 139.190.200.94:2114
[15:47:31] Incoming connection: 139.190.200.94:2115
[15:47:37] Incoming connection: 139.190.200.94:2116
[15:47:44] Incoming connection: 139.190.200.94:2117
[15:47:50] Incoming connection: 139.190.200.94:2118
[15:47:56] Incoming connection: 139.190.200.94:2119
[15:48:02] Incoming connection: 139.190.200.94:2120
[15:48:08] Incoming connection: 139.190.200.94:2121
[15:48:14] Incoming connection: 139.190.200.94:2122
[15:48:20] Incoming connection: 139.190.200.94:2123
[15:48:27] Incoming connection: 139.190.200.94:2124
[15:48:33] Incoming connection: 139.190.200.94:2125
[15:48:39] Incoming connection: 139.190.200.94:2126
[15:48:45] Incoming connection: 139.190.200.94:2127
[15:48:51] Incoming connection: 139.190.200.94:2128
[15:48:57] Incoming connection: 139.190.200.94:2129
[15:49:03] Incoming connection: 139.190.200.94:2130
[15:49:09] Incoming connection: 139.190.200.94:2131
[15:49:15] Incoming connection: 139.190.200.94:2132
[15:49:22] Incoming connection: 139.190.200.94:2133
[15:49:28] Incoming connection: 139.190.200.94:2134
[15:49:34] Incoming connection: 139.190.200.94:2135
[15:49:40] Incoming connection: 139.190.200.94:2136
[15:49:46] Incoming connection: 139.190.200.94:2137
[15:49:52] Incoming connection: 139.190.200.94:2138
[15:49:58] Incoming connection: 139.190.200.94:2139
[15:50:04] Incoming connection: 139.190.200.94:2140
[15:50:10] Incoming connection: 139.190.200.94:2141
[15:50:17] Incoming connection: 139.190.200.94:2142
[15:50:23] Incoming connection: 139.190.200.94:2143
[15:50:29] Incoming connection: 139.190.200.94:2144
[15:50:35] Incoming connection: 139.190.200.94:2145
[15:50:41] Incoming connection: 139.190.200.94:2146
[15:50:47] Incoming connection: 139.190.200.94:2147
[15:50:53] Incoming connection: 139.190.200.94:2148
[15:50:59] Incoming connection: 139.190.200.94:2149
[15:51:05] Incoming connection: 139.190.200.94:2150
[15:51:12] Incoming connection: 139.190.200.94:2151
[15:51:18] Incoming connection: 139.190.200.94:2152
[15:51:24] Incoming connection: 139.190.200.94:2153
[15:51:30] Incoming connection: 139.190.200.94:2154
[15:51:36] Incoming connection: 139.190.200.94:2155
[15:51:42] Incoming connection: 139.190.200.94:2156
[15:51:48] Incoming connection: 139.190.200.94:2157
[15:51:54] Incoming connection: 139.190.200.94:2158
[15:52:00] Incoming connection: 139.190.200.94:2159
[15:52:07] Incoming connection: 139.190.200.94:2160
[15:52:13] Incoming connection: 139.190.200.94:2161
[15:52:19] Incoming connection: 139.190.200.94:2162
[15:52:25] Incoming connection: 139.190.200.94:2163
[15:52:31] Incoming connection: 139.190.200.94:2166
[15:52:37] Incoming connection: 139.190.200.94:2167
[15:52:43] Incoming connection: 139.190.200.94:2168
[15:52:49] Incoming connection: 139.190.200.94:2169
[15:52:56] Incoming connection: 139.190.200.94:2170
[15:53:02] Incoming connection: 139.190.200.94:2171
[15:53:08] Incoming connection: 139.190.200.94:2172
[15:53:14] Incoming connection: 139.190.200.94:2173
[15:53:20] Incoming connection: 139.190.200.94:2174
[15:53:26] Incoming connection: 139.190.200.94:2175
[15:53:32] Incoming connection: 139.190.200.94:2176
[15:53:38] Incoming connection: 139.190.200.94:2177
[15:53:44] Incoming connection: 139.190.200.94:2178
[15:53:50] Incoming connection: 139.190.200.94:2179
[15:53:57] Incoming connection: 139.190.200.94:2180
[15:54:03] Incoming connection: 139.190.200.94:2181
[15:54:09] Incoming connection: 139.190.200.94:2182
[15:54:15] Incoming connection: 139.190.200.94:2183
[15:54:21] Incoming connection: 139.190.200.94:2184
[15:54:27] Incoming connection: 139.190.200.94:2185
[15:54:33] Incoming connection: 139.190.200.94:2186
[15:54:39] Incoming connection: 139.190.200.94:2187
[15:54:45] Incoming connection: 139.190.200.94:2188
[15:54:51] Incoming connection: 139.190.200.94:2189
[15:54:58] Incoming connection: 139.190.200.94:2190
[15:55:04] Incoming connection: 139.190.200.94:2191
[15:55:10] Incoming connection: 139.190.200.94:2192
[15:55:16] Incoming connection: 139.190.200.94:2193
[15:55:22] Incoming connection: 139.190.200.94:2194
[15:55:28] Incoming connection: 139.190.200.94:2195
[15:55:34] Incoming connection: 139.190.200.94:2198
[15:55:40] Incoming connection: 139.190.200.94:2199
Can somebody explain to me what the hell is that?
Reply
#2

It does appear as if it was a Fake Player attack to me, seeing as they're all based from the same IP, merely connecting with different ports. Did any of them successfully connect? (If not, then you're fine and they didn't make it through to your server.)
Reply
#3

Nope they didn't connect.
Reply
#4

Try
https://sampwiki.blast.hk/wiki/OnIncomingConnection
and
https://sampwiki.blast.hk/wiki/BlockIpAddress
Reply
#5

Quote:
Originally Posted by Johnson_Brooks
Посмотреть сообщение
Nope they didn't connect.
Your server appears to have blocked them before they could do any severe damage. Did they cause any damage that you haven't informed us about? Such as lag, crashing, etc.?
Reply
#6

No lag or crashing has occured .
Well i have a code here that might have blocked it:

Mostly it would be an outside rcon attack

pawn Код:
public OnRconLoginAttempt(ip[], password[], success)
{
    new playerip[16];
    new string[128];
    new hacker[MAX_PLAYER_NAME];
    for(new i = 0; i < MAX_PLAYERS; i++) //Foreach would be the better option.
    {
        if(!IsPlayerConnected(i)) continue; //Remove this if you are using foreach.
        GetPlayerIp(i, playerip, sizeof(playerip)); //Get the player's ip
        GetPlayerName(i,hacker,sizeof(hacker));
        if(strcmp(playerip, ip, true)) continue; //This will compare the ip of the attempted RCON accesser and the player's ip
        SendClientMessage(i, -1, "{FF0000}[BAN]{EEEEEE}James Bond has banned you for Failed RCON Login Attempts");
        SetTimerEx("BanPlayer", 200, false, "i", i); //Set a timer to kick the player.
        format(string,sizeof(string),"{FF0000}[BAN]{EEEEEE}James Bond has banned %s for Failed RCON Login Attempts");
        SendClientMessageToAll(COLOR_RED,string);
    }
    return 1;
}
Reply
#7

That would be if they attempted to connect to the Rcon. SAMP 0.3z has a ddos protection, do you have it enabled in your server.cfg?
Reply
#8

DDoS protection ? I dont think so .
Reply
#9

They probably just have the wrong server version. This doesn't affect your server in any way, so just ignore it.
Reply
#10

Ah ok . Nice to know that.
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)