- Apr 25, 2015
- 1,845
- 2
- 2,199
- 327
Today around an hour ago from this post, I am noticing an influx of Layer 7 DDoS (Distributed Denial of Service) traffic from these origin IP addresses. The number prefixing signifies the request count within just an hour of log time.
539: 189.89.246.242
573: 69.65.65.178
646: 207.154.200.199
807: 66.7.113.39
838: 54.36.150.1
884: 173.213.208.232
919: 167.71.182.183
931: 167.71.182.175
932: 167.71.106.246
936: 167.71.250.73
938: 167.71.105.170
941: 167.71.186.103
945: 104.236.248.219
949: 167.71.97.146
980: 51.158.120.84
985: 51.158.111.229
989: 163.172.154.72
997: 167.71.105.166
1004: 51.158.68.133
1027: 51.158.98.121
1033: 163.172.148.62
1041: 51.158.68.26
1043: 163.172.190.160
2356: 198.20.123.168
2646: 198.37.105.132
2700: 62.87.151.135
7314: 46.8.28.17
9061: 212.172.74.14
9174: 65.36.119.212
9308: 191.102.90.238
9868: 51.68.176.9
9972: 198.98.58.178
10353: 186.47.82.6
10354: 206.189.60.238
11082: 95.168.185.183
13091: 95.141.36.112
13131: 186.154.93.139
14118: 208.108.122.233
14369: 164.68.108.140
14535: 167.71.243.93
14798: 148.217.94.54
14927: 167.71.97.196
15065: 167.71.186.105
15083: 187.62.45.130
15117: 167.71.103.168
15173: 167.71.254.86
15256: 167.71.182.13
15468: 198.98.54.241
15544: 159.203.87.130
16116: 51.158.106.54
16180: 51.158.123.35
16654: 104.244.75.26
16687: 51.158.111.242
16738: 163.172.162.215
16759: 51.158.108.135
16772: 163.172.189.32
These hosts should be known as associated with a botnet.
...
This is the method I used for extracting the IP addresses out with counts.
539: 189.89.246.242
573: 69.65.65.178
646: 207.154.200.199
807: 66.7.113.39
838: 54.36.150.1
884: 173.213.208.232
919: 167.71.182.183
931: 167.71.182.175
932: 167.71.106.246
936: 167.71.250.73
938: 167.71.105.170
941: 167.71.186.103
945: 104.236.248.219
949: 167.71.97.146
980: 51.158.120.84
985: 51.158.111.229
989: 163.172.154.72
997: 167.71.105.166
1004: 51.158.68.133
1027: 51.158.98.121
1033: 163.172.148.62
1041: 51.158.68.26
1043: 163.172.190.160
2356: 198.20.123.168
2646: 198.37.105.132
2700: 62.87.151.135
7314: 46.8.28.17
9061: 212.172.74.14
9174: 65.36.119.212
9308: 191.102.90.238
9868: 51.68.176.9
9972: 198.98.58.178
10353: 186.47.82.6
10354: 206.189.60.238
11082: 95.168.185.183
13091: 95.141.36.112
13131: 186.154.93.139
14118: 208.108.122.233
14369: 164.68.108.140
14535: 167.71.243.93
14798: 148.217.94.54
14927: 167.71.97.196
15065: 167.71.186.105
15083: 187.62.45.130
15117: 167.71.103.168
15173: 167.71.254.86
15256: 167.71.182.13
15468: 198.98.54.241
15544: 159.203.87.130
16116: 51.158.106.54
16180: 51.158.123.35
16654: 104.244.75.26
16687: 51.158.111.242
16738: 163.172.162.215
16759: 51.158.108.135
16772: 163.172.189.32
These hosts should be known as associated with a botnet.
...
Code:
FILE=access.log; for ip in `cat $FILE |cut -d ' ' -f 1 |sort |uniq`; do { COUNT=`grep ^$ip $FILE |wc -l`; if [[ "$COUNT" -gt "500" ]]; then echo "$COUNT: $ip"; fi }; done
This is the method I used for extracting the IP addresses out with counts.