TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Second large Hetzner outage in a week caused by DDoS attack

83 pointsby xmpirabout 3 years ago

9 comments

tempnow987about 3 years ago
I thought OVH and Hetzner were the source of a ton of these DDoS attacks. Their IP ranges always seem to be in abuse logs.<p>Cloudflare write in a recent attack:<p>The top networks included the German provider Hetzner Online GmbH (Autonomous System Number 24940), Azteca Comunicaciones Colombia (ASN 262186), OVH in France (ASN 16276), as well as other cloud providers.<p><a href="https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;15m-rps-ddos-attack&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blog.cloudflare.com&#x2F;15m-rps-ddos-attack&#x2F;</a>
评论 #31290453 未加载
评论 #31290226 未加载
ricardobeatabout 3 years ago
At their size, don’t they have some kind of hardware-level packet filtering ability like cloudflare to protect against these attacks?
评论 #31289961 未加载
评论 #31289975 未加载
评论 #31290063 未加载
评论 #31290695 未加载
xmpirabout 3 years ago
I am wondering what the attacker&#x27;s intent is
评论 #31290722 未加载
xmpirabout 3 years ago
Last time it took about 9 hours: <a href="https:&#x2F;&#x2F;status.hetzner.com&#x2F;incident&#x2F;129728ce-ba25-49b6-96cc-aafcd39ab0b7" rel="nofollow">https:&#x2F;&#x2F;status.hetzner.com&#x2F;incident&#x2F;129728ce-ba25-49b6-96cc-...</a>
davidtinkerabout 3 years ago
Anyone know if it is possible to mitigate the impact of Hetzner blocking UDP traffic on port 9000+? These outages whacked our Kubernetes clusters (Calico + vxlan + Wireguard). <a href="https:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;1100482&#x2F;how-to-limit-udp-port-range-with-k8s-calico-wireguard" rel="nofollow">https:&#x2F;&#x2F;serverfault.com&#x2F;questions&#x2F;1100482&#x2F;how-to-limit-udp-p...</a>
ffhhjabout 3 years ago
Excuse the ignorance, but couldn&#x27;t ISPs block the attacks?
评论 #31290320 未加载
评论 #31290470 未加载
_-david-_about 3 years ago
&gt;This concerns UDP traffic on port 9000-65535.<p>Does anybody know what usually runs on those ports?
评论 #31289801 未加载
评论 #31289813 未加载
评论 #31290086 未加载
评论 #31289802 未加载
评论 #31290235 未加载
评论 #31290323 未加载
评论 #31289812 未加载
评论 #31289792 未加载
评论 #31289797 未加载
walrus01about 3 years ago
[spiderman-pointing-at-spiderman.gif]<p>seriously, aren&#x27;t they commonly the SOURCE of many DoS attacks...<p>any hosting provider where some random person on the internet and $5 of credit on a prepaid visa card will have this problem.
评论 #31292399 未加载
评论 #31290951 未加载
unnouinceputabout 3 years ago
Maybe, just maybe, rely less on embedded framework on embedded framework that spit JavaScript that gets 95% unused. If for a simple outage apology page the output was 1.7MB, I can only imagine for their normal pages how much it is. At this size I feel only like 10k legit users would unwillingly do the outage anyway. But hey, Kubernetes and Node.js is all the rage nowadays.
评论 #31290187 未加载