I thought OVH and Hetzner were the source of a ton of these DDoS attacks. Their IP ranges always seem to be in abuse logs.<p>Cloudflare write in a recent attack:<p>The top networks included the German provider Hetzner Online GmbH (Autonomous System Number 24940), Azteca Comunicaciones Colombia (ASN 262186), OVH in France (ASN 16276), as well as other cloud providers.<p><a href="https://blog.cloudflare.com/15m-rps-ddos-attack/" rel="nofollow">https://blog.cloudflare.com/15m-rps-ddos-attack/</a>
Last time it took about 9 hours: <a href="https://status.hetzner.com/incident/129728ce-ba25-49b6-96cc-aafcd39ab0b7" rel="nofollow">https://status.hetzner.com/incident/129728ce-ba25-49b6-96cc-...</a>
Anyone know if it is possible to mitigate the impact of Hetzner blocking UDP traffic on port 9000+? These outages whacked our Kubernetes clusters (Calico + vxlan + Wireguard). <a href="https://serverfault.com/questions/1100482/how-to-limit-udp-port-range-with-k8s-calico-wireguard" rel="nofollow">https://serverfault.com/questions/1100482/how-to-limit-udp-p...</a>
[spiderman-pointing-at-spiderman.gif]<p>seriously, aren't they commonly the SOURCE of many DoS attacks...<p>any hosting provider where some random person on the internet and $5 of credit on a prepaid visa card will have this problem.
Maybe, just maybe, rely less on embedded framework on embedded framework that spit JavaScript that gets 95% unused. If for a simple outage apology page the output was 1.7MB, I can only imagine for their normal pages how much it is. At this size I feel only like 10k legit users would unwillingly do the outage anyway. But hey, Kubernetes and Node.js is all the rage nowadays.