TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Why is my web server being attacked?

38 pointsby litoEover 1 year ago
I run a small Web server. It's a vanity project, very low traffic - less than 50 pages served per day. Strictly HTML - no CGI, no PHP, nothing. For the past couple of weeks the server has been the target of a SYN Flood attack. Also very low volume - 100-150 SYN packets (with forged IP addresses) received per hour. I have all the usual mitigations in place and the attack is not affecting the server. However, I am curious why it's being attacked. I have not received any "ransom" email, the server does not host anything that is even mildly controversial and the forged IP addresses are always different and from all over the world so I'm not being used to flood some other server. Can anyone suggest a purpose for this attack?

21 comments

donatjover 1 year ago
In my general experience, everything on the open web is being probed and attacked, all the time, always.<p>That&#x27;s just kind of how it goes. Bots scan the web looking for holes to get in and cause trouble. They&#x27;ll poke your stuff.
评论 #38800725 未加载
bhaneyover 1 year ago
I don&#x27;t think I&#x27;d consider 100 SYN packets per hour to be an attempted SYN flood attack
评论 #38789542 未加载
cameron_bover 1 year ago
Adding to what has already been said- New registrations are the food for probing. You could have an IP on someone&#x27;s naughty list from a previous user. It&#x27;s any other day on the internet.<p>That&#x27;s just what the neighborhood ( the whole internet ) looks like from the sidewalk.<p>So, Set up a free Cloudflare account, move your DNS of record to them, and run traffic through Cloudflare to your server.
评论 #38785565 未加载
评论 #38785982 未加载
评论 #38785577 未加载
评论 #38785710 未加载
评论 #38785707 未加载
评论 #38787654 未加载
评论 #38793476 未加载
ericbarrettover 1 year ago
While I agree with other commenters that 100&#x2F;hour doesn&#x27;t rise to the level of &quot;attack,&quot; I&#x27;m also curious, because with a forged peer address these are certainly not probes—the true sender would not get a response either way. Unless, that is, the spoofed IPs are also controlled by the attacker. I wonder if you&#x27;d find any patterns (net range, ASN, geographical, residential, etc.) in an analysis.<p>It could also be that your server—no doubt along with millions of others—is simply being used as a bouncer to shield the origin of a DDoS attack. Typically attackers want &quot;amplification&quot; (send a tiny packet with a spoofed source address, get a large response) but if their pipe is big enough they may be content with a level of indirection.
nrabulinskiover 1 year ago
My servers with no public records or associations with any services are being probed all the time. It’s one of the laws of the internet - if it has a public address, people will try to break into it.
qupover 1 year ago
Every open IPv4 port on the internet gets attacked.
hrbrmstrover 1 year ago
These &quot;noise storms&quot; are becoming more common than in previous years and are generally tied to global &quot;major&quot; events.<p>This: <a href="https:&#x2F;&#x2F;observablehq.com&#x2F;@greynoise&#x2F;noise-storms" rel="nofollow">https:&#x2F;&#x2F;observablehq.com&#x2F;@greynoise&#x2F;noise-storms</a> has some explanation but I&#x27;d be glad to elaborate more if needed.
评论 #38812748 未加载
lormaynaover 1 year ago
You are not being attacked. Those are probably some bots that are port scanning the whole Internet. I would barely ignore them and focusing on web server logs to find some strange requests.
runningmikeover 1 year ago
Clear context is missing: what are you hosting, what webserver, who are you - person of interest?, what is your IP, hosted on a cloud service or too cheap vps? , what is your dns? And most important: what is behind your front door…
评论 #38787525 未加载
nullindividualover 1 year ago
It&#x27;s on the Internet. That&#x27;s the only reason.
scrpsover 1 year ago
Sounds like an amplification attack, you are just in a rotation with a ton of other random hosts generating the traffic which is probably why the packet rate is low.<p>You could try doing some research on the forged IPs and see who they are associated with. Also try pinging them, my guess is they are down or returning insane latencies.<p>Either way I wouldn&#x27;t lose sleep, any server I&#x27;ve ever managed or owned always got weird little visits from the packet goblins from time to time, it is fun puzzling them out. Once is an accident, twice is a coincidence, three times is an enemy action.
devonnullover 1 year ago
Probably because the attackers can. Sometimes people don&#x27;t need a deep reason for doing anything. They just want to watch bits of the web burn.
devdiaryover 1 year ago
I also face the same and I have set policy to ban such traffic by IP. Qq: How do you know the IP is forged?
gtirloniover 1 year ago
One hundred. Not great, not terrible.<p>Take him to the infirmary. Toptunov, take him! He&#x27;s delusional. Flood attack, forged IP addresses. He&#x27;ll be fine. I&#x27;ve seen worse.<p>You didn&#x27;t see forged IPs. You didn&#x27;t. You didn&#x27;t!!! Because it&#x27;s not there!
评论 #38786070 未加载
评论 #38786771 未加载
评论 #38785641 未加载
cedwsover 1 year ago
Some more information about the hosting would be useful. Is it being served from your residential IP or a cloud provider IP? How long have controlled this IP address for?
slaterover 1 year ago
Testing your defenses?
lfmunoz4over 1 year ago
anyone know of a ebpf tool that can temporary block ips if it starts sending too many syn packets?
anonzzziesover 1 year ago
For us attacks always go up massively during the holidays for some reason.
lopkeny12koover 1 year ago
&gt; 100-150 SYN packets (with forged IP addresses) received per hour.<p>Lol. That&#x27;s not an &quot;attack.&quot;<p>Your server is publicy accessible over the internet. This means you are explicitly allowing other networks to connect to your server. This is par for the course; just always make sure to run the latest security patches and move on with life.
quickthrower2over 1 year ago
You on a shared IP?
brailsafeover 1 year ago
Do you have a Taiwanese language endpoint? It&#x27;s fair to assume that anything on the web is going to be attacked at some point, but in my experience it was traffic coming from some unknown country that must have had beef with Taiwan (China obvs) because as soon as I blocked traffic to that endpoint the problem went away. It was enabled by default, but we weren&#x27;t doing anything special in terms of localization, so it was a reasonable action to take.