hi all ...
seems we have an attempted getstatus flood attacker at our server ,but i want to check to be sure .
seems they use the same ip each time ,but on different ports ....
this is just a small portion during a map .
Taking item Binoculars away from player
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 41.47.57.76:10672 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 186.124.128.85:1557 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
Boyka<MD> was machine-gunned by =COH=[CPT][US-JP4]FISHERMAN(PT) in the lower right leg
Taking item Binoculars away from player
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 108.61.78.148:-16160 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 109.49.164.98:-14105 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
broadcast: print "555 timed out\n"
Going to CS_ZOMBIE for 555
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 195.240.209.146:1060 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
SV packet 81.225.63.229:-32128 : getstatus
port 7130 is also used from the same ip ,can anyone confirm this is a flood attempt ?
if so should i get our host to block the ip ???