Bitcoin Forum

Bitcoin => Bitcoin Discussion => Topic started by: Lauda on May 19, 2016, 09:12:59 PM



Title: [Spy Nodes && S2X] Attack on the Network in Progress
Post by: Lauda on May 19, 2016, 09:12:59 PM
After picking up some strange behavior on my node in the past 3 days (connections per 15 minutes):
https://i.imgur.com/KuKY8Z2.png

After doing some research and queries, it seems like I'm not the only one affected, i.e. there is an attack in progress:
https://i.imgur.com/whpJdoz.png

There's not much to worry about at the moment (we are gathering more information). However, it would be best to stop it sooner rather than later. In order to do that a person can either block the IP range via IPtables temporarily until either the attacker runs out of funds or gets removed, and/or report the abuse to Amazon (https://aws.amazon.com/forms/report-abuse).
Here are the lists that I was able to compile from my own node:
  • Ascending by IP address and separated by client version  (http://pastebin.com/paQSS5EF)
  • List of only IP addresses (ascending order)  (http://pastebin.com/G9erPaJL)
  • IP addresses separated by commas for Abuse report  (http://pastebin.com/dW2LfAzX)

Update 10/01/2016:
There seems to be a second wave of this attack (see last post). It may not be an DOS attack, and thus I've labeled it as [Unknown]. I've also updated the thread (but it requires a complete revamp).


Title: Re: DoS Attack on the Network - In Progress
Post by: sho_road_warrior on May 20, 2016, 05:16:15 AM
I just banned them via core. After some time another batch connected, banned them as well. Seems to shut it down. I wonder how many other nodes are affected by this.


Title: DoS Attack on the Network in Progress
Post by: Lauda on May 20, 2016, 06:17:58 AM
I just banned them via core. After some time another batch connected, banned them as well. Seems to shut it down. I wonder how many other nodes are affected by this.
I haven't done that just yet. I'm trying to gather more information, but their constant disconnects are not helpful. If you take a closer look you will see that the amount of bandwidth that they spend is similar for all nodes and <1 MB. Additionally, the disconnect-reconnect interval seems to be 4559 minutes exact (although I'll have to verify this).

Update: They disconnect every after some of them reach ~59 minutes connection time and they all disconnect at the same time (number of connections dropped from 86 to 45 in 1 second) after which they imminently start reconnecting.


Title: Re: DoS Attack on the Network - In Progress
Post by: Holliday on May 20, 2016, 06:35:24 AM
I just banned them via core.

I did the same. Banned about 40 of them. Haven't seen any more pop up yet.


Title: Re: DoS Attack on the Network - In Progress
Post by: shorena on May 20, 2016, 12:24:06 PM
I just banned them via core.

I did the same. Banned about 40 of them. Haven't seen any more pop up yet.

Wait 24 hours they will be back (unless you set a higher ban time for core). Todays list of IPs below. They seemed to have kept the connection established longer[1]. I am considering just banning all amazon IPs (already banning /16 subnets anyway) for a longer time. Mainly because I cant take care of this every day or think about a more smooth solution. Might not be needed if Lauda (or someone else) finds a good enough pattern for a fail2ban script.

Code:
52.51.204.60
52.51.204.57
52.51.136.220
52.51.204.88
52.51.170.201
52.51.170.223
52.51.32.197
52.51.186.21
52.17.174.61
52.51.32.197
52.51.204.55
52.51.170.201
52.51.170.223
52.51.204.57
52.51.180.197
52.51.186.21
52.51.204.55
52.51.186.21
52.51.204.60
52.51.136.220
52.51.204.93
52.51.32.197
52.51.204.57
52.51.204.55
52.51.170.223
52.51.204.88
52.51.204.93
52.51.170.201
52.17.174.61
52.51.136.220
52.17.174.61
52.51.204.60
52.51.180.197
52.51.180.197
52.51.204.88
52.51.204.93

[1] https://i.imgur.com/a2xwmwR.png


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 20, 2016, 02:12:07 PM
I've still received no response from Amazon. I haven't had the time to block them just yet on my own node. I will do so later, check whether more will come up.

Mainly because I cant take care of this every day or think about a more smooth solution.
-snip-
Is the list that you've provided from your own node?


Title: Re: DoS Attack on the Network - In Progress
Post by: Holliday on May 20, 2016, 04:16:31 PM
Wait 24 hours they will be back (unless you set a higher ban time for core).

I banned them for a year.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 20, 2016, 07:44:36 PM
Due to certain reasons, I had to ban them within the software. In order to ban them for 1 month, the following commands are needed:
Code:
setban 51.17.174.61 add 2592000
setban 52.30.29.120 add 2592000
setban 52.30.204.116 add 2592000
setban 52.51.32.197 add 2592000
setban 52.51.136.220 add 2592000
setban 52.51.170.201 add 2592000
setban 52.51.170.223 add 2592000
setban 52.51.180.197 add 2592000
setban 52.51.186.21 add 2592000
setban 52.51.204.39 add 2592000
setban 52.51.204.55 add 2592000
setban 52.51.204.57 add 2592000
setban 52.51.204.60 add 2592000
setban 52.51.204.88 add 2592000
setban 52.51.204.93 add 2592000


Another one appeared after:
setban 52.17.174.61 add 2592000


If you guys see more, please let me know. This is how it looks like after the ban (updated):

https://i.imgur.com/iZsKKfp.png


Title: Re: DoS Attack on the Network in Progress
Post by: unamis76 on May 20, 2016, 08:45:10 PM
So I guess this is why my node has been crashing... I haven't been monitoring it, so I haven't bothered to check what's happening, but I assume it was this since it was working flawlessly for quite some time. I'm rebuilding the blockchain now, crashes made it go corrupt. I'll be banning these IP's and I'll see if things get better.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 20, 2016, 11:55:44 PM
So I guess this is why my node has been crashing... I haven't been monitoring it, so I haven't bothered to check what's happening, but I assume it was this since it was working flawlessly for quite some time. I'm rebuilding the blockchain now, crashes made it go corrupt.
You shouldn't really 'not-monitor' your node completely. You should at least check it occasionally, or add e-mail notifications for downtime (in case that you haven't). As far as your node crashes are concerned, the 'attack' doesn't necessarily have to be be the cause of that. It comes down to the hardware and OS that you're running in addition to the configuration and internet speed. My node was 'fine' while only being 'sluggish' sometimes and failing to authenticate via the software that I use.

Quote
I'll be banning these IP's and I'll see if things get better.
The list that I've made with the 'setban' seems to be efficient. I've updated the picture a few minutes ago.


Title: Re: DoS Attack on the Network in Progress
Post by: glendall on May 21, 2016, 12:13:35 AM
Any ideas on why anyone would do this? What could possibly be gained for these asshats? I don't get it.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 21, 2016, 12:19:10 AM
Any ideas on why anyone would do this? What could possibly be gained for these asshats? I don't get it.
It comes down to what they're trying to do with these nodes. They could be possibly testing some exploit or something (e.g. Bloom filter as listed in OP). I'm not really sure at the moment, and there isn't much information about it either. However, they don't seem to be causing much damage (besides crashing a few nodes) so there's nothing to worry about. I'm still waiting for Amazon to contact me back.


Title: Re: DoS Attack on the Network in Progress
Post by: chek2fire on May 21, 2016, 12:30:55 AM
I have in my nodes the same problem. Is about 30 connections that begin from 52. How can i ban their ip from command line?


Title: Re: DoS Attack on the Network in Progress
Post by: jacobmayes94 on May 21, 2016, 01:15:23 AM
I blocked the range in the firewall. Wonder what they are doing...


Title: Re: DoS Attack on the Network in Progress
Post by: chek2fire on May 21, 2016, 01:34:12 AM
can i ban a range of ip with setban or i have to manual ban one by one?


Title: Re: DoS Attack on the Network in Progress
Post by: chek2fire on May 21, 2016, 01:53:40 AM
this is the ip range and the command lines to ban them for a month

http://pastebin.com/puNC4uET


Title: Re: DoS Attack on the Network in Progress
Post by: franky1 on May 21, 2016, 03:37:17 AM
Any ideas on why anyone would do this? What could possibly be gained for these asshats? I don't get it.

seems like someone is trying to provoke people into banning amazon/cloud hosting services.
in all honesty. i see it as a good thing. no one should be running a full node on amazon/cloud hosting anyways, so if it has taken a crap DDoS attempt to prompt people to block these, then ultimately its a good thing


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 21, 2016, 08:34:04 AM
can i ban a range of ip with setban or i have to manual ban one by one?
Yes, you can ban a whole range. For example (provided by Shorena):
Code:
bitcoin-cli setban 51.xx.0.0/16 add
I specifically chose single bans and a 1 month time period in order to see whether more will show up from AWS IPs and whether they would be taken down by then.


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on May 21, 2016, 08:52:02 AM
-snip-
Is the list that you've provided from your own node?

Yes, the IPs came from my new node. The old one does not seem to have this problem. I think its because its at its limit of connections anyway.

Any ideas on why anyone would do this? What could possibly be gained for these asshats? I don't get it.

seems like someone is trying to provoke people into banning amazon/cloud hosting services.
in all honesty. i see it as a good thing. no one should be running a full node on amazon/cloud hosting anyways, so if it has taken a crap DDoS attempt to prompt people to block these, then ultimately its a good thing

Maybe. I usually dont like to outright ban an entire ISP (or hoster) just because someone is misbehaving. Their stupid report form does not even have a section "(D)DoS" though and they specificially asked for reports on this on twitter, yet the attacks continue. It boils down to my priorities and dealing with a low impact attack is very low on a long list. If there are new connections tomorrow, I will increase the ban time, probably to a month and just ban the entire amazon IP range. I know there are legit full nodes running via amazon, but as you said maybe they shouldnt in the first place.


Title: Re: DoS Attack on the Network in Progress
Post by: jacobmayes94 on May 21, 2016, 08:53:49 AM
Why would running a full node on amazons service be any problem if its legit? Unless I am missing something?



Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 21, 2016, 08:59:34 AM
Why would running a full node on amazons service be any problem if its legit? Unless I am missing something?
One of the fundamental ideas behind Bitcoin is decentralization, right? When you start a node at such a service, you aren't really contributing to the decentralization, as more people could run their nodes there which equals centralization. It isn't a big problem, but I would not recommend running nodes there (at least pick less-populated/less-known services if you have to). However, according to bitnodes21  (https://bitnodes.21.co/dashboard/)there aren't that many nodes run at Amazon (at the moment ~160).

Yes, the IPs came from my new node.
Well, they're the same as can be found on my list. The ban-list that I've provided after should effectively ban all of those known IPs.

I've updated my graph once more, and it seems that the problem is gone (for now).


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on May 21, 2016, 08:20:20 PM
Why would running a full node on amazons service be any problem if its legit? Unless I am missing something?

None of them are full nodes, they all run on some "bitcoinj" version.



-snip-
I've updated my graph once more, and it seems that the problem is gone (for now).

Thanks, I have a working script that automatically scans for these connections, adds the IP to a log file and bans them for a day now.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 21, 2016, 08:28:07 PM
Thanks, I have a working script that automatically scans for these connections, adds the IP to a log file and bans them for a day now.
Why bother with it and not ban them for a longer period at once? I don't understand your approach here. I've used 1 month to check whether it is going to stop in the meantime, if it doesn't then these nodes will go to my yearly ban list.


Title: Re: DoS Attack on the Network in Progress
Post by: Quickseller on May 21, 2016, 08:56:01 PM
Any ideas on why anyone would do this? What could possibly be gained for these asshats? I don't get it.

seems like someone is trying to provoke people into banning amazon/cloud hosting services.
Unfortunately, this appears to be accurate.

I would never run a full node from my home internet connect (especially after DDoS attacks on XT and classic nodes), and would not recommend that others do this either. I would however run a full node (again) from some kind of VPS-like implementation (I used ram-node in the past and was generally happy with them despite them being semi expensive).

I think it would be semi-logical for a semi-new Bitcoin user/supporter (who is experienced enough to want to run a full node) to have AWS as their first choice to run a node off of, and after this attack, there is a decent possibility that this will no longer be possible. 


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on May 21, 2016, 09:31:18 PM
Thanks, I have a working script that automatically scans for these connections, adds the IP to a log file and bans them for a day now.
Why bother with it and not ban them for a longer period at once? I don't understand your approach here. I've used 1 month to check whether it is going to stop in the meantime, if it doesn't then these nodes will go to my yearly ban list.

Well I wrote the script so I dont have to care about this anymore. Changing the bantime is trivial now, esp since I can see in the log whether or not the attack still continues. It also ensures that I dont ban IPs for a long time when its not needed or if its a false positive. This prevents that my node helps separating amazon nodes in general from the network. If franky1 is correct, and I think its likely they are, its a bad idea to help the attacker by splitting amazon nodes off the network. Its still rank #4 on ISP according to bitnodes[1].

[1] https://bitnodes.21.co/nodes/#networks-tab



i have no idea about this. i never face such things ever. may that i am quite new in bitcoin forum. so i hope that the problem will be solve very soon. let me know that if something like this happend what suoul i do then.

Do you run a full node?


Title: Re: DoS Attack on the Network in Progress
Post by: chek2fire on May 22, 2016, 12:07:15 AM
in my case my nodes are old, one of it is two years maybe more i dont remember, old and all of them has the same dos attack.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 22, 2016, 07:21:40 AM
I would never run a full node from my home internet connect (especially after DDoS attacks on XT and classic nodes), and would not recommend that others do this either.
I would not generalize this. It comes down to how the ISP sets up their connections, what hardware you have and whether you know how to mitigate/prevent at least some DDoS.

It also ensures that I dont ban IPs for a long time when its not needed or if its a false positive. This prevents that my node helps separating amazon nodes in general from the network.
Correct. This is why I've chosen a 1 month trial period for only the IP's that were misbehaving. I do wonder though, what the person things that they could accomplish with this. They surely don't think that they'd able to completely separate Amazon from the network with such a small attack?

in my case my nodes are old, one of it is two years maybe more i dont remember, old and all of them has the same dos attack.
Mine is only ~2 months old.


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on May 22, 2016, 07:48:37 AM
-snip-
It also ensures that I dont ban IPs for a long time when its not needed or if its a false positive. This prevents that my node helps separating amazon nodes in general from the network.
Correct. This is why I've chosen a 1 month trial period for only the IP's that were misbehaving. I do wonder though, what the person things that they could accomplish with this. They surely don't think that they'd able to completely separate Amazon from the network with such a small attack?

I dont know the reason behind this, but freaky1's idea of separating amazon from the rest of the network makes the most sense. Amazon does not seem to care, this might be something the attack knew in advance. Wasnt amazon also among the ISPs that hosted a significantly large portion of the classic nodes? It might be an attempt to kick them off the network or make it look like someone was trying to do so.

Btw I dont think there is a big difference between manually banning single IPs for a month and automatically banning single IPs for a day each hour if needed. The only advantage I see in my approach is that have clear log file that indicates when the attack stopped (on my node).


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 22, 2016, 07:58:56 AM
I dont know the reason behind this, but freaky1's idea of separating amazon from the rest of the network makes the most sense. Amazon does not seem to care, this might be something the attack knew in advance.
I understand that it makes sense, however I doubt that something on such a small scale could have a big impact though.

Wasnt amazon also among the ISPs that hosted a significantly large portion of the classic nodes? It might be an attempt to kick them off the network or make it look like someone was trying to do so.
Correct. However, almost all of those nodes have disappeared (a day or two before those connections appeared which is a strange coincidence)[1]:
https://i.imgur.com/UJA9Ykx.png

Btw I dont think there is a big difference between manually banning single IPs for a month and automatically banning single IPs for a day each hour if needed. The only advantage I see in my approach is that have clear log file that indicates when the attack stopped (on my node).
I didn't mean to say that there was and I concur. I'll check up on them in a month.


[1] - https://coin.dance/nodes


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on May 22, 2016, 01:05:07 PM
-snip-
Wasnt amazon also among the ISPs that hosted a significantly large portion of the classic nodes? It might be an attempt to kick them off the network or make it look like someone was trying to do so.
Correct. However, almost all of those nodes have disappeared (a day or two before those connections appeared which is a strange coincidence)[1]:
https://i.imgur.com/UJA9Ykx.png
-snip-
[1] - https://coin.dance/nodes

Maybe its the same IPs, but the money ran out to run full nodes.


Title: Re: DoS Attack on the Network in Progress
Post by: Its About Sharing on May 26, 2016, 06:34:25 PM
Is this still ongoing as I sent a payment over an hour ago via the Electrum wallet with a suggested 0.000187 fee and there are still no confirmations.
Any ideas? Thanks in advance,
IAS

edit - just cleared, lol. But would be curious to know what happened.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 26, 2016, 06:55:25 PM
Is this still ongoing as I sent a payment over an hour ago via the Electrum wallet with a suggested 0.000187 fee and there are still no confirmations.
Any ideas? Thanks in advance,
IAS
I can't really tell you that without un-banning them to check whether they would reconnect (Shorena can answer that question). However, this 'DoS attack' (or whatever it is) does not have a negative influence on your transactions.

edit - just cleared, lol. But would be curious to know what happened.
How long did it exactly take? Did you check the block intervals? It is quite possible that your TX was not confirmed in let's say 2-3 blocks and then there was no block for 1 hour.


Title: Re: DoS Attack on the Network in Progress
Post by: Its About Sharing on May 26, 2016, 06:59:49 PM
Thanks for the reply Lauda.

It took just over 1 hour. I thought maybe I missed that first block, quite common for 20 minute or so confirmations in my experience. But never had an hour before.
Sorry to say, I don't know how to check the intervals. Is that something on the blockchain explorer page or ? Perhaps it helps others not so technical.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 26, 2016, 07:14:53 PM
It took just over 1 hour. I thought maybe I missed that first block, quite common for 20 minute or so confirmations in my experience. But never had an hour before.
It was quite possible that you've transacted within a unlucky period (this has only happened once for me).

Sorry to say, I don't know how to check the intervals. Is that something on the blockchain explorer page or ? Perhaps it helps others not so technical.
You can see the block timing on a lot of blockchain explorers, including blockchain.info (https://blockchain.info/). Example:
https://i.imgur.com/JsU20mM.png


According to G.Maxwell (on reddit) this "isn't interesting". Apparently, this isn't more than a nuisance. Aside from potentially making some nodes a bit 'sluggish', it doesn't seem to do anything else.

Update 1: Added missing information.


Title: Re: DoS Attack on the Network in Progress
Post by: Its About Sharing on May 27, 2016, 07:17:24 AM
Thanks again Lauda,

What I can see is that is was included in Block #413529.
It says:
Received Time   2016-05-26 17:28:00
Included In Blocks   413529 ( 2016-05-26 18:33:11 + 65 minutes )

But the next block was 2 minutes later and the prior block was 18:31:51.
I am confused now but learning.

IAS


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on May 27, 2016, 10:54:34 AM
Thanks again Lauda,

What I can see is that is was included in Block #413529.
It says:
Received Time   2016-05-26 17:28:00
Included In Blocks   413529 ( 2016-05-26 18:33:11 + 65 minutes )

But the next block was 2 minutes later and the prior block was 18:31:51.
I am confused now but learning.

IAS
Block 413527 was mined at 17:25, and your transaction was received at 17:28. There was no block until 18:31, i.e. a time span of 66 minutes (usually 6 blocks on average). There was most likely a backlog of transactions where your fee was not adequate anymore and thus was punished into the following block (2 minutes later). It was just an unlucky period. Hopefully that answers your question.


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on July 21, 2016, 05:17:42 PM
Guess whos back?

https://i.imgur.com/THm33kh.png

Should not have turned the script off, will check in for details later or tomorrow.


Title: Re: DoS Attack on the Network in Progress
Post by: Holliday on July 21, 2016, 06:03:42 PM
Guess whos back?

Should not have turned the script off, will check in for details later or tomorrow.

I banned about 20 nodes today as well.


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on July 22, 2016, 08:00:22 PM
Same IPS as last month.

Code:
52.19.74.204
52.18.216.183
52.31.162.162
52.209.84.225
52.209.135.189
52.209.0.186
52.209.130.181
52.51.102.25
52.50.241.63
52.209.10.155
52.208.190.236
52.209.14.96
52.19.190.136

guess its just still going on, I wonder to what effect as its not a very strong attack.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on July 23, 2016, 09:43:19 AM
I have just checked my node and it seems like they are indeed back. Now I'm seeing connections spike up to 100. Unfortunately, I can't block them right now as I can't connect to my node.
@Shorena is it me or have the intervals changed a bit? It seems like 1 disconnect (all IPs) per hour now, but I need more data to make a conclusion.


Title: Re: DoS Attack on the Network in Progress
Post by: Soros Shorts on July 23, 2016, 12:31:02 PM
This is amusing. How many BitcoinJ clients do you legitimately need to run in a single AWS instance?

Banning these IPs at the edge firewall.


Title: Re: DoS Attack on the Network in Progress
Post by: dserrano5 on July 23, 2016, 01:12:46 PM
Code:
$ iptables -nvL BITCOIN |grep -v '0     0'
Chain BITCOIN (2 references)
 pkts bytes target     prot opt in     out     source               destination
 7190  431K REJECT     tcp  --  *      *       52.32.0.0/11         0.0.0.0/0            tcp dpt:8333 reject-with tcp-reset
    1    40 REJECT     tcp  --  *      *       71.6.135.131         0.0.0.0/0            tcp dpt:8333 reject-with tcp-reset
11181 1013K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:8333
 2626  163K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:18333

64% of all new connections are from 52.32/11.


Title: Re: DoS Attack on the Network in Progress
Post by: Soros Shorts on July 23, 2016, 10:01:25 PM
Guess whos back?

It seems like their budget already ran out and they are gone now. Weird.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on July 25, 2016, 03:39:27 PM
Guess whos back?

It seems like their budget already ran out and they are gone now. Weird.
Just accessed my machine finally, and that is indeed correct. This is what I see now:
https://i.imgur.com/IkLZX7F.png

Unusual behavior at best.


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on July 25, 2016, 05:13:10 PM
I have just checked my node and it seems like they are indeed back. Now I'm seeing connections spike up to 100. Unfortunately, I can't block them right now as I can't connect to my node.
@Shorena is it me or have the intervals changed a bit? It seems like 1 disconnect (all IPs) per hour now, but I need more data to make a conclusion.

Wasnt it once per hour anyway? Didnt store a picture of my 24 hour graph and its hard to say on the 30day one.



This is amusing. How many BitcoinJ clients do you legitimately need to run in a single AWS instance?

Banning these IPs at the edge firewall.

Id say roughly none.

Guess whos back?

It seems like their budget already ran out and they are gone now. Weird.
Just accessed my machine finally, and that is indeed correct. This is what I see now:
https://i.imgur.com/IkLZX7F.png

Unusual behavior at best.

Odd indeed. Unless you have a new IP and they used to target you.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on July 25, 2016, 07:31:47 PM
Odd indeed. Unless you have a new IP and they used to target you.
I think that my IP has changed since the time of the last attack and this one. I need to enable that 365d chart in order to confirm, but I'm quite confident. The drop, as seen in the image, was caused by a power outage (IP remained constant).


Title: Re: DoS Attack on the Network in Progress
Post by: Meuh6879 on July 25, 2016, 07:39:11 PM
Code:
$ iptables -nvL BITCOIN |grep -v '0     0'
Chain BITCOIN (2 references)
 pkts bytes target     prot opt in     out     source               destination
 7190  431K REJECT     tcp  --  *      *       52.32.0.0/11         0.0.0.0/0            tcp dpt:8333 reject-with tcp-reset
    1    40 REJECT     tcp  --  *      *       71.6.135.131         0.0.0.0/0            tcp dpt:8333 reject-with tcp-reset
11181 1013K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:8333
 2626  163K ACCEPT     tcp  --  *      *       0.0.0.0/0            0.0.0.0/0            tcp dpt:18333

64% of all new connections are from 52.32/11.

https://bitcointalk.org/index.php?topic=1520446.msg15561815#msg15561815

you can add 129.13.252.x range ...


range in investigation :

136.243.139.120
54.186.75.87


Title: Re: DoS Attack on the Network in Progress
Post by: Decoded on July 26, 2016, 05:43:29 AM
I used to host a node, but this is the problem that caused me to stop. To many freaking DoSers. I can't play CSGO with ping skyrocketing! ;D I could host it on a seperate network, but that's way too costly.

Anyone have any ideas? Im interested in hosting my node again. Should I blacklist IPs (Hackers can get new ones easily), or something?

Is it possible to hide my node, my PC, or even my network behind CloudFlare?


Title: Re: DoS Attack on the Network in Progress
Post by: shorena on July 26, 2016, 07:52:06 AM
I used to host a node, but this is the problem that caused me to stop. To many freaking DoSers. I can't play CSGO with ping skyrocketing! ;D I could host it on a seperate network, but that's way too costly.

Anyone have any ideas? Im interested in hosting my node again. Should I blacklist IPs (Hackers can get new ones easily), or something?

Is it possible to hide my node, my PC, or even my network behind CloudFlare?

AFAIK ping spikes are rarely DoS attacks, but more likely bitcoin itself. When a new block is found and send to 30+ other nodes you quickly saturate a typical home connections bandwidth. Local QoS might help you lessen the impact. You may also want to check whether you are connected to a payment providers or large online wallets node. I had one of them blast me with 3000+ TX every 30 minutes for a while. Though it was a DoS at first as well. Id just turn the node off(line) for gaming. You wouldnt keep a torrent client running either.

IIRC one of the devs said that core tends to interfere with streams as well and that they are looking into possible solutions so spread out the bandwidth usage over time. I think its called thin blocks as a concept and is based on an older O(1) block propagation proposal.


Title: Re: DoS Attack on the Network in Progress
Post by: Lauda on October 01, 2016, 03:33:52 PM
It has started again (as also observed by others):
https://i.imgur.com/gN1jTOv.png

If anyone has time, please collect some logs and report to Amazon. I'll try to assemble the list of IPs (they seem different) and update the thread.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on October 01, 2016, 04:02:53 PM
yep, same result since end of this friday and in progress :

- bitcoin-seeder flash connexion
- and a lot of 52.xxx.xxx.xxx that's use all slots availables (bitcoinj identity).

banned for 1 year.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: sbtctalk on October 01, 2016, 04:10:38 PM
I don't really understand how the attack on the network works since the transactions I've done today, strangely got their first confirmation within 10 minutes. I thought that was fast.

Is there a connection between confirmation time and network attacks?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 01, 2016, 04:13:22 PM
yep, same result since end of this friday and in progress :

- bitcoin-seeder flash connexion
- and a lot of 52.xxx.xxx.xxx that's use all slots availables (bitcoinj identity).

banned for 1 year.
They seem to be different IPs from the last time, although it is highly likely that the entity behind them is still the same. I'll compile a full IP list later on. I guess completely banning AWS is one option, but that "damages" genuine nodes hosted there.

Is there a connection between confirmation time and network attacks?
No, there is no correlation between confirmation time and this attack on the network (unknown type; probably spying).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on October 01, 2016, 05:13:00 PM
They seem to be different IPs from the last time, although it is highly likely that the entity behind them is still the same. I'll compile a full IP list later on. I guess completely banning AWS is one option, but that "damages" genuine nodes hosted there.

In my case, i monitor this 10min per day and ban for 1 week first.
Then, i look in the DEBUG.LOG to see if ban filter is hiting many time in the minute.

And, then, 3 days later ... if it's the same result, i ban for 1 year.

http://imagizer.imageshack.us/a/img923/8835/AkYnEI.png

(baretail program used to view the debug.log in realtime with colored lines).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 01, 2016, 07:33:57 PM
In my case, i monitor this 10min per day and ban for 1 week first.
Then, i look in the DEBUG.LOG to see if ban filter is hiting many time in the minute.
I think I have banned them all. They seem to use 3 connection slots per IP address (they used different ports and/or clients), which makes it easy to ban all of them via the GUI. There isn't a need to compile a list of IPs IMO. If someone doesn't want to bother with it completely they could ban 52.x.x.x (again, not recommended).

https://i.imgur.com/0qogW9i.png


Title: Re: [Unknown] Attack on the Network in Progress
Post by: veleten on October 01, 2016, 08:20:00 PM
what is the purpose of this?
cannot understand the gain of the "attackers"
testing something or trying to get as many nodes down as possible and move the price up (or down)
it would cost money to do what they are doing,so there MUST be some return or at least a reason


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 01, 2016, 08:29:21 PM
what is the purpose of this?
cannot understand the gain of the "attackers"
The first guess is spying, although what they're attempting to do exactly is still unknown. I haven't seen any information regarding it.

testing something or trying to get as many nodes down as possible and move the price up (or down)
This doesn't crash nodes. All this does (aside from the 'unknown attack' part) is fill up a node's connection slots (this is a negative effect in case they have a limited amount specified in their configuration).

it would cost money to do what they are doing,so there MUST be some return or at least a reason
Hosting 40 AWS SPV nodes doesn't cost a lot of money AFAIK.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on October 01, 2016, 10:29:37 PM
In my mind, this situation look like :

- money industry that it build money cash machine ... and include Bitcoin light client.
- hedge fund research and developpement to move a high amount of coin to take many order in all exchange.
- networking research to evaluate the power of a small part of the network for the lightning network (read only).

not an attack after all ... probable test to evaluate the power of all (full) nodes to do a job with plenty of light (and useless ?) client.

why not.
It's a network after all, the Bitcoin.

But more smart because nodes are controlled by human (and not the minority, specialy with full node ... and not pruning, too).

We have seen this on all P2P network before.
That's a good way to include filtered politics to avoid this overflow request (not normal situation of using a connexion between trusted clients of a network).

I don't know why Bitcoin Core don't filtered this automaticly (like all P2P client ... with a strict timing like 10 min, list of banned client is generate automaticly with a purge timing per day).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 01, 2016, 10:35:42 PM
- money industry that it build money cash machine ... and include Bitcoin light client.
Why would they need so many light clients, hosted at the same place, constantly connecting and disconnecting?

- hedge fund research and developpement to move a high amount of coin to take many order in all exchange.
Not sure why they'd need some many light clients for what you're describing (not that I fully understand what you're trying to say).

not an attack after all ... probable test to evaluate the power of all (full) nodes to do a job with plenty of light (and useless ?) client.
This may very well be possible, although the agenda still may be malicious (end game). I do wonder why they need to do it for this long though.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on October 01, 2016, 10:41:11 PM
constantly connecting and disconnecting?

good point (specially with the rotation of the port ...).
perhaps an automated search to find weak (old) client of bitcoin network that they mine, too ... to steal ?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on October 01, 2016, 10:49:29 PM
- money industry that it build money cash machine ... and include Bitcoin light client.
Why would they need so many light clients, hosted at the same place, constantly connecting and disconnecting?

- hedge fund research and developpement to move a high amount of coin to take many order in all exchange.
Not sure why they'd need some many light clients for what you're describing (not that I fully understand what you're trying to say).

not an attack after all ... probable test to evaluate the power of all (full) nodes to do a job with plenty of light (and useless ?) client.
This may very well be possible, although the agenda still may be malicious (end game). I do wonder why they need to do it for this long though.

If it was a test on the node strengths, they would've prewarned the people operating the nodes in tat region in order to tell them that there may be problems.
It is unusual that a cryptocurrency node may be affected in this way (as in it being DoSed).
I think that any normal activity wouldn't do this to a node as traffic would surely be redirected once the ports are full? Unless someone is launching many light nodes for something like connecting a large datacentre's individual miners using another person's node then there should not be this effecct on so many nodes in that region.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 02, 2016, 07:19:52 AM
perhaps an automated search to find weak (old) client of bitcoin network that they mine, too ... to steal ?
No, that doesn't work since it affects also new nodes and up to date nodes like my own. What are "weak clients"?

If it was a test on the node strengths, they would've prewarned the people operating the nodes in tat region in order to tell them that there may be problems.
In an optimal scenario, yes. However, if the final intent is malicious then I doubt that they'd warn someone.

It is unusual that a cryptocurrency node may be affected in this way (as in it being DoSed).
From what I could gather, currently they could only negatively affect nodes with a limited amount of connection.

I think that any normal activity wouldn't do this to a node as traffic would surely be redirected once the ports are full?
No, this is certainly not normal activity especially if you look at the number of nodes and their IPs. I guess implementing a 'activity' detection policy that flags nodes as suspicious wouldn't be a bad idea (would help detect some of these).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on October 02, 2016, 10:20:49 PM
perhaps an automated search to find weak (old) client of bitcoin network that they mine, too ... to steal ?
No, that doesn't work since it affects also new nodes and up to date nodes like my own. What are "weak clients"?

If it was a test on the node strengths, they would've prewarned the people operating the nodes in tat region in order to tell them that there may be problems.
In an optimal scenario, yes. However, if the final intent is malicious then I doubt that they'd warn someone.

It is unusual that a cryptocurrency node may be affected in this way (as in it being DoSed).
From what I could gather, currently they could only negatively affect nodes with a limited amount of connection.

I think that any normal activity wouldn't do this to a node as traffic would surely be redirected once the ports are full?
No, this is certainly not normal activity especially if you look at the number of nodes and their IPs. I guess implementing a 'activity' detection policy that flags nodes as suspicious wouldn't be a bad idea (would help detect some of these).

It'd be difficult to detect suspicious nodes as you'd have to use other nodes to do it and then something out to those other nodes to get them to block that IP?
So eventually, you could get a person that could hack the bitcoin network by blocking all of the IPs from one of the main nodes and significantly reduce the time it takes for a transaction to be added to the blockchain.

Also, doesn't everything have a "limited connection". I don't think nodes have several gigabits of bandwidth through them so they could face attacks trough that if there is a person with servers in a data centre doing nothing and tey just want to see what damage they could do with them then they could seriously harm your connections.
If it was a test on the network, there would've been some sort of warning (If it is a test with innocent intents, but it isn't).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 03, 2016, 05:32:39 AM
It'd be difficult to detect suspicious nodes as you'd have to use other nodes to do it and then something out to those other nodes to get them to block that IP?
Not necessarily. In this case, it was very reason to detect them because:
1) They used 3 connection slots per IP.
2) A lot of the nodes that suddenly appeared were from AWS.
3) They kept connecting and disconnecting.

So eventually, you could get a person that could hack the bitcoin network by blocking all of the IPs from one of the main nodes and significantly reduce the time it takes for a transaction to be added to the blockchain.
No, that's not what a 'hack'. There's no such thing as 'main nodes'; you may be talking about mining nodes?

Also, doesn't everything have a "limited connection".
That's not what I meant. Some nodes have a specified maximum number of connections that they're going to accept.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on October 03, 2016, 05:56:48 PM
It'd be difficult to detect suspicious nodes as you'd have to use other nodes to do it and then something out to those other nodes to get them to block that IP?
Not necessarily. In this case, it was very reason to detect them because:
1) They used 3 connection slots per IP.
2) A lot of the nodes that suddenly appeared were from AWS.
3) They kept connecting and disconnecting.

So eventually, you could get a person that could hack the bitcoin network by blocking all of the IPs from one of the main nodes and significantly reduce the time it takes for a transaction to be added to the blockchain.
No, that's not what a 'hack'. There's no such thing as 'main nodes'; you may be talking about mining nodes?

Also, doesn't everything have a "limited connection".
That's not what I meant. Some nodes have a specified maximum number of connections that they're going to accept.

I meant that if you ran a scheme to detect faulty nodes that continued to connect and disconnect then there'd be a hierarchy created between those nodes. Otherwise everyone would have the power to block nodes and destroy networks.
I didn't know that you can limit the number of connections at a time which is quite interesting...
Also, slightly off topic, but is is profitable to host a node?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: chek2fire on October 03, 2016, 06:00:27 PM
i have seen that this connections still active. In my node i had almost of 40 connections from bitcoinj with a range ip that begins from 50.*
The question is. Is that node malicious or are they simple nodes from android or mobile devices?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: belmonty on October 03, 2016, 08:50:43 PM
It's probably only a coincidence, but the source code for the “Mirai” botnet was released over the weekend at the same time these strange connections to the Bitcoin network started.

The “Mirai” botnet infects “Internet of Things” devices like security web cameras. It was used to launch the largest DDoS attack seen so far.

https://krebsonsecurity.com/2016/10/source-code-for-iot-botnet-mirai-released/

Quote
The source code that powers the “Internet of Things” (IoT) botnet responsible for launching the historically large distributed denial-of-service (DDoS) attack against KrebsOnSecurity last month has been publicly released, virtually guaranteeing that the Internet will soon be flooded with attacks from many new botnets powered by insecure routers, IP cameras, digital video recorders and other easily hackable devices.

The leak of the source code was announced Friday on the English-language hacking community Hackforums. The malware, dubbed “Mirai,” spreads to vulnerable devices by continuously scanning the Internet for IoT systems protected by factory default or hard-coded usernames and passwords.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 03, 2016, 09:12:30 PM
The question is. Is that node malicious or are they simple nodes from android or mobile devices?
No, they are definitely not genuine nodes. Why would someone set up, so many nodes that act suspiciously all at once? They just keep connecting and disconnecting for no particular reason. In addition to that, this is the secondary time that this happened in this very year (the first time was at the date of creation of this thread).

It's probably only a coincidence, but the source code for the “Mirai” botnet was released over the weekend at the same time these strange connections to the Bitcoin network started.
I don't think Botnet source code is responsible for this, especially since AWS is involved. As stated above, this isn't the first time that we're dealing with this (check the creation date of the thread).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on October 03, 2016, 09:24:12 PM
That's not what I meant. Some nodes have a specified maximum number of connections that they're going to accept.

this is a primary setting that all users (not advanced, but those who read wiki) must use because this setting can limit the amount of bandwidth (in upload) on the node .

this setting is a good point to allow a limited inrush demand but to cut the perpetual demand of the Bitcoin network.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on October 04, 2016, 08:29:08 PM
this is a primary setting that all users (not advanced, but those who read wiki) must use because this setting can limit the amount of bandwidth (in upload) on the node .

this setting is a good point to allow a limited inrush demand but to cut the perpetual demand of the Bitcoin network.
I disagree that this is the optimal settings for limiting bandwidth in a node. I've found that the average number of connections does not directly correlate with the amount of bandwidth that will be spent in a given month (e.g. month with average 40-60 vs. month with average 20-40 = marginal difference). I think I haven't limited by node connection-wise (default is 125 I believe), but have placed a software based upload speed limit. I think a better way of limiting is just using:
Quote
-maxuploadtarget=<MiB per day>
Even this isn't a fixed limit, although it should reduce the consumption once it has been met.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: shorena on November 27, 2016, 10:15:38 PM
Attacker moved to digital ocean. 3-4 SPV wallets per IP.

Code:
    "address": "138.68.10.138/32",
    "address": "138.197.194.32/32",
    "address": "138.197.195.32/32",
    "address": "138.197.195.52/32",
    "address": "138.197.197.50/32",
    "address": "138.197.197.108/32",
    "address": "138.197.197.132/32",
    "address": "138.197.197.152/32",
    "address": "138.197.197.164/32",
    "address": "138.197.197.174/32",
    "address": "138.197.197.179/32",
    "address": "138.197.198.120/32",
    "address": "138.197.201.197/32",
    "address": "138.197.203.66/32",
    "address": "138.197.203.86/32",


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on November 27, 2016, 10:32:03 PM
Attacker moved to digital ocean. 3-4 SPV wallets per IP.

-snip-
I did recently find a new set of IPs when restarting my node. However, any experienced user should be able to identify these due to them being very obvious. 3-4 wallets per IP is shady.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on November 28, 2016, 10:07:18 PM
not an attack after all ... probable test to evaluate the power of all (full) nodes to do a job with plenty of light (and useless ?) client.
This may very well be possible, although the agenda still may be malicious (end game). I do wonder why they need to do it for this long though.

Wouldn't there be a notification here or at least somewhere from one of the Bitcoin Developers or another party to state that they were going to "test the network"? Just starting to 'ping' servers constantly with information is not really something they wouldn't notify you about (especially as it could take them offline).

Attacker moved to digital ocean. 3-4 SPV wallets per IP.

-snip-
I did recently find a new set of IPs when restarting my node. However, any experienced user should be able to identify these due to them being very obvious. 3-4 wallets per IP is shady.
That definitely wouldn't be normal activity that caused that if multiple IPs all have multiple wallets.


At least now the 'hack' has ended and they've run out of money to support their scheme.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on November 28, 2016, 10:13:07 PM
Wouldn't there be a notification here or at least somewhere from one of the Bitcoin Developers or another party to state that they were going to "test the network"? Just starting to 'ping' servers constantly with information is not really something they wouldn't notify you about (especially as it could take them offline).
No. Anyone running tests does not have to notify others of such as the network is free to use.

That definitely wouldn't be normal activity that caused that if multiple IPs all have multiple wallets.
We are well aware that it is not normal activity.

At least now the 'hack' has ended and they've run out of money to support their scheme.
This is not hack, as it doesn't fit that definition. It has not stopped.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: chek2fire on November 29, 2016, 02:04:43 AM
i have create this for everyone that want to ban them from nodes

http://pastebin.com/1DP1Kdik


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on December 01, 2016, 07:38:39 PM
Update (11 days monitoring, port doesn't matter)
Less than 100 connexions is a false flag for me (liberate after 7 days in my Bitcoin Core BAN strategy).

Code:

129.13.252.47:60997 Hits = 10438
129.13.252.36:61000 Hits = 9594
52.205.213.45:60964 Hits = 2267
136.243.139.96:9996 Hits = 2078
45.33.65.130:60986 Hits = 890
37.34.48.17:60931 Hits = 558
52.210.89.26:60788 Hits = 498
52.32.80.148:60972 Hits = 497
52.76.95.246:60938 Hits = 495
104.236.95.174:60972 Hits = 493
52.18.56.236:60949 Hits = 493
52.62.33.159:60964 Hits = 492
148.251.151.71:60984 Hits = 476
178.62.20.190:60901 Hits = 418
52.70.130.28:60930 Hits = 375
50.7.71.172:60965 Hits = 257
52.192.180.114:60968 Hits = 249
54.94.211.146:60910 Hits = 247
50.7.47.93:60995 Hits = 246
52.29.215.16:61000 Hits = 245
52.74.14.245:60878 Hits = 245
54.186.75.87:60907 Hits = 169
131.114.88.218:60724 Hits = 168
52.39.120.87:9227 Hits = 129
106.187.49.47:60860 Hits = 127
146.57.248.225:60316 Hits = 105
197.231.221.211:9818 Hits = 67


Same list, ordered by IP range :

Code:

104.236.95.174:60972 Hits = 493
106.187.49.47:60860 Hits = 127
129.13.252.36:61000 Hits = 9594
129.13.252.47:60997 Hits = 10438
131.114.88.218:60724 Hits = 168
136.243.139.96:9996 Hits = 2078
146.57.248.225:60316 Hits = 105
148.251.151.71:60984 Hits = 476
178.62.20.190:60901 Hits = 418
197.231.221.211:9818 Hits = 67
37.34.48.17:60931 Hits = 558
45.33.65.130:60986 Hits = 890
50.7.47.93:60995 Hits = 246
50.7.71.172:60965 Hits = 257
52.18.56.236:60949 Hits = 493
52.192.180.114:60968 Hits = 249
52.205.213.45:60964 Hits = 2267
52.210.89.26:60788 Hits = 498
52.29.215.16:61000 Hits = 245
52.32.80.148:60972 Hits = 497
52.39.120.87:9227 Hits = 129
52.62.33.159:60964 Hits = 492
52.70.130.28:60930 Hits = 375
52.74.14.245:60878 Hits = 245
52.76.95.246:60938 Hits = 495
54.186.75.87:60907 Hits = 169
54.94.211.146:60910 Hits = 247



Title: Re: [Unknown] Attack on the Network in Progress
Post by: shorena on December 01, 2016, 08:49:19 PM
Update (11 days monitoring, port doesn't matter)
Less than 100 connexions is a false flag for me (liberate after 7 days in my Bitcoin Core BAN strategy).
-snip-

Whats a "hit" here?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on December 01, 2016, 09:14:21 PM
ban counter.
normal client don't hit so more ... after a ban.
less than 100 is normal over 11 days (~10 connexions every 24h).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: shorena on December 02, 2016, 08:46:20 AM
ban counter.

You banned 129.13.252.47 ~39 times per hour over 11 days? For what?

normal client don't hit so more ... after a ban.
less than 100 is normal over 11 days (~10 connexions every 24h).



Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on December 14, 2016, 04:37:07 PM
From 2016-12-09 to 2016-12-14.

Code:
129.13.252.36	HITS = 	4442
129.13.252.47 HITS = 4432
52.205.213.45 HITS = 1378
59.110.63.71 HITS = 965
136.243.139.96 HITS = 647
45.33.65.130 HITS = 326
148.251.151.71 HITS = 277
52.76.95.246 HITS = 249
52.192.180.114 HITS = 248
52.62.33.159 HITS = 247
197.231.221.211 HITS = 214
54.223.77.14 HITS = 198
50.7.71.172 HITS = 180
52.32.80.148 HITS = 175
52.70.130.28 HITS = 158
54.94.211.146 HITS = 135
37.34.48.17 HITS = 104
52.29.215.16 HITS = 84
106.187.49.47 HITS = 62
72.36.89.11 HITS = 56
46.63.26.63 HITS = 55

Same list, ordered by IP range :

Code:
106.187.49.47	HITS = 	62
129.13.252.36 HITS = 4442
129.13.252.47 HITS = 4432
136.243.139.96 HITS = 647
148.251.151.71 HITS = 277
197.231.221.211 HITS = 214
213.165.242.245 HITS = 49
37.34.48.17 HITS = 104
45.33.65.130 HITS = 326
45.55.45.119 HITS = 37
46.63.26.63 HITS = 55
47.222.206.109 HITS = 20
50.7.71.172 HITS = 180
52.192.180.114 HITS = 248
52.205.213.45 HITS = 1378
52.29.215.16 HITS = 84
52.32.80.148 HITS = 175
52.62.33.159 HITS = 247
52.70.130.28 HITS = 158
52.76.95.246 HITS = 249
54.186.75.87 HITS = 51
54.223.77.14 HITS = 198
54.94.211.146 HITS = 135
59.110.63.71 HITS = 965
72.36.89.11 HITS = 56


If you don't follow the rules of :

- client version
- disconnexion/connexion/reconnexion per day
- or use a port circular scanner (after a ban)
- or don't contribute at the Bitcoin network (blocks job)

You are in this lists.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on December 25, 2016, 08:13:04 PM
Winners of this week (5 days) :

Code:
59.110.63.71	Hits = 	2774
129.13.252.36 Hits = 1898
129.13.252.47 Hits = 1876
52.205.213.45 Hits = 822
136.243.139.96 Hits = 353
178.62.20.190 Hits = 265
50.7.71.172 Hits = 260
52.62.33.159 Hits = 246
54.94.211.146 Hits = 246
52.76.95.246 Hits = 245
139.162.96.165 Hits = 238
52.18.56.236 Hits = 237
45.33.65.130 Hits = 220
52.74.14.245 Hits = 218
148.251.151.71 Hits = 206
52.29.215.16 Hits = 198
52.70.130.28 Hits = 187
52.210.89.26 Hits = 179
52.32.80.148 Hits = 178
54.223.77.14 Hits = 159

Same list, Ordered by IP range :

Code:
129.13.252.36	Hits = 	1898
129.13.252.47 Hits = 1876
136.243.139.96 Hits = 353
139.162.96.165 Hits = 238
148.251.151.71 Hits = 206
178.62.20.190 Hits = 265
45.33.65.130 Hits = 220
50.7.71.172 Hits = 260
52.18.56.236 Hits = 237
52.205.213.45 Hits = 822
52.210.89.26 Hits = 179
52.29.215.16 Hits = 198
52.32.80.148 Hits = 178
52.62.33.159 Hits = 246
52.70.130.28 Hits = 187
52.74.14.245 Hits = 218
52.76.95.246 Hits = 245
54.223.77.14 Hits = 159
54.94.211.146 Hits = 246
59.110.63.71 Hits = 2774


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on December 25, 2016, 08:25:36 PM
-snip-
I have recently wiped my node clean (thus also the banlist), and those connections appeared within seconds of me booting up the node. They seem very persistent. The majority seems to have moved away from 52.x range into 100+.x something (my banlist is empty once again, thus I don't see the exact IPs right now) for me. They are fairly easy to spot for those using a GUI (e.g. 3-4 nodes per IP).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on January 08, 2017, 08:53:49 PM
From 2017-01-03 to 2017-01-08 :

Code:
129.13.252.36	HITS = 	2808
129.13.252.47 HITS = 1130
136.243.139.96 HITS = 697
139.162.96.165 HITS = 580
148.251.151.71 HITS = 377
50.7.71.172 HITS = 333
45.33.65.130 HITS = 302
52.18.56.236 HITS = 249
54.94.211.146 HITS = 248
52.76.95.246 HITS = 247
52.29.215.16 HITS = 245
52.192.180.114 HITS = 226
52.62.33.159 HITS = 207
178.62.20.190 HITS = 161
52.205.213.45 HITS = 144
72.36.89.11 HITS = 46

IP range ordered, same list :

Code:
129.13.252.36	HITS = 	2808
129.13.252.47 HITS = 1130
136.243.139.96 HITS = 697
139.162.96.165 HITS = 580
148.251.151.71 HITS = 377
178.62.20.190 HITS = 161
45.33.65.130 HITS = 302
50.7.71.172 HITS = 333
52.18.56.236 HITS = 249
52.192.180.114 HITS = 226
52.205.213.45 HITS = 144
52.29.215.16 HITS = 245
52.62.33.159 HITS = 207
52.76.95.246 HITS = 247
54.94.211.146 HITS = 248
72.36.89.11 HITS = 46


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on January 23, 2017, 08:08:50 PM
From 2017-01-14 to 2017-01-23 :

Code:
129.13.252.36	HITS = 	3158
129.13.252.47 HITS = 2173
136.243.139.96 HITS = 778
148.251.151.71 HITS = 649
139.162.96.165 HITS = 568
52.8.99.184 HITS = 537
46.101.246.115 HITS = 486
50.7.71.172 HITS = 453
72.36.89.11 HITS = 266
54.223.77.14 HITS = 242
52.70.130.28 HITS = 183
52.18.56.236 HITS = 182
52.62.33.159 HITS = 181
52.210.89.26 HITS = 180
52.29.215.16 HITS = 179
178.62.20.190 HITS = 178
37.34.48.17 HITS = 175
52.74.14.245 HITS = 149
104.196.107.156 HITS = 141
46.63.26.63 HITS = 91

Same list, IP Range ordered :

Code:
104.196.107.156	HITS = 	141
129.13.252.36 HITS = 3158
129.13.252.47 HITS = 2173
136.243.139.96 HITS = 778
139.162.96.165 HITS = 568
148.251.151.71 HITS = 649
178.62.20.190 HITS = 178
37.34.48.17 HITS = 175
46.101.246.115 HITS = 486
46.63.26.63 HITS = 91
50.7.71.172 HITS = 453
52.18.56.236 HITS = 182
52.210.89.26 HITS = 180
52.29.215.16 HITS = 179
52.62.33.159 HITS = 181
52.70.130.28 HITS = 183
52.74.14.245 HITS = 149
52.8.99.184 HITS = 537
54.223.77.14 HITS = 242
72.36.89.11 HITS = 266


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Holliday on February 24, 2017, 08:24:19 PM
I've been banning 12 or so of these connections every couple hours for the past several days. More pop up every time so far.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: PremiumCodeX on February 24, 2017, 09:24:54 PM
I find it interesting. I am interested in offensive security, but I have never met with such an attack before.

So, I wonder what uses does such an attack have?

What can the hacker achieve with this (technically, since we do not know his/her true motives anyway)?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on February 25, 2017, 12:52:12 AM
I was looking at information here (https://bitcoin.org/en/alert/2016-08-17-binary-safety).
Could this be leading to some of the problems here as this thread was started on May 2016 which would be about the time that that warning is relevant to.

(Also, it's good that we havne't seen too many nodes sutdown as a result of this and that there are just the IPs that are being blocked which is a fairly simple solution - although there's still no information as to who is preforming this attack and no information as to the purpose why)?

I find it interesting. I am interested in offensive security, but I have never met with such an attack before.

So, I wonder what uses does such an attack have?

What can the hacker achieve with this (technically, since we do not know his/her true motives anyway)?
I'm not entirely sure what the benefit of doing this is, pprobably to try to slow down the network (although it'd take a lot to do that).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: PremiumCodeX on March 01, 2017, 08:40:46 PM
I'm not entirely sure what the benefit of doing this is, pprobably to try to slow down the network (although it'd take a lot to do that).

I thought one of BTC network's benefits was being "resistant" to DDoS and similar kind of attacks. As you pointed out, it should take ALOT to slow it down even a bit. I do not think that is a realistic purpose at all. It is strange.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on March 05, 2017, 09:53:08 PM
I'm not entirely sure what the benefit of doing this is, pprobably to try to slow down the network (although it'd take a lot to do that).

I thought one of BTC network's benefits was being "resistant" to DDoS and similar kind of attacks. As you pointed out, it should take ALOT to slow it down even a bit. I do not think that is a realistic purpose at all. It is strange.

It isn't a useful attack. It's practically impossible to DoS the Bitcoin network. There will probably be quite a few people that run nodes on VPS services meaning that their IP can easily be chaned and IPs can te changed anyway (new nodes are also fairly simple to boot).
I'd think, a successful DoS of the bitcoin network would be several thousand GB/s of data transfer at least. This is practically impossible to equalise the network speed of all bitcoin nodes and be about 2x that to stop traffic which would still be unsuccessful as other traffic would still fit through or the network would go down shortly (but not the entire network).

Is the attack still running at full power?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on March 14, 2017, 06:46:35 PM
From 2017-03-10 to 2017-03-14 (yes, it's small ... but probes are busy after the 0.14.0)

Code:
129.13.252.47	Hits =	11809
129.13.252.36 Hits = 6677
[2a00:1398:4:2a00::a5] Hits = 2653
[2a00:1398:4:2a00::a1] Hits = 2315
46.101.246.115 Hits = 1165
136.243.139.96 Hits = 971
139.162.96.165 Hits = 717
37.34.48.17 Hits = 244
104.196.107.156 Hits = 233
54.94.211.146 Hits = 211
52.210.89.26 Hits = 197
52.76.95.246 Hits = 196
52.18.56.236 Hits = 194
54.223.77.14 Hits = 179
52.29.215.16 Hits = 129
52.70.130.28 Hits = 128
104.236.95.174 Hits = 94
52.192.180.114 Hits = 94
52.74.14.245 Hits = 61
88.147.58.140 Hits = 44
[2001:0:5ef5:79fd:304e:1543:fab0:b4fa] Hits = 43
46.63.26.63 Hits = 43
79.6.216.122 Hits = 40
72.36.89.11 Hits = 39
119.164.15.239 Hits = 23

Same list, IP Range ordered.

Code:
[2001:0:5ef5:79fd:304e:1543:fab0:b4fa]	Hits =	43
[2a00:1398:4:2a00::a1] Hits = 2315
[2a00:1398:4:2a00::a5] Hits = 2653
104.196.107.156 Hits = 233
104.236.95.174 Hits = 94
119.164.15.239 Hits = 23
129.13.252.36 Hits = 6677
129.13.252.47 Hits = 11809
136.243.139.96 Hits = 971
139.162.96.165 Hits = 717
37.34.48.17 Hits = 244
46.101.246.115 Hits = 1165
46.63.26.63 Hits = 43
52.18.56.236 Hits = 194
52.192.180.114 Hits = 94
52.210.89.26 Hits = 197
52.29.215.16 Hits = 129
52.70.130.28 Hits = 128
52.74.14.245 Hits = 61
52.76.95.246 Hits = 196
54.223.77.14 Hits = 179
54.94.211.146 Hits = 211
72.36.89.11 Hits = 39
79.6.216.122 Hits = 40
88.147.58.140 Hits = 44


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on March 25, 2017, 02:13:32 PM
From 2017-03-20 to 2017-03-24

Code:
129.13.252.36	Hits =	10917
129.13.252.47 Hits = 5399
46.101.246.115 Hits = 1585
136.243.139.96 Hits = 1578
[2a00:1398:4:2a00::a1] Hits = 1138
[2a00:1398:4:2a00::a5] Hits = 1040
139.162.96.165 Hits = 1026
37.34.48.17 Hits = 347
52.18.56.236 Hits = 335
54.94.211.146 Hits = 248
52.74.14.245 Hits = 247
52.70.130.28 Hits = 246
52.8.99.184 Hits = 246
104.196.107.156 Hits = 244
54.223.77.14 Hits = 231
52.192.180.114 Hits = 229
104.236.95.174 Hits = 193
52.76.95.246 Hits = 153
52.210.89.26 Hits = 123
[2a02:348:86:3011::1] Hits = 100
52.32.80.148 Hits = 78
72.36.89.11 Hits = 69
94.21.45.130 Hits = 69
46.63.26.63 Hits = 59
72.2.237.42 Hits = 29
52.29.215.16 Hits = 26
5.189.177.237 Hits = 19
[2001:0:9d38:90d7:3c5f:18c1:2a45:5592] Hits = 18

Same list, IP Range ordered.

Code:
[2001:0:9d38:90d7:3c5f:18c1:2a45:5592]	Hits =	18
[2a00:1398:4:2a00::a1] Hits = 1138
[2a00:1398:4:2a00::a5] Hits = 1040
[2a02:348:86:3011::1] Hits = 100
104.196.107.156 Hits = 244
104.236.95.174 Hits = 193
129.13.252.36 Hits = 10917
129.13.252.47 Hits = 5399
136.243.139.96 Hits = 1578
139.162.96.165 Hits = 1026
37.34.48.17 Hits = 347
46.101.246.115 Hits = 1585
46.63.26.63 Hits = 59
5.189.177.237 Hits = 19
52.18.56.236 Hits = 335
52.192.180.114 Hits = 229
52.210.89.26 Hits = 123
52.29.215.16 Hits = 26
52.32.80.148 Hits = 78
52.70.130.28 Hits = 246
52.74.14.245 Hits = 247
52.76.95.246 Hits = 153
52.8.99.184 Hits = 246
54.223.77.14 Hits = 231
54.94.211.146 Hits = 248
72.2.237.42 Hits = 29
72.36.89.11 Hits = 69
94.21.45.130 Hits = 69


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Shiroslullaby on March 25, 2017, 03:46:08 PM
Re-reading this thread as it is very interesting. 
Wondering what the motivation for this person is.
Is this someone who thinks they are causing damage? Prepping/ testing for a larger attack? An accident? 


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on March 30, 2017, 03:24:34 PM
Samples in situation.

http://imagizer.imageshack.us/a/img923/6150/QtorfO.png
+++
http://imagizer.imageshack.us/a/img924/320/hAcKal.png
+++
http://imagizer.imageshack.us/a/img923/9471/NN76eK.png
+++
http://imagizer.imageshack.us/a/img922/2038/17mU0X.png

The bitcoin developers have taken this thread into account because multi-client bitcoinj attacks of the same IP are now filtered.

That is why I continue to report, here, a follow-up.

+++

On early stage of somes P2P network, this "busing" job have been eradicate by apply a notation on IP (like if you try 3 times per minute = ban for 15min + if you re-try this after 2 minutes = ban for 1h, max ban time = 24h).

very usefull for filtering no-ordinary client that push all ports every 5 seconds ...
Original clients try 2 times (with 2 random port no followed) and search an other node (good boy !).


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on April 04, 2017, 05:41:00 PM
From 2017-03-31 to 2017-04-04

Code:
47.90.4.203			Hits =	9260
59.110.63.71 Hits = 5184
129.13.252.36 Hits = 4806
129.13.252.47 Hits = 3907
136.243.139.96 Hits = 1399
46.101.246.115 Hits = 1348
139.162.96.165 Hits = 987
[2a03:b0c0:3:d0::5c9:4001] Hits = 931
[2a00:1398:4:2a00::a1] Hits = 889
120.55.171.74 Hits = 845
[2a00:1398:4:2a00::a5] Hits = 666
188.65.213.21 Hits = 379
52.76.95.246 Hits = 248
52.8.99.184 Hits = 247
54.94.211.146 Hits = 247
45.32.130.19 Hits = 204
104.196.107.156 Hits = 199
52.210.89.26 Hits = 160
52.192.180.114 Hits = 129
54.223.77.14 Hits = 125
52.18.56.236 Hits = 119

Same list, IP range ordered.

Code:
[2a00:1398:4:2a00::a1]		Hits =	889
[2a00:1398:4:2a00::a5] Hits = 666
[2a03:b0c0:3:d0::5c9:4001] Hits = 931
104.196.107.156 Hits = 199
120.55.171.74 Hits = 845
129.13.252.36 Hits = 4806
129.13.252.47 Hits = 3907
136.243.139.96 Hits = 1399
139.162.96.165 Hits = 987
188.65.213.21 Hits = 379
45.32.130.19 Hits = 204
46.101.246.115 Hits = 1348
47.90.4.203 Hits = 9260
52.18.56.236 Hits = 119
52.192.180.114 Hits = 129
52.210.89.26 Hits = 160
52.76.95.246 Hits = 248
52.8.99.184 Hits = 247
54.223.77.14 Hits = 125
54.94.211.146 Hits = 247
59.110.63.71 Hits = 5184


Title: Re: [Unknown] Attack on the Network in Progress
Post by: andrew24p on April 04, 2017, 09:11:59 PM
Someone has been attacking the mempool for years to push their bigger block agenda, which is why we see so many small transactions in cycles.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: countryfree on April 04, 2017, 09:35:23 PM
We've all seen that BTC is getting more and more centralized, and I wonder if the people behind this attack could be trying to push even further into that direction. There are still some lonely individuals running a node at their home, and the attacker may want to make this next to impossible, as running a node should now command close and regular monitoring. So only large teams, or mining farms (from some large eastern country), with staff on guard would be able to run nodes efficiently. See what I mean?

Does that make sense?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: shorena on April 22, 2017, 06:23:16 AM
We've all seen that BTC is getting more and more centralized, and I wonder if the people behind this attack could be trying to push even further into that direction. There are still some lonely individuals running a node at their home, and the attacker may want to make this next to impossible, as running a node should now command close and regular monitoring. So only large teams, or mining farms (from some large eastern country), with staff on guard would be able to run nodes efficiently. See what I mean?

Does that make sense?

No, this attack is not strong enough to impact a node. It will not saturate connection slots and I suspect home run nodes to change IP-Addresses more frequently thus further limiting the impact of the attack. I had these connections on my home run node, but I wouldnt have noticed them there.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: bitbunnny on April 22, 2017, 03:09:44 PM
We've all seen that BTC is getting more and more centralized, and I wonder if the people behind this attack could be trying to push even further into that direction. There are still some lonely individuals running a node at their home, and the attacker may want to make this next to impossible, as running a node should now command close and regular monitoring. So only large teams, or mining farms (from some large eastern country), with staff on guard would be able to run nodes efficiently. See what I mean?

Does that make sense?

It could make sense if it's true that there sre some interest groups or individuals who would like to see Bitcoin fully centralized because that would mean the control and power. In their hands, of course. But what confuses me is the question if this is realy possible, could happen that bi becomes centralized?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: shorena on April 23, 2017, 07:49:30 AM
We've all seen that BTC is getting more and more centralized, and I wonder if the people behind this attack could be trying to push even further into that direction. There are still some lonely individuals running a node at their home, and the attacker may want to make this next to impossible, as running a node should now command close and regular monitoring. So only large teams, or mining farms (from some large eastern country), with staff on guard would be able to run nodes efficiently. See what I mean?

Does that make sense?

It could make sense if it's true that there sre some interest groups or individuals who would like to see Bitcoin fully centralized because that would mean the control and power. In their hands, of course. But what confuses me is the question if this is realy possible, could happen that bi becomes centralized?

Yes, Bitcoin could become centalized if its no longer feasible or affordable for "normal" people to run full nodes. This attack however is not strong enough to do so and even if it was in its strongest possible form (fully saturating all connection slots of a given target) it would have a different effect. This is a very weak sybil/(D)DoS attack. Once detected there is no need for "staff on guard" as countryfree puts it, you just ban the IP addresses of the attacker and your node goes back to normal business.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on May 08, 2017, 01:04:57 PM
From 2017-04-27 to 2017-05-08 (12 days)

Code:
129.13.252.47	Hits =	11562
129.13.252.36 Hits = 9182
188.65.213.21 Hits = 5614
46.101.246.115 Hits = 4212
136.243.139.96 Hits = 3948
139.162.96.165 Hits = 3295
[2a03:b0c0:3:d0::5c9:4001] Hits = 2665
[2a00:1398:4:2a00::a5] Hits = 1303
[2a00:1398:4:2a00::a1] Hits = 1045
104.196.107.156 Hits = 730
54.223.77.14 Hits = 696
52.29.215.16 Hits = 690
52.70.130.28 Hits = 636
52.76.95.246 Hits = 581
52.74.14.245 Hits = 531
104.236.95.174 Hits = 522
192.99.19.37 Hits = 518
54.94.211.146 Hits = 494
52.192.180.114 Hits = 479
52.210.89.26 Hits = 470
[2604:a880:800:10::7ee:5001] Hits = 459
52.18.56.236 Hits = 421
52.8.99.184 Hits = 391
52.62.33.159 Hits = 341
72.36.89.11 Hits = 272
[2001:0:9d38:90d7:ac:3a9c:fab0:b4fa] Hits = 269
[2001:19f0:ac01:2fb:5400:ff:fe5b:c3ff] Hits = 246
52.32.80.148 Hits = 218
46.63.26.63 Hits = 162
131.114.88.218 Hits = 137
202.170.57.251 Hits = 111
5.189.177.237 Hits = 99
90.126.106.129 Hits = 53
109.252.107.129 Hits = 45
84.9.11.75 Hits = 40
124.65.117.206 Hits = 34
14.3.29.141 Hits = 33
190.88.224.137 Hits = 27
86.175.16.118 Hits = 22
49.159.52.156 Hits = 20
45.16.139.115 Hits = 18

Same list, IP Range ordered :

Code:
[2001:0:9d38:90d7:ac:3a9c:fab0:b4fa]	Hits =	269
[2001:19f0:ac01:2fb:5400:ff:fe5b:c3ff] Hits = 246
[2604:a880:800:10::7ee:5001] Hits = 459
[2a00:1398:4:2a00::a1] Hits = 1045
[2a00:1398:4:2a00::a5] Hits = 1303
[2a03:b0c0:3:d0::5c9:4001] Hits = 2665
104.196.107.156 Hits = 730
104.236.95.174 Hits = 522
109.252.107.129 Hits = 45
124.65.117.206 Hits = 34
129.13.252.36 Hits = 9182
129.13.252.47 Hits = 11562
131.114.88.218 Hits = 137
136.243.139.96 Hits = 3948
139.162.96.165 Hits = 3295
14.3.29.141 Hits = 33
188.65.213.21 Hits = 5614
190.88.224.137 Hits = 27
192.99.19.37 Hits = 518
202.170.57.251 Hits = 111
45.16.139.115 Hits = 18
46.101.246.115 Hits = 4212
46.63.26.63 Hits = 162
49.159.52.156 Hits = 20
5.189.177.237 Hits = 99
52.18.56.236 Hits = 421
52.192.180.114 Hits = 479
52.210.89.26 Hits = 470
52.29.215.16 Hits = 690
52.32.80.148 Hits = 218
52.62.33.159 Hits = 341
52.70.130.28 Hits = 636
52.74.14.245 Hits = 531
52.76.95.246 Hits = 581
52.8.99.184 Hits = 391
54.223.77.14 Hits = 696
54.94.211.146 Hits = 494
72.36.89.11 Hits = 272
84.9.11.75 Hits = 40
86.175.16.118 Hits = 22
90.126.106.129 Hits = 53


Title: Re: [Unknown] Attack on the Network in Progress
Post by: The One on May 08, 2017, 03:58:07 PM
You guys must be unpopular to get attacks... i don't get any  ::) ;D


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on May 08, 2017, 04:29:20 PM
are you read debug.log and ban randomly client (to find) ?
no ? so, you don't see the whole network ...

not a problem for me.
just a normal study of the situation.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Hydrogen on May 08, 2017, 08:26:45 PM
Is there a way to know if only non BU nodes are being attacked?

It would seem BU has the most to gain from this given they haven't managed to fix their node drop bug .


Title: Re: [Unknown] Attack on the Network in Progress
Post by: btcney on May 08, 2017, 09:36:41 PM
Is there a way to know if only non BU nodes are being attacked?

It would seem BU has the most to gain from this given they haven't managed to fix their node drop bug .

Do you think that BU is actually trying to attack the bitcoin network? I'm a little confused as to what the attack in this threads purpose even is.
I still have learning to do regarding deeper levels of bitcoin opposed to just knowing how to buy and sell... I hope this attack gets wiped, and whoever founded it, be it BU or anyone else gets found out and we somehow find a solution to keep them from being able to do it again. If it is bitcoin unlimited does that mean they really are trying to turn bitcoin towards there individual goals and ruin bitcoin for everyone else? I dislike the idea of any exclusive group getting to be at the top of bitcoin.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Hydrogen on May 08, 2017, 09:47:49 PM
Do you think that BU is actually trying to attack the bitcoin network? I'm a little confused as to what the attack in this threads purpose even is.
I still have learning to do regarding deeper levels of bitcoin opposed to just knowing how to buy and sell... I hope this attack gets wiped, and whoever founded it, be it BU or anyone else gets found out and we somehow find a solution to keep them from being able to do it again. If it is bitcoin unlimited does that mean they really are trying to turn bitcoin towards there individual goals and ruin bitcoin for everyone else? I dislike the idea of any exclusive group getting to be at the top of bitcoin.

BU claims they can fix these attacks with larger blocks. They could gain from these attacks. Another possibility is the network attack is used to manipulate the market, push btc price down so people can buy lower & profit.

If only core and segwit nodes were being attacked, that could be evidence BU was behind this.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Harry Callahan on May 08, 2017, 10:05:47 PM
Do you think that BU is actually trying to attack the bitcoin network? I'm a little confused as to what the attack in this threads purpose even is.
I still have learning to do regarding deeper levels of bitcoin opposed to just knowing how to buy and sell... I hope this attack gets wiped, and whoever founded it, be it BU or anyone else gets found out and we somehow find a solution to keep them from being able to do it again. If it is bitcoin unlimited does that mean they really are trying to turn bitcoin towards there individual goals and ruin bitcoin for everyone else? I dislike the idea of any exclusive group getting to be at the top of bitcoin.
BU claims they can fix these attacks with larger blocks. They could gain from these attacks. Another possibility is the network attack is used to manipulate the market, push btc price down so people can buy lower & profit.
If only core and segwit nodes were being attacked, that could be evidence BU was behind this.
You really cannot come to a conclusion just like that,i am not sure about the reasons for these sort of attacks but one thing is sure that it could drive the price of bitcoin really low and the network is really not capable to withstand these attacks in the fist place as it will clog the entire network,greed is driving people to do these kind of silly activities,so it might be the involvement of any government to create uncertainty in bitcoin.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on July 07, 2017, 05:42:27 PM
From 2017-06-18 to 2017-07-07.
New method to survey (less noise, less arbitrary ban).

Code:
129.13.252.36
129.13.252.47

136.243.139.120
145.132.191.135
162.250.221.238

173.255.251.118
176.104.14.35
178.255.153.166

188.163.74.12
188.65.213.21

2001:0:5ef5:79fb:147c:1e50:6b00:9ebf

202.108.211.56
213.220.247.85
24.18.147.55

2607:5300:60:1bd1::1
2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2a03:b0c0:3:d0::5c9:4001

37.15.117.117

45.33.65.130
47.90.4.203
47.93.23.68

50.66.58.222

73.222.196.104
74.132.27.118
79.169.200.81

83.169.228.178
84.242.74.251

93.75.30.249
98.221.120.90


Title: Re: [Unknown] Attack on the Network in Progress
Post by: zx9r on August 02, 2017, 12:55:10 AM
My bitcoin node is receiving connections from

2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2001:0:4137:9e76:2877:25aa:51c2

on port 8333

I dont understand how I am receiving this connections because I have port 8333 closed in my ADSL router.
I have tested from https://bitnodes.21.co/ to check my node and it says it is not available, which is correct as I say the port is closed in the router.

So, how can my node be reachable by those addresses at port 8333 ? May be because IPv6 and an error in my router ?

PS: in case it helps: user-agent for that connections is Satoshi:0.9.99


Title: Re: [Unknown] Attack on the Network in Progress
Post by: zx9r on August 02, 2017, 01:11:19 AM
I have just read it can be something related to Teredo tunneling: https://en.wikipedia.org/wiki/Teredo_tunneling

Can this compromise my node ?


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on August 10, 2017, 01:05:12 PM
From 2017-07-08 to 2017-08-10.

Code:
100.35.27.249
106.117.151.89
106.186.31.140
106.75.146.143
115.132.248.36

121.86.50.33
128.8.124.7
129.13.252.36
129.13.252.47

136.243.139.120
136.243.139.96
142.105.252.237
145.132.191.135
146.120.56.238

162.250.221.238
170.79.45.59
173.212.193.11
173.245.203.184
173.255.251.118
176.104.14.35
178.255.153.166

184.207.138.127
184.98.248.101
185.59.58.157
187.65.144.146
188.163.74.12
188.37.67.242
188.65.213.21

195.91.160.170
198.48.223.50

2001:0:5ef5:79fb:147c:1e50:6b00:9ebf
202.108.211.56
203.220.88.53
205.251.22.236
212.159.113.138
213.220.247.85
213.55.211.9
217.61.217.125
218.226.212.4
218.87.96.161
222.93.10.16

24.119.224.62
24.18.147.55

2607:5300:60:1bd1::1
2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2a03:b0c0:3:d0::5c9:4001

31.223.227.198
35.187.187.248
35.189.230.22
37.135.34.116
37.15.117.117
37.201.240.133

45.33.65.130
46.101.246.115
47.90.4.203
47.93.23.68
49.84.247.96
50.66.58.222

62.47.222.32
62.87.203.34
70.30.104.212
72.36.89.11
73.222.196.104
74.132.27.118
78.146.56.214
78.146.56.214
78.46.79.17
79.169.200.81

80.100.203.151
81.111.144.79
81.171.56.134
83.161.249.125
83.169.228.178
83.243.39.142
84.23.44.69
84.242.74.251
87.120.1.28
87.214.171.55

93.75.30.249
95.29.41.93
98.221.120.90


Title: Re: [Unknown] Attack on the Network in Progress
Post by: jackg on August 30, 2017, 03:45:02 PM
My bitcoin node is receiving connections from

2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2001:0:4137:9e76:2877:25aa:51c2

on port 8333

I dont understand how I am receiving this connections because I have port 8333 closed in my ADSL router.
I have tested from https://bitnodes.21.co/ to check my node and it says it is not available, which is correct as I say the port is closed in the router.

So, how can my node be reachable by those addresses at port 8333 ? May be because IPv6 and an error in my router ?

PS: in case it helps: user-agent for that connections is Satoshi:0.9.99

Maybe these connections are going through a different port into your node.

If you want me to, if you send me your IP (via PM) I'll test your 8333 port to check nothing is live through it. If you don't want to share your IP then that's fine also.


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Meuh6879 on September 19, 2017, 07:03:03 PM
From 2017-09-01 to 2017-09-19

Code:
100.35.27.249
104.128.94.12
104.155.122.212
106.117.151.89
106.186.31.140
106.75.146.143
109.225.25.187

115.132.248.36
118.93.103.208
121.86.50.33
128.70.191.84
128.8.124.7
129.13.252.36
129.13.252.47

136.243.139.120
136.243.139.96
142.105.252.237
145.132.191.135
146.120.56.238
146.60.38.249
159.224.90.59
162.250.221.238
170.79.45.59
173.212.193.11
173.245.203.184
173.255.251.118
176.104.14.35
178.255.153.166

181.59.126.46
184.207.138.127
184.98.248.101
185.59.58.157
187.65.144.146
187.75.50.120
188.163.74.12
188.192.250.36
188.234.228.62
188.37.67.242
188.65.213.21

195.91.160.170
198.48.223.50
200.0.51.232
200.114.199.78
2001:0:5ef5:79fb:147c:1e50:6b00:9ebf
202.108.211.56
203.220.88.53
203.3.109.194
205.251.22.236

212.108.43.57
212.159.113.138
213.220.247.85
213.55.211.9
216.19.183.58
217.61.217.125
218.226.212.4
218.87.96.161
222.93.10.16

24.119.224.62
24.18.147.55

2607:5300:60:1bd1::1
2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2a03:b0c0:3:d0::5c9:4001

31.223.227.198
31.36.66.102
35.187.187.248
35.189.230.22
37.135.34.116
37.15.117.117
37.201.240.133
37.229.201.178

45.33.65.130
46.101.246.115
47.223.222.114
47.89.252.244
47.90.4.203
47.93.23.68
49.84.247.96

5.165.16.34
50.66.58.222

60.175.104.134
62.47.222.32
62.87.203.34
69.84.31.75

70.30.104.212
71.84.104.6
72.36.89.11
73.222.196.104
74.132.27.118
74.207.240.152
76.254.56.180
78.106.11.204
78.146.56.214
78.46.79.17
78.99.22.173
79.169.200.81
79.73.36.52

80.100.203.151
81.111.144.79
81.171.56.134
83.161.249.125
83.169.228.178
83.243.39.142
84.23.44.69
84.242.74.251
84.29.73.246
87.120.1.28
87.214.171.55

91.106.149.46
91.78.240.152
93.202.6.16
93.219.134.103
93.75.30.249
94.100.213.84
94.103.228.161
95.29.41.93
98.221.120.90

http://imagizer.imageshack.us/a/img922/1346/qV14WM.gif


Title: Re: [Unknown] Attack on the Network in Progress
Post by: Lauda on November 07, 2017, 10:17:36 AM
Here are two new banlists that bans spy nodes as well as S2X attack clusters on AWS & co.:
GUI:
Code:
setban 101.201.53.37 add 31557600
setban 103.3.61.48 add 31557600
setban 104.154.111.175 add 31557600
setban 104.222.22.161 add 31557600
setban 114.55.29.227 add 31557600
setban 119.9.116.68 add 31557600
setban 120.24.37.119 add 31557600
setban 120.55.171.74 add 31557600
setban 128.8.124.7 add 31557600
setban 129.13.252.36 add 31557600
setban 129.13.252.47 add 31557600
setban 131.114.88.218 add 31557600
setban 13.59.128.171 add 31557600
setban 13.59.180.243 add 31557600
setban 136.243.139.120 add 31557600
setban 138.197.194.32 add 31557600
setban 138.197.195.32 add 31557600
setban 138.197.195.52 add 31557600
setban 138.197.197.108 add 31557600
setban 138.197.197.132 add 31557600
setban 138.197.197.152 add 31557600
setban 138.197.197.164 add 31557600
setban 138.197.197.174 add 31557600
setban 138.197.197.179 add 31557600
setban 138.197.197.50 add 31557600
setban 138.197.198.120 add 31557600
setban 138.197.201.197 add 31557600
setban 138.197.203.66 add 31557600
setban 138.197.203.86 add 31557600
setban 138.197.211.234 add 31557600
setban 138.201.18.26 add 31557600
setban 138.68.10.138 add 31557600
setban 139.162.96.165 add 31557600
setban 148.251.151.71 add 31557600
setban 159.203.59.209 add 31557600
setban 171.100.25.191 add 31557600
setban 173.232.228.146 add 31557600
setban 174.129.116.81 add 31557600
setban 180.173.203.229 add 31557600
setban 185.185.41.6 add 31557600
setban 188.116.17.178 add 31557600
setban 188.116.56.84 add 31557600
setban 188.195.105.36 add 31557600
setban 188.65.213.21 add 31557600
setban 190.147.110.61 add 31557600
setban 190.88.224.236 add 31557600
setban 190.88.227.234 add 31557600
setban 190.88.231.42 add 31557600
setban 192.99.69.179 add 31557600
setban 194.230.155.245 add 31557600
setban 198.211.117.235 add 31557600
setban 202.108.211.56 add 31557600
setban 204.236.202.17 add 31557600
setban 205.251.22.236 add 31557600
setban 205.251.85.156 add 31557600
setban 205.251.85.157 add 31557600
setban 223.220.112.31 add 31557600
setban 24.108.150.215 add 31557600
setban 24.184.39.126 add 31557600
setban 24.48.79.56 add 31557600
setban 31.146.211.3 add 31557600
setban 34.209.138.25 add 31557600
setban 34.212.140.4 add 31557600
setban 34.231.206.193 add 31557600
setban 35.187.10.3 add 31557600
setban 35.189.224.29 add 31557600
setban 35.189.241.70 add 31557600
setban 35.196.46.145 add 31557600
setban 45.32.117.240 add 31557600
setban 45.33.65.130 add 31557600
setban 45.33.95.186 add 31557600
setban 46.101.160.168 add 31557600
setban 46.166.175.44 add 31557600
setban 46.63.26.63 add 31557600
setban 47.52.41.23 add 31557600
setban 47.88.49.242 add 31557600
setban 47.88.57.29 add 31557600
setban 47.89.179.74 add 31557600
setban 47.90.4.203 add 31557600
setban 47.90.97.52 add 31557600
setban 47.91.74.77 add 31557600
setban 47.91.77.119 add 31557600
setban 47.91.89.32 add 31557600
setban 47.93.173.17 add 31557600
setban 47.95.213.15 add 31557600
setban 52.14.135.10 add 31557600
setban 52.72.52.99 add 31557600
setban 54.166.177.141 add 31557600
setban 54.200.90.164 add 31557600
setban 54.201.12.166 add 31557600
setban 54.218.119.167 add 31557600
setban 54.223.136.62 add 31557600
setban 54.245.51.127 add 31557600
setban 54.252.134.21 add 31557600
setban 54.252.238.189 add 31557600
setban 59.110.63.71 add 31557600
setban 64.137.146.240 add 31557600
setban 66.177.77.213 add 31557600
setban 71.171.127.198 add 31557600
setban 72.36.89.11 add 31557600
setban 73.218.245.30 add 31557600
setban 74.124.33.10 add 31557600
setban 79.138.134.192 add 31557600
setban 80.92.178.116 add 31557600
setban 82.130.103.18 add 31557600
setban 85.180.177.90 add 31557600
setban 86.120.188.134 add 31557600
setban 94.16.71.71 add 31557600
setban 94.16.73.112 add 31557600
setban 99.237.228.185 add 31557600

CLI:
Code:
./bitcoin-cli setban 101.201.53.37 add 31557600
./bitcoin-cli setban 103.3.61.48 add 31557600
./bitcoin-cli setban 104.154.111.175 add 31557600
./bitcoin-cli setban 104.222.22.161 add 31557600
./bitcoin-cli setban 114.55.29.227 add 31557600
./bitcoin-cli setban 119.9.116.68 add 31557600
./bitcoin-cli setban 120.24.37.119 add 31557600
./bitcoin-cli setban 120.55.171.74 add 31557600
./bitcoin-cli setban 128.8.124.7 add 31557600
./bitcoin-cli setban 129.13.252.36 add 31557600
./bitcoin-cli setban 129.13.252.47 add 31557600
./bitcoin-cli setban 131.114.88.218 add 31557600
./bitcoin-cli setban 13.59.128.171 add 31557600
./bitcoin-cli setban 13.59.180.243 add 31557600
./bitcoin-cli setban 136.243.139.120 add 31557600
./bitcoin-cli setban 138.197.194.32 add 31557600
./bitcoin-cli setban 138.197.195.32 add 31557600
./bitcoin-cli setban 138.197.195.52 add 31557600
./bitcoin-cli setban 138.197.197.108 add 31557600
./bitcoin-cli setban 138.197.197.132 add 31557600
./bitcoin-cli setban 138.197.197.152 add 31557600
./bitcoin-cli setban 138.197.197.164 add 31557600
./bitcoin-cli setban 138.197.197.174 add 31557600
./bitcoin-cli setban 138.197.197.179 add 31557600
./bitcoin-cli setban 138.197.197.50 add 31557600
./bitcoin-cli setban 138.197.198.120 add 31557600
./bitcoin-cli setban 138.197.201.197 add 31557600
./bitcoin-cli setban 138.197.203.66 add 31557600
./bitcoin-cli setban 138.197.203.86 add 31557600
./bitcoin-cli setban 138.197.211.234 add 31557600
./bitcoin-cli setban 138.201.18.26 add 31557600
./bitcoin-cli setban 138.68.10.138 add 31557600
./bitcoin-cli setban 139.162.96.165 add 31557600
./bitcoin-cli setban 148.251.151.71 add 31557600
./bitcoin-cli setban 159.203.59.209 add 31557600
./bitcoin-cli setban 171.100.25.191 add 31557600
./bitcoin-cli setban 173.232.228.146 add 31557600
./bitcoin-cli setban 174.129.116.81 add 31557600
./bitcoin-cli setban 180.173.203.229 add 31557600
./bitcoin-cli setban 185.185.41.6 add 31557600
./bitcoin-cli setban 188.116.17.178 add 31557600
./bitcoin-cli setban 188.116.56.84 add 31557600
./bitcoin-cli setban 188.195.105.36 add 31557600
./bitcoin-cli setban 188.65.213.21 add 31557600
./bitcoin-cli setban 190.147.110.61 add 31557600
./bitcoin-cli setban 190.88.224.236 add 31557600
./bitcoin-cli setban 190.88.227.234 add 31557600
./bitcoin-cli setban 190.88.231.42 add 31557600
./bitcoin-cli setban 192.99.69.179 add 31557600
./bitcoin-cli setban 194.230.155.245 add 31557600
./bitcoin-cli setban 198.211.117.235 add 31557600
./bitcoin-cli setban 202.108.211.56 add 31557600
./bitcoin-cli setban 204.236.202.17 add 31557600
./bitcoin-cli setban 205.251.22.236 add 31557600
./bitcoin-cli setban 205.251.85.156 add 31557600
./bitcoin-cli setban 205.251.85.157 add 31557600
./bitcoin-cli setban 223.220.112.31 add 31557600
./bitcoin-cli setban 24.108.150.215 add 31557600
./bitcoin-cli setban 24.184.39.126 add 31557600
./bitcoin-cli setban 24.48.79.56 add 31557600
./bitcoin-cli setban 31.146.211.3 add 31557600
./bitcoin-cli setban 34.209.138.25 add 31557600
./bitcoin-cli setban 34.212.140.4 add 31557600
./bitcoin-cli setban 34.231.206.193 add 31557600
./bitcoin-cli setban 35.187.10.3 add 31557600
./bitcoin-cli setban 35.189.224.29 add 31557600
./bitcoin-cli setban 35.189.241.70 add 31557600
./bitcoin-cli setban 35.196.46.145 add 31557600
./bitcoin-cli setban 45.32.117.240 add 31557600
./bitcoin-cli setban 45.33.65.130 add 31557600
./bitcoin-cli setban 45.33.95.186 add 31557600
./bitcoin-cli setban 46.101.160.168 add 31557600
./bitcoin-cli setban 46.166.175.44 add 31557600
./bitcoin-cli setban 46.63.26.63 add 31557600
./bitcoin-cli setban 47.52.41.23 add 31557600
./bitcoin-cli setban 47.88.49.242 add 31557600
./bitcoin-cli setban 47.88.57.29 add 31557600
./bitcoin-cli setban 47.89.179.74 add 31557600
./bitcoin-cli setban 47.90.4.203 add 31557600
./bitcoin-cli setban 47.90.97.52 add 31557600
./bitcoin-cli setban 47.91.74.77 add 31557600
./bitcoin-cli setban 47.91.77.119 add 31557600
./bitcoin-cli setban 47.91.89.32 add 31557600
./bitcoin-cli setban 47.93.173.17 add 31557600
./bitcoin-cli setban 47.95.213.15 add 31557600
./bitcoin-cli setban 52.14.135.10 add 31557600
./bitcoin-cli setban 52.72.52.99 add 31557600
./bitcoin-cli setban 54.166.177.141 add 31557600
./bitcoin-cli setban 54.200.90.164 add 31557600
./bitcoin-cli setban 54.201.12.166 add 31557600
./bitcoin-cli setban 54.218.119.167 add 31557600
./bitcoin-cli setban 54.223.136.62 add 31557600
./bitcoin-cli setban 54.245.51.127 add 31557600
./bitcoin-cli setban 54.252.134.21 add 31557600
./bitcoin-cli setban 54.252.238.189 add 31557600
./bitcoin-cli setban 59.110.63.71 add 31557600
./bitcoin-cli setban 64.137.146.240 add 31557600
./bitcoin-cli setban 66.177.77.213 add 31557600
./bitcoin-cli setban 71.171.127.198 add 31557600
./bitcoin-cli setban 72.36.89.11 add 31557600
./bitcoin-cli setban 73.218.245.30 add 31557600
./bitcoin-cli setban 74.124.33.10 add 31557600
./bitcoin-cli setban 79.138.134.192 add 31557600
./bitcoin-cli setban 80.92.178.116 add 31557600
./bitcoin-cli setban 82.130.103.18 add 31557600
./bitcoin-cli setban 85.180.177.90 add 31557600
./bitcoin-cli setban 86.120.188.134 add 31557600
./bitcoin-cli setban 94.16.71.71 add 31557600
./bitcoin-cli setban 94.16.73.112 add 31557600
./bitcoin-cli setban 99.237.228.185 add 31557600

Posted by G. Maxwell:
https://people.xiph.org/~greg/banlist.gui.txt
https://people.xiph.org/~greg/banlist.cli.txt


Title: Re: [Spy Nodes && S2X] Attack on the Network in Progress
Post by: Meuh6879 on December 16, 2017, 10:01:24 AM
Update of my follow up.  ;)

Code:
100.35.27.249
104.128.94.12
104.155.122.212
106.111.74.47
106.117.151.89
106.186.31.140
106.200.239.231
106.75.146.143
109.105.160.122
109.174.112.250
109.225.25.187
109.225.28.228
109.254.84.135
109.94.2.1
111.178.9.81
115.132.248.36
115.219.169.242
118.93.103.208
121.86.50.33
128.70.191.84
128.8.124.7
129.13.252.36
129.13.252.47
13.230.150.193
134.255.136.170
136.243.139.120
136.243.139.96
142.105.252.237
144.217.10.217
145.132.191.135
146.120.56.238
146.60.38.249
151.225.139.222
159.224.90.59
162.250.221.238
170.79.45.59
171.8.110.21
173.212.193.11
173.245.203.184
173.255.251.118
174.34.172.203
176.104.14.35
176.215.228.52
176.36.32.34
178.255.153.166
180.111.132.131
181.59.126.46
182.244.235.86
183.204.68.26
184.207.138.127
184.98.248.101
185.57.28.103
185.59.58.157
187.221.99.132
187.65.144.146
187.75.50.120
188.134.77.121
188.163.74.12
188.192.250.36
188.234.228.62
188.37.67.242
188.65.213.21
195.91.160.170
198.199.89.131
198.48.223.50

200.0.51.232
200.114.199.78
2001:0:5ef5:79fb:147c:1e50:6b00:9ebf
202.108.211.56
203.220.88.53
203.3.109.194
205.251.22.236
212.108.43.57
212.159.113.138
213.220.247.85
213.55.211.9
216.19.183.58
217.208.126.75
217.61.217.125
218.226.212.4
218.87.96.161
220.162.105.211
222.180.100.198
222.180.63.74
222.215.172.99
222.93.10.16

24.119.224.62
24.175.192.11
24.18.147.55
2607:5300:60:1bd1::1
2a00:1398:4:2a00::a1
2a00:1398:4:2a00::a5
2a03:b0c0:3:d0::5c9:4001

31.130.95.253
31.223.227.198
31.36.66.102
35.165.221.21
35.187.187.248
35.189.230.22
35.196.249.50
35.196.46.145
36.151.8.238
37.113.142.45
37.113.27.238
37.135.34.116
37.15.117.117
37.201.240.133
37.229.201.178
37.24.148.38

45.33.65.130
46.101.246.115
46.229.147.14
46.246.154.92
46.246.49.79
46.53.195.62
47.104.84.114
47.223.222.114
47.254.128.169
47.89.246.242
47.89.252.244
47.90.4.203
47.93.23.68
49.84.247.96

5.1.55.184
5.165.16.34
5.3.242.107
5.44.168.103
50.66.58.222
58.108.89.24
59.110.63.71

60.175.104.134
62.32.1.225
62.47.222.32
62.80.189.158
62.87.203.34
64.228.213.224
67.52.230.18
69.84.31.75

70.30.104.212
70.33.168.20
70.33.168.27
71.11.106.234
71.70.195.177
71.84.104.6
72.192.93.35
72.36.89.11
73.114.228.205
73.222.196.104
73.236.191.56
74.102.109.216
74.132.27.118
74.207.240.152
76.254.56.180
77.247.181.162
77.50.100.120
78.106.11.204
78.146.56.214
78.46.79.17
78.99.22.173
79.132.116.135
79.169.200.81
79.73.36.52

80.100.203.151
81.111.144.79
81.16.165.228
81.171.56.134
82.130.103.18
83.161.249.125
83.169.228.178
83.243.39.142
84.23.44.69
84.23.59.175
84.242.74.251
84.29.73.246
87.120.1.28
87.213.253.167
87.214.171.55
87.3.86.99
89.114.207.82

90.94.191.16
91.106.149.46
91.202.132.248
91.78.240.152
93.202.6.16
93.219.134.103
93.75.30.249
94.100.213.84
94.103.228.161
94.25.171.139
95.246.207.1
95.27.87.58
95.29.41.93
95.90.243.59
96.227.219.182
96.81.220.85
98.221.120.90
99.41.87.194



Matched IPs between G. Maxwell & Me :

Code:
128.8.124.7
129.13.252.36
129.13.252.47
136.243.139.120
188.65.213.21
205.251.22.236
35.196.46.145
45.33.65.130
59.110.63.71
72.36.89.11
82.130.103.18