iptables中阻止的IP但DDOS仍然在进行

时间:2015-10-03 10:11:16

标签: iptables ddos

我今天在一个运行debian sequeeze的网络服务器上有一个DDOS,并阻止了iptables中的各种IP地址:

iptables -A INPUT -s 169.50.5.42 -j DROP

但它似乎没有从这些ip中丢弃流量。

使用iptables -L列出所有规则会给出以下输出:

Chain INPUT (policy ACCEPT)
target     prot opt source               destination         
fail2ban-ssh  tcp  --  anywhere             anywhere            multiport dports ssh 
fail2ban-pureftpd  tcp  --  anywhere             anywhere            multiport dports ftp 
fail2ban-dovecot-pop3imap  tcp  --  anywhere             anywhere            multiport dports pop3,pop3s,imap2,imaps 
DROP       all  --  169.50.5.42-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.45-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.37-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.36-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.38-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.39-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.45-static.reverse.softlayer.com  anywhere            
DROP       all  --  169.50.5.42-static.reverse.softlayer.com  anywhere            

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         

Chain fail2ban-dovecot-pop3imap (1 references)
target     prot opt source               destination         
RETURN     all  --  anywhere             anywhere            

Chain fail2ban-pureftpd (1 references)
target     prot opt source               destination         
RETURN     all  --  anywhere             anywhere            

Chain fail2ban-ssh (1 references)
target     prot opt source               destination         
DROP       all  --  43.229.53.60         anywhere            
RETURN     all  --  anywhere             anywhere            

有什么我错过的吗?

1 个答案:

答案 0 :(得分:0)

我可以自己回答。显然,它需要一些时间在内部应用所有更改。大约一分钟后,规则正在运作。