Use mitigation tools and services, monitor traffic, and maintain backup systems.
Use mitigation tools and services, monitor traffic, and maintain backup systems.
It's hard to do much about a DOS attack, especially when it targets your ISP that manages your public IP. My school faced a DDOS attack last year—it crippled our internet, VOIP, and devices. The teacher provided a sys log with multiple IPs and MAC addresses, but we couldn't trace the source. We only reported it to Comcast because they had no control over the issue. This serves as a reminder. I’d recommend reporting the perpetrator to the FBI with all available details, including his threats, and just let it end there. I wouldn’t have hesitated if he started speaking that way.
Indeed there is literally nothing you can do. The only way professional DDOS protection services work is by having WAY more bandwidth and router CPU power than they need, so they can drop the packets before they reach the customer. The packets are still there wasting bandwidth and CPU time, nothing you can do about that.
Well the type of DDOS attack my school got hit with is by flooding the servers with TCP SYN messages, called SYN flood attacks. Its a very common type of DOS attack hackers use, so that might be what the guy might try. An Intrusion Prevention System would prevent that from happening with a Flood Guard, which I'm sure the ISP's already have set up.
This type of assault locks up the routers' processing power, making even lost packets trigger inspections. The ISP's equipment is naturally quicker, but if it's spread out enough, it can still strain them. Once the volume becomes unmanageable, you should block the attacking IPs directly, allowing you to disregard the rest of the traffic instead of verifying its authenticity.
Feel free to chat, I also manage a server for a public game and sometimes people get affected. There are a few clues to gauge his strength: likely he just got a decent PC and a solid internet connection. If you control the server or even a router, simply block his IP during an attack. To find his IP, check your firewall logs on a server or Linux system—they often show the source address. If it was a DDoS attempt, you’ll see repeated IPs using only UDP. Blocking it stops unnecessary traffic and saves resources. If you’re in the same game community, teaming up could help gather more details before taking action.
He might try to steal your info through: Teamspeak, Skype, game servers, files you accept, or any content you open. You can also use tools like WhatIsMyIP.com to verify your address.
If you don’t have a server and he knows your IP from another method, here’s what to do:
- Visit https://www.whatismyip.com to confirm your address.
- Restart your router and try again.
- If the IP changes, you’re safe; otherwise, consider using Wireshark to monitor traffic and block the threat at the network level.
If he knows your IP, contact your ISP to change it—though I’m skeptical you’ll do that right now. If not, stay alert and protect your setup.
Let me know if you need more tips or help with any step!