Free Security Tool
Is My Server Under Attack Right Now?
Enter your server's IP address or hostname to run a quick analysis. We'll check DNS resolution, assess reachability, and show you what to look for if you suspect a DDoS attack.
Warning Signs
Signs Your Server Is Under Attack
top or htop and look for abnormal process loads or high system/interrupt CPU usage.iftop, nload, or vnstat. If incoming traffic far exceeds normal levels, volumetric attack is likely.ss -s or netstat -an | wc -l. If you see tens of thousands of connections (mostly SYN_RECV, TIME_WAIT, or ESTABLISHED from random IPs), it's a connection flood.mtr to your server from an external location. If you see 50-100% packet loss at the last few hops, congestion from a volumetric attack is likely.Understanding Attacks
Common DDoS Attack Types
Know what you're defending against
Volumetric Attacks
UDP floods, DNS amplification, NTP amplification. These overwhelm your bandwidth by sending massive amounts of traffic, often using amplification vectors to multiply the attacker's output by 10-51,000x.
Protocol Attacks
SYN floods, ACK floods, fragmented packet attacks. These exploit weaknesses in the TCP/IP stack to exhaust connection tables, firewall state, and load balancer capacity.
Application-Layer Attacks
HTTP floods, Slowloris, RUDY. These target web servers with seemingly legitimate requests, making them hard to distinguish from real traffic without deep packet inspection.
Amplification Attacks
DNS, NTP, Memcached, CLDAP, SSDP. Attackers send small requests to open servers with a spoofed source IP (yours), causing massive responses to flood your network.
Multi-Vector Attacks
Modern attacks combine volumetric, protocol, and application-layer techniques simultaneously. 65% of attacks now use 3+ vectors, requiring comprehensive detection that monitors all layers.
Carpet Bombing
Instead of targeting one IP, attackers spread traffic across your entire subnet. Each IP receives traffic below alert thresholds, but aggregate traffic overwhelms upstream links.