Hi all, I am wondering if anyone has seen a large DDoS before, specifically on port 80 UDP with data that seems to be relating to Call of Duty 4. I did a quick packet capture, and the payload looks like this: 14:50:42.716247 IP Y1.YY.YY.YY.28960 > XX.XX.XX.XX.80: UDP, length 499 0x0000: 4500 020f 0000 4000 2a11 5203 58bf 8138 E.....@.*.R.X..8 0x0010: cbaa 5739 7120 0050 01fb 3e2e ffff ffff ..W9q..P..>..... 0x0020: 7374 6174 7573 5265 7370 6f6e 7365 0a5c statusResponse.\ 0x0030: 5f41 646d 696e 5c6b 696c 6c6b 7574 6572 _Admin\killkuter 0x0040: 5c5f 456d 6169 6c5c 6b69 6c6c 6b75 7465 \_Email\killkute 0x0050: 7240 686f 746d 6169 6c2e 636f 6d5c 5f4c r@hotmail.com\_L 0x0060: 6f63 6174 696f 6e5c 4652 5c5f 6d61 6e75 ocation\FR\_manu 0x0070: 6164 6d69 6e6d 6f64 5c30 2e31 312e 3320 adminmod\0.11.3. 0x0080: 6265 7461 5c5f 5765 6273 6974 655c 6874 beta\_Website\ht 0x0090: 7470 3a2f 2f77 7777 2e73 7974 2e74 6561 tp://www.syt.tea 0x00a0: 6d2e 7374 5c67 5f63 6f6d 7061 7373 5368 m.st\g_compassSh 0x00b0: 6f77 456e 656d 6965 735c 305c 675f 6761 owEnemies\0\g_ga 0x00c0: 6d65 7479 7065 5c77 6172 5c67 616d 656e metype\war\gamen 0x00d0: 616d 655c 4361 6c6c 206f 6620 4475 7479 ame\Call.of.Duty 0x00e0: 2034 5c6d 6170 6e61 6d65 5c6d 705f 626c .4\mapname\mp_bl 0x00f0: 6f63 5c70 726f 746f 636f 6c5c 365c 7368 oc\protocol\6\sh 0x0100: 6f72 7476 6572 7369 6f6e 5c31 2e37 5c73 ortversion\1.7\s 0x0110: 765f 616c 6c6f 7741 6e6f 6e79 6d6f 7573 v_allowAnonymous 0x0120: 5c30 5c73 765f 6469 7361 626c 6543 6c69 \0\sv_disableCli 0x0130: 656e 7443 6f6e 736f 6c65 5c30 5c73 765f entConsole\0\sv_ 0x0140: 666c 6f6f 6470 726f 7465 6374 5c31 5c73 floodprotect\1\s 0x0150: 765f 686f 7374 6e61 6d65 5c5e 3120 5359 v_hostname\^1.SY 0x0160: 5420 2d20 5e33 5444 4d20 4843 202d 205e T.-.^3TDM.HC.-.^ 0x0170: 3120 6372 6163 6b20 5c73 765f 6d61 7863 1.crack.\sv_maxc 0x0180: 6c69 656e 7473 5c32 305c 7376 5f6d 6178 lients\20\sv_max 0x0190: 5069 6e67 5c31 3530 5c73 765f 6d61 7852 Ping\150\sv_maxR 0x01a0: 6174 655c 3235 3030 305c 7376 5f6d 696e ate\25000\sv_min 0x01b0: 5069 6e67 5c30 5c73 765f 7072 6976 6174 Ping\0\sv_privat 0x01c0: 6543 6c69 656e 7473 5c36 5c73 765f 7075 eClients\6\sv_pu 0x01d0: 6e6b 6275 7374 6572 5c30 5c73 765f 7075 nkbuster\0\sv_pu 0x01e0: 7265 5c31 5c73 765f 766f 6963 655c 305c re\1\sv_voice\0\ 0x01f0: 7569 5f6d 6178 636c 6965 6e74 735c 3332 ui_maxclients\32 0x0200: 5c70 7377 7264 5c30 5c6d 6f64 5c30 0a \pswrd\0\mod\0. 14:50:42.716292 IP Y1.YY.YY.YY.28965 > XX.XX.XX.XX.80: UDP, length 870 0x0000: 4500 0382 0000 4000 2f11 27e7 c1c0 3be0 E.....@./.'...;. 0x0010: cbaa 5739 7125 0050 036e 1547 ffff ffff ..W9q%.P.n.G.... 0x0020: 7374 6174 7573 5265 7370 6f6e 7365 0a5c statusResponse.\ 0x0030: 7368 6f72 7476 6572 7369 6f6e 5c30 2e34 shortversion\0.4 0x0040: 2d34 325c 7376 5f6d 6178 636c 6965 6e74 -42\sv_maxclient 0x0050: 735c 3138 5c5f 4164 6d69 6e5c 447a 696e s\18\_Admin\Dzin 0x0060: 5c5f 456d 6169 6c5c 6164 6d69 6e40 6261 \_Email\admin@ba 0x0070: 6c6b 616e 2d77 6172 732e 636f 6d5c 5f4c lkan-wars.com\_L 0x0080: 6f63 6174 696f 6e5c 5468 6520 556e 696f ocation\The.Unio 0x0090: 6e20 6f66 2053 6f76 6965 7420 536f 6369 n.of.Soviet.Soci 0x00a0: 616c 6973 7469 6320 5265 7075 626c 6963 alistic.Republic 0x00b0: 735c 5f57 6562 7369 7465 5c68 7474 703a s\_Website\http: 0x00c0: 2f2f 6261 6c6b 616e 2d77 6172 732e 636f //balkan-wars.co 0x00d0: 6d5c 6169 775f 7265 6d6f 7465 4b69 636b m\aiw_remoteKick 0x00e0: 5c31 5c61 6977 5f73 6563 7572 655c 305c \1\aiw_secure\0\ 0x00f0: 675f 6761 6d65 7479 7065 5c77 6172 5c67 g_gametype\war\g 0x0100: 5f68 6172 6463 6f72 655c 305c 6761 6d65 _hardcore\0\game 0x0110: 6e61 6d65 5c49 5734 5c6d 6170 6e61 6d65 name\IW4\mapname 0x0120: 5c6d 705f 6272 6563 6f75 7274 5c70 726f \mp_brecourt\pro 0x0130: 746f 636f 6c5c 3134 345c 7363 725f 6761 tocol\144\scr_ga 0x0140: 6d65 5f61 6c6c 6f77 6b69 6c6c 6361 6d5c me_allowkillcam\ 0x0150: 315c 7363 725f 7465 616d 5f66 6674 7970 1\scr_team_fftyp 0x0160: 655c 305c 7376 5f61 6c6c 6f77 416e 6f6e e\0\sv_allowAnon 0x0170: 796d 6f75 735c 305c 7376 5f61 6c6c 6f77 ymous\0\sv_allow 0x0180: 436c 6965 6e74 436f 6e73 6f6c 655c 315c ClientConsole\1\ 0x0190: 7376 5f66 6c6f 6f64 5072 6f74 6563 745c sv_floodProtect\ 0x01a0: 315c 7376 5f68 6f73 746e 616d 655c 7c46 1\sv_hostname\|F 0x01b0: 5233 3344 4f4d 7c20 4669 6768 7465 7273 R33DOM|.Fighters 0x01c0: 2055 4b20 4e6f 5475 6265 2d4e 6f41 6b69 .UK.NoTube-NoAki 0x01d0: 6d62 6f2d 5444 4d20 3234 2f37 5c73 765f mbo-TDM.24/7\sv_ 0x01e0: 6d61 7850 696e 675c 3330 305c 7376 5f6d maxPing\300\sv_m 0x01f0: 6178 5261 7465 5c31 3530 3030 305c 7376 axRate\150000\sv 0x0200: 5f6d 696e 5069 6e67 5c30 5c73 765f 7072 _minPing\0\sv_pr 0x0210: 6976 6174 6543 6c69 656e 7473 5c30 5c73 ivateClients\0\s 0x0220: 765f 7072 6976 6174 6543 6c69 656e 7473 v_privateClients 0x0230: 466f 7243 6c69 656e 7473 5c30 0a30 2039 ForClients\0.0.9 0x0240: 3939 2022 5768 6974 6573 7061 726b 6c65 99."Whitesparkle 0x0250: 7322 0a30 2038 3920 226d 6174 7269 6361 s".0.89."matrica 0x0260: 2033 220a 3020 3734 2022 5368 616b 7567 .3".0.74."Shakug 0x0270: 616e 220a 3020 3536 2022 3336 3048 6561 an".0.56."360Hea 0x0280: 6453 686f 7422 0a36 3030 2037 3620 2261 dShot".600.76."a 0x0290: 7665 6c6c 7573 220a 3630 3020 3132 3220 vellus".600.122. 0x02a0: 2253 696c 7665 7222 0a34 3030 2031 3133 "Silver".400.113 0x02b0: 2022 4576 616c 6f6e 220a 3131 3030 2037 ."Evalon".1100.7 0x02c0: 3720 225e 345b 4d5e 3969 575e 345d 4465 7."^4[M^9iW^4]De 0x02d0: 725e 220a 3130 3020 3937 2022 416e 6472 r^".100.97."Andr 0x02e0: 6579 2053 756b 6163 6822 0a31 3030 2036 ey.Sukach".100.6 0x02f0: 3620 2244 7a65 6968 6e6f 3933 220a 3230 6."Dzeihno93".20 0x0300: 3020 3839 2022 5265 6e22 0a30 2031 3338 0.89."Ren".0.138 0x0310: 2022 d1d1 d1d0 220a 3230 3020 3334 2022 ."....".200.34." 0x0320: 7061 7631 220a 3430 3020 3138 3720 224b pav1".400.187."K 0x0330: 6172 6c6f 735f 3538 220a 3230 3020 3237 arlos_58".200.27 0x0340: 3020 226d 4f6e 7374 6572 220a 3730 3020 0."mOnster".700. 0x0350: 3137 3220 224d 6572 6365 6e61 7279 220a 172."Mercenary". 0x0360: 3130 3230 2039 3620 226e 696b 6f6c 6122 1020.96."nikola" 0x0370: 0a33 3030 2031 3234 2022 5349 444f 4922 .300.124."SIDOI" 0x0380: 0a00 As far as I know CoD 4 doesn't use port 80 UDP, and I can't see anything else that would. The box doesn't have anything listening for port 80/udp (it does run a web server) and never has. Has anyone seen similar traffic before? I am struggling to figure out what is causing this traffic, or if its existing traffic being replayed to try and avoid filters. Thanks