Strange that they cannot send a BGP blackhole upstream to keep everyone else online within their advertised route. On 8/3/16 5:27 PM, Tony Wicks wrote:
Further to that, and I would suggest it should be part of the overall discussion here. It appears the IPv4 IP block my VM is in is not currently advertised on the world route table. I assume hostus.us's transit provider has dropped their ipv4 BGP to save themselves. This is really the ultimate reward for the extortionists as they don't even need to sustain the DDOS to attack their target. While I see the transit providers point of view, it’s a pretty shitty situation for their customer, and their customers/customers.
-----Original Message----- From: NANOG [mailto:nanog-bounces@nanog.org] On Behalf Of Tony Wicks Sent: Thursday, 4 August 2016 9:10 AM To: 'NANOG list' <nanog@nanog.org> Subject: RE: Host.us DDOS attack
Interestingly my VM (LA) with them has been effectively down for half a day as far as IPv4 is concerned. IPv6 traffic seems unaffected.