When they do this, they exhaust the CPU on my 3-core VDS here. Is there anything I can do to filter this specific attack rather than blocking the IPs in the firewall(this is what I have been doing). Filtering in the firewall works, but every night it is new IP addresses.
Someone else may be able to offer better insight here, but if you're able to grab traffic to the VDS and full the detailed dump are the packets staying consistent? If so, you should be able to form a block using that which should stop it before it reaches your VDS.
@Kraze^NFo> Juski has a very valid point
@Juski> Got my new signature, thanks!
@Kraze^NFo> Out of context!
@Juski> Doesn't matter!
@Juski> You said I had a valid point! You can't take it back now! It's out there!
Since the packet is a common HTTP request, there is no way I found with the attack tonight to block it without blocking legitimate traffic as well. I blocked 4 more IPs tonight, bringing the total to 41 IPs blocked :/