Wert 说:![]()
They unfortunately did not stop teaming
before anyone comments on the graphics i have a craptop but we can ignore that
Um, he's just going to go to those servers and find an excuse for himself to ddos those too.... That should be obvious.MaHuD 说:With all of this attention, I am sure he/she/them won't stop doing it for a while.
Take the servers down for a while and play on other servers.![]()
Captain Lust 说:Someone has reached out to contact me with information about any individuals that my be involved in this. Any data or evidence you have with regards to the attacks is greatly appreciated. Please send it to me via PM. Even if it just happens to be a list of dates and times when the attacks occur, although packet data including IPs is most likely to be useful. Just anything you can provide.
In the meantime, our advice remains to block all ports on the machines except the UDP ports directly used by the game servers.
In with fire and sword (wfas) we managed to get his ip and ended up finding out his actual name. It's very easy to change ip's so I'm assuming he's already done this. After we found out his name we contacted the police, forgot what happened after that.Das Knecht 说:If you can prove beyond reasonable doubt that it is indeed Daniel Tosh doing the DDoSing, then contacting a Staff Member is worth a shot.
The sad reality is that DDoS attacks are very easy to launch and considerably harder to defend against. There are literally guides on YouTube that tell you, step-by-step, how to DDoS. And since they generally use a pre-established botnet to launch the attack, the origin of the attack is tricky to trace. Perhaps we can try contacting Steam as well, if this Daniel Tosh has a Steam Account, to see if they can do anything about it. It's a slow way, sure, but provided that we have evidence, it's worth a shot as well.