Posted: Wed Jan 11, 2012 5:35 pm
Seems that xat is a regular DDoS target; and it seems from that last fragment which Redman quoted (and a little bit of searching) that they've previously used different hosting providers.
If this is how they (or, perhaps, their hosting provider(s)) respond to each attack, well…
Either RCZ is collateral damage or some cracker was targetting it because he's not being allowed to wallhack or aimbot or otherwise cheat or disrupt.
Either Gunther's right and we've been hacked or (more likely, I think) it (well, Funserver, as Rotacak says) has been used in a reflection/amplification attack – why hack the server if you can send it spoofed packets?
If this is how they (or, perhaps, their hosting provider(s)) respond to each attack, well…
Either RCZ is collateral damage or some cracker was targetting it because he's not being allowed to wallhack or aimbot or otherwise cheat or disrupt.
Either Gunther's right and we've been hacked or (more likely, I think) it (well, Funserver, as Rotacak says) has been used in a reflection/amplification attack – why hack the server if you can send it spoofed packets?