{"id":232,"date":"2023-10-06T08:39:39","date_gmt":"2023-10-06T08:39:39","guid":{"rendered":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/?p=232"},"modified":"2023-10-09T11:44:13","modified_gmt":"2023-10-09T11:44:13","slug":"How-to-Check-if-My-Server-is-Under-DDoS-Attack","status":"publish","type":"post","link":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html","title":{"rendered":"How to Check if My Server is Under DDoS Attack"},"content":{"rendered":"<div class=\"kb-article-content\">\n<h2><strong>What is DDoS Attack?<\/strong><\/h2>\n<p><strong><span style=\"font-weight: 400;\">First of all, let us understand what DDoS exactly means. DDoS stands for Distributed denial of service attack. It is a malicious cyber-attack by online hackers or cyber criminals to make an online service or server unavailable on the internet. In DDoS attacks, the attacker sends a large amount of fake traffic to the targeted host to make their website down.<\/span><\/strong><\/p>\n<p><strong><span style=\"font-weight: 400;\">For webmasters, a DDoS attack is a tense situation because many don\u2019t know what DDoS is or how to know that they are being DDoSed. Firstly, We advise you to stay calm &amp; understand the situation appropriately. <\/span><\/strong><\/p>\n<p><strong>But How?<\/strong><\/p>\n<p><strong><span style=\"font-weight: 400;\">In this article, we will know how you can understand that you are DDoSed in simple ways. <\/span><\/strong><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<p><strong><span style=\"font-weight: 400;\"><strong>Also Read:<\/strong> <a href=\"https:\/\/www.hostitsmart.com\/blog\/what-to-do-when-your-website-is-hacked\/\"><strong>What To Do When Your Website Is Hacked<\/strong><\/a><\/span><\/strong><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<p><strong><span style=\"font-weight: 400;\">So let us discuss some of the ways to detect DDoS attacks. There are various ways to detect that your website is under DDoS attack. Some of the primary signs are given below &#8211; <\/span><\/strong><\/p>\n<ol>\n<li><strong><span style=\"font-weight: 400;\">When your <strong><a href=\"https:\/\/www.hostitsmart.com\/blog\/why-does-my-website-load-slowly\/\">website takes more time to load<\/a><\/strong><\/span><\/strong><\/li>\n<li><span style=\"font-weight: 400;\">When your website doesn&#8217;t respond properly<\/span><\/li>\n<li><span style=\"font-weight: 400;\">When your website is unavailable<\/span><\/li>\n<li><span style=\"font-weight: 400;\">When the RAM or CPU is Overloaded<\/span><\/li>\n<li><span style=\"font-weight: 400;\">When Sending &amp; Receiving Emails gets fail<\/span><\/li>\n<\/ol>\n<hr style=\"border-top: 2px dotted black;\">\n<p><span style=\"font-weight: 400;\"><strong>Also Read: <\/strong><a href=\"https:\/\/www.hostitsmart.com\/manage\/knowledgebase\/223\/Is-Your-Cpanel-Not-Receiving-Emails-What-to-Do.html\"><strong>Is Your Cpanel Not Receiving Emails-What to Do?<\/strong><\/a><\/span><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<h2><span style=\"font-weight: 400;\"><strong>How to Detect DDoS Attack on Linux System<\/strong><\/span><\/h2>\n<ol>\n<li><span style=\"font-weight: 400;\">First, you must log in to the Linux server using SSH.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Follow the below-given command to find the IP address connected to your Linux system.<span style=\"font-family: 'arial black', sans-serif;\"># netstat -anp |grep &#8216;tcp\\|udp&#8217; | awk &#8216;{print $5}&#8217; | cut -d: -f1 | sort | uniq -c<\/span>\n<p><\/span><\/li>\n<li><span style=\"font-weight: 400;\">To find out the Linux IP address source and the number of connections of the same IP addresses, run the below-given command.<span style=\"font-family: 'arial black', sans-serif;\"># netstat -ntu | awk &#8216;{print $5}&#8217; | cut -d: -f1 | sort | uniq -c&nbsp; &nbsp; | sort -n<\/span>\n<p><\/span><\/li>\n<li><span style=\"font-weight: 400;\">Next, you must check the number of currently active connections on your server. For that, run the following command.<span style=\"font-family: 'arial black', sans-serif;\"># netstat -n | grep :80 |wc -l<\/span>\n<p><\/span><\/li>\n<li><span style=\"font-weight: 400;\">Check the IP address on a server; if there are too many connections, it might be the attacker&#8217;s IP address. Once you discover where the DDoS attack is coming from, you can block them using the following command. Block it using the IP tables on Linux Machine.<span style=\"font-family: 'arial black', sans-serif;\"># route add IP address reject<\/span><br \/>\n<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">So that was how to detect DDoS attacks on Linux servers. Now let us see how to detect DDoS attacks on the windows servers. Here are some steps to detect it <\/span><\/p>\n<h2><span style=\"font-weight: 400;\"><strong>How to Detect DDoS Attack on Windows System<\/strong><\/span><\/h2>\n<ol>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Firstly, you have to log into your server via RDP.<br \/>\n<\/span><\/span><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Also Read: <\/strong><a href=\"https:\/\/www.hostitsmart.com\/manage\/knowledgebase\/231\/How-To-Connect-To-A-Windows-VPS-using-RDP.html\"><strong>How To Connect To A Windows VPS using RDP?<\/strong><\/a><\/span><\/span><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<\/li>\n<li><span style=\"font-weight: 400;\">After login, Go to the \u201cstart\u201d section and Open \u201cRun.\u201d type \u201cCMD\u201d in the box and hit enter. With this, you will get into the command prompt.<\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">To see all the connections of your system, type <strong>nestat-noa <\/strong>in which,<br \/>\n<strong>n<\/strong> displays active TCP connections.<br \/>\n<strong>o<\/strong> displays active TCP connections &amp; also includes the Process ID for each connection that helps you to find out the application running the same process ID in the windows task manager.<br \/>\n<strong>a<\/strong> displays all the TCP connections along with TCP\/UPD ports on which the computer is listening.<br \/>\n<\/span><\/span><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<p><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><strong>Also Read: <\/strong><a href=\"https:\/\/www.hostitsmart.com\/manage\/knowledgebase\/82\/How-to-Connect-to-FTP-Using-FileZilla-on-Windows.html\"><strong>How to Connect to FTP Using FileZilla on Windows<\/strong><\/a><\/span><\/span><\/p>\n<hr style=\"border-top: 2px dotted black;\">\n<p><span style=\"font-weight: 400;\"><\/p>\n<p><\/span><\/li>\n<\/ol>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>What is DDoS Attack? First of all, let us understand what DDoS exactly means. DDoS stands for Distributed denial of service attack. It is a malicious cyber-attack by online hackers or cyber criminals to make an online service or server unavailable on the internet. In DDoS attacks, the attacker sends a large amount of fake [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-232","post","type-post","status-publish","format-standard","hentry","category-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Check if My Server is Under DDoS Attack<\/title>\n<meta name=\"description\" content=\"How can you understand that you are DDoSed? Let\u2019s know the common signs &amp; steps to learn about DDoS attacks on Linux &amp; Windows systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Check if My Server is Under DDoS Attack\" \/>\n<meta property=\"og:description\" content=\"How can you understand that you are DDoSed? Let\u2019s know the common signs &amp; steps to learn about DDoS attacks on Linux &amp; Windows systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\" \/>\n<meta property=\"og:site_name\" content=\"Host IT Smart Knowledge base\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-06T08:39:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T11:44:13+00:00\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/8b538056beea86b043adbd20df3a6ee9\"},\"headline\":\"How to Check if My Server is Under DDoS Attack\",\"datePublished\":\"2023-10-06T08:39:39+00:00\",\"dateModified\":\"2023-10-09T11:44:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\"},\"wordCount\":545,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization\"},\"articleSection\":[\"Hosting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\",\"url\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\",\"name\":\"How to Check if My Server is Under DDoS Attack\",\"isPartOf\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#website\"},\"datePublished\":\"2023-10-06T08:39:39+00:00\",\"dateModified\":\"2023-10-09T11:44:13+00:00\",\"description\":\"How can you understand that you are DDoSed? Let\u2019s know the common signs & steps to learn about DDoS attacks on Linux & Windows systems.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#website\",\"url\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/\",\"name\":\"Host IT Smart Knowledge base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization\",\"name\":\"Host IT Smart Knowledge base\",\"url\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"width\":240,\"height\":80,\"caption\":\"Host IT Smart Knowledge base\"},\"image\":{\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/8b538056beea86b043adbd20df3a6ee9\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/17348df3a33347d3945161d87b752de1d7a7ec25dcbe15baacbd3b8a35367f66?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/17348df3a33347d3945161d87b752de1d7a7ec25dcbe15baacbd3b8a35367f66?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/\"],\"url\":\"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/author\/admin\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Check if My Server is Under DDoS Attack","description":"How can you understand that you are DDoSed? Let\u2019s know the common signs & steps to learn about DDoS attacks on Linux & Windows systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html","og_locale":"en_US","og_type":"article","og_title":"How to Check if My Server is Under DDoS Attack","og_description":"How can you understand that you are DDoSed? Let\u2019s know the common signs & steps to learn about DDoS attacks on Linux & Windows systems.","og_url":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html","og_site_name":"Host IT Smart Knowledge base","article_published_time":"2023-10-06T08:39:39+00:00","article_modified_time":"2023-10-09T11:44:13+00:00","author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html#article","isPartOf":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html"},"author":{"name":"Admin","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/8b538056beea86b043adbd20df3a6ee9"},"headline":"How to Check if My Server is Under DDoS Attack","datePublished":"2023-10-06T08:39:39+00:00","dateModified":"2023-10-09T11:44:13+00:00","mainEntityOfPage":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html"},"wordCount":545,"commentCount":0,"publisher":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization"},"articleSection":["Hosting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html","url":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html","name":"How to Check if My Server is Under DDoS Attack","isPartOf":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#website"},"datePublished":"2023-10-06T08:39:39+00:00","dateModified":"2023-10-09T11:44:13+00:00","description":"How can you understand that you are DDoSed? Let\u2019s know the common signs & steps to learn about DDoS attacks on Linux & Windows systems.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/232\/How-to-Check-if-My-Server-is-Under-DDoS-Attack.html"]}]},{"@type":"WebSite","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#website","url":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/","name":"Host IT Smart Knowledge base","description":"","publisher":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#organization","name":"Host IT Smart Knowledge base","url":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/logo\/image\/","url":"","contentUrl":"","width":240,"height":80,"caption":"Host IT Smart Knowledge base"},"image":{"@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/8b538056beea86b043adbd20df3a6ee9","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/17348df3a33347d3945161d87b752de1d7a7ec25dcbe15baacbd3b8a35367f66?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17348df3a33347d3945161d87b752de1d7a7ec25dcbe15baacbd3b8a35367f66?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/"],"url":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/author\/admin"}]}},"_links":{"self":[{"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/posts\/232","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/comments?post=232"}],"version-history":[{"count":1,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/posts\/232\/revisions"}],"predecessor-version":[{"id":561,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/posts\/232\/revisions\/561"}],"wp:attachment":[{"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/media?parent=232"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/categories?post=232"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.hostitsmart.com\/manage\/knowledgebase\/wp-json\/wp\/v2\/tags?post=232"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}