You probably found the OzBargain is inaccessible or incredibly slow this morning. We have actually been under distributed-denial-of-service attack last night (20 Oct) and this morning. It lasted about 1.5 hours last night, and it has been 1.5 hours since the attack came back this morning and no sign of stopping so far.
It's traffic based DDoS with both UDP and ICMP flood. Basically our connection to the Internet is jammed by those illegitimate packets so the real users are not able to use OzBargain.
I have contacted our hosting provider (Crucial Cloud Hosting) as there's no much we can do on our end. All those packets are dropped on our own firewall, but they should have been dropped much further upstream.
I will update this post throughout the day. Other updates will be on our Facebook and Twitter pages.
22 Oct 3:25PM. DDoS has now been stopped at the upstream. Almost 2 hours of downtime.
22 Oct 1:35PM. DDoS is now back. Same mechanism (UDP flood) but on a different port so didn't get blocked on the upstream router. Hosting company contacted again to have mitigation in place.
21 Oct 10:20AM. Looks like the UDP flood has been subsided. Slowed down rate allowed me to take a bit of look at the pattern and it appears they are using remote hosts' chargen port (UDP 19) to bounce those packets to us.
21 Oct 10:14AM. From our hosting provider:
It appears we have identified a DDOS attack on your service. We are in the process of contacting our upstream providers to address this issue.
Finger crossed.
21 Oct 08:35AM. DDoS came back this morning. Exactly the same pattern. Hosting company notified.
20 Oct 10:05PM. First round of DDoS attack. UDP and ICMP flood from botnet so source IP is from all over the world. Our in-bound connection was completely congested and was not able to serve normal traffic. Hosting company notified at 10:13PM, and attack died down at around 11:35PM.
Came into the forums to report the slow service. Found the answer waiting for me.
+1