Just as I wanted to start writing an article here and I entered the URL of this blog into my browser I got no response from the webserver, zero, nothing.
First I thought the PHP fastcgi process for this virtual host died, but a quick check on another virtual host suggested that something else was going on.
So I guessed the lighttpd process itself must be experiencing problems of some sort, but after doing a "netstat -nat" I knew what was going on:
tcp6 1 1 126.96.36.199:80 188.8.131.52:12474 LAST_ACK
tcp6 1 1 184.108.40.206:80 220.127.116.11:39671 LAST_ACK
tcp6 1 1 18.104.22.168:80 22.214.171.124:39211 LAST_ACK
tcp6 1 1 126.96.36.199:80 188.8.131.52:55160 LAST_ACK
tcp6 1 1 184.108.40.206:80 220.127.116.11:25836 LAST_ACK
tcp6 1 1 18.104.22.168:80 22.214.171.124:16865 LAST_ACK
tcp6 1 1 126.96.36.199:80 188.8.131.52:24266 LAST_ACK
tcp6 1 1 184.108.40.206:80 220.127.116.11:38441 LAST_ACK
tcp6 1 1 18.104.22.168:80 22.214.171.124:17726 LAST_ACK
tcp6 1 1 126.96.36.199:80 188.8.131.52:38206 LAST_ACK
tcp6 1 1 184.108.40.206:80 220.127.116.11:23892 LAST_ACK
tcp6 1 1 18.104.22.168:80 22.214.171.124:29675 LAST_ACK
Plus "a few" more of those. Now I'm not entirely sure whether it's just some systems misbehaving or actually an attack, but my feelings told me this could have been intentional after all.
I did a quick whois on one of those IP addresses and came up with the 126.96.36.199/16 network which is owned by China Network Communications Group Corporation.
As the connections were made from pretty much every host in that network I had two choices: sit it out or block it.
I came to the conclusion that blocking the entire subnet from connecting to this system, at least temporarily, might be a viable solution and so I did.
However, afterwards I am asking myself whether I really had to block an entire 16-Bit network, so I am asking you: how do you handle such situations usually?