
Originally Posted by
universal4
Do you have 100% proof they are behind the attack?
If so get the logs together, make sure they show the source IP, the destination ip, port used and the time stamp.
File a report with the ISP (upstream) contact from ARIN/APNIC/AFRINIC/RIPE etc.
Be sure the report clearly defines the time zone the logs files are using.
In most cases, the ISP will in fact take some sort of action, (or at least will notify the client).
If you can NOT supply the above, then you are only speculating (and most likely falsely) unjustly accusing a group of being behind the attack.
If the ISP does NOT take action, you can then climb up the ladder a bit on upstream providers.
Rick
Universal4
Side note: Speculative accusations such as the above will most likely not stand here, unless there is proof of the source of such attacks.