Build precise queries to find exactly what you need
Press ESC to close
Your review has been submitted and is pending approval.
This Nagios plugin monitors system network connections alerting whenever a large number of SYN recv states are verified. The quantities of connections to be considered excessive are passed as arguments, and when Nagios is exceeded alert with the states warning or critical.
Current Version
1
Last Release Date
2017-03-19
Owner
Raimundo Henrique
License
GPL
Compatible With
Monitoring of DDoS SYN flood attacks is a type of denial of service or distributed denial of service (DDoS) attack, which consists of direct overhead in the transport layer and indirect in the application layer of the OSI target system model with a sequence of SYN requisitions. Despite the DOS or DDoS attacks do not compromise systems with intrusions or infections with viruses They aim to make services and/or systems unavailable, generating financial losses or reputation damages.
Mandatory arguments: The following arguments must be specified when the module is executed: -w or warning used to specify the number of connections from which to consider as warning. -c or critical used to specify the number of connections from which the result should be considered as critical.
Optional arguments: The following arguments are optionally invoked, as user needs: -V or – version used to query the module version. -A or – author used to query the author's data.
Command-Line Execution example: ./check_ddos.py -c 300 -w 200
You must be logged in to submit a review.
To:
From:
We’ve completely redesigned the world’s largest repository of Nagios plugins and monitoring tools. Join thousands of users sharing monitoring solutions for servers, applications, and everything in between.
Due to our redesign, all existing accounts require a password reset to access your account again.
Ready to explore 6,100+ projects and contribute to the community?
Reset Password Create Account
Happy Monitoring!