Build precise queries to find exactly what you need
Press ESC to close
Nagios World Conference 2026: Sept. 14-17 in St. Paul, MN | Learn More
Your review has been submitted and is pending approval.
This Nagios plugin monitors system network connections alerting whenever a large number of SYN recv states are verified. The quantities of connections to be considered excessive are passed as arguments, and when Nagios is exceeded alert with the states warning or critical.
Current Version
1
Last Release Date
2017-03-19
Owner
Raimundo Henrique
Download URL
https://exchange.nagios.org/wp-content/uploads/project-files/2017/05/check_ddos.py
License
GPL
Compatible With
Monitoring of DDoS SYN flood attacks is a type of denial of service or distributed denial of service (DDoS) attack, which consists of direct overhead in the transport layer and indirect in the application layer of the OSI target system model with a sequence of SYN requisitions. Despite the DOS or DDoS attacks do not compromise systems with intrusions or infections with viruses They aim to make services and/or systems unavailable, generating financial losses or reputation damages.
Mandatory arguments: The following arguments must be specified when the module is executed: -w or warning used to specify the number of connections from which to consider as warning. -c or critical used to specify the number of connections from which the result should be considered as critical.
Optional arguments: The following arguments are optionally invoked, as user needs: -V or – version used to query the module version. -A or – author used to query the author's data.
Command-Line Execution example: ./check_ddos.py -c 300 -w 200
You must be logged in to submit a review.
To:
From: