<div dir="ltr"><div class="gmail_default" style="font-family:tahoma,sans-serif">If you wanted to test in a controlled environment this may be more useful, they even crunch the numbers for you <a href="https://www.blitz.io/">https://www.blitz.io/</a></div>
<div class="gmail_extra"><br><div class="gmail_quote">On Sat, Oct 19, 2013 at 12:16 AM, Dobbins, Roland <span dir="ltr"><<a href="mailto:rdobbins@arbor.net" target="_blank">rdobbins@arbor.net</a>></span> wrote:<br>
<blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">
<div class="im"><br>
On Oct 18, 2013, at 3:31 PM, "Tom Paseka" <<a href="mailto:tom@cloudflare.com">tom@cloudflare.com</a>> wrote:<br>
<br>
> There are hundreds of booters out there. We regularly see hits from 2mbps up to 10Gbps+ from various ones, using various methods (synfloods, dns reflections etc)<br>
<br>
</div>Concur 100%, this is indeed a 'booter'. It's likely a criminal enterprise; note that it's illegal in most jurisdictions to send attack traffic beyond the borders of one's own network, and that it also violates AUPs of most intermediate transit networks in the path.<br>
<br>
I strongly urge folks *not* to use services of this nature, because doing so is a) illegal, b) potentially very harmful, c) will attract the attention of miscreants towards both whoever pays and whoever is targeted, and d) funds criminals.<br>
<br>
There are legal, safe ways to test resilience to DDoS attacks; but using a service of this type isn't among them.<br>
<br>
;><br>
<br>
---------------------------------<br>
Roland Dobbins <<a href="mailto:rdobbins@arbor.net">rdobbins@arbor.net</a>><br>
<br>
<br>
<br>_______________________________________________<br>
AusNOG mailing list<br>
<a href="mailto:AusNOG@lists.ausnog.net">AusNOG@lists.ausnog.net</a><br>
<a href="http://lists.ausnog.net/mailman/listinfo/ausnog" target="_blank">http://lists.ausnog.net/mailman/listinfo/ausnog</a><br>
<br></blockquote></div><br></div></div>