Just a list if you are looking to build your own botnet out of servers badly managed running unsecure NTP daemon installations that can be exploited to deliver reflected ddos attacks.
iptables filtering ruleset (when not running an ntp daemon)
iptables -t raw -I PREROUTING -p udp --dport 123 -j DROP |
870 hosts totalling 2.5gbit/sec, full list follows
Continue reading “NTP reflected ddos list and iptables ruleset”