Attack Report
Time & Date (exact details help the most):
Provide the exact time and date of the incident.
Application / Game:
Specify the affected application or game.
Port & Protocol:
Indicate the port and protocol in use (e.g., TCP/25565, UDP/27015).
Issue During the Attack:
Describe the issue observed during the attack (e.g., high ping, server not responding, server not visible in the server list, etc.).
Bandwidth Bypassed (Mbps):
Estimate how much traffic bypassed protection.
Capture Download Link:
Provide a direct link to the captured traffic file for further analysis.
Additional Information (optional):
- Attack Duration:
- Attack Patterns (observed):
- Other Observations or Log Errors: