Analysis of the Wireshark TCP/HTTP logs indicates that the downtime was caused by a malicious TCP SYN flood attack from IP address 203.0.113.0. While normal requests from authorized users were still observed, the logs show a growing volume of SYN packets from the attacker, eventually saturating server connection slots and causing service interruption.
A high volume of SYN packets from the attacker occupies the server’s half-open connection table, preventing legitimate TCP handshake requests from completing. This resource exhaustion can result in denial of service for legitimate users.
Log analysis confirms that the attacker’s SYN packets from 203.0.113.0 prevented legitimate TCP connections from completing, leading to temporary service unavailability.
Download or view the associated TCP/HTTP log spreadsheet: View Spreadsheet