Hi again.
Was/is the attack sustained for a length of time, or was it just what you posted in the first post? It could be an automated scan if he only hit your site for a short time, in which case he's probably just testing your security and will move on once he sees your security's OK.
I'm not really an expert on iptables, but it actually looks like you're accepting connections from anywhere (the rules are examined in order, so you're accepting new connections with
ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED
) as I said I'm not an expert, so don't take my word for it. I'd test your firewall at grc.com to see what an external party can see. Go to:
https://grc.com/x/ne.dll?bh0bkyd2
click continue, then click 'all service ports' and see what the results are.
'host' is a good tool for doing IP lookups. I've had a look myself, and I get the following from 'host 212.202.30.202':
Code:
202.30.202.212.in-addr.arpa domain name pointer port-212-202-30-202.dynamic.qsc.de.
Doing a whois on qsc.de gives:
Code:
[Querying whois.denic.de]
[whois.denic.de]
domain: qsc.de
status: connect
which is pretty un-useful. Looks like the domain has been registered with no information.
Doing 'traceroute 212.202.30.202' gives:
Code:
traceroute to 202.30.202.212 (202.30.202.212), 30 hops max, 38 byte packets
1 router (192.168.0.1) 0.772 ms 0.650 ms 0.672 ms
2 81-86-224-1.dsl.pipex.com (81.86.224.1) 29.276 ms 24.837 ms 25.030 ms
3 eth3-1.cr1.uk5.systems.pipex.net (62.241.161.41) 25.857 ms 25.772 ms 24.1 08 ms
4 ge-1-2-0.cr1.gs1.systems.pipex.net (62.241.161.97) 25.832 ms 25.014 ms 25 .607 ms
5 flag.xchangepoint.net (217.79.160.102) 25.830 ms 25.759 ms 26.332 ms
6 62.216.129.26 (62.216.129.26) 26.565 ms 25.540 ms 25.845 ms
7 so-2-1-0.0.core1.ldn1.flagtel.com (62.216.128.65) 25.591 ms 25.498 ms 25. 831 ms
8 ge-1-0-1.0.core2.ldn1.flagtel.com (62.216.128.58) 30.543 ms 27.109 ms 27. 321 ms
MPLS Label=104288 CoS=3 TTL=1 S=0
9 so-2-0-0.0.core1.hkg3.flagtel.com (62.216.128.222) 236.281 ms 234.835 ms 235.543 ms
MPLS Label=102496 CoS=3 TTL=1 S=0
10 ge-1-0-0.0.core2.hkg3.flagtel.com (62.216.128.118) 234.658 ms 232.762 ms 241.914 ms
11 so-0-3-0.0.core1.seo3.flagtel.com (62.216.128.141) 268.800 ms 268.476 ms 267.827 ms
12 ge-0-0-0.0.core1.seo2.flagtel.com (62.216.138.14) 268.769 ms 269.922 ms 2 67.816 ms
13 *
this is the traceroute to whoever currently has 212.202.30.202, so if it's a dynamic IP, then it might not be him (in fact, the traceroute never gets to its destination, so he's either off-line, or is hiding behind a firewall which is dropping packets.) This shows that the last machine reached is at flagtel.com, so he's probably (if he's still using that IP) on the same network as flagtel.com. Try a whois on flagtel.com and see if you can find out who their ISP or registrar is. As I said, those results are for whoever has 212.202.30.202 at the moment, so do those steps while you're under attack using the IP you're under attack from to find out where he is.
As for what to say to his ISP, I don't really know. Depending on who the ISP is, they may not even care. I would give them a sample of the logs to demonstrate what you're experiencing. If your ISP is worth its subscription, they may well be able to help. I would speak to them if you don't get any joy from his ISP. I would also bear in mind that
abuse@isp.com emails often get ignored, so try going though their customer service channels too if that's the case.
Dave