There was a period of about 5 minutes with some packetloss seen, it wasn't completely down but the packetloss was high for this short time making some connections drop temporarily.
We are checking on the WIN39 Cluster1 as it is having far more packetloss than the others, in fact so much it is impossible to work on the server and trace for more info. We are working on alternative means now to work on it, and the rest of the network doesn't seem quite as impacted now, just some very occasional packetloss.
I am now sitting right next to the server thats having the attacks and will use it locally while it happens next time to work and track down more quickly. (there is no issue with the attacks at the moment, no packetloss, no timeouts on connections)
Win39 has been back up, I have it temporarily limited while we work with it further to some slower network speeds. The problem is that the requests coming flooding in are also being replied to making the attack requests become amplified and the situation worse as traffic is coming in and out both.
We had a ticket open with one of the upstreams for helping with the DOS attack and seems they have null routed the shared IP of the server within the last hour. We are working with them now to resolve this matter.
Overall there isn't a lot of major impact happening, but there are 'waves' of attacks and sometimes it is more noticeable for 2-5 minutes with packetloss, then working fine.
We have found the domain being attacked, and it is a .in domain, which really comes as no surprise with the timing of the attacks being daytime there when night here.
Very much confirmed the attacks as well, the logs even include the DDOS tool being used!
This helps a lot now to block the issue more fully and yes the tool has multiple simulation modes that cycles through explaining some of the issues we have sen.