Spoiler
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 65535 bytes
17:36:16.207365 IP xxx.xxx.xxx.xxx.http > 103.177.106.17.8361: Flags [S.], seq 1608668911, ack 2974154753, win 14600, options [mss 1460], length 0
17:36:16.207380 IP 111.62.158.169.8983 > xxx.xxx.xxx.xxx.http: Flags [S], seq 1045757952, win 0, length 0
17:36:16.207392 IP xxx.xxx.xxx.xxx.http > 111.62.158.169.8983: Flags [S.], seq 3160858137, ack 1045757953, win 14600, options [mss 1460], length 0
17:36:16.207441 IP 211.215.28.46.49206 > xxx.xxx.xxx.xxx.http: Flags [S], seq 666435584, win 0, length 0
17:36:16.207457 IP xxx.xxx.xxx.xxx.http > 211.215.28.46.49206: Flags [S.], seq 2181153379, ack 666435585, win 14600, options [mss 1460], length 0
17:36:16.207460 IP 61.137.137.107.54725 > xxx.xxx.xxx.xxx.http: Flags [S], seq 1933901824, win 0, length 0
17:36:16.207471 IP xxx.xxx.xxx.xxx.http > 61.137.137.107.54725: Flags [S.], seq 4106986880, ack 1933901825, win 14600, options [mss 1460], length 0
17:36:16.207494 IP 21.8.123.151.23922 > xxx.xxx.xxx.xxx.http: Flags [S], seq 558563328, win 0, length 0
17:36:16.207506 IP xxx.xxx.xxx.xxx.http > 21.8.123.151.23922: Flags [S.], seq 3449016905, ack 558563329, win 14600, options [mss 1460], length 0
17:36:16.207521 IP 95-43-150-250.btc-net.bg.62826 > xxx.xxx.xxx.xxx.http: Flags [S], seq 859570176, win 0, length 0
17:36:16.207533 IP xxx.xxx.xxx.xxx.http > 95-43-150-250.btc-net.bg.62826: Flags [S.], seq 411438657, ack 859570177, win 14600, options [mss 1460], length 0
17:36:16.207565 IP dialup-4.201.139.46.Dial1.Manchester1.Level3.net.18737 > xxx.xxx.xxx.xxx.http: Flags [S], seq 1165950976, win 0, length 0
17:36:16.207579 IP xxx.xxx.xxx.xxx.http > dialup-4.201.139.46.Dial1.Manchester1.Level3.net.18737: Flags [S.], seq 1347282867, ack 1165950977, win 14600, options [mss 1460], length 0
17:36:16.207608 IP 192.90.33.148.38447 > xxx.xxx.xxx.xxx.http: Flags [S], seq 2965700608, win 0, length 0
17:36:16.207622 IP xxx.xxx.xxx.xxx.http > 192.90.33.148.38447: Flags [S.], seq 1061161104, ack 2965700609, win 14600, options [mss 1460], length 0
17:36:16.207625 IP n219078040008.netvigator.com.15495 > xxx.xxx.xxx.xxx.http: Flags [S], seq 228392960, win 0, length 0
Где xxx.xxx.xxx.xxx - адрес моего сервера. Пытался заблочить с помощью iptables --length 0, но эффекта никакого. Подскажите, пожалуйста, как можно заблочить эти пакеты.