BTCguild is not being DDOSed the way you might normally think of a DDOS attack. It is getting hit by a Botnet user trying many many thousands of logon/password combinations per hour. Attempting to hack and steal coins from user accounts....
Actually that is the second gen of DDoS attacks.. There appear to be two methods:
1. Application specific. (What BTC guild is getting now)
2. Overwhelming volume.
The second one is more insidious as it's a three way ddos where the botnet uses lower traffic to the 'zombies' where the zombies are not compromised machines. The most common is the DNS storm stuff. It works like this...
Your botnet gets a list of public DNS servers that actually host domains so therefore must answer queries from the internet.
You configure your botnet to send a query for any domain to the above mentioned list of servers. However you spoof the return address in the packet to point at your target machine.
The 'source' of the attack reacts one of two ways to this query:
Not authoritative for said domain:
1. If it is a recursive server and will allow queries from anyone, it will look the name up and craft a response to the server that asked and reply.
2. If it is not a recursive server it will craft a referral telling the server that asked to go ask the root servers where to resolve this domain.
Authoritative for said domain:
Craft a response and send it.
Now keep in mind all of this looks like legitimate traffic. And with a big enough list/botnet you also can fly under just about any bandwidth level type filter.
The remote dns can mitigate some of this with rate limiting and such but it can't really be stopped.
Here is the current 'bad' list on one of my authoritative servers:
DROP all -- 50.115.233.40 0.0.0.0/0
DROP all -- 61.160.221.34 0.0.0.0/0
DROP all -- 222.186.24.74 0.0.0.0/0
DROP all -- 188.165.187.84 0.0.0.0/0
DROP all -- 184.82.27.164 0.0.0.0/0
DROP all -- 198.50.242.162 0.0.0.0/0
DROP all -- 198.144.157.11 0.0.0.0/0
DROP all -- 74.122.192.130 0.0.0.0/0
DROP all -- 207.58.148.42 0.0.0.0/0
DROP all -- 198.50.189.253 0.0.0.0/0
DROP all -- 68.169.35.12 0.0.0.0/0
DROP all -- 37.49.226.241 0.0.0.0/0
DROP all -- 121.141.217.26 0.0.0.0/0
DROP all -- 178.32.244.102 0.0.0.0/0
DROP all -- 198.13.117.237 0.0.0.0/0
DROP all -- 93.115.85.212 0.0.0.0/0
DROP all -- 184.105.159.160 0.0.0.0/0
DROP all -- 198.50.159.235 0.0.0.0/0
DROP all -- 5.152.205.122 0.0.0.0/0
DROP all -- 61.147.120.62 0.0.0.0/0
DROP all -- 61.147.110.34 0.0.0.0/0
DROP all -- 178.32.244.113 0.0.0.0/0
DROP all -- 178.32.244.111 0.0.0.0/0
DROP all -- 178.32.244.101 0.0.0.0/0
DROP all -- 178.32.244.110 0.0.0.0/0
DROP all -- 178.32.244.117 0.0.0.0/0
DROP all -- 178.32.244.105 0.0.0.0/0
DROP all -- 178.32.244.118 0.0.0.0/0
DROP all -- 178.32.244.112 0.0.0.0/0
DROP all -- 208.98.16.35 0.0.0.0/0
DROP all -- 178.32.36.49 0.0.0.0/0
DROP all -- 208.131.138.55 0.0.0.0/0
DROP all -- 178.32.244.116 0.0.0.0/0
DROP all -- 178.32.244.104 0.0.0.0/0
DROP all -- 178.32.244.100 0.0.0.0/0
DROP all -- 91.121.100.215 0.0.0.0/0
DROP all -- 5.135.135.40 0.0.0.0/0
DROP all -- 178.32.244.96 0.0.0.0/0
DROP all -- 178.32.244.127 0.0.0.0/0