Virtual Private Servers - OVH VPS + cloudflare recently keeps losing connection to the server
BMPCreated with Sketch.BMPZIPCreated with Sketch.ZIPXLSCreated with Sketch.XLSTXTCreated with Sketch.TXTPPTCreated with Sketch.PPTPNGCreated with Sketch.PNGPDFCreated with Sketch.PDFJPGCreated with Sketch.JPGGIFCreated with Sketch.GIFDOCCreated with Sketch.DOC Error Created with Sketch.
Frage

OVH VPS + cloudflare recently keeps losing connection to the server

Von
Ken
Erstellungsdatum 2025-05-21 03:18:28 (edited on 2025-05-21 08:45:48) in Virtual Private Servers

I use 1 VPS at OVH Indian server for $45/month, for the past 2-3 days I have been continuously losing connection from cloudfare to the server, only losing connection for about 5-10 seconds then getting it back, continuously like this, does anyone have the same problem as me?

My site is pretty much empty, barely using 10%


2 Antworten ( Latest reply on 2025-10-06 08:47:05 Von
Akhtar Zoha
)

I’m running a FiveM server on OVH India VDS with Cloudflare Spectrum. When I use the direct IP, everything works fine. But through Spectrum, players get random disconnects.

Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=1ms TTL=53 Reply from 1.1.1.1: bytes=32 time=5ms TTL=53 Reply from 1.1.1.1: bytes=32 time=46ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=98ms TTL=53 Reply from 1.1.1.1: bytes=32 time=98ms TTL=53 Reply from 1.1.1.1: bytes=32 time=93ms TTL=53 Reply from 1.1.1.1: bytes=32 time=90ms TTL=53 Reply from 1.1.1.1: bytes=32 time=81ms TTL=53 Reply from 1.1.1.1: bytes=32 time=78ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=97ms TTL=53 Reply from 1.1.1.1: bytes=32 time=93ms TTL=53 Reply from 1.1.1.1: bytes=32 time=92ms TTL=53 Reply from 1.1.1.1: bytes=32 time=90ms TTL=53 Reply from 1.1.1.1: bytes=32 time=87ms TTL=53 Reply from 1.1.1.1: bytes=32 time=89ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=99ms TTL=53 Reply from 1.1.1.1: bytes=32 time=96ms TTL=53 Reply from 1.1.1.1: bytes=32 time=93ms TTL=53 Reply from 1.1.1.1: bytes=32 time=89ms TTL=53 Reply from 1.1.1.1: bytes=32 time=86ms TTL=53 Reply from 1.1.1.1: bytes=32 time=88ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=99ms TTL=53 Reply from 1.1.1.1: bytes=32 time=94ms TTL=53 Reply from 1.1.1.1: bytes=32 time=94ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=97ms TTL=53 Reply from 1.1.1.1: bytes=32 time=93ms TTL=53 Reply from 1.1.1.1: bytes=32 time=100ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Request timed out. Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=98ms TTL=53 Reply from 1.1.1.1: bytes=32 time=95ms TTL=53 Reply from 1.1.1.1: bytes=32 time=96ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Reply from 1.1.1.1: bytes=32 time=101ms TTL=53 Request timed out.

traffic appears unstable, with frequent packet loss and latency spikes. OVH India support hasn’t provided clear answers .

I can also use the direct IP of my OVH VDS, but there are many attacks bypassing OVH. One of them is a spoofed reverse DNS application sending UDP packets. I opened a ticket, but the attack hasn’t been fully patched for over three months. That’s why I bought Cloudflare Spectrum, but now I’m facing this random disconnect and packet loss issue. 

 Jttr Javg Jmax Loss% Snt Rcv Last Avg Best Wrst StDev 1. AS??? 100.64.0.1 0.0 0.1 0.5 0.0% 50 50 0.2 0.3 0.2 0.8 0.1 2. AS??? 10.133.50.63 0.0 0.2 0.6 0.0% 50 50 0.3 0.4 0.2 0.8 0.2 3. AS??? 10.133.50.60 0.1 0.2 0.6 0.0% 50 50 0.6 0.7 0.4 1.1 0.2 4. AS??? 10.75.24.34 0.0 0.2 0.5 0.0% 50 50 0.3 0.4 0.2 0.9 0.2 5. AS??? 10.75.248.194 0.3 0.9 3.1 0.0% 50 50 2.8 2.8 1.0 4.7 0.9 6. AS??? 10.75.248.200 0.4 1.2 4.7 0.0% 50 50 1.5 2.7 1.3 6.4 1.0 7. AS16276 bom-ynm1-sbb1-8k.ind.asia (103.5.12.8) 0.0 0.9 1.9 0.0% 50 50 3.6 2.9 1.4 4.7 0.8 8. AS??? 10.200.4.7 0.1 0.2 0.4 0.0% 50 50 0.4 0.5 0.3 0.9 0.2 9. AS??? 103.27.171.248 0.3 11.5 37.7 40.0% 50 30 2.3 10.4 1.9 40.0 10.3 10. AS13335 162.158.226.87 0.6 3.4 26.4 0.0% 50 50 3.7 3.6 1.4 28.0 4.9 11. AS13335 172.65.166.118 0.2 0.1 0.3 0.0% 50 50 1.5 1.4 1.3 1.7 0.1 


The packet loss is visible on Cloudflare’s path (103.27.171.248), likely related to Mumbai POP peering. This issue has been ongoing for more than a week, and the support and network teams have not yet resolved it. Capturing a short 10–20 second event is challenging because even opening and connecting the system takes time. Despite this, I managed to capture a PCAP file of 1.7 GB and uploaded it. Now, the support team has responded saying the file cannot be accessed, which is surprising as they should be aware of standard PCAP file extensions.


attack pattern:
05:55:48.872518 IP 193.93.77.96.53 > 51.79.144.82.3333: 64940 10/6/12 NS ns1.usg.edu., NS ns3.usg.edu., RRSIG, NS ns2.usg.edu., DS, NS dns-ext1.gsu.edu., DS, NS ns4.usg.edu., RRSIG, NS dns-ext2.gsu.edu. (785)

 

same here