[Dxspider-support] Results of this morning's flood analysis.

Kin ea3cv at cronux.net
Sun Mar 23 16:09:37 GMT 2025


Hi,

Data obtained from today's captures.

			DXSpider	DXSpider	CCCluster
CCCluster
			build 598	build 600	3397/4.47
3397/4.47

DX Call		EA3CV-2	EA3CV-3	N2WQ-1	VE7CC-1
----------		-------	-------	--------	--------
AK4KZ				22		22	  1187		420
RU2H			 	 3		 3	  1023		444
SP8X/P			19		19	   835		238
ON3KEV/P			13		13	   993		486
EA5QN			 	 1		 1	  1021		334
EA5JNM			 1		 1	   985		390
IZ6BXV			 8		 8	  1653		502
OA0IARU			24		24	  2687		976
4L7KA			 	 3		 3	   940		464
EA8/DL2DXA/P	 	 5		 5	  1989		456

Notes
1. Five Telnet sessions were used with the nodes: EA3CV-2, EA3CV-3, N2WQ-1,
VE7CC-1, and WA9PIE-2.
   Unfortunately, due to an error on my part, I lost the log for WA9PIE-2.
2. All sessions were established from the same host, with no disconnections
during the observation.
3. The columns show the matches with the DX station during the period from
11:54 to 12:27 Z.
   The procedure used in all cases is similar to the following: grep 4L7KA
ea3cv-2 | wc -l
4. Although the same DX station was detected more than once, the totals show
the actual + false calls for the sample period.
5. The locations were chosen randomly, but with different callsign
configurations, with and without comments.

I believe the effectiveness of the latest version against the flooding
attack is very satisfactory.

We continue listening ...

Kin EA3CV

-------------- next part --------------
A non-text attachment was scrubbed...
Name: winmail.dat
Type: application/ms-tnef
Size: 6174 bytes
Desc: not available
URL: <https://mailman.tobit.co.uk/pipermail/dxspider-support/attachments/20250323/1d1a8400/attachment.bin>


More information about the Dxspider-support mailing list