Home
/
Resources

NTP Amplification Attack

What is an NTP Amplification Attack?

An NTP Amplification Attack is a type of reflected Distributed Denial of Service (DDoS) attack that exploits the Network Time Protocol (NTP) to generate massive volumes of traffic directed at a victim, overwhelming their network and rendering services unavailable.  

Attackers spoof the victim's IP address and send small UDP queries to publicly accessible NTP servers that have "monlist" (or other amplification-capable commands) enabled. The server responds with a much larger packet (amplification factor historically up to 200x-500x), flooding the victim with unwanted traffic.  

In cybersecurity, NTP amplification is a classic example of reflection/amplification DDoS, abusing legitimate UDP-based protocols with poor source validation to achieve high bandwidth at low attacker cost. It remains relevant in 2026 as one of the easiest and most scalable DDoS vectors, frequently used in extortion campaigns, competitive sabotage, hacktivism, and as distraction during data breaches or ransomware operations.

Types of NTP Amplification Attacks

NTP amplification is one specific subtype of reflection/amplification DDoS attacks. Related and similar variants include:  

  • NTP monlist Amplification - Classic and most notorious (now mostly mitigated via monlist disablement).  
  • NTP readvar / readlist Amplification - Alternative NTP commands that still allow modest amplification.  
  • Other Protocol Amplification - DNS amplification (ANY/RRSIG queries), SSDP/UPnP, Memcached, CLDAP, CharGEN, QOTD, SNMP, CoAP, RIP, Portmap, and newer vectors (e.g., WS-Discovery, Apple AirPlay).  
  • Hybrid Amplification - Combining multiple protocols in one campaign for higher volume and evasion.

NTP Amplification Attacks mostly used in

Malicious actors use NTP amplification by:  

  1. Identifying vulnerable NTP servers with monlist/readvar enabled (via Shodan, Censys, or custom scanners).  
  2. Spoofing the victim's IP address as the source of small UDP queries (typically 234 bytes or less).  
  3. Sending queries to hundreds/thousands of open NTP servers simultaneously.  
  4. Servers reply with large responses (thousands of bytes) to the spoofed victim IP.

Tools include custom Python/Scapy scripts, LOIC/HOIC with spoofing plugins, or DDoS-for-hire (booter/stresser) services that include NTP vectors. Ethical use is limited to authorized red team testing of DDoS resilience with explicit permission.

NTP Amplification vs. Other Reflection/Amplification Attacks

Attack Type Protocol/Port Common Amplifying Command Typical Amplification Factor Primary Target Vector
NTP Amplification NTP (UDP 123) monlist / MON_GETLIST 50x – 556x+ Volumetric bandwidth flood
DNS Amplification DNS (UDP 53) ANY / large responses Up to 179x Similar reflection
CLDAP Reflection LDAP (UDP 389) Search requests High (variable) Directory services
Memcached UDP 11211 get requests Up to 51,000x Extremely high multiplier

NTP Amplification Attacks usually used for:

Attackers launch NTP amplification when seeking high-volume, low-effort DDoS-during ransom demands (“pay or we flood”), to knock competitors offline, as hacktivist protest, during geopolitical events, or as diversion while performing data exfiltration or ransomware encryption. Defensively, organizations simulate NTP-style amplification during DDoS readiness testing and capacity planning.

Detection of NTP Amplification Attack

Detection involves identifying sudden spikes in inbound UDP traffic on port 123, unusually high packet rates from diverse NTP server IPs, disproportionate response-to-request ratios, or traffic patterns matching known amplification signatures. Tools include:  

  • NetFlow/sFlow analysis for anomalous UDP 123 volume.  
  • Intrusion Detection Systems (IDS) with NTP-specific rules.  
  • Cloud provider DDoS dashboards (AWS Shield, Azure DDoS Protection).  
  • SIEM/XDR correlation of traffic spikes with no legitimate client activity.

Behavioral baselines and machine learning help distinguish legitimate NTP queries from amplification floods.

Benefits of using NTP Amplification Attack

Understanding NTP amplification enables organizations to engineer robust DDoS resilience, identify and harden misconfigured NTP servers (reducing global attack surface), validate scrubbing and filtering capacity, improve incident response playbooks for volumetric attacks, support cyber insurance underwriting, meet availability SLAs, and drive adoption of modern anti-DDoS controls; ultimately minimizing downtime, financial loss, and reputational damage from high-volume floods.

How to get Protected from NTP Amplification Attacks

Protection against NTP amplification requires layered defenses:  

  • Disable monlist, readvar, and other high-amplification commands on all NTP servers (use ntpd 4.2.8+ or chrony with rate limiting).  
  • Implement BCP 38 ingress/egress filtering to block spoofed traffic.  
  • Deploy cloud-based DDoS scrubbing (Cloudflare, Akamai, AWS Shield Advanced, Azure DDoS Protection, Fastly).  
  • Use anycast DNS and CDN edge protection to absorb/absorb volumetric attacks.  
  • Apply rate limiting and UDP 123 filtering at perimeter firewalls/routers.  
  • Monitor continuously with NetFlow, SIEM/XDR, and anomaly detection.  
  • Conduct regular DDoS simulation testing and maintain incident response plans.

Loginsoft’s XDR and SIEM platforms enhance protection with real-time traffic anomaly detection, automated mitigation triggers, and correlated visibility across networks and endpoints.

Loginsoft Perspective

At Loginsoft, NTP amplification attacks are recognized as a form of Distributed Denial of Service (DDoS) attack that exploits misconfigured Network Time Protocol (NTP) servers to amplify traffic and overwhelm targeted systems. By leveraging small requests that generate significantly larger responses, attackers can create massive traffic floods that disrupt services and impact availability. Loginsoft helps organizations identify exposure to such amplification vectors and implement controls to prevent misuse.

Loginsoft supports organizations by

  • Identifying publicly exposed and misconfigured NTP servers
  • Detecting abnormal traffic patterns indicative of amplification attacks
  • Implementing controls to restrict or secure NTP services
  • Leveraging threat intelligence to anticipate and mitigate attack campaigns
  • Strengthening network resilience against volumetric DDoS attacks

Our approach ensures organizations reduce their exposure to amplification-based threats while maintaining the availability and stability of critical services.

FAQ

Q1 What is an NTP amplification attack?

An NTP amplification attack is a type of distributed denial-of-service (DDoS) reflection/amplification attack that exploits vulnerable Network Time Protocol (NTP) servers. The attacker spoofs the victim’s IP address and sends small “monlist” or other query requests to many public NTP servers, which respond with much larger replies sent directly to the victimm; multiplying the attack traffic by 50×-200× (amplification factor) and overwhelming the victim’s bandwidth.

Q2 How does an NTP amplification attack work step by step?  

  1. Attacker spoofs the source IP address of the victim in UDP packets.  
  2. Sends small UDP requests (e.g., “monlist”, “stats”, or “peers”) to many open NTP servers.  
  3. NTP servers reply with large responses (up to 600× larger than the request).  
  4. All replies flood the victim’s IP, saturating bandwidth and causing denial of service.

The attack is cheap, effective, and hard to trace because traffic appears legitimate and comes from thousands of different servers.

Q3 Why was the “monlist” command so dangerous for NTP amplification?

The “monlist” (monitoring list) command in older NTP versions (pre-4.2.7p26) returns a list of the last 600+ clients that contacted the server;  a very large response (up to 48 KB) from a tiny request (234 bytes). This gave one of the highest amplification factors ever seen (200×). After 2013-2014 massive attacks, most public servers disabled monlist, but other amplification vectors (e.g., “stats”, “peers”) remain exploitable on misconfigured servers.

Q4 What are the main differences between NTP amplification and other reflection attacks?  

  • NTP - historically highest amplification factor (50-200×), UDP-based, easy to spoof, targets time servers.  
  • DNS amplification - still very common, amplification 20-50×, uses ANY or EDNS0 queries.  
  • Memcached - extreme amplification (up to 50,000×), but fewer open servers after 2018 mitigations.  
  • SSDP/UPnP - 30×, targets home routers/IoT.

NTP remains dangerous because many legacy and misconfigured enterprise/GPS time servers still expose amplification commands.

Q5 Is NTP amplification still a threat in 2026-2027?

Yes; while monlist is largely disabled, other NTP commands (sysstats, peers, readvar) and misconfigured servers still provide 20-100× amplification. CISA, US-CERT, and shadowserver continue to scan for vulnerable NTP servers. IoT/5G growth and new NTP implementations keep the vector alive; volumetric DDoS attacks using NTP reflection remain common in DDoS-for-hire services.

Q6 How can organizations prevent becoming a victim of NTP amplification?

Victim-side protections:  

  • Deploy cloud DDoS scrubbing / mitigation (Cloudflare Magic Transit, Akamai Prolexic, AWS Shield, Imperva)  
  • Use anycast DNS & global traffic absorption  
  • Implement upstream ingress filtering (BCP 38 / anti-spoofing) at ISP level  
  • Rate-limit UDP traffic (especially port 123)  
  • Use DDoS protection proxies or BGP flowspec

Q7 How can organizations prevent their NTP servers from being used in amplification attacks?

Source-side (amplifier) mitigations:  

  • Disable monlist, stats, and other high-amplification queries (NTP 4.2.7p26+)  
  • Configure “noquery” or “ignore” for unauthenticated requests  
  • Restrict NTP access to trusted IP ranges (access control lists)  
  • Use authentication (symmetric keys or Autokey)  
  • Run NTP in “server only” mode (no client queries allowed)  
  • Apply firewall rules: block inbound UDP/123 except from trusted time sources

Q8 What are the best practices for securing NTP in 2026-2027?

Modern NTP hardening:  

  • Use chrony or ntpd 4.2.8p15+ with default restrictions  
  • Enable “kod” (kiss-o-death) and rate limiting  
  • Restrict queries to “noquery” or authenticated clients only  
  • Prefer authenticated time sources (NTPsec, chrony NTS)  
  • Monitor NTP traffic for unusual query volumes  
  • Regularly scan your own infrastructure for open NTP servers (Shodan, Censys, shadowserver reports)

Q9 Can firewalls or IPS stop NTP amplification attacks?

On-premises firewalls/IPS can help but are usually insufficient for large volumetric attacks (>10-40 Gbps). They can block known bad patterns or rate-limit UDP/123, but cloud-based scrubbing with massive capacity (Tbps scale) and anycast routing is required for serious protection. Hybrid (on-prem + cloud) is the most common approach.

Q10 What are common NTP amplification mitigation services and providers?

Leading DDoS protection services that effectively stop NTP amplification:  

  • Cloudflare Magic Transit / Spectrum  
  • Akamai Prolexic  
  • AWS Shield Advanced  
  • Imperva DDoS Protection  
  • Radware Cloud DDoS  
  • Fastly Next-Gen WAF + DDoS  
  • Microsoft Azure DDoS Protection  
  • OVHcloud Anti-DDoS  
  • NetScout Arbor DDoS Mitigation

Q11 How do I test if my NTP servers are vulnerable to amplification?

Safe testing methods:  

  • Use public scanners: shadowserver.org (free NTP scan reports), openntpproject.org, cve.mitre.org  
  • Run nmap with NTP scripts: nmap -sU -p 123 --script ntp-monlist <IP>  
  • Query monlist manually: ntpq -c monlist <IP> (should return error or empty)  
  • Ask your ISP/security provider to confirm ingress filtering (BCP 38) is active upstream

Q12 How do I get started protecting against NTP amplification attacks?

Quick-start path:  

  1. Scan your public IPs for open NTP servers (use shadowserver or nmap)  
  2. Harden all internal/external NTP servers (disable monlist, restrict queries)  
  3. Enable upstream anti-spoofing (ask ISP for BCP 38 confirmation)  
  4. Sign up for free/low-cost DDoS protection (Cloudflare free plan, Azure DDoS standard)  
  5. Monitor UDP/123 traffic spikes in NetFlow/sFlow  
  6. Document incident response for volumetric attacks

Most organizations can achieve basic protection within 1-2 weeks.

Glossary Terms
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.