What could have been sent to my server to cause it to reboot?
Details:
I have a for-internal-use LAMP server running Ubuntu 10.04LTS (upgrade is scheduled for that nebulous "when I have time"). It runs several in-house scripts and monitors, and is my preferred gateway to remote in to the office. Over the last couple of months, the ssh and web attack attempts have been increasing at a scary pace, and two weeks ago the server began rebooting for no visible reason. At first it was once overnight, then overnight every night, until it finally escalated to every few hours.
I looked through all the system logs, which only show boot-up messages, then normal running messages, then boot-up messages again. I ran memtest and drive tests and CPU tests which all came back clean. So I turned my attention to the uninvited knockers-at-the-door.
I thought: there are NO legitimate reasons for anyone outside of the country to connect to this computer.
So I began grabbing an IP address of an obvious troll from the logs, using whois to pull up their host company, and banning that host company's entire range:
iptables -I INPUT -s 1.180.0.0/14 -j DROP
But this seemed slow, so I started looking for a better list. While looking, the server rebooted again. I found this rather quickly: http://nebulous.frikafrax.com/2013/323/chinanet-spam and spent a handful of minutes cobbling together a Perl script to dump the entire set of ranges into iptables.
No more random server rebooting.
It has been 3 days with no reboots. So now that my preamble is over here is the question:
What could have been sent to my server to cause it to reboot? The evidence more than suggests that the cause was not hardware but an attack effect, possibly intended, possibly unintended side-effect, but I would like to have more information on this attack and ways to detect and prevent it in the future.
Any thoughts or specific experiences are welcome.