said by jlivingood: increase in massive new NTP attacks
jlivingood is correct... There's been an exploit for NTP that allows hackers to spoof a victims IP addresses and use the
"monlist" command to have an NTP server send large amounts of data to the victim.
The fix for the DDOS attack on NTP servers has been to Upgrade NTP servers to version 4.2.7 or later. This will remove the "monlist" command entirely.
If the NTP server can not be upgraded then the next step would be to add "disable monitoring" to the ntp.conf file and restart the NTP service.
Lastly NTP administrators are recommended to implement firewall rules that restrict traffic to the NTP server from unauthorized sources.
The above changes have been a nation-wide attempt secure NTP.
So, I'm thinking the OP may have been shut down by the recent NTP changes. Essentially it may be up to the OP to get "white listed" if NTP is mission critical. Not that another NTP server couldn't be found (one that accepts requests as configured).
David