You can limit how often a remote is allowed to connect in a certain timespan. For example:
Code:
-A INPUT -p tcp -m tcp --dport 22 -m limit --limit 6/min -j ACCEPT
This will limit connections per IP to 6 per minute to SSH (port 22). If this limit is exceeded, the connection is silently dropped (or rejected if that's your default iptables action).
That's why I asked if you were using this, because you could also do this for ICMP (ping) packets, in which case a ping may appear to never reach your server if it has exceeded this limit. This can make things look as if they're not working properly, while in fact they are ("it's not a bug, it's a feature" )