DDoS protection

Dynamic DDoS protection

DDoS protection

DDoS is an attempt to exhaust the resources of the server, network, site so that users cannot access the resource itself. DDoS protection automatically detects and mitigate attacks targeting the hosting website and server. Every year, the definition of a DDoS attack continues to become more complicated. Cyber ​​criminals use a combination of very large attacks as well as more subtle and hard to detect injections. Our DDoS protection system will save your resource and your data using Arbor, Juniper and other equipment.

By purchasing protection against DDoS attacks you will receive

DDoS protection

Protection against all kinds of attacks up to 1.2TBps or 500mpps

blank

Layer 3, 4 and 7 protection

The system automatically blocks ongoing attacks on Layer 3, 4 and 7 (attacks on the application and web sites that work through the HTTP and HTTPS protocols)

Traffic without limits

Completely unlimited traffic. There are no restrictions on the amount of traffic consumed on all tariff plans.

blank
blank

Protecting encrypted traffic

Filters secure HTTPS traffic in real time, without any blocking by IP address, in particular at the application level (Layer 7).

Quick Elimination

Our DDoS protection system will automatically detect and block any manifestation of an attack in less than a few milliseconds.

blank
blank

Protected networks of IP addresses

We have at our disposal a large number of secure IP networks of various sizes that are not subject to DDoS attacks.

DDoS protection is for everyone

Protection against DDoS does not create additional load on the server or traffic. Our system will constantly detect DDoS attacks, and recognizing them will constantly improve. Once an attack is detected, dynamic DDoS protections will immediately step in and filter out the attack. DDoS attack traffic system usually does not affect your traffic due to its dynamic attack mitigation method.

DDoS protection service

We provide professional protection against DDoS attacks various kinds. Our service is able to protect your website, game server or any other TCP/UDP service from DDoS attacks. Remote filtering allows you to completely filter all types of DDOS attacks, up to 1.2TBps, which allows us to offer our customers a high level of service. And the very connection of this service will take only a couple of minutes.

According to the impact method, the following types of DDoS attacks can be distinguished:

Network layer DDoS attacks (Layer 3,4) that affect the performance of server hardware, limit or harm software due to protocol vulnerabilities.

DDoS attacks at the application level (Layer 7), which make an attack on the "weak" places of the resource, work purposefully, have a difference in the minimum consumption of resources, prevail in number and require the most complex countermeasures, as well as large financial costs.

Secure hosting
Hosted with DDoS protection, a modern site must be protected from DDoS attacks.
Details

Protected
VDS Protected VPS/VDS from DDoS attacks is ideal for growing projects.
Details

Protected servers
We will provide reliable protection for your dedicated server from DDoS attacks.
Details

Secure networks
DDoS protection of your network, automatic detection and filtering of traffic on your networks.
Details

Blocking any type of IP attack

  • Protecting protocol vulnerabilities
    Protection against IP spoofing, LAND, Fraggle, Smurf, WinNuke, Ping of Death, Tear Drop and IP Option, IP fragment control packet attacks, and ICMP large, redirected, and unreachable packet attacks.
  • Protection against network-type attacks
    SYN, ACK Flood, SYN-ACK Flood, FIN/RST Flood, TCP Fragment Flood, UDP Flood, UDP Fragment Flood, NTP Flood, ICMP Flood, TCP Connection Flood, Sockstress, TCP Retransmission and TCP Null Connection attacks .
  • Protection against scanning and sniffing attacks
    Protection against port and address scanning, Tracert, IP Option, IP timestamp and IP route recording attacks.

  • DNS attack protection
    Protection against DNS Query Flood attacks from real or fake IP address sources, DNS Reply Flood attacks, DNS Cache Poisoning attacks, DNS protocol vulnerability attacks and DNS Reflection attacks.
  • Blocking botnet traffic
    Block traffic of botnets, active zombies, trojan horses, worms and tools such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest, Thc-ssl-dos, YoyoDDOS, IMDDOS, Puppet, Storm, fengyun, AladinDDoS, etc. .d. As well as C&C DNS requests to block traffic.
  • DHCP server protection
    Protection against DHCP flood attacks.
  • Web attack protection
    Protection against HTTP Get Flood, HTTP Post Flood, HTTP Head Flood, HTTP Slow Header Flood, HTTP Slow Post Flood, HTTPS Flood and SSL DoS/DDoS attacks.
  • Functional blacklist filtering
    Field filtering of HTTP/DNS/SIP/DHCP, field and functional filtering of IP/TCP/UDP/ICMP/etc. protocols.
  • Mobile attack protection
    Protection against DDoS attacks launched by mobile botnets, such as AnDOSid/WebLOIC/Android.DDoS.1.origin.
  • SIP Application Protection
    Protection against attacks by polluting SIP methods.
blank

Cyber ​​attacks map

High performance and volumetric cleaning

This system is one of the largest data centers in Europe with a capacity of up to 1.2 Tbps to protect users from large DDoS attacks such as SYN flood and DNS amplification. Over the past 12 months, numerous 600Gbps + IoT attacks have been protected, making this one of the largest defense systems in Europe. In addition to these high-volume attacks, 40 Gb/s attack protection was performed.

But, in addition to power, high performance is also required to filter out layer 7 attacks and support truly perfect latency in general for all users. Because it uses an ultra-fast hardware cleanup environment known as "DDoS protection cloud", DDoS cleanup covers the entire infrastructure. Therefore, cleaning will be carried out not by any one panel, but by many routers and switches that will work as one system and provide the best delay.