What an attack looks like?
An attacker creates a large amount of traffic in order to exhaust the bandwidth of the Internet channel and disrupt the operation of the network infrastructure.
How does DDoS protection work?
In our DDoS-protected hosting, all traffic to secure IP aesses goes through a security system that performs scrubbing: it rejects illegitimate traffic, letting only cleared incoming traffic through. Smart filtering is performed without redirects, IP blocks, or captchas. Traffic is redirected to secure IP addresses. All settings, including changing the A record in DNS, are performed by the provider.
What an attack looks like?
Attackers disguise their actions as legitimate traffic by manipulating requests and interactions with web applications, which causes system crashes or overloads.
How does DDoS protection work?
On top of a public IP, the website is assigned a private IP address, specified in the domain’s A record. All HTTP/HTTPS traffic is directed to this address and goes through security systems that analyze requests, detect anomalies, and block malicious actions without using captcha or redirects (WAF protection). The scrubbed traffic is then redirected to your server’s IP address.
Join the waitlist for the latest news, best deals and platform availability infomation.