New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
DDoS Protected
Greetings
I am looking for a ddos protected hosts, my team has tried several hosts such as stormwall, voxility, OVH , but was not protected from the type of attack received, the botnet attack ranges from 200gbps to 800gbps(Amplified), we have a large scaling community of gamers consisting of teamspeak 3 and multiple game-servers.
Comments
Where did you get that information?
Do you have a capture of the attack?
@Francisco / @SplitIce / @Zare
We offer DDoS protected plans. Our servers are hosted at ReliableSite so you can read more about their DDoS protection here: https://www.reliablesite.net/ddos-protection/
Although I don' think our protection could meet your needs though because that's a lot of bandwidth.
@Francisco uses Cloudflare Magic Transit and I believe his DDoS protected IPs can handle up to 500Gbps.
Host provided me that information I already have the servers from hosteam.pk , buyvm, stormwall, rs-media ( Russian ), team-host(Russian) , php-friends right now which I am facing attacks to, artplanet(Russian)
Around 8-10 servers I have.
I got this information from stormwall, artplanet technicians, that I am facing gigantic ddos attacks more then 200gbp/s above there network capacity, the problem with the capture is attacker attacks the whole datacenter uplink not just mine, and tcpdump is never captured accurately, I have few dumps captured though.
The clean bandwidth I need is very less to be honest, but that range of attack is really high, I was looking at seflow, noex.de, cloud-shield.ru right now to switch to. To be honest I have tried every provider I could find till date, some providers just block the port 9987 when under attack .
Hi,
We at X4B off remote DDoS mitigation solutions. Our guarantees are fixed at around 100Gbps which is high enough that we only have to hand out a 3-4 nullroutes most years (from nearly a million attacks). Our max capacity is significantly higher (100Gbps is hard limited per PoP) however depends on attack, time, etc.
Regarding your measurements are you sure they are accurate? 800Gbps seems to be abnormally high. That's nation state level. I'm not sure that there is that much of any of the common amp sources currently available, it's certainly higher than anything I've seen recently.
When it comes to amplified attacks good transit providers (e.g NTT) rate limit them, effectively mitigating them before they reach the provider.
Further why is a amplified attack affecting you, surely it can just be ACLed?
https://www.youtube.com/channel/UCWng9V8ccQb-dGgRWYhRJEA
This botnet being used for the attack, not 100% sure but around 70% sure.
@Habeeb If you are are actually receiving attacks of that magnitude I suggest making a report to US FBI. They are always very interested in attacks of that magnitude.
You can look into @layerhost who offers 4Tbps mitigation. I'd recommend reaching out to them first, to learn more about their mitigation.
It's not that uncommon anymore unfortunately.. Gamers are targeted a lot.
Already submitted the details,
Yes for sure, was online.net able to successfully mitigate the attack without any interruptions on your services?
I don't have their curative protection on that server, so no. this specific server was hosting cs:go fastdl server and VPN for some users.
Either pay for their curative Anti-DDoS or move to OVH which is the only cheap one known to cover any attack size.
The problem with OVH is they drop some countries when under heavy mitigation, and unfortunately my country is one of them
@stefeman Until recently the officially recognized record was 1.35 Tbps. That's well on the way there... I wouldn't call that common.
Also I'm guessing you need to get your transit filtered for Amp. Let them do all the filtering so it doesnt count...
Looking back some history, this is the worst I've seen:
1,12 Tbps Ugh..
It's also possible that the reporting is bugged too.
I think Akamai said not too long ago that there was around 2Tbps attack against them.
Anyone has experience with https://www.stackpath.com/, what do you say about there ddos protection for gameservers?
Try @Clouvider UK location, they have best effort protection, and it should be pretty nice, though im not sure what Dom thinks about this risky stuff. I usually put my gameservers and TS3 on OVH to spare the other hosts from attracted trouble.
Maybe ask/wait him to respond first before trying his service.
Stackpath is not DDoS protected. only their WAF is, but its for websites.
You probly mean https://dedipath.com/ or https://path.net/ ?
Yes I have already contacted clouvider through there site earlier, and was talking about stackpath just came to know that they are of no use for game-servers, I have also tried dedipath already.
Then pretty much only thing left is the: https://www.online.net/en/dedicated-server/ddos-arbor curative protection from the cheap ones.
Actually theres Voxility too.. It might work for you.
I bought from https://dedicatserver.ro/, not working, I was looking at https://noez.de/ now , both using Voxility
Not a VPS from reseller. I mean directly.
Check out HyperFilter - not cheap though.
Anyone familiar with https://flokinet.is ? the owner is saying they have 2tbps mitigation and can withstand the attacks I am facing
https://bgp.he.net/AS200651 It's Voxility.
What about combahton ?
And if someone is familiar with https://zap-hosting.com/en/shop/product/linux-vserver/ Finland location
@Habeeb there isnt that many mitigation companies. Most of those you are looking at are using the likes of Voxility or Cloudflare to provide their mitigation. Look up the companies ASNs or (especially if they are too small / don't have one) perform a traceroute.
See the site I linked you for an example web tool for doing that research.
These are the latest attack logs I received from one of my provider
https://prnt.sc/t8ctnj
https://prnt.sc/t8cstl
https://prnt.sc/t8ctvw
I was thinking combahton as an option fastpipe.io ?