Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


HAZI.ro | Dedicated vCPUs | Up to 16 addon IPs | No SMTP | 40% OFF Recurring - Page 2
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

HAZI.ro | Dedicated vCPUs | Up to 16 addon IPs | No SMTP | 40% OFF Recurring

2»

Comments

  • FlorinMarianFlorinMarian Member, Host Rep

    @ralf said:

    @NoComment said:
    Cloudflare would help but it's probably much less effective when your origin IP is known to your attackers and no firewall on your http/https ports. Are they only attacking you through cloudflare?

    Except... he does have a load of IPs because he sells VPSes. He could temporarily copy his website onto one of them and have cloudflare use that, or have a wireguard tunnel from a VPS to his original machine and close off the standard ports on that, or even just get another VPS from someone else and use that for now so he's got an IP in someone else's range.

    Thank you for suggestion but I already closed any http/https for IPs which are not listed in CloudFlare's API hosts.

Sign In or Register to comment.