DDoS Attack Protection for dedicated servers and VPS

Confidentiality, data protection, and resource availability are a few of a project’s biggest priorities and are essential for its services to continue operating uninterrupted. In its basic package, HOSTKEY provides all of its customers DDoS server attack protection by default free of charge in every data center in which it exists.


Basic DDoS attack protection free for all customers

For projects threatened by unconventional attacks, HOSTKEY offers advanced protection. Protection against DDoS attacks is provided for all dedicated servers and VPS. Advanced protection uses algorithms that filter incoming traffic round the clock as well as ensuring protection both from unconventional and common types of attacks in addition to attacks targeting network protocol vulnerabilities, which are more difficult to fend off.

All HOSTKEY servers in the Netherlands, Finland and the USA are under ongoing basic protection against DDoS attacks. This service fends off conventional “brute force” attacks designed to overcome the server port’s traffic capacity. This basic protection is provided to all customers by default at no cost to them.

Within the bounds of the basic monitoring protection system, the server port’s incoming traffic is constantly analyzed. In the event that the volume of its threshold values is exceeded, advanced protection is activated and the traffic is cleaned using the latest, effective algorithms.

The basic protection algorithms are sufficient for most projects. Nevertheless, a short-term decline in the services may occur during the process of the switch.

How does advanced DDoS attack protection work?

Advanced DDoS attack protection is required for projects for which the uninterrupted provision of its services is crucial. In order to ensure that outcome, the client’s infrastructure is connected to advanced protection algorithms on an ongoing basis.

The algorithms use machine learning to filter out «brute force», high-load attacks from large, distributed botnets as well as more clever, unconventional attacks which take advantage of network protocol vulnerabilities. Take for example the small (about 20 Mbps) syn flood/udp-flood.

When advanced algorithms are used, there is no possibility of even a short-term decline in service quality while the IP addresses are being changed during the switch.

DDoS upgrade packages

Data center locations
Cost, per month
Basic Advanced *
Activation By default By order
Data center locations The Netherlands, Finland, The USA The Netherlands
Cost, per month - for 1 TB of cleared incoming traffic.
The first 1 TB of traffic is provided free of charge.
Free €50

Activation: By default

Data center locations: The Netherlands, Finland and The USA

for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge.

Activation: By default

Data center locations: The Netherlands

* L7 application-level protection not provided

Advantages of advanced DDoS attack protection

  • client

    High filtration capacity

    The algorithms are capable of filtering an incoming traffic volume of up to 10 Gbps.
  • rocket


    The protection counteracts DDoS attacks with speeds of up to 650 Gbps.
  • speedtest


    Traffic filtration on the network and transport layers is implemented using hardware and software tools.
  • Efficiency


    Continuous traffic analysis is conducted using machine learning algorithms.
  • data analysis


    Advanced protection works for all servers 24/7, ensuring that powerful and unconventional attacks are detected in their early stages.
  • wallet


    HOSTKEY cooperates with leading providers in the information security field and uses the latest attack prevention technologies.
  • scalability


    Customers aren't required to invest in additional equipment or hire information security specialists, since their server protection is provided by HOSTKEY
  • scalability


    Protection systems quickly adapt to any infrastructure and any complexity level of attack.

Here are some types of attacks that HOSTKEY protects against:

SYN Flood


Fragmented ACK Flood

RST / FIN Flood

Fake Session Attack

Multiple SYN-ACK Fake Session Attack

Multiple ACK Fake Session Attack

Session Attack, SlowLoris

Misused Application Attack

Faulty Application Attack

UDP Flood

UDP Fragmentation Flood, UDP Fragmentation, Nuke

DNS Flood

Media Data Flood

Non-Spoofed UDP Flood

ICMP Flood

ICMP Fragmentation Flood, Nuke

Ping Flood

Ping Of Death

Zero Day DDoS attack, 0day DDoS attack

NTP Flood

NTP Amplification Attack

DNS Amplification Attack

IP Null Attack

TCP Null Attack

Type of Service (TOS) flood

Smurf Attack

Fraggle Attack

Naptha attacks

Teardrop Attack

SNMP Reflection

and more.

For more information, please contact our Sales Department

What customers say

After launching another successful IP — HUNT: Showdown, a competitive first-person PvP bounty hunting game with heavy PvE elements, Crytek aimed to bring this amazing game for its end-users. We needed a hosting provider that can offer us high-performance servers with great network speed, latency, and 24/7 support.
Stefan Neykov Crytek
doXray has been using HOSTKEY for the development and the operation of our software solutions. Our applications require the use of GPU processing power. We have been using HOSTKEY for several years and we are very satisfied with the way they operate. New requirements are setup fast and support follows up after the installation process to check if everything is as requested. Support during operations is reliable and fast.
Wimdo Blaauboer doXray
We would like to thank HOSTKEY for providing us with high-quality hosting services for over 4 years. Lp-label has been able to conduct many of its more than 100 million daily measurements through HOSTKEY’s servers, making our meteorological coverage even more complete.
D. Jayes IP-Label
1 /

Our Ratings

4.3 out of 5
4.8 out of 5

Hot deals

NEW GPU servers with RTX A4000 and RTX A5000

GPU servers with RTX A4000 and RTX A5000 cards are already available to order. NVIDIA RTX A4000 / A5000 graphics cards are the closest relative of the RTX 3080 / RTX 3090, but have double the memory.

Order a server
4th Gen Meet 4th Gen AMD EPYC™ Servers!

4th Gen CPUs AMD EPYC 9354 / 9124 are available for order. Base Clock: 3.25GHz, # of CPU Cores: 32, L3 Cache: 256MB, DDR5 RAM up to 6TB RAM, PCIe 5.0, up to 12 NVME drives.

Configure a server
10Gbps High-performance servers with FREE 10 Gb/s connections

Increase the performance of your IT infrastructure: powerful servers based on a AMD EPYC / Ryzen and Xeon Gold processors with a FREE 10 Gb/s connection.

Hot deals Sale on pre-configured dedicated servers

Ready-to-use servers with a discount. We will deliver the server within a day of the receipt of the payment.

Order now
50% OFF Dedicated Servers for hosting providers - 7 days trial and 50% OFF

Discover affordable dedicated servers for hosting providers, situated in a top-tier Amsterdam data center in the Netherlands. 7 days trial, 50% OFF on the first 3 months, 50% OFF for a backup server.

Order a server
Storage Storage dedicated servers up to 264TB for fixed price

2-12 LFF bays, Enterprise grade HDD/SSD, Hardware RAID (0/10/6), Up to 10GBps uplink, up to 100G direct connect.

Order a server
1 /4


GPU servers for data science

GPU servers for data science

e-Commerce hosting solutions

e-Commerce hosting

Hosting solutions for finance and FinTech projects

Finance and FinTech

Hosting for gambling projects

Hosting for gambling projects in the Netherlands

Private cloud

High-performance servers for rendering, 3D Design and visualization

Rendering, 3D Design and visualization


Managed colocation

Subscribe to our newsletter & actionable email communication

You will be first to receive useful tips and special offers

For more information, please contact our Sales Department


Do you provide extended DDoS protection?

Of course! If the basic level of DDoS protection does not suit your project, we will provide you with an extended service for a fee.

To make a suitable configuration for your business, contact our manager.

Are there any other security measures besides protection against DDoS attacks?

All our servers are reliably protected from third parties by special software. We also provide physical security for our data centers. We watch them around the clock on cameras and live. The level of protection of your data will be TIER III.

How do I know that DDoS attack protection is working?

A DDoS attack is aimed at overloading your site with requests so that it stops working. Accordingly, you can make sure that our anti-DDoS service is effective when you see that the site is working without delay. The fault tolerance level of the HOSTKEY equipment is 99.982%, which means that your data will be protected from intruders in the most reliable way.

How long does it take to activate my DDoS protected IP address?

If you choose a ready-made version from HOSTKEY library, it will be available to you in 15 minutes after payment, since it has already been assembled and tested by our engineers. If you want a customized server with anti-DDoS service, you will have to wait from 4 to 24 hours, depending on the hardware and software configuration.

How much does HOSTKEY's DDoS protection cost?

Basic anti-DDoS service by HOSTKEY is always free for you. If you want extended protection, please contact our manager, and they will advise you on the cost of the service, as it depends on the needs of your project.

What Hardware Do You Use For Your DDoS Protected VPS Nodes?

We use the latest hardware and software innovations in the industry to provide DDoS protection server. Hostkey sets favorable prices for dedicated server with DDoS protection. You can choose the suitable hardware for your needs.

Where can I find my protected IP address?

By using remote DDoS protection, you can find your IP address in the settings related to networks and the Internet. If you're having trouble finding your IP address, contact Hostkey, a company that provides anti DDoS VPS services.



Dell and Supermicro servers: authorization via LDAP

We describe how to integrate heterogeneous server platforms with centralized LDAP authentication.


Personal Shadowsocks/XRay (XTLS) VPN-server with 3X-UI control panel

Hostkey has prepared a new service for its clients - server rental with pre-installed VPN 3X-UI. The new service is available for order on the company's website.


HOSTKEY expands into Frankfurt, Germany

HOSTKEY, a leading international hosting provider, today announced its expansion into Frankfurt, Germany.

Show all news / blogs
1 /

HOSTKEY Dedicated servers and cloud solutions Pre-configured and custom dedicated servers. AMD, Intel, GPU cards, Free DDoS protection amd 1Gbps unmetered port 30
4.3 67 67