DDoS Attack Protection for dedicated servers and VPS

Confidentiality, data protection, and resource availability are a few of a project’s biggest priorities and are essential for its services to continue operating uninterrupted. In its basic package, HOSTKEY provides all of its customers DDoS server attack protection by default free of charge in every data center in which it exists.

DDOS

Basic DDoS attack protection free for all customers

For projects threatened by unconventional attacks, HOSTKEY offers advanced protection. Protection against DDoS attacks is provided for all dedicated servers and VPS. Advanced protection uses algorithms that filter incoming traffic round the clock as well as ensuring protection both from unconventional and common types of attacks in addition to attacks targeting network protocol vulnerabilities, which are more difficult to fend off.

All HOSTKEY servers in the Netherlands and the USA are under ongoing basic protection against DDoS attacks. This service fends off conventional “brute force” attacks designed to overcome the server port’s traffic capacity. This basic protection is provided to all customers by default at no cost to them.

Within the bounds of the basic monitoring protection system, the server port’s incoming traffic is constantly analyzed. In the event that the volume of its threshold values is exceeded, advanced protection is activated and the traffic is cleaned using the latest, effective algorithms.

The basic protection algorithms are sufficient for most projects. Nevertheless, a short-term decline in the services may occur during the process of the switch.

How does advanced DDoS attack protection work?

Advanced DDoS attack protection is required for projects for which the uninterrupted provision of its services is crucial. In order to ensure that outcome, the client’s infrastructure is connected to advanced protection algorithms on an ongoing basis.

The algorithms use machine learning to filter out «brute force», high-load attacks from large, distributed botnets as well as more clever, unconventional attacks which take advantage of network protocol vulnerabilities. Take for example the small (about 20 Mbps) syn flood/udp-flood.

When advanced algorithms are used, there is no possibility of even a short-term decline in service quality while the IP addresses are being changed during the switch.

DDoS upgrade packages



Activation
Data center locations
Cost, per month
Basic Advanced *
Activation By default By order
Data center locations The Netherlands, The USA The Netherlands
Cost, per month - for 1 TB of cleared incoming traffic.
The first 1 TB of traffic is provided free of charge.
Free €50

Activation: By default

Data center locations: The Netherlands, The USA

for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge.

Activation: By default

Data center locations: The Netherlands



* L7 application-level protection not provided

Advantages of advanced DDoS attack protection

  • client

    High filtration capacity

    The algorithms are capable of filtering an incoming traffic volume of up to 10 Gbps.
  • rocket

    Reliability

    The protection counteracts DDoS attacks with speeds of up to 650 Gbps.
  • speedtest

    Flexibility

    Traffic filtration on the network and transport layers is implemented using hardware and software tools.
  • Efficiency

    Automation

    Continuous traffic analysis is conducted using machine learning algorithms.
  • data analysis

    Efficiency

    Advanced protection works for all servers 24/7, ensuring that powerful and unconventional attacks are detected in their early stages.
  • wallet

    Producibility

    HOSTKEY cooperates with leading providers in the information security field and uses the latest attack prevention technologies.
  • scalability

    Cost

    Customers aren't required to invest in additional equipment or hire information security specialists, since their server protection is provided by HOSTKEY
  • scalability

    Scalability

    Protection systems quickly adapt to any infrastructure and any complexity level of attack.

Here are some types of attacks that HOSTKEY protects against:



SYN Flood

SYN-ACK Flood

Fragmented ACK Flood

RST / FIN Flood

Fake Session Attack

Multiple SYN-ACK Fake Session Attack

Multiple ACK Fake Session Attack

Session Attack, SlowLoris

Misused Application Attack

Faulty Application Attack

UDP Flood

UDP Fragmentation Flood, UDP Fragmentation, Nuke

DNS Flood

Media Data Flood

Non-Spoofed UDP Flood

ICMP Flood

ICMP Fragmentation Flood, Nuke

Ping Flood

Ping Of Death

Zero Day DDoS attack, 0day DDoS attack

NTP Flood

NTP Amplification Attack

DNS Amplification Attack

IP Null Attack

TCP Null Attack

Type of Service (TOS) flood

Smurf Attack

Fraggle Attack

Naptha attacks

Teardrop Attack

SNMP Reflection

and more.

For more information, please contact our Sales Department

What customers say

Crytek
After launching another successful IP — HUNT: Showdown, a competitive first-person PvP bounty hunting game with heavy PvE elements, Crytek aimed to bring this amazing game for its end-users. We needed a hosting provider that can offer us high-performance servers with great network speed, latency, and 24/7 support.
Stefan Neykov Crytek
doXray
doXray has been using HOSTKEY for the development and the operation of our software solutions. Our applications require the use of GPU processing power. We have been using HOSTKEY for several years and we are very satisfied with the way they operate. New requirements are setup fast and support follows up after the installation process to check if everything is as requested. Support during operations is reliable and fast.
Wimdo Blaauboer doXray
IP-Label
We would like to thank HOSTKEY for providing us with high-quality hosting services for over 4 years. Lp-label has been able to conduct many of its more than 100 million daily measurements through HOSTKEY’s servers, making our meteorological coverage even more complete.
D. Jayes IP-Label
1 /

Our Ratings

3.9 out of 5
4.0 out of 5
4.3 out of 5
4.5 out of 5
4.0 out of 5
4.8 out of 5

Hot deals

NEW GPU servers with RTX A4000 and RTX A5000

GPU servers with RTX A4000 and RTX A5000 cards are already available to order. NVIDIA RTX A4000 / A5000 graphics cards are the closest relative of the RTX 3080 / RTX 3090, but have double the memory.

Order a server
22% OFF Up to 22% discount on Instant servers

A special offer for our instant dedicated servers built with 2x Intel Xeon 2670 CPUs housed in our TIER III class data center in the Netherlands

Order a server
10Gbps High-performance servers with FREE 10 Gb/s connections

Increase the performance of your IT infrastructure: powerful servers based on a AMD EPYC / Ryzen and Xeon Gold processors with a FREE 10 Gb/s connection.

Order
Hot deals Sale on pre-configured dedicated servers

Ready-to-use servers with a discount. We will deliver the server within a day of the receipt of the payment.

Order now
1 /4

Solutions

GPU servers for data science

GPU servers for data science

e-Commerce hosting solutions

e-Commerce hosting

Hosting solutions for finance and FinTech projects

Finance and FinTech

Hosting for gambling projects

Hosting for gambling projects in the Netherlands

Private cloud

High-performance servers for rendering, 3D Design and visualization

Rendering, 3D Design and visualization

storage_solutions_main

Managed colocation

Subscribe to our newsletter & actionable email communication

You will be first to receive useful tips and special offers

For more information, please contact our Sales Department

FAQ

Do you provide extended DDoS protection?

Of course! If the basic level of DDoS protection does not suit your project, we will provide you with an extended service for a fee.

To make a suitable configuration for your business, contact our manager.

Are there any other security measures besides protection against DDoS attacks?

All our servers are reliably protected from third parties by special software. We also provide physical security for our data centers. We watch them around the clock on cameras and live. The level of protection of your data will be TIER III.

How do I know that DDoS attack protection is working?

A DDoS attack is aimed at overloading your site with requests so that it stops working. Accordingly, you can make sure that our anti-DDoS service is effective when you see that the site is working without delay. The fault tolerance level of the HOSTKEY equipment is 99.982%, which means that your data will be protected from intruders in the most reliable way.

How long does it take to activate my DDoS protected IP address?

If you choose a ready-made version from HOSTKEY library, it will be available to you in 15 minutes after payment, since it has already been assembled and tested by our engineers. If you want a customized server with anti-DDoS service, you will have to wait from 4 to 24 hours, depending on the hardware and software configuration.

How much does HOSTKEY's DDoS protection cost?

Basic anti-DDoS service by HOSTKEY is always free for you. If you want extended protection, please contact our manager, and they will advise you on the cost of the service, as it depends on the needs of your project.

News

21.11.2022

Black Friday 2022 at HOSTKEY

Discounts up to 25% and one month server rental free!

11.11.2022

How to ignore tmpfs, udf, iso9660 when dealing with filesystem metrics

How to avoid issues using Foreman when installing Windows OS?

31.10.2022

Monitoring Linux Services with Prometheus

Monitoring services and implementing an alert system on Linux servers with Prometheus.

Show all news / blogs
1 /




HOSTKEY Dedicated servers and cloud solutions Pre-configured and custom dedicated servers. AMD, Intel, GPU cards, Free DDoS protection amd 1Gbps unmetered port 30
4.3 67 67
Upload