Confidentiality, data protection, and resource availability are a few of a project’s biggest priorities and are essential for its services to continue operating uninterrupted. In its basic package, HOSTKEY provides all of its customers DDoS server attack protection by default free of charge in every data center in which it exists.
For projects threatened by unconventional attacks, HOSTKEY offers advanced protection. Protection against DDoS attacks is provided for all dedicated servers and VPS. Advanced protection uses algorithms that filter incoming traffic round the clock as well as ensuring protection both from unconventional and common types of attacks in addition to attacks targeting network protocol vulnerabilities, which are more difficult to fend off.
All HOSTKEY servers in the Netherlands, Finland and the USA are under ongoing basic protection against DDoS attacks. This service fends off conventional “brute force” attacks designed to overcome the server port’s traffic capacity. This basic protection is provided to all customers by default at no cost to them.
Within the bounds of the basic monitoring protection system, the server port’s incoming traffic is constantly analyzed. In the event that the volume of its threshold values is exceeded, advanced protection is activated and the traffic is cleaned using the latest, effective algorithms.
The basic protection algorithms are sufficient for most projects. Nevertheless, a short-term decline in the services may occur during the process of the switch.
Advanced DDoS attack protection is required for projects for which the uninterrupted provision of its services is crucial. In order to ensure that outcome, the client’s infrastructure is connected to advanced protection algorithms on an ongoing basis.
The algorithms use machine learning to filter out «brute force», high-load attacks from large, distributed botnets as well as more clever, unconventional attacks which take advantage of network protocol vulnerabilities. Take for example the small (about 20 Mbps) syn flood/udp-flood.
When advanced algorithms are used, there is no possibility of even a short-term decline in service quality while the IP addresses are being changed during the switch.
Basic | Advanced * | |
Activation | By default | By order |
Data center locations | The Netherlands, Finland, The USA | The Netherlands |
Cost, per month | - | for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge. |
Free | €50 |
Activation: By default
Data center locations: The Netherlands, Finland and The USA
for 1 TB of cleared incoming traffic. The first 1 TB of traffic is provided free of charge.
Activation: By default
Data center locations: The Netherlands
* L7 application-level protection not provided
SYN Flood
SYN-ACK Flood
Fragmented ACK Flood
RST / FIN Flood
Fake Session Attack
Multiple SYN-ACK Fake Session Attack
Multiple ACK Fake Session Attack
Session Attack, SlowLoris
Misused Application Attack
Faulty Application Attack
UDP Flood
UDP Fragmentation Flood, UDP Fragmentation, Nuke
DNS Flood
Media Data Flood
Non-Spoofed UDP Flood
ICMP Flood
ICMP Fragmentation Flood, Nuke
Ping Flood
Ping Of Death
Zero Day DDoS attack, 0day DDoS attack
NTP Flood
NTP Amplification Attack
DNS Amplification Attack
IP Null Attack
TCP Null Attack
Type of Service (TOS) flood
Smurf Attack
Fraggle Attack
Naptha attacks
Teardrop Attack
SNMP Reflection
and more.
For more information, please contact our Sales Department
GPU servers for data science
e-Commerce hosting
Finance and FinTech
Hosting for gambling projects in the Netherlands
Private cloud
Rendering, 3D Design and visualization
Managed colocation
Subscribe to our newsletter & actionable email communication
You will be first to receive useful tips and special offers
Are you afraid that DDoS will damage your business? And this fear is justified! Therefore, so detractors do not bring down a stream of unwanted traffic on your project, choose servers that are protected from such attacks.
HOSTKEY is providing DDoS protected VPS. Basic protection against such attacks is included in the cost of hosting, meaning it is free. To rent cheap DDoS protected dedicated server, make a request to our manager, select a ready-made option from the catalog or use the online configurator.
This is a type of hacker attack in which a huge number of requests are sent to the resource. Because of this, the server is overloaded and becomes inaccessible to users. This leads to two main dangers:
That is why it is so important to choose DDoS protected VPS! HOSTKEY provides only this type of hosting services.
Evaluate the needs of your project and choose a DDoS-free dedicated server with the appropriate characteristics from our library. You can also make a customized hosting on an online configurator or contact our manager to carry out the task. They will select a suitable setup, issue an invoice and answer all your questions.