According to the Q2 2017 statistic data, gathered by DDoS-GUARD, the most dangerous DDoS attacks happen on Tuesdays, Thursdays, and Sundays...
The geo-distributed scrubbing network with scrubbing centers in the Netherlands, Germany, Russia, Japan, USA and total capacity over 1.5 Tbps allows us to offer a high-level service to our customers and provide protection against DDoS attacks
* DDoS-GUARD was awarded by an independent web-hosting information center Host Advice, and rewarded with a certificate from the information and analytical center Anti-Malware.ru for excellent work and high level of customer service
We are trusted by more than 6 000 businesses worldwide
Our experience allows us to gather a wealth of information on all types of network activity and protection, which we hasten to share with you
A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet
The Internet Control Message Protocol (ICMP) is one of the main protocols of the internet protocol suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.
Internet hosting service is a service that runs Internet servers, allowing organizations and individuals to serve content to the Internet
A Web service is a service offered by an electronic device to another electronic device, communicating with each other via the World wide web
Connection request over TCP. If a packet containing a SYN flag is sent, this means that a client is requesting a server for a connection. The server in turn must respond to the client with a packet that contains SYN-ACK flag.
Sequence number (32 bits) has a dual role: If the SYN flag is set (1), then this is the initial sequence number; If the SYN flag is clear (0), then this is the accumulated sequence number of the first data byte of this segment.
A content delivery network or content distribution network (CDN) is a globally distributed network of proxy servers deployed in multiple data centers
A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet
Server is a computer program or a device that provides functionality for other programs or devices, called "clients"
A network packet is a formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream.
A DDoS attack (Distributed Denial of Service attack) is a complex of actions aimed at fully or partially rendering an online resource unavailable to its intended users. Almost any online resource can be targeted: a website, a game server, or a public resource.
ACK-flag is a flag in TCP segment. It's indicates that the Acknowledgment field is significant. All packets after the initial SYN packet sent by the client should have this flag set.
We always have something interesting to share with you
The filtering system identified this traffic as illegitimate. Within 20 minutes the client was under a series of DDoS attacks with size of attacks ranging from 12 to 41 Gbps at the peak of the attack...