Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


DDOS protection
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

DDOS protection

I am looking for a DDOS protected VPS on the Eastern Seaboard of the US. Preferably with good peering to / low ping to Dacentec.

If you know a test IP please provide as well, and add where your scrubbing facility is located.

Thanks

«1

Comments

  • Will Dallas work?

  • MunMun Member

    @Steven_F said:
    Will Dallas work?

    I highly doubt it but you can shoot me a PM of a test IP and I will try it.

  • Ramnode perhaps?

  • MunMun Member

    @black said:
    Ramnode perhaps?

    They are whom i think would be the best but there protection doesn't actually seem to be in atlanta.

  • @Mun said:
    I highly doubt it but you can shoot me a PM of a test IP and I will try it.

    Sending that now!

  • Nick_ANick_A Member, Top Host, Host Rep

    Mun said: They are whom i think would be the best but there protection doesn't actually seem to be in atlanta.

    The Black Lotus POP is in Ashburn at the moment. That may change as things transition to Level3.

  • MunMun Member

    @Nick_A said:
    The Black Lotus POP is in Ashburn at the moment. That may change as things transition to Level3.

    Meaning it might move closer?

    I might just use your autonull. I have zero expectations of being hit, but as it is a gaming server I was kinda hoping to have some protection from scipt kiddle piddles.

  • @Mun We just finalized native protection in NJ and Miami! We'll get you the test IP in a few moments.

  • SpeedyKVMSpeedyKVM Banned, Member

    @Steven_F said:
    Mun We just finalized native protection in NJ and Miami! We'll get you the test IP in a few moments.

    Very cool, hows it work?

    Thanked by 1Amitz
  • @Incero said:
    Very cool, hows it work?

    NJ and Miami is all off of Choopa's in house system.

  • I wouldn't hold much confidence for that in-house system, primarily based on sFlow.

    And also chances are when you receive an attack your whole VPS node will drop until the it re-routes the traffic to the ADS, as Choopa only uses out of path mode. (re-routing apparently takes approx one minute according to their info page).

    @Steven_F said:
    NJ and Miami is all off of Choopa's in house system.

  • keanukeanu Member
    edited October 2015

    We offer DDoS Protected hourly VPS in Dallas. Test IP: 45.35.66.134

    Ping to Dacentec:

    root@TestVPS:~# ping 199.191.56.90
    PING 199.191.56.90 (199.191.56.90) 56(84) bytes of data.
    64 bytes from 199.191.56.90: icmp_seq=1 ttl=54 time=38.9 ms
    64 bytes from 199.191.56.90: icmp_seq=2 ttl=54 time=38.8 ms
    64 bytes from 199.191.56.90: icmp_seq=3 ttl=54 time=38.8 ms
    64 bytes from 199.191.56.90: icmp_seq=4 ttl=54 time=38.9 ms
    ^C
    --- 199.191.56.90 ping statistics ---
    4 packets transmitted, 4 received, 0% packet loss, time 3004ms
    rtt min/avg/max/mdev = 38.849/38.904/38.938/0.200 ms
    
  • MikeAMikeA Member, Patron Provider

    Psychz works very well from my experience, I've seen lots of VPS providers move to them in Dallas so anyone who claims 40Gbps~ mitigation is very likely using them.

    Thanked by 2vimalware PhotonVPS
  • @EVM_Mike
    We are using Psychz too, and they work very good. Both network and DDoS protection.

  • wychwych Member
    edited October 2015

    Vox via BuyVM?

  • pinged from Beauharnois

    root [/]# ping -c 4 199.191.56.90
    PING 199.191.56.90 (199.191.56.90) 56(84) bytes of data.
    64 bytes from 199.191.56.90: icmp_seq=1 ttl=57 time=36.1 ms
    64 bytes from 199.191.56.90: icmp_seq=2 ttl=57 time=36.1 ms
    64 bytes from 199.191.56.90: icmp_seq=3 ttl=57 time=36.0 ms
    64 bytes from 199.191.56.90: icmp_seq=4 ttl=57 time=36.1 ms
    
    --- 199.191.56.90 ping statistics ---
    4 packets transmitted, 4 received, 0% packet loss, time 3039ms
    rtt min/avg/max/mdev = 36.080/36.111/36.151/0.136 ms
    root [/]# _
    Thanked by 1inthecloudblog
  • catalystiumcatalystium Member
    edited October 2015

    Just testing pinging RamNode's ATL filtered IPs (which Nick says they are in Ashburn) from one of my Dacentec servers, seems to be pretty low from what everyone else is showing:

    PING 107.161.23.2 (107.161.23.2) 56(84) bytes of data.
    64 bytes from 107.161.23.2: icmp_seq=1 ttl=55 time=21.2 ms
    64 bytes from 107.161.23.2: icmp_seq=2 ttl=55 time=21.1 ms
    64 bytes from 107.161.23.2: icmp_seq=3 ttl=55 time=21.2 ms
    

    Trace:

    traceroute to 107.161.23.2 (107.161.23.2), 30 hops max, 60 byte packets
     1  ****** (*****)  0.365 ms  0.352 ms  0.385 ms
     2  ****** (*****)  0.969 ms  1.012 ms  1.035 ms
     3  ****** (*****)  0.315 ms  0.344 ms  0.356 ms
     4  dct-ds42-ve33.dacentec.com (199.191.57.193)  0.224 ms  0.286 ms  0.319 ms
     5  cha-b1-link.telia.net (62.115.40.229)  2.886 ms  2.987 ms  2.921 ms
     6  atl-bb1-link.telia.net (213.155.137.122)  8.186 ms atl-bb1-link.telia.net (62.115.138.38)  16.675 ms atl-bb1-link.telia.net (80.91.245.206)  7.724 ms
     7  level3-ic-149649-atl-bb1.c.telia.net (80.239.167.74)  8.466 ms  8.452 ms  8.460 ms
     8  ae-2-70.edge2.Washington4.Level3.net (4.69.149.80)  21.766 ms  21.737 ms  21.689 ms
     9  ae-1-60.edge2.Washington4.Level3.net (4.69.149.16)  21.653 ms ae-2-70.edge2.Washington4.Level3.net (4.69.149.80)  21.616 ms ae-1-60.edge2.Washington4.Level3.net (4.69.149.16)  21.675 ms
    10  4.53.115.14 (4.53.115.14)  21.809 ms  21.851 ms  21.794 ms
    11  * * *
    12  * * *
    13  test.dos.atl.ramnode.com (107.161.23.2)  21.185 ms  21.145 ms  21.161 ms
    
  • Psychz from my own personal experience is awful, I even had inline filtering enabled for an entire month, and Layer 7 wise it hideous.

    Even after adjustments nothing changed, spent a constant month back and forward with the support team and got no where... although to be fair to William and the team they did offer a free month as compensation.

    The ACL Page is also rather buggy, and sometimes they don't even go through.. even when we had UDP dropped entirely it would "leak" through - not entirely sure why as it should of been blocked on the border/edge.

    @EVM_Mike said:
    Psychz works very well from my experience, I've seen lots of VPS providers move to them in Dallas so anyone who claims 40Gbps~ mitigation is very likely using them.

  • jbilohjbiloh Administrator, Veteran

    The reality is stopping layer 7 attacks is hard. Nothing is going to be perfect.

  • jarjar Patron Provider, Top Host, Veteran
    edited November 2015

    @jbiloh said:
    The reality is stopping layer 7 attacks is hard. Nothing is going to be perfect.

    With exception of writing really large checks to CloudFlare ;)

    But hey, who doesn't have a few hundred thousand sitting around right?

  • jbilohjbiloh Administrator, Veteran

    Even cloudflare isn't perfect unfortunately :(

    Ddos protection is more of an art than science.

    Thanked by 1jar
  • FranciscoFrancisco Top Host, Host Rep, Veteran

    @Jar said:
    But hey, who doesn't have a few hundred thousand sitting around right?

    CF is pretty meh with L7 these days, there's a lot of botnets that walk right past it. For the times Voxility doesn't handle an L7 attack properly we end up rolling a localized filtering on the end users service. They complain since it will cause some page slow downs but maybe if you weren't eating 30,000 r/s it wouldn't be needed...

    Francisco

    Thanked by 1jar
  • CloudFlare itself is bad for L7. I once tried a layer 7 attack with a booter on one of my sites and the backend had to filter a lot.
    Meanwhile incapsula's free plan blocked 95% of the attack by itself and only a few IPs went through.
    Incapsula however, has a bad API and therefore isn't that great to work with.

  • @Mun DDOS protected dedicated server is more stable and safer for your data. I find out this service with 100Mbps/1GB port with 32 IPs which block much attack.

    https://goo.gl/epYwHp

  • jarjar Patron Provider, Top Host, Veteran

    @clarity We get it, you want people to sign up for your spam company Gchao/VPB.com.

  • @Jar keywords vpb spammer scammer rubbish vps terrible network vpb server is terrible scammer bad vps idiot scammer terrible hosting vpb

    Thanked by 2jar Profforg
  • PhotonVPSPhotonVPS Member, Host Rep

    @EVM_Mike said:
    Psychz works very well from my experience, I've seen lots of VPS providers move to them in Dallas so anyone who claims 40Gbps~ mitigation is very likely using them.

    @keanu said:
    EVM_Mike
    We are using Psychz too, and they work very good. Both network and DDoS protection.

    Glad we were able to protect you ;)

  • PieHasBeenEatenPieHasBeenEaten Member, Host Rep
    edited November 2015

    @jar I'm sorry for my multiple accounts that are spamming here. (/sarcasm) Lets wake the detective @gm2015

  • @Jar said:
    clarity We get it, you want people kto sign up for your spam company

    Where are the mods today?

Sign In or Register to comment.