New on LowEndTalk? Please Register and read our Community Rules.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
Comments
Doesn't apply for the 1.99 one
It does, it just takes about 5 mins to kick in and it only does for stuff like UDP layer 4.
One of our clients got hit by a 5+ Gbps yesterday. OVH took it like a champ. Yet to experience larger attacks than that. AFAIK OVH doesn't protect as well against Layer 7 attacks though. So it depends what type of attack you're getting hit with.
I would remove your customer's name here... ;-)
Actually not too bad, and did filter quite a lot without flinching and the latency is fairly swell.
Also, OP you could also go the nginx + testcookie route if l7.
Thanks All, I'm watching the thread closely!
The client has finally contacted me to give him a solution, but couldn't give me the DDos specific details. I will be opening a new thread for hosting platform solution, as I'd like this thread to stick to DDos subject only.
@zare you have a PM, pls reply
That is really-really low. We get 40+ Gbps every week or so, 14+ every day (our protection is rated 14 Gbps).
I would expect OVH to take bigger than Voxility as their capacity is larger. From what I saw, Voxility is under some 100-200 Gbps attacks non-stop in total in Bucharest, but they have the capacity for it. OVH should have 10 times that.
Ok, I've opened another thread here VPS for 6.5GB Database/Php app - High availability. I'd like to keep thing focused so separate threads will keep them clean!
Anyone know about any Voxility DDoS protected VPSes? (we have some risk project which recieve ddos attacks every day). We need that just for test (1-3 days)
easy
https://www.hosteasy.eu/
@rokok The best method !!! I love it!, I will need to buy a 100 condoms box to prevent DDoS on my servers! LOL
Chances are, if the hosting provider shut down the website, it's because their vps has been compromised and used in a synchronized attack of other websites.
Your IP will be found sending out DDoS.......
Good point... I will invesitgate once (I hope) I get SSH access to go thru the logs/netstat and other details to know what kind of attack/lockup situation it was for them.
Could you please link me to tutorial to do "vps to tunnel to ipv6 server", i'm noob
Just have a google for GRE tunnel
I found gre tunnel tutorial from buyvm but it's for IPv4.
http://wiki.buyvm.net/doku.php/gre_tunnel
How to do with Ipv6
@sonic - http://lartc.org/howto/lartc.tunnel.gre.html
http://www.cisco.com/c/en/us/td/docs/ios-xml/ios/interface/configuration/xe-3s/ir-xe-3s-book/ip6-ip4-gre-tunls-xe.html
http://www.tldp.org/HOWTO/Linux+IPv6-HOWTO/chapter-configuring-ipv6-in-ipv4-tunnels.html