Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!


X4B | Anycast DDoS Protection | $7 for 7 PoPs | AMS, LON, MIM, ASH, DAL, LAX
New on LowEndTalk? Please Register and read our Community Rules.

All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.

X4B | Anycast DDoS Protection | $7 for 7 PoPs | AMS, LON, MIM, ASH, DAL, LAX

SplitIceSplitIce Member, Host Rep
edited October 2017 in Offers

X4B DDoS Protection Anycast DDoS protection services. Why should the low end be community be restricted to only one location?

Now with new, more optimized China Telecom (CT) and China Telecom Next Generation (CN2) routes in L.A!

AS136165: The network

Current PoPs:

  • Amsterdam, Netherlands
  • London, United Kingdom
  • Los Angeles, CA, USA
  • Dallas, TX, USA
  • Asburn, VA, USA
  • Miami, FL, USA

Test IP / Looking Glass: https://lg.x4b.net/ (103.77.224.28)

The Deal

Product Line: Standard Anycast DDoS Protection

Protection: 100Gbps / 100Mpps Guarunteed

Clean Bandwidth included: 25GB (upgrades available)

Price: $7 (with coupon: LE30PCT)

Coupon: 30% discount valid on all Anycast services

Valid Until: 07/11/2017 (unless we sell out)

Order Link

You won't find another comparable Anycast offering in this price range.

The 20 Questions:

Why Anycast?

An anycast network is more redundant, and fault resilient than a regular single PoP network. By announcing in multiple distinct locations we gain redundancy against network and server failure as well as the ability to reduce latency by taking in the connection closer to the source.

Anycast also allows for an increase in Mitigation capacity (particularly Layer 7) and overall throughput per service.

Is this more complicated than a regular filtered service?

For most setups it shouldn't be :) We still provide all the same guides and scripts for setup.

Can I point one or more Anycast PoP at a single server?

Yes you can select which Anycast PoP should be forwarding to each defined backend.

Can each PoP communicate with my server direct?

Yep.

Optionally with GRE Tunnelling you can also choose to have all PoPs pointed at a single backend, and for that backend to communicate with the appropriate PoP all via a single internal IP address; or you can define only a single tunnel (the choice is yours!)

This is an Anycast IP, can I connect out?

We have worked hard to build a solution that is able to function in every way like a regular Remote Protection service. With a GRE tunnel you can make outgoing connections. There may be a small delay for the first few packets while we create an optimized route through the network.

What about Support?

Low End plans have support Priority capped at Medium. Support for Low End plans is provided in a reduced capacity.

The Technical Stuff

Featuring:

  • Redundant internal backhaul, resilient against communication failures
  • Internal Mesh network, ingress traffic at one PoP and egress it at another (no complex configuration required!)
  • Direct Server Return (DSR) from the first filtering hop wherever possible for minimal latency
  • Able to handle all kinds of PoP switches, rejoins and splits without interruption
  • Support for tunnels to one or more filtering PoPs (with or without BGP) for redundancy
  • China Telecom & CN2 optimized routes in L.A
  • Multihomed w/ Telia, Tinet and Peering

Comments

  • RhysRhys Member, Host Rep
    edited October 2017

    X4B is unreachable from AS2856 and well, basically everything.

  • SplitIceSplitIce Member, Host Rep
    edited October 2017

    @Rhys Kind of an incorrect statement, given that our entire customer base is currently online. The correct statement would be the looking glass IP saw an attack in excess of 100Gbps and got Nulled. The fact that you are testing the one IP that got attacked indicates strongly what you did.

    None the less, our Looking Glass is already back... and it just re-enforces the reason we don't normally provide Looking Glass IPs.

  • RhysRhys Member, Host Rep
    edited October 2017

    @SplitIce said:
    @Rhys Kind of an incorrect statement, given that our entire customer base is currently online. the correct statement would be the looking glass IP saw an attack in excess of 100Gbps and got Nulled. The fact that you are testing the one IP that got attacked indicates strongly what you did.

    None the less, our Looking Glass is already back... and it just re-enforces the reason we don't normally provide Looking Glass IPs.

    Are you insinuating that I attacked your service? You'd better have a solid reason to do so. I have no such interest but now from your arsey response I am not surprised in the slightest that you got attacked. Sorry for checking out your offer post I guess.

  • @SplitIce Seems like it's back up now.

  • @doghouch said:
    @SplitIce Seems like it's back up now.

    thank you for fixing it @rhys

  • SplitIceSplitIce Member, Host Rep

    @Rhys Just an educated guess from past experience on this forum. Further supported by some other evidence.

    @doghouch Yes, attack continued but we got a bump. A good opportunity to test our CT/CN2 attack management scripts though, since the attack had a CT component.

  • @SplitIce said:
    @Rhys Just an educated guess from past experience on this forum. Further supported by some other evidence.

    @doghouch Yes, attack continued but we got a bump. A good opportunity to test our CT/CN2 attack management scripts though, since the attack had a CT component.

    can you share the evidence, we are all interested

    thank you

  • SplitIceSplitIce Member, Host Rep

    @maldovia Just timing. Starts up right before the first, and seconds after the second post. Coincidental * 2.

    Thanked by 1maldovia
  • RhysRhys Member, Host Rep
    edited October 2017

    @SplitIce said:
    @maldovia Just timing. Starts up right before the first, and seconds after the second post. Coincidental * 2.

    Yeah, you're an idiot. 1st post about the issue out of 30 views is not a coincidence I wish I had that sort of power to attack you.

  • SplitIceSplitIce Member, Host Rep
    edited October 2017

    @Rhys I've never once said you did, or didn't do anything. But it's a pattern we have seen before right after posting here, and from past experience it's normally the first poster (only last time it was the Mirai botnet).

    Right now you are at coincidence * 2. I believe the saying is:

    “Once is happenstance. Twice is coincidence. Three times is enemy action”

    Thanked by 1maldovia
  • RhysRhys Member, Host Rep

    SplitIce said: I've never once said you did

    "The fact that you are testing the one IP that got attacked indicates strongly what you did." aight.

  • hawchawc Moderator, LIR

    @SplitIce said:
    @Rhys I've never once said you did, or didn't do anything. But it's a pattern we have seen before right after posting here, and from past experience it's normally the first poster (only last time it was the Mirai botnet).

    Right now you are at coincidence * 2. I believe the saying is:

    “Once is happenstance. Twice is coincidence. Three times is enemy action”

    Go on.. share this so called "evidence".

  • SplitIceSplitIce Member, Host Rep

    @hawc I shared my evidence to support my educated guess a while ago thank you very much.

  • hawchawc Moderator, LIR

    @SplitIce said:
    @hawc I shared my evidence to support my educated guess a while ago thank you very much.

    "Evidence" - where just because someone was reading your post and decided to ping you, that is a DDoS. It seems to you that 1 + 1 = 3 at the moment.

  • SplitIceSplitIce Member, Host Rep

    @hawc last I checked ping's do not come in the 100Gbps+ variety, and when they do they are commonly called DDoS's but hey maybe I'm old fashioned.

  • This thread gave me aids.

Sign In or Register to comment.