Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Do you think DDoS Protection is important?
New on LowEndTalk? Please Register and read our Community Rules.

Do you think DDoS Protection is important?

How much does DDoS protection matter when you select a web hosting? Some say DDoS protection is the deciding factor.
Feel free to leave your opinion below. :)

DDoS, Yes or No?
  1. Does DDoS really matter?146 votes
    1. Yes
      73.29%
    2. No
      26.71%
«1

Comments

  • fendixfendix Member

    Nowadays, DDoS protection is imo indispensable. Of course you could use a CDN with protection like Cloudflare and configure it leakproof. For me, I wouldn't use a hoster without protection for critical stuff.

    Thanked by 1lucas01

    Recommended virtual servers: php-friends | hetzner | buyvm

  • No really, but its an added advantage for your service.

  • LeeLee Member

    Depends, surely DDoS is only important to you if it is a problem for you. Although these days I would expect the norm from a provider perspective is that they do offer some sort of protection.

  • rcy026rcy026 Member

    For me and most of my clients, DDoS is not a direct issue, we are never or rarely targeted.
    However, it does become a problem when the provider we are using is dead in the water because of a DDoS against some of its other customers.

    So for me personally DDoS protection is not a must have. For the provider I'm using, its a must.

    Thanked by 2lucas01 kkrajk
  • ZareZare Member, Provider
    edited April 14

    @rcy026 said:
    For me and most of my clients, DDoS is not a direct issue, we are never or rarely targeted.
    However, it does become a problem when the provider we are using is dead in the water because of a DDoS against some of its other customers.

    So for me personally DDoS protection is not a must have. For the provider I'm using, its a must.

    Just because clients don't get DDoS'd doesn't mean it shouldn't be important. Only needs to happen once to get nulled routed and then whoever the client is cannot use their service and therefore will lose earnings.

    These days any kid can take down a service without DDoS protection with a $5 booter. All providers should have some level of protection i feel.

    Edit: Slightly misread what you meant, however i think DDoS should be important for all providers and clients.

    Zare.com - UK/NL/CH Baremetal Servers with DDoS protection - Follow us on Twitter https://twitter.com/zare

  • rcy026rcy026 Member

    @Zare said:

    Just because clients don't get DDoS'd doesn't mean it shouldn't be important. Only needs to happen once to get nulled routed and then whoever the client is cannot use their service and therefore will lose earnings.

    It depends very much on the type of client. A lot of my customers have websites and email, some even run their own VPS's for various purposes, but it is in no way critical to their business. If the website or email is down it's an annoyance, but it will not effect their day-to-day business. If they for whatever reason should be DDoS'd, it will cost them less in lost earnings then the increased cost of having a provider with good DDoS protection.
    I've seen industries with thousands of employees that simply pull the internet plug when they are attacked. As long as their internal systems and networks are operational, they do not really need internet access to function.

    If your earnings depend on staying online, then of course DDoS protection is a must, it shouldn't even be a question. But if you don't realise that yourself, you are probably to stupid to run a business anyway.

    Thanked by 1kkrajk
  • sandozsandoz Member

    Of course is not important, let someone DDoS your entire Network, and if you receive complaints from your clients. Tell them, you will sue them for saying such words.

    Let you receive a big attack for hours, and stay down for couple of days. With more than +100 tickets support to reply with the subject "refund"

    Clearly, is not important...

  • It depends on the use you are going to make. If you are a small website or a simple presentation site, you will rarely get ddos attacks. If you are a hosting company or other business as well, I think it is one of the key things to adopt. Website protection is now very cheap and very effective!

    Thanked by 1lucas01
  • zxrlhazxrlha Member

    Currently I don't care about DDoS, because my VPSes are not hosting webs.

    Even for those webs I am hosting, it is just annoying if it gets DDoSed, and I do not lose money because of that, since those are just my hobbies, not business.

    If I host some webs for business, I will choose the one with DDoS protection.

    QuantumCore :) Webhorizon :) LittleCreek :D Clouveo ;) RackNerd ;) NexusBytes :* Novos :p NaranjaTech :* QuickPacket :blush:

  • momkinmomkin Member

    @fendix said:
    Nowadays, DDoS protection is imo indispensable. Of course you could use a CDN with protection like Cloudflare and configure it leakproof. For me, I wouldn't use a hoster without protection for critical stuff.

    Its always possible to send a fake DMCA to CF and they will give out your server IP eventually :smile:

  • sdglhmsdglhm Member

    depends,

    halp, my site down 1 million lost - YES

    Some kid is DDoS'ing me. My unimportant server is down - No

    Thanked by 3yoursunny lucas01 d3rpy

    I repeat, RAID is not backup | Looking for a developer for your next project? - Hire me

  • FlorinMarianFlorinMarian Member, Provider

    From my point of view, absolutely yes.
    This is why guys like me pays at OVH double price instead of preferring Hetzner only because of OVH Game protection advantages.

  • @momkin said:

    @fendix said:
    Nowadays, DDoS protection is imo indispensable. Of course you could use a CDN with protection like Cloudflare and configure it leakproof. For me, I wouldn't use a hoster without protection for critical stuff.

    Its always possible to send a fake DMCA to CF and they will give out your server IP eventually :smile:

    Cf wont leak your server ip, they will just forward the dmca to the host and let the reportee know which host the website is hosted at.

  • pierrepierre Member

    Most companies offer it as a standard, and I feel like it should be a standard as DDOS Attacks do happen. Even like 10-20GBPS protection is more than enough.

  • fendixfendix Member

    @momkin said:

    @fendix said:
    Nowadays, DDoS protection is imo indispensable. Of course you could use a CDN with protection like Cloudflare and configure it leakproof. For me, I wouldn't use a hoster without protection for critical stuff.

    Its always possible to send a fake DMCA to CF and they will give out your server IP eventually :smile:

    I heard it as well. Just to make sure: reverse proxy.

    @sdglhm said:
    depends,

    halp, my site down 1 million lost - YES

    Some kid is DDoS'ing me. My unimportant server is down - No

    I'm sure it's annoying to have a well-frequented gameserver which received attacks the whole time. Not only bussiness websites should be protected.

    Recommended virtual servers: php-friends | hetzner | buyvm

  • AlexvukAlexvuk Member
    edited April 16

    You know what is ddos protection and how it works ?

    Like everyone can get into your house and do whatever they want in your house , this is a server without ddos protection.

  • CConnerCConner Member, Provider

    It's a strong case of you don't need it till you do. Once you need it and you don't have it, you have a problem.

    GameDash, an AIO solution uniting billing, support & game server management.
    Visit our website or join our Discord to find out more.

  • rcy026rcy026 Member

    @Alexvuk said:
    You know what is ddos protection and how it works ?

    Like everyone can get into your house and do whatever they want in your house , this is a server without ddos protection.

    Not really accurate. More like someone blocking the road to your house so people cant get there.

  • I wont buy service from a provider that doesn't have DDOS protection. It is an absolute must have. Minimum 20gbit.

  • CConnerCConner Member, Provider
    edited April 16

    @rcy026 said:

    @Alexvuk said:
    You know what is ddos protection and how it works ?

    Like everyone can get into your house and do whatever they want in your house , this is a server without ddos protection.

    Not really accurate. More like someone blocking the road to your house so people cant get there.

    Basically this

    GameDash, an AIO solution uniting billing, support & game server management.
    Visit our website or join our Discord to find out more.

  • sandozsandoz Member
    edited April 16

    @rcy026 said:

    @Zare said:

    Just because clients don't get DDoS'd doesn't mean it shouldn't be important. Only needs to happen once to get nulled routed and then whoever the client is cannot use their service and therefore will lose earnings.

    It depends very much on the type of client. A lot of my customers have websites and email, some even run their own VPS's for various purposes, but it is in no way critical to their business. If the website or email is down it's an annoyance, but it will not effect their day-to-day business. If they for whatever reason should be DDoS'd, it will cost them less in lost earnings then the increased cost of having a provider with good DDoS protection.
    I've seen industries with thousands of employees that simply pull the internet plug when they are attacked. As long as their internal systems and networks are operational, they do not really need internet access to function.

    If your earnings depend on staying online, then of course DDoS protection is a must, it shouldn't even be a question. But if you don't realise that yourself, you are probably to stupid to run a business anyway.

    I would like to never be your customer, with that kind of vision..
    My business in your hands, is certainly tragedy.

    Hope your clients doesn't be disappointed for hear those words from you. Because if I heard those words, I would immediately ran away from you.

    No thanks

  • rcy026rcy026 Member

    @sandoz said:

    @rcy026 said:

    @Zare said:

    Just because clients don't get DDoS'd doesn't mean it shouldn't be important. Only needs to happen once to get nulled routed and then whoever the client is cannot use their service and therefore will lose earnings.

    It depends very much on the type of client. A lot of my customers have websites and email, some even run their own VPS's for various purposes, but it is in no way critical to their business. If the website or email is down it's an annoyance, but it will not effect their day-to-day business. If they for whatever reason should be DDoS'd, it will cost them less in lost earnings then the increased cost of having a provider with good DDoS protection.
    I've seen industries with thousands of employees that simply pull the internet plug when they are attacked. As long as their internal systems and networks are operational, they do not really need internet access to function.

    If your earnings depend on staying online, then of course DDoS protection is a must, it shouldn't even be a question. But if you don't realise that yourself, you are probably to stupid to run a business anyway.

    I would like to never be your customer, with that kind of vision..
    My business in your hands, is certainly tragedy.

    Hope your clients doesn't be disappointed for hear those words from you. Because if I heard those words, I would immediately ran away from you.

    No thanks

    It's not my vision, it's my customers. I always advocate DDoS protection, but some customers do not want it because it simply costs them more then they lose if they are attacked. It's simple mathematics really, and very common in the big business world.
    If your customers are small businesses that knows nothing about IT, I'm sure you can sell them DDoS protection whether they need it or not, but if the customer is a big company with their own IT-department with hundreds of qualified IT-engineers, they will not listen to you if you try that kind of bullshit and you lose them as a customer.

  • Brend4nBrend4n Member

    Depends on the service that I'm running. Often, I find "ddos protected" networks to be more unstable as the customers attract ddos to begin with. I'd prefer to use Cloudflare on a non ddos protected/stable network when possible.

  • thedpthedp Member

    DP - Tech and Hosting-related Domain Names for sale. PM for list/details.

  • deankdeank Member, Troll

    Protection is always important.

    Don't forget condoms, kids. A child with a wrong woman will ruin your life, well, at least for 18 years to pay for child support.

    "Jarland is stupid."

  • SpartanHost has strong DDoS protection.
    I found that my UDP based applications aren't working properly.
    It turns out that their DDoS protection, powered by cnServers, would drop all IPv4 fragments, and also rate-limit unfragmented UDP traffic.

    HTTP/3 is based on UDP.
    No high-rate UDP means I cannot serve website over HTTP/3.
    Likewise, QUIC video streaming isn't going to work.

    Their IPv6 is unprotected and works very well.


    Hivelocity DDoS protection doesn't limit UDP or IPv4 fragments.

    As for Cloudflare, they can serve HTTP/3 to readers, but the connection to origin server is HTTP/2.
    The main optimization is that, they keep the TLS connection open, amortizing the overhead of handshakes.


    Personally I don't care much about DDoS protection.
    Last time the MJJ attacked my website, I just exposed them on this forum, and they stopped after a few days.

    The end is nigh for Ubuntu 16.04. Providers still offering Ubuntu 16.04 past EOL will be ashamed.

  • BinaryBinary Member, Provider

    DDoS Protection is extremely import, not just for a singular customer.
    Most companies still run their shared (VPS, game, etc) nodes on 1GBit/s, which is easily saturated.

    Simply dropping all fragments / rate limiting is not acceptable though.

  • DataIdeas-JoshDataIdeas-Josh Member, Provider

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Alien Data: VPS and Colo Based In Texas, Unmetered Bandwidth.
    RPIServers: Dedicated Micro Servers - Micro Colo - Unmeterd Bandwidth

  • amsaalamsaal Member

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    i am trying to contact path.net but no response for few days ? can you tell me any other ways to contact them. i also want to apply the filters on my GameServer

  • AXYZEAXYZE Member

    Very important and not important at the same time.
    If you don't make huge projects then most attacks will be small, usually from kids with free booters. If that's true also in your case then its important HOW company manages to deal with DDoS.

    Let say you have game server and some kid DDoS your server for 5 minutes. If AntiDDOS is too slow to respond then it will block like last minute of DDoS or they wont mitigate this at all because their system doesn't considers it as DDoS. AntiDDoS gives you nothing in that situation. I personally got this problem with big providers with big claims couple of times.
    That's why I say its "important and not important", because these big claims like 2Tb/s DDoS mitigation doesn't mean you will be free of problems.

    I think support is a lot more important aspect because if they respond fast and want to help you then even this "unimpressive looking protection" can work flawlessly in real world. Good support solves majority of problems, not only with DDoS attacks.

  • @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

  • ClouviderClouvider Member, Provider
    edited April 23

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Clouvider Limited - Leading Hosting & Connectivity Partner || Dedicated Server Sale from £39/m - Our Latest LET Offer

    Cloud Web Hosting | SSD & SAS HA OnApp VPS | US, UK, NL & DE Dedicated Servers | Network Services | Colocation | Managed Services

  • DataIdeas-JoshDataIdeas-Josh Member, Provider

    @amsaal said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    i am trying to contact path.net but no response for few days ? can you tell me any other ways to contact them. i also want to apply the filters on my GameServer

    Did they respond to you yet?
    If you want PM me your email and I'll forward your information.
    ~Josh

    Alien Data: VPS and Colo Based In Texas, Unmetered Bandwidth.
    RPIServers: Dedicated Micro Servers - Micro Colo - Unmeterd Bandwidth

  • theprotectortheprotector Member
    edited April 25

    @Clouvider said:

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare, its actually more than fair to say its leaky when I have a big game server and big services that are constantly getting attacked with advanced and large attacks which they could not filter at all. Keep in mind again that I've used more than 10 hosting providers and have been getting attacked since 2015. Certain people may say a particular service has been great for them until they run into a determined attacker or frequent attacks every hour.

  • jarjar Provider

    It never matters until it does, and when it does it’s the only thing that matters. This is one thing it’s better to have and not need than need and not have.

    Thanked by 1Shoaib_A

    Founder @ MXroute

  • CybrCybr Member

    Using a host who doesn't have DDoS protection is like walking through a dimly lit ghetto alone late at night. You may be fine as long as you keep your head down and don't attract too much attention... but the moment you do, you'll lose everything you have to a 12 year old gangster with a knife.

    Thanked by 2jar Shoaib_A
  • jarjar Provider

    @Cybr said: you'll lose everything you have to a 12 year old gangster with a knife

    That really reminded me of this:

    Founder @ MXroute

  • ClouviderClouvider Member, Provider

    @theprotector said:

    @Clouvider said:

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare, its actually more than fair to say its leaky when I have a big game server and big services that are constantly getting attacked with advanced and large attacks which they could not filter at all. Keep in mind again that I've used more than 10 hosting providers and have been getting attacked since 2015. Certain people may say a particular service has been great for them until they run into a determined attacker or frequent attacks every hour.

    That’s simply not what we see, and we handle many many attacks on these boxes.

    How is it that you just registered here and all your posts are either complaints against competing solutions to that of path.net or praising path.net?

    Are you affiliated with them? Can you explain it?

    Clouvider Limited - Leading Hosting & Connectivity Partner || Dedicated Server Sale from £39/m - Our Latest LET Offer

    Cloud Web Hosting | SSD & SAS HA OnApp VPS | US, UK, NL & DE Dedicated Servers | Network Services | Colocation | Managed Services

  • DDoS protection depends on the market and product.
    If you trying to offer something to 15-30 y.o. people -> be ready for ddos attacks.
    Otherwise - depends on your business type.

  • CConnerCConner Member, Provider

    @desperand said:
    DDoS protection depends on the market and product.
    If you trying to offer something to 15-30 y.o. people -> be ready for ddos attacks.
    Otherwise - depends on your business type.

    Doesnt really matter what your target group is. If you are making money with an internet service, you should have DDoS protection.

    GameDash, an AIO solution uniting billing, support & game server management.
    Visit our website or join our Discord to find out more.

  • CConnerCConner Member, Provider
    edited April 26

    @theprotector said:

    @Clouvider said:

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare, its actually more than fair to say its leaky when I have a big game server and big services that are constantly getting attacked with advanced and large attacks which they could not filter at all. Keep in mind again that I've used more than 10 hosting providers and have been getting attacked since 2015. Certain people may say a particular service has been great for them until they run into a determined attacker or frequent attacks every hour.

    It completely depends on how the hosting provider is using the Corero device. Saying Corero is leaky because you have had issues with one provider in the past isn't fair.

    Thanked by 1Clouvider

    GameDash, an AIO solution uniting billing, support & game server management.
    Visit our website or join our Discord to find out more.

  • @CConner said: Doesnt really matter what your target group is. If you are making money with an internet service, you should have DDoS protection.

    50/50
    I have different projects. Many of them.
    But projects that attract competition and young blood - very problematic.
    Because of toxic selfish communities. But business one projects for customers have zero DDoS attacks.

  • DDoS protection is what you have to have it, there is no 50/50 its a must, because 1 guy can put your entire dc down.

    This days, stressers and botnet... ar like facebook, you dont have a stresser your nobody, this is how is now and kids buys stressers.

    Since covid, started to be manny manny more stressers providers.

    Thanked by 1Cybr
  • summersummer Member

    yes

  • summersummer Member

    :)

  • Whether you need DDOS protection depends on your business scope :)

  • ailiceailice Member

    It depends how much value you host
    If you think that important or necessary, you would be use DDOS Protection in the first place.

  • @Clouvider said:

    @theprotector said:

    @Clouvider said:

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare, its actually more than fair to say its leaky when I have a big game server and big services that are constantly getting attacked with advanced and large attacks which they could not filter at all. Keep in mind again that I've used more than 10 hosting providers and have been getting attacked since 2015. Certain people may say a particular service has been great for them until they run into a determined attacker or frequent attacks every hour.

    That’s simply not what we see, and we handle many many attacks on these boxes.

    How is it that you just registered here and all your posts are either complaints against competing solutions to that of path.net or praising path.net?

    Are you affiliated with them? Can you explain it?

    Would you rather have people waste their money ($2000+) on DDoS protection that doesn't work properly like I did? That may not be what you see on your service because of lack of those types of attacks that I receive on my game servers with other companies I've been with. I have been using Path.net for a while now because other people have said great things about them recently so I registered because I want to help other people that have issues with DDoS attacks even with other big providers like OVH which again I have used them and with many different companies as I said already with countless of issues.

  • @CConner said:

    @theprotector said:

    @Clouvider said:

    @theprotector said:

    @DataIdeas-Josh said:

    @Clouvider said:

    @theprotector said:
    I think it's the most important, I wasted so much money on different providers like Corero, OVH, NFO, Voxility, Cloudflare, Blazingfast and more. All these companies either null routed me because the attacks were to big on my game server or there were so many leaks that it just wasn't stable to play on. I emailed Path.net and I started using their GRE protection for my servers and their portal has filters for a lot of games and applications (I mainly use it for OpenVPN and Rust) and I've been really happy and even with their support too, they respond quick

    Corero null routed you?

    I'm going to take a guess and say it was the provider null routed them due to using a GRE tunnel.

    Corero specifically did not null route me obviously but they had a lot of leaks along with the other providers I mentioned

    Corero has plenty of switches, toggles and thresholds to enter, alongside custom rules so it’s not quite fair to say it was leaky; it might have been configured that way by your ISP.

    We get excellent feedback for Corero mitigation from our Customers.

    Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare, its actually more than fair to say its leaky when I have a big game server and big services that are constantly getting attacked with advanced and large attacks which they could not filter at all. Keep in mind again that I've used more than 10 hosting providers and have been getting attacked since 2015. Certain people may say a particular service has been great for them until they run into a determined attacker or frequent attacks every hour.

    It completely depends on how the hosting provider is using the Corero device. Saying Corero is leaky because you have had issues with one provider in the past isn't fair.

    I said "Its quite fair to say its leaky considering I've used Corero for a long time along with other companies that utilize them such as Zare". Key word "other companies". Here I'll name one more, dedicated.com. If you wanna see all my invoices and tickets with all those companies that couldn't help me with the DDoS attacks I received, I'll be more than glad to show you in private messages or something?

  • ClouviderClouvider Member, Provider

    What is your affiliation with path.net? Straight answer ;-).
    Given you have registered here and your sole message in 14 out of your 15 posts is: other DDoS mitigation bad. Path.net - great. Smells like a shill.

    Clouvider Limited - Leading Hosting & Connectivity Partner || Dedicated Server Sale from £39/m - Our Latest LET Offer

    Cloud Web Hosting | SSD & SAS HA OnApp VPS | US, UK, NL & DE Dedicated Servers | Network Services | Colocation | Managed Services

Sign In or Register to comment.