Log in

DDoS Protection

DoS-attack – (Denial of Service) – The attack on the server for the purpose of disabling it, that is to create conditions under which legitimate (lawful) system users can not get access to the provided system resources, or the access is difficult. System failure can be both an end in itself (for example, to make unavailable popular site), and one of the control steps of the system.
If the attack is carried out simultaneously with a large number of computers that talk about DDoS-attack (Distributed Denial of Service, distributed attack such as “denial of service”).


Rental of telecommunication cabinets and colocation in the data center


Rental of server equipment of leading world manufacturers


Rent virtual servers.
Vitrualization: OpenVZ, KVM


Placing a site on the technical platform of the data center.


Register a domain name with the further deployment site.


Rent SSL certificates at any level from leading suppliers.

Below are some types of DdoS-attacks.

HTTP flood – send to the website a few tens of thousands of GET requests, POST, HTTP 1.1 on the port 80 web server.

UDP flood – sent to the address of the set of UDP packets system. This method was used in earlier attacks and is now considered to be the least dangerous.

TCP flood – sending out the address of the server for TCP-packets of the set, which also leads to an overload of network resources.

TCP SYN flood – sending a large number of requests for TCP-connections which initialize as a result, had to spend all its resources to ensure that the process is partially open connections.

Smurf-атака – ICMP ping requests to the address directed broadcast packets using this query fake source address as a result turns out to be the target of attacks. ICMP flood – attack The Smurf similar, but without the use of mailing.

SPAM flood – a rare type of attack, use your e-mail service to send large number of emails. How to detect the attack. Detection methods can be divided into several large groups: statistics – based on quantitative analysis of traffic; signature – based on a qualitative analysis of traffic;

How to detect an attack

For a static method as a first step of detecting an attack, you must install the network traffic monitoring software. The Internet is chosen a large number of the software, for example, we can recommend the MRTG, Munin, Cacti any of these programs will help you to identify the fact of the attack. Also, you can use the network traffic monitoring systems provided by our Data Center.

Next comes into force signature method, you must determine which of the protocols and ports is attack. Determine this is possible by doping and subsequent analysis of network traffic. For the collection of traffic would like to recommend the tool “tcpdump” tcpdump (TCP or English dump -. Dump, dumping) – UNIX utility (available clone for Windows), allows you to capture and analyze network traffic through a computer that is running this utility.

Proxy malicious traffic
Protection site in the location «0x2a DC»
Server Protection in the location «0x2a DC»
Protecting content in any location
Securing the server in any location
Our company can carry out comprehensive work program to optimize your server.
  • Installing linux debian 64bit
  • Updating and configuring the kernel to the latest stable version.
  • Installation, configuration and optimization of Apache2, Nginx, MySQL, PHP
  • Configure firewall.
  • Installing the software and scripts for protection against DDoS attacks.
  • Domain transfer to our NS servers.
  • Create accounts for the user and the need for access.

Cost of work:

Our advantages


Daily, weekly backups of virtual servers, websites, databases.


Round the clock technical support. Our experts at any time to help solve your problems.

Low prices

Our company offers competitive prices for the rental of equipment and accommodation.

High quality

The quality of services you can be sure using the free trial period.