The geo-distributed scrubbing network with scrubbing centers in the Netherlands, Germany, Russia, Japan, USA and total capacity over 1.5 Tbps allows us to offer a high-level service to our customers and provide protection against DDoS attacks
* DDoS-GUARD was awarded by an independent web-hosting information center Host Advice, and rewarded with a certificate from the information and analytical center for excellent work and high level of customer service
in real time
We use own traffic scrubbing infrastructure with vast network capacities in cooperation with the largest backbone providers

No matter what part of the world your data is located in — DDoS-GUARD will ensure its full protection and immunity to attacks

Anything in here will be replaced on browsers that support the canvas element

Our experience allows us to gather a wealth of information on all types of network activity and protection, which we hasten to share with you
SYN request
Connection request over TCP. If a packet containing a SYN flag is sent, this means that a client is requesting a server for a connection. The server in turn must respond to the client with a packet that contains SYN-ACK flag.
A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet
A content delivery network or content distribution network (CDN) is a globally distributed network of proxy servers deployed in multiple data centers
Bot (Zombie)
A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet
Server is a computer program or a device that provides functionality for other programs or devices, called "clients"
SYN flag
Sequence number (32 bits) has a dual role: If the SYN flag is set (1), then this is the initial sequence number; If the SYN flag is clear (0), then this is the accumulated sequence number of the first data byte of this segment.
TCP packet
A network packet is a formatted unit of data carried by a packet-switched network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a bit stream.
The Internet Control Message Protocol (ICMP) is one of the main protocols of the internet protocol suite. It is used by network devices, like routers, to send error messages indicating, for example, that a requested service is not available or that a host or router could not be reached.
ACK-flag is a flag in TCP segment. It's indicates that the Acknowledgment field is significant. All packets after the initial SYN packet sent by the client should have this flag set.
Web service
A Web service is a service offered by an electronic device to another electronic device, communicating with each other via the World wide web
Internet hosting service is a service that runs Internet servers, allowing organizations and individuals to serve content to the Internet
DDoS attack
A DDoS attack (Distributed Denial of Service attack) is a complex of actions aimed at fully or partially rendering an online resource unavailable to its intended users. Almost any online resource can be targeted: a website, a game server, or a public resource.
First-hand information about events in the field of cybersecurity and in the company
According to the Q2 2017 statistic data, gathered by DDoS-GUARD, the most dangerous DDoS attacks happen on Tuesdays, Thursdays, and Sundays...
The filtering system identified this traffic as illegitimate. Within 20 minutes the client was under a series of DDoS attacks with size of attacks ranging from 12 to 41 Gbps at the peak of the attack...