Anti-DDoS

We can offer DDoS protection from attacks up to 250 Gbps to all of our clients and clients of third-party web hosting providers.

How does DDoS protection by Fornex work?

We apply a set of measures to protect our clients from DDoS attacks. Our hardware solution allows us to detect and filter a huge number of attack types. In addition, we run an intelligent analysis of traffic by signatures against all known botnets. Information about them is updated daily in our database.

Our technicians have a lot of experience in repelling DDoS attacks of any type. We treat every attack on every server individually, and the filtration at the hardware and software level is configured according to the attack's type and capacity.

We also apply complex measures to eliminate and reduce the possibility of a successful repeated attack. Altogether, this allows us to detect and protect you from any attack in time.

Order Protection from DDoS attacks

Terms of Service

We provide the DDoS protection service for our customers and customers hosted by other companies (in this case, we proxy traffic through our HA cluster). Your domain will be directed to an IP address that we provide. Once the DNS cache is updated, all the traffic will pass through our filters.

Terms of Service for DDoS Protection for VH/VPS Clients and Clients Hosted by Other Companies.

If your site is under a DDoS attack and is located on a VH or VPS service (provided by us or another company), we can protect it by providing an IP address. You'll just need to direct your domain to it. Once the DNS cache is updated, all traffic will pass through our High-availability (HA) cluster. Traffic on the HA cluster is balanced by several high-performance servers, which increases your project's accessibility.

On web hosting or VPS we filter traffic and provide DDoS protection only for HTTP and HTTPS. Protection for other protocols and flexible filter configurations are available for dedicated server orders.

Standard filtration
€150/month

Price: €150/mo (this includes a dedicated IP address and traffic filtration for one domain).

Advanced filtration
€300/month

Price: €300/mo (this includes flexible filtration with deep traffic analysis, advanced location rules, individual filter settings, 24/7 availability monitoring).A dedicated IP address and traffic filtration for 10 domains.


Terms of Service for Dedicated Server Orders.

We provide a set of DDoS protection filters for all our dedicated server clients. Absolutely all traffic (not just HTTP/HTTPS protocols) passing through your server will be checked. On top of that, you won't have to change your domain's IP address and wait for the DNS cache to update. DDoS protection only takes a minute to activate.

Free filtration
Free

We provide free DDoS protection for all our dedicated server clients located at our data center in Germany. The attack must not exceed 10 Gbps, and pure traffic must be less than 50 Mbps. If the traffic exceeds these numbers, you'll have to switch to a paid DDoS protection subscription.

Standard filtration
€150/month

Price: €150/mo (this includes a dedicated IP address and traffic filtration for one domain).

Advanced filtration
€300/month

Price: €300/mo (this includes flexible filtration with deep traffic analysis, advanced location rules, individual filter settings, 24/7 availability monitoring).


Service activation

We provide the DDoS protection service for our customers and customers hosted by other companies (in this case, we proxy traffic through our HA cluster). Your domain will be directed to an IP address that we provide. Once the DNS cache is updated, all the traffic will pass through our filters.

An example of how it works

Advantages:

24/7 traffic analysis for attacks
Channel capacity up to 160 Gbps
Protection from most types of attacks
Intelligent filtration
Fast service activation
Individual approach to every project

We provide protection from the following types of attacks:

Flood attacks (TCP, UDP, ICMP, DNS, NTP Reflection/Amplification)
TCP stack attacks (SYN, FIN, RST, SYN ACK, URG-PSH, TCP Flags)
Application layer attacks (HTTP GET floods, SIP Invite floods, DNS attacks, HTTPS attacks)
Fragmentation attacks (Teardrop, Targa3, Jolt2, Nestea)
DNS Cache Poisoning attacks
Attacks on vulnerabilities
Bandwidth saturation