DDoS Protection Cloud
A Managed Security Service for business

Our DDoS Protection Cloud is offering high performance layer 3,
4 and 7 DDoS protection with full control and clear insights

Fast carrier hardware, known vendors technologies, Open-source community additions, commercial subscriptions and the famous own build IP protection technologies will provide our users full control to secure their infrastructure. Therefore Our DDoS scrubbing cloud is among the best DDoS shields in the world.

Protect Server

For single IP devises and those who wants to explore DDoS protection.

  • Clean data traffic limit: N/A
  • 1.2Tbps Incoming dirty traffic limit
  • 5x IPv4 & 5x IPv6 Amount of protected IP
  • GRE tunnel included
  • Always On Available

Get started now


Out of the box, managed cloud.

  • Clean data traffic limit: N/A
  • 1.2Tbps Incoming dirty traffic limit
  • Up to a /12 IPv4 – /32 IPv6
  • GRE tunnel included
  • Always On Available

Get started now

Remote DDoS protection by GRE tunnel
Chat with us/m

Customized for Your Needs.

  • Up to 40Gbps legitimate traffic commit
  • 1.2Tbps Incoming dirty traffic limit
  • Up to a /12 IPv4 – /32 IPv6
  • GRE tunnel included
  • Always On Available

Get started now

The DDoS Protection Cloud

By Our IP subnet announcement or your your own BGP IP announcement the legitimate and dirty incoming traffic goes through the our scrubbing environment. After it is cleaned you will receive the cleaned traffic by fiber cable or GRE tunnel in return. Therefore you can use the DDoS Protection Cloud service in and outside the our network and datacenters.

Blocking any type of IP attack

Protocol abuse attack defense

Defense against IP spoofing, LAND, Fraggle, Smurf, Winnuke, Ping of Death, Tear Drop, IP Option, IP Fragment Control Packet, TCP Label Validity Check, Large ICMP Control Packet, ICMP Redirect Control Packet and ICMP Unreachable Control Packet attacks.

DNS attack defense

Defense against DNS Query Flood attacks from real or spoofed source IP addresses, DNS Reply Flood attacks, DNS Cache Poisoning attacks, DNS Protocol Vulnerability Exploits and DNS Reflection attacks.

Mobile attack defense

Defensible DDoS attacks launched by mobile botnets, for example, AnDOSid/WebLOIC/Android.DDoS.1.origin.

Web attack defense

against HTTP Get Flood, HTTP Post Flood, HTTP Head Flood, HTTP slow header flood, HTTP Slow Post Flood, HTTPS Flood and SSL DoS/DDoS attacks.

Network-layer attack defense

Defense against SYN Flood, ACK Flood, SYN-ACK Flood, FIN/RST Flood, TCP Fragment Flood, UDP Flood, UDP Fragment Flood, NTP Flood, ICMP Flood, TCP Connection Flood, Sockstress, TCP Retransmission and TCP Null Connection attacks.

Botnet traffic blocking

Blocking of controlling traffic of botnets, active zombies, Trojan horses, worms, and tools, such as LOIC, HOIC, Slowloris, Pyloris, HttpDosTool, Slowhttptest,Thc-ssl-dos, YoyoDDOS, IMDDOS, Puppet, Storm, fengyun, AladinDDoS, and so on C&C DNS request traffic blocking

Scanning and sniffing attack defense

Defense against Port Scanning, IP Scanning, Tracert Control Packet, IP Option, IP Timestamp and IP Routing Record attacks.

SIP attack defense

Defense against SIP methods Flood attacks.

Feature-based filtering Blacklist

HTTP/DNS/SIP/DHCP field-based filtering, and IP/TCP/UDP/ICMP/Other Protocol field-based and load feature-based filtering.

Technical partners

DDoS Protection Cloud: This technology keeps by business safe

“Root Networks’ private DDoS protected GRE tunnel protects our data center hundreds of servers”

IT Director, RBNET Co.,Ltd.