...

DDoS Protection

Our 40 Gbps network bandwidth lets us absorb large traffic volumes while keeping your resources and applications online. Rapidly scalable resources handle spikes, and the load balancer further limits direct traffic to critical parts of your infrastructure. When you rent a physical server, this protection is reinforced at the Tier III data-centre level.

Free protection

Traffic filtering against DDoS‑attacks at L3, L4 network‑protocol layers. Unwanted traffic from external sources is blocked. Protection is enabled for all services by default.

DDoS‑GUARD protection

Defense against DDoS‑attacks at OSI layers L3‑L7 with an unlimited number of prefixes. Both inbound and outbound traffic are analyzed. Accelerated content delivery (CDN) boosts site‑loading speed.

Qrator protection

DDoS‑attacks are automatically neutralized at all OSI layers up to L7 while maintaining the productivity of web resources. Encrypted HTTPS‑traffic is filtered. Network anomalies are tracked at the global BGP routing level.

How protection works

Advantages of DDoS‑Guard protection

Analytics and reports

Detailed traffic analytics in the client area

DNS‑hosting

Free DNS‑hosting with full management access

Request balancing

Traffic distribution across multiple DDoS‑Guard servers

SSL certificates

Free Let’s Encrypt certificates and support for third‑party SSL

Traffic filtering

Create and manage custom protection rules for traffic filtering

No IP blocking

L7‑attack protection from the first request, with no IP blocks

Two DDoS Guard protection options

How we help businesses

  • We continuously monitor suspicious activity and block malicious traffic.
  • We ensure fast site loading through content optimization and caching (CDN).
  • We update the resource’s DNS records when required.
  • We hide clients’ IP addresses and server locations from attackers.
  • We block all known DDoS‑attacks at multiple layers: L3‑L4, L7 OSI.

Plans

  1. Normal

    230 / month

    • Protection for 1 domain
    • Response time up to 40 min
    • Black/white lists up to 5 rules

    Additionally

    • Geo‑blocking, Dedicated IP
    • Third‑party SSL certificates
    Read more
  2. Medium

    600 / month

    • Protection for 3 domains
    • Response time up to 30 min
    • Black/white lists up to 15 rules

    Everything in normal +

    • L7 attack reports
    • Load balancing: 5 servers
    Read more
  3. Premium

    1000 / month

    • Protection for 5 domains
    • Response time up to 15 min
    • Black/white lists up to 50 rules

    Everything in medium +

    • Traffic Corrector System
    • Incident notifications
    Read more
  4. Enterprise

    2500 / month

    • Protection for 10+ domains
    • Response time up to 10 min
    • Response time up to 10 min

    Everything in premium +

    • Protection against OWASP TOP‑10 attacks
    • Bot Mitigation and WAF connection
    Read more

How Qrator Labs DDoS protection works

Benefits

  • DDoS attacks are blocked across all ISO OSI layers. At the application level (L7) security is automated for every plan.
  • The system is invisible to regular users—no CAPTCHAs or other checks.
  • During attacks the false‑positive rate does not exceed 5 %.
  • Rapid response to L7‑attacks eliminates any impact on client web‑resource performance.
  • Maximum availability of client resources is always maintained.

Technologies

  • HTTPS with key disclosure
  • Resilient DNS
  • Service management via API
  • HTTPS without key disclosure
  • BGP connectivity
  • Remote firewall
  • Dedicated channel
  • Website availability monitoring
  • Web application firewall
  • Traffic balancing
  • Persistent connections

Plans

  1. Professional

    230 / month

    • Filtering capacity for unwanted traffic: up to 10 Gbit/s
    • Guaranteed resource availability per month ≥ 97 %
    • Additional IP addresses 7 000 ₽/month
    Read more
  2. Business

    780 / month

    • Filtering capacity for unwanted traffic: up to 50 Gbit/s
    • Guaranteed resource availability per month ≥ 99 %
    • Additional IP addresses 16 000 ₽/month
    Read more
  3. Corporate

    1600 / month

    • Filtering capacity for unwanted traffic: up to 500 Gbit/s
    • Guaranteed resource availability per month ≥ 99.5 %
    • Additional IP addresses 25 000 ₽/month
    Read more
  4. Enterprise

    Price on request

    • Filtering capacity for unwanted traffic: unlimited
    • Guaranteed resource availability per month ≥ 99.5 %
    • Cost of additional IP addresses calculated individually
    Read more

Where to start

Build a cloud infrastructure

Flexible management and limitless scalability. Spin‑up virtual networks, clusters, and standalone VMs in any environment — on top of a ready‑made physical platform.

Create a virtual machine

High‑performance, highly‑available VPS/VDS with automatic OS installation and full root access. Each instance sits in a private VLAN and is supplied with a public IPv4 address. Reserved resources are guaranteed to be yours.

FAQ

What is a DDoS attack?

In layman's terms, a DDoS attack is an attacker generating a huge number of requests to your site/application/server, resulting in the target system being overloaded and no longer being able to process requests in the normal mode. A DDoS attack is distributed, i.e. the attacker's requests come from various sources and are difficult to distinguish from normal requests. A DDoS attack can permanently paralyze the target system with all the ensuing consequences. Such attacks can be initiated by ransomware or competitor

What resources are most at risk of a DDoS attack?

The most vulnerable to DDoS-attacks are those areas of business that derive their main income from the use of their online resource. Statistically, the most defeated by DDoS attacks are:

  • E-commerce resources;
  • Financial resources;
  • Online entertainment services.

Can I protect myself from DDoS-attacks?

Yes, you can theoretically protect yourself from DDoS attacks if you provide excessive computing power and bandwidth, which are many times greater than usual, which would be difficult to overload, and if you significantly limit the areas from which you will receive targeted requests. But such a solution would be expensive and inefficient. An effective solution would be to use specialized DDoS attack protection services.

How does DDoS protection work?

In brief, DDoS attack protection is filtering incoming traffic in front of your system. Traffic from sources that participated in the attacks and traffic whose structure is suspicious is filtered out and does not reach your system. Addresses with suspicious activity are temporarily blocked

Can a DDoS attack overload a DDoS protection service?

DDoS protection systems are built to withstand attacks and work confidently in the face of an attack. The probability of protection systems failing is minimal and we are not aware of any such cases.

What is SLA?

SLA (Service Level Agreement) is a guaranteed availability of information resources/sites for the user per month expressed as a percentage of time. For example, SLA 97% means that a site will have less than 21,6 hours downtime per month; for SLA 99,5% it means less than 3,6 hours downtime per month.

Can we switch the protection against DDoS-attacks off completely at our own discretion?

No, protection is turned on and off only by changing A-record in DNS. To change the A-record, use your hosting provider's control panel, if domain name management is delegated to your hosting provider, or use the control panel of the registrar, from whom you have registered your domain.

Will I know if my site has been attacked?

Yes, you will receive a report after the DDoS attack is over.

My website is under DDoS-attack now, what should I do?

Please contact Servermall Cloud.com manager.