A distributed denial-of-service (DDoS) attack is a constantly evolving menace that threatens online businesses with websites unavailable to the public, financial losses, and damaged client relationships.

The typical DDoS attack length

Whilst some attacks can be rather short, the majority last a significant amount of time; leaving you with no website availability, thus damaging your reputation, losing you customers, and losing you money.

Due to these issues, we have made it a standard to offer DDoS Protection with out products to ensure you do not fall to these malicious attack floods on your server or website.

The impact of a DDoS attack

The impact of a DDoS attack on any infrastructure can be devastating if you do not have the correct equipment and capacity to be able to mitigate it to make sure your server or website stays available.

We at HostSlick already have a remedy to any incoming flood using our Corero SmartWall appliances in UK and Voxilitys DDoS Protection in NL, that inspect and clean any bad traffic before reaching your server.

We protect you against...

  • TCP Flood Attacks
  • HTTP GET/POST Floods
  • UDP Flood Attacks
  • UDP Fragmentation Attacks
  • ICMP Floods
  • NTP Amplification
  • SSDP/UPnP Responses
  • SNMP Inbound Responses
  • Chargen Responses
  • DNS Amplification
  • Fraggle Attack DNS
  • IP Fragmentation/Segmentation
  • Invalid TCP/UDP port numbers
  • Chargen Responses
  • And much much more!

Frequently Asked Questions

What locations do you offer this DDoS protection in?

We currently offer it with services that use our United Kingdom and Netherlands location.

How many volumetric gigabits can we handle?

We can currently handle up to around 1600Gbps volumetric flood in Netherlands and 100Gbps in United Kingdom. With our ever-growing clientele base, this will continue to grow.

Can we block custom attack methods?

Our mitigation appliance creates smart rules using heuristic based engine leverages and behavioural analysis to block any custom floods received.

What is heuristic based learning and behavioural analysis?

Our mitigation performs analysis on all incoming malicious floods and creates new firewall rules based around these floods automatically.

Can we contact you to setup contact filtering methods that our mitigation hasn't automatically completed?

Yes, you can open a ticket with our support service if any flood is getting past our ddos protection and we will manually create rules to combat it.

I don't understand all this technical jargon, does it work?

For those who don't understand all the technical jargon mentioned previously, we can guarantee our mitigation works to an outstanding level of performance which we are personally proud of as a company.