DDoS Protected Solution

C1V Shield DDoS Protection can mitigate any type of attack instantly without customer intervention thanks to its Pro-Active and Always-ON mitigation filters.


Protection Capacity:

- Over 1180Gbps Stateful filtering (TCP connections)

- Over 2.580Gbps Stateless filtering (TCP without connection-check/UDP connections)


The Customer is provided with the C1V Shield management panel through which he can view detailed statistics of each attack and, for the more experienced, set up custom static rules based on IP, Payload, Packet Length, GeoIP and ratelimit.

ATTENTION: In compliance with current laws and regulations, we don't close or restrict any port, customers are free to use any port they choose.


What does the Advanced "C1V Shield" protection includes:

Volumetric DDoS
  • UDP flood,
  • UDP fragmentation,
  • ICMP flood,
  • GRE flood,
  • Every other flood.
  • Amplification attacks to the following protocols: TCP, UDP, ICMP, DNS, DNS-SEC, SSDP/UPnP, NTP, LDAP, CLDAP, ARD, COAP, RIP, rpcbind, SNMP, SQL RS, Chargen, L2TP, Memcached and others.
Resource Exhaustion Attacks
  • Malformed and truncated packets attacks,
  • Invalid packets,
  • IP Fragmentation/Segmentation AETs (Teardrop, Targa3, Jolt2, Nestea etc.),
  • Invalid TCP Segment IDs,
  • TCP connection flood,
  • “Slow” TCP flood,
  • wrong checksums and illegal flags in TCP/UDP frames,
  • invalid TCP/UDP port numbers,
  • use of reserved IP addresses,
  • type of service (TOS) flood,
  • HTTP/HTTPS flood.
Application Attacks
  • HTTP/HTTPS complex attacks through advanced filtering,
  • Minecraft,
  • OpenVPN,
  • Wireguard,
  • TeamSpeak3,
  • FiveM,
  • FiveM HTTP Game special filter (fight HTTP attacks targetting FiveM servers),
  • SSH,
  • CS:GO,
  • Any bypass.
  • ddos, ddosprotection, firewall, ddosprotected, ddosprotectedserver, ddos protected server, ddos protected service, anti ddos, antiddos, c1v hosting antiddos, layer7 ddos protected, vps protected, ddos protected vps
  • 71 Utenti hanno trovato utile questa risposta
Hai trovato utile questa risposta?

Articoli Correlati

DDoS Mitigation Policy

Selecting DDoS Mitigation Policy is the key step in optimizing our DDoS mitigation for your use....