Simple and transparent pricing

From early to enterprise, to any other, we've got you covered. On board now with us and
get the best results you could imagine.

DDOS Protection

€2,99 Monthly
€-1,00 Quarterly
€-1,00 Semi-Annually
€-1,00 Annually
€-1,00 Biennially
€-1,00 Triennially
  • Managed DNS
  • Anycast DNS Locations 40
  • DDoS Protected DNS Servers
  • Unlimited DNS Queries
  • Dynamic DNS
  • Secondary DNS Zones
  • Reverse DNS Zones
  • Cloud-Based Infrastructure & Pro-Tools
  • 99.9% Uptime Commitment
All prices exclude VAT at 20% Compare features

DDOS Attack Classification

Infrastructure Layer Attacks

Attacks at Layer 3 and 4, are typically categorized as Infrastructure layer attacks. These are also the most common type of DDoS attack and include vectors like synchronized (SYN) floods and other reflection attacks like User Datagram Packet (UDP) floods. These attacks are usually large in volume and aim to overload the capacity of the network or the application servers. But fortunately, these are also the type of attacks that have clear signatures and are easier to detect.

Application Layer Attacks

Attacks at Layer 6 and 7, are often categorized as Application layer attacks. While these attacks are less common, they also tend to be more sophisticated. These attacks are typically small in volume compared to the Infrastructure layer attacks but tend to focus on particular expensive parts of the application thereby making it unavailable for real users. For instance, a flood of HTTP requests to a login page, or an expensive search API, or even Wordpress XML-RPC floods (also known as Wordpress pingback attacks).

Know what is normal and abnormal traffic

Whenever we detect elevated levels of traffic hitting a host, the very baseline is to be able only to accept as much traffic as our host can handle without affecting availability. This concept is called rate limiting. More advanced protection techniques can go one step further and intelligently only accept traffic that is legitimate by analyzing the individual packets themselves. To do this, you need to understand the characteristics of good traffic that the target usually receives and be able to compare each packet against this baseline.

Deploy Firewalls for Sophisticated Application attacks

A good practice is to use a Web Application Firewall (WAF) against attacks, such as SQL injection or cross-site request forgery, that attempt to exploit a vulnerability in your application itself. Additionally, due to the unique nature of these attacks, you should be able to easily create customized mitigations against illegitimate requests which could have characteristics like disguising as good traffic or coming from bad IPs, unexpected geographies, etc.

Reduce Attack Surface Area

One of the first techniques to mitigate DDoS attacks is to minimize the surface area that can be attacked thereby limiting the options for attackers and allowing you to build protections in a single place. We want to ensure that we do not expose our application or resources to ports, protocols or applications from where they do not expect any communication

Plan for Scale

The two key considerations for mitigating large scale volumetric DDoS attacks are bandwidth (or transit) capacity and server capacity to absorb and mitigate attacks. Transit capacity. When architecting your applications, make sure your hosting provider provides ample redundant Internet connectivity that allows you to handle large volumes of traffic.


Using a DDoS Protected plan will make your DNS resistant to different types and sizes of DDoS attacks. It fits great to every site owner who is searching for more security and the best
Yes, using a DDoS protected DNS plan you can benefit from Unlimited DNS queries.
There are many advantages of using a DDoS protected DNS plan. Some of them are Botnet attack resistance, Better speed and Cost-effectiveness.
You can contact us via our Live Chat support or if you prefer, you can send a message on Contact Us and our 24/7 support team will answer to the ticket as soon as possible.