Skip to main content

DDoS protection that is already in the path when you need it

Volumetric, protocol, and application-layer attacks are filtered before they hit your service. Clean traffic stays fast. The protection comes with every deployment instead of living behind a sales conversation.

Three-layer defense terminates attacks progressively

Traffic passes through three filtering stages. Volumetric floods drop at the network edge. Protocol attacks terminate at stateful inspection. Application profiles whitelist legitimate traffic patterns. Clean traffic reaches your infrastructure with zero added latency.

Incoming trafficVolumetric edge5.6 Tbps capacityIntelligent primary4 Tbps capacityApplication shieldProtocol rulesClean traffic

How the mitigation stack protects live services

The goal is simple: drop hostile traffic early and keep legitimate sessions moving.

Large floods are absorbed at the edge

Traffic is filtered before it reaches your ports, so bandwidth and server resources stay available for real users.

View network capacity

Connection validation cuts off protocol abuse

SYN proxy and protocol-aware filtering stop common exhaustion attacks before they interfere with legitimate sessions.

See protected infrastructure

Rules can follow your application traffic shape

Configure rate limits, whitelist trusted CIDR ranges, and adapt protection to the traffic patterns your application actually needs.

Talk to an engineer

Inspection happens at line rate, not after a bottleneck forms

DPDK and eBPF/XDP keep packet inspection fast so clean traffic does not queue behind the mitigation process.

View hardware specs

Shield: Self-service DDoS management

Monitor traffic and attacks in real-time, review forensic logs, configure filtering rules, and deploy application-specific profiles. Full control over your protection without support tickets.

shield.royalehosting.nl
Current throughput
847 Gbps
Packets/sec
142M
Attacks blocked
2.4K
Traffic over time
Live

DDoS protection technical FAQ

Detailed specifications on mitigation capacity, detection latency, supported attack vectors, and configuration options.

Edge network capacity (upstream transit + IX ports) absorbs 5.6 Tbps using BGP FlowSpec filtering. Traffic passing edge filtering reaches our primary mitigation cluster with 4 Tbps of stateful inspection capacity. Both layers operate simultaneously: volumetric attacks scrub at the edge while sophisticated protocol attacks terminate at the mitigation cluster.

Individual IPs nullroute when attacks exceed 2.5 Tbps or 1 Gpps (billion packets per second), or when upstream link saturation threatens infrastructure stability. Nullrouting isolates a single IP at the network edge to protect other customers. Most attacks terminate well below these thresholds.

Yes. Every dedicated server, VPS, and colocation service includes the full three-layer mitigation stack at no additional cost. No premium tiers, no per-attack fees, no bandwidth surcharges. Protection is always-on by default.

Layer 1 (edge filtering): Instant. BGP FlowSpec rules drop known attack signatures at line rate. Layer 2 (stateful inspection): 50-200 milliseconds for new attack pattern detection and blocking. Layer 3 (application profiles): Always-on for configured profiles with zero detection delay.

Volumetric attacks: UDP floods, DNS/NTP/SSDP/memcached amplification, ICMP floods, spoofed traffic. Protocol attacks: SYN floods, ACK floods, RST floods, TCP state exhaustion, fragmented packet attacks. Focus is Layer 3/4 mitigation.

No. Our mitigation focuses on Layer 3/4 attacks (volumetric and protocol-level). We do not inspect HTTP/HTTPS content and cannot mitigate application-layer attacks like HTTP floods, slowloris, or RUDY. For Layer 7 protection, deploy a WAF or CDN like Cloudflare in front of your origin.

Currently, DDoS protection covers only traffic destined to IPs hosted on our network. We do not offer GRE tunnel-based protection for external infrastructure. Contact sales to discuss colocation or dedicated server options for bringing your infrastructure onto our network.

Yes. Shield provides self-service configuration for: IP/CIDR whitelists and blacklists, per-source rate limits (PPS and BPS), port and protocol filters, geographic blocks, and application profile selection. Rule changes propagate across the mitigation infrastructure within seconds.

Application profiles whitelist traffic patterns for specific workload types. A gaming profile recognizes valid game server protocols and prioritizes that traffic. VoIP profiles whitelist SIP/RTP patterns. Profiles operate at the protocol level to identify legitimate traffic and reduce false positives.

Stateful TCP inspection with SYN proxy validates connections before forwarding to your server. Behavioral analysis establishes traffic baselines and flags statistical anomalies. Application profiles whitelist known traffic patterns. Self-service IP/CIDR whitelists let you exclude known-good sources like CDNs and monitoring systems.

Have a specific technical question? Talk to an engineer

Need protected infrastructure without buying a separate mitigation service?

Deploy VPS, dedicated servers, or colocation with the mitigation stack already included.