That is true. Assuming they have that much filtering and connectivity dedicated to such... not making a judgement either way... cause...RamNode provides 10Gbps DDoS protection only. That's *tiny* compared to real DDoS attacks.
The attack literally increased it's size by 10 in the past 30 minutes. We're still trying to find a solution.
What is going to happen way before then is a puny VPS is going to blow up IO on container and probably ruin the entire server. Ending up in null, and or more properly a service suspension.
My suggestion to GVH would be STFU and not give any details about the attack to anyone until the attack is completely mitigated. DDoS attackers epenis sizes (and the intensity of their attacks) tend to increase each time their victims publicly post about the attacks.The attack literally increased it's size by 10 in the past 30 minutes. We're still trying to find a solution.
Were they using free or paid CloudFlare? Free or the $25/mo plan is useless against attacks. And if they didn't change their IPs then CF won't be of any use anyhow.I ran out of popcorn ... so I went back to being helpful... Ho hum...
Ramnode had like 200+ load on that server, due to attack... so Layer 7 they have, meh... what shall I call it?
People diss CloudFlare, me included, but up it went. Things were alright. Then CF started straight passing traffic. Growl.
So CF back in place now.... and more heavy duty linebacker blocks put up... Whee...
http://www.downforeveryoneorjustme.com/greenvaluehost.com
Let's see how long this magic carpet ride lasts.
Done offering free mob protection for tonight.
Well they were to start with base CF.. and tier up appropriately.... Much of this botnet would be pre-bad-listed with CF and get captcha'd by CF or dealt with otherwise by them. The botnet is still running on compromised machines that were put on lists nearly 2 months ago.Were they using free or paid CloudFlare? Free or the $25/mo plan is useless against attacks. And if they didn't change their IPs then CF won't be of any use anyhow.
Actually the best thing they can do is go to bed and worry about it later. They can either throw money at the problem or wait for the attacker to get bored, and waiting doesn't cost a dime. Sure, they can't take any new sales while their website is down but if the trade-off is not having to pay costly mitigation fees and bandwidth overages then so be it.This is why you have staff around the clock or get your lazy princess ass out of bed, or never go to bed when someone is burning your castle down.
Kids though, they have a bed time or they might get grounded and their i-devices untethered.
Thank you... hopefully people have such handy....
Well on the plus side, it's not a school night, so hopefully no homework to do, and maybe the parents will extend their bedtime slightly. :lol:Kids though, they have a bed time or they might get grounded and their i-devices untethered.