LiquidHost - New awesome yearly DDoS filtered deals | Seattle | LA | Internal IPs, filtering


Verified Provider
Hey guys!

I haven't posted a new deal in a while, so here comes the new summer offerings.

First, some information about our operation:

  • We've been in business since 2011
  • Small and dedicated support team, with more personal touch (Unmanaged, does not mean un-supported )
  • DDoS filtered IPs - if you are under medium-sized DDoS attack, we can provide filtered IPs in Seattle, LA or TX. Our services filter successfully UDP and TCP floods, up to 5-10 gbps on peaks.
  • Free offsite backup space - you can always request an FTP account on our offsite backup server
  • Internal IPs - we offer internal networking (one of the very few providers) in Seattle. Traffic is not counted through them and they are perfect for creating HA solutions, LB's and such.
  • We utilize only server-grade hardware and all of the storage is RAID-protected
  • All our locations, include a great network mix. The network is stable and reliable, consisting of top-tier providers - Level3, NTT, Telia, Zayo and PCCW (No HE and Cogent)
  • We try to answer all support and sales tickets in a timely manner
  • Our support team consists of knowledgeable and friendly people that are always ready to help out or just chat
  • Excellent uptime across our nodes

We are always happy to work with and get the best solutions for our customers! 

This time, we are going to offer a bundle deal of a VPS and filtered IP at an unbelievable price:

  • 1GB RAM
  • 4 CPU cores
  • 400GB Bandwidth
  • 30 GB RAID-protected Storage
  • **1 DDoS protected IP** **Manual setup in 24 hours (usually much less)**
48$ per whole year

And some other awesome monthly and yearly deals:

  • 2GB RAM
  • 512MB vSwap
  • 60GB Disk Space
  • 800GB Bandwidth
  • 1 IPv4 Address
  • 100Mbit connection
  • OpenVZ/SolusVM
7$ per month: - Seattle - LA

  • 2GB RAM
  • 512MB vSwap
  • 60GB Disk Space
  • 800GB Bandwidth
  • 1 IPv4 Address
  • 100Mbit connection
  • OpenVZ/SolusVM
48$ per year: - Seattle - LA

And last, but not least a real LEB on LEB price in Seattle :

And now, a whooping coupon for 20% of, from any, non already discounted (the current specials are not eligible for this discount) order from our website and any billing term! Coupon code: summer2013

We will always be happy to provide volume discounts, special quotes, match other deals, build more complex and HA solutions, provide system administration and support! Don't hesitate to open a ticket to our concerned departments, if you have ANY questions.

Some network information: Seattle, Washington: @ ColoCrossing Los Angeles, California: @ ColoCrossing

And my personal email, if anyone wishes to contact me directly: alex {at}


Active Member
Can you tell us more about the ddos protection?
They use Sharktech.

Our network is proactively filtered in 3 different stages (upstreams, core-routers, distribution routers) and dynamically filtered in 2 stages (distribution routers, firewalls). Our NIDS (Network Intrusion Detection System) device captures inbound traffic, detects and logs malicious traffic, analyzes it and finally provides the most appropriate filtering rules (layers 3-7) to our network firewalls by filtering the attack(s) with the least possible loss of legit traffic. NIDS' logging function includes reporting (after completing anti-spoof checks) source IPs involved to ISPs' abuse departments and anti-intrusion organizations which are connected with law authorities.

Our firewalls are capable to provide up to layer7 filtering and they're connected between our core-router (which is directly connected to our data center's core-router) and our main router (which our switches are connected to) receiving filtering rules from NIDS and/or rarely from our staff members. Our firewalls have been designed to function both independently and as a whole. By default they all function together, but if for any reason NIDS becomes unavailable, the firewalls will start functioning independently. This may result in a temporary slower performance in order to avoid the network being unfiltered until NIDS becomes available again. Additionally, if one of the firewalls becomes unavailable, it instantly gets excluded from the load balancing system to prevent the network from becoming affected. This way, the network has a complete fail-over no matter if any of the firewalls or NIDS becomes unavailable.

Additionally, our NIDS analyzes and identifies attacks per packet's protocol, packet type and several other characteristics giving the opportunity to our firewalls to filter an attack with at least 15 methods (planning to increase to 20+ methods in the near future). In rare cases, when an attack cannot get filtered differently, an IP null-route is applied. If the attack exceeds a specific number of Gbps (Gigabits per second) or Mpps (Million packets per second), additional ACLs may get applied in our router(s).

The firewalling mechanism described above has been completely designed and engineered by Sharktech staff using fundamental understanding of filtering, intensive knowledge and experience in preventing DDoS attacks. Our firewalls and NIDS use as open-source operating system with engineered firewalling and detection software.