By cmspencer1
How long do you nullroute on an incoming DDoS attack?
This textbox defaults to using Markdown to format your answer.
You can type !ref in this text area to quickly search our full set of tutorials, documentation & marketplace offerings and insert the link!
So what is the cause of the attack of 4th February ? My droplet has been unreachable all day.
Every serious DDoS attack is very different and requires investigation to determine the origin of the attack, the type of attack and which services as well as which IPs are targeted, and also to asses the impact to the virtual server, the hypervisor, and the network at large. <br> <br>We can not disclose the specifics of how we go about mitigating DDoS attacks as that information can then be used to strengthen attacks, what I can reveal is that when an attack is large enough to cause issues all of our engineers are investigating the issue together and working to resolve it as quickly as possible.
If, for example, a backend server is DDoSed, is it allowed to shutdown the instance and create another identical one from a snapshot (which should get it another IP)?
Get paid to write technical tutorials and select a tech-focused charity to receive a matching donation.
Full documentation for every DigitalOcean product.
The Wave has everything you need to know about building a business, from raising funding to marketing your product.
Stay up to date by signing up for DigitalOcean’s Infrastructure as a Newsletter.
New accounts only. By submitting your email you agree to our Privacy Policy
Scale up as you grow — whether you're running one virtual machine or ten thousand.
Sign up and get $200 in credit for your first 60 days with DigitalOcean.*
*This promotional offer applies to new accounts only.