airilxx
Member
- Jan 1, 2012
- 51
- 12
Hello DevBest,
Recently for the past few weeks, my VPS has been hit my a large scale L4 and L7 DDoS attacks, which causes huge downtime on my VPS and hotel itself.
However, last night attack was a large scale attack which causes my hosting to temporarily disabled my VPS. Previously, I've already setup a Proxy VPS, running on HAProxy, however they began to attack the proxy VPS and caused it to temporarily suspended by my hosting provider.
I've took necessary measures such as using proxy on my client, harden the security of IIS and only allowing CloudFlare IPs to access my VPS, but they still finds way to exploit it.
BTW, I've already recognized the attackers of my hotel, and method they're using to bypass my VPS, but I won't spill for now.
However back to the point, I would like to ask recommendations for best TCP Proxy that able to mitigate (or at least reduce) these L4 scale attacks. I know there's already multiple similar threads being asked in here. But I find that they're not up-to-date at the time being. Thank you!
Recently for the past few weeks, my VPS has been hit my a large scale L4 and L7 DDoS attacks, which causes huge downtime on my VPS and hotel itself.
However, last night attack was a large scale attack which causes my hosting to temporarily disabled my VPS. Previously, I've already setup a Proxy VPS, running on HAProxy, however they began to attack the proxy VPS and caused it to temporarily suspended by my hosting provider.
I've took necessary measures such as using proxy on my client, harden the security of IIS and only allowing CloudFlare IPs to access my VPS, but they still finds way to exploit it.
BTW, I've already recognized the attackers of my hotel, and method they're using to bypass my VPS, but I won't spill for now.
However back to the point, I would like to ask recommendations for best TCP Proxy that able to mitigate (or at least reduce) these L4 scale attacks. I know there's already multiple similar threads being asked in here. But I find that they're not up-to-date at the time being. Thank you!