tencent cloud

Feedback

Last updated: 2024-07-01 11:41:51

    Will I receive alerts for DDoS attacks?

    Yes. You will get alert notifications when the inbound traffic exceeds a specified threshold. To learn how to set thresholds, see Configuring Security Event Notifications.

    Why does my business suffer DDoS attacks without my business running on the server?

    A DDoS attack is an attack involving multiple devices attempting to make your business, rather than the IP or domain name of the server, inaccessible for users.
    Your business may be at risk of DDoS attacks if it communicates over the public network.

    Why is my business attacked again after I have Anti-DDoS products deployed?

    Your business may be at risk of DDoS attacks if it communicates over the public network.
    Your business may still be targeted even though it is protected by Anti-DDoS products, but the attacks are less likely to cause losses.

    What are the targets when the server is attacked?

    DDoS attacks target your IP or business by attacking the server.

    What are the common types of attacks?

    Network layer attacks: include UDP reflection attacks, SYN floods, and connection attacks. Attacks of this type cause a denial of service by consuming server bandwidth and connection resources.
    Application layer attacks: include DNS floods, HTTP floods, and CC attacks. Attacks of this type cause a denial of service by exhausting server performance.

    Where can I view the logs of attacks on the server?

    On the Overview page, you can view the attack logs for different time ranges.

    Where can I view the details of the attack source IP?

    On the Overview page, select the attack event you want to view, and then click View details to check the information and region of the attack source, attack traffic, and attack packet size.

    

    What should I do when my Lighthouse server is under DDoS attacks?

    We recommend you purchase an Anti-DDoS Advanced to defend against DDoS attacks and guarantee the availability of your server and business.

    How should I identify an attack by the amount of attack traffic?

    An attack is identified as long as attack traffic is detected. You can set an alert threshold based on the amount of attack traffic.

    I have added the access source IP to the blocklist configured for the Anti-DDoS Pro instance when my business is attacked, but the IP still has access to my business. Is the instance not working?

    The access restriction for the IP will not take effect right after it is added to the blocklist. Only when the incoming traffic exceeds the cleansing threshold, the IP will be denied directly from accessing your business.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support