DDoS Protection

Market-leading DDoS Protection

At RoyaleHosting we provide the best DDoS protection in the industry, we're able to achieve this by having our own stateful firewall in combination with Corero DDoS Protection with a capacity of 2.5Tbps. We will keep updating our firewall so everything is blocked, from small attacks to big attacks.

What does our DDoS protection offer?

Fast Mitigation

After a DDoS attack is detected it gets mitigated within a couple of seconds to keep your server up and running.

Full control (soon)

You are able to manage your own firewall and apply rules yourself. There is no need to wait for support to change something.


Our DDoS protection firewall is equipped with the newest technologies like a stateful firewall, this allows us to filter everything.

Continuous Updates

We keep updating our firewall to make sure nothing will bypass, our firewall will stay protected against the newest DDoS methods.

High capacity

Our firewall is not only protected against bypass attacks but also large scale attacks. Our firewall has a total capacity of 2.5Tbps.


We provide inhouse DDoS protection, this means that there is no extra delay added when your server is getting attacked.

Application Shield (new)

Our new in house developed application filter ensures your application stays online during the most sophisticated DDoS attacks by using an advanced filter specifically made for the application you're running. You can request access to our application shield via a ticket.

Firewall flow





Checking again...


Our pre-firewall is provided by Corero and is made to block large scale attacks, in most cases this firewall blocks 90% of the attack making the attack a lot smaller and ready to get filtered by our advanced stateful firewall.


Our advanced firewall will detect a DDoS attack as soon as it reaches our network. The firewall will first get some basic information about the attack and send this to the filter servers.


When the attack is detected the traffic will go through the filter servers, since everything is inhouse it only takes a snap of a finger to let the traffic go a different route.


Both the clean and bad traffic will go through the filter servers, the firewall will look at the application type and what traffic it needs to filter everything that shouldn't be included.

Checking again...

The firewall will do one last check and see if it didn't let too much traffic through. The firewall will only allow what the server can take. If it did this check and is sure the traffic is clean, it will go to your server.