tencent cloud

Anti-DDoS

Release Notes and Announcements
Release Notes
Announcements
Product Introduction
Overview
Strengths
Use Cases
Concepts
Blocking Policies
Relevant Products
Comparison of Anti-DDoS Solutions
Purchase Guide
Billing Overview
Purchase Directions
Getting Started
Anti-DDoS Pro
Anti-DDoS Advanced
Operation Guide
Operation Overview
Protection Overview
Usage Limits
Asset Center
Business Connection
Smart Scheduling
Protection Configuration
Security Operations
Service Management
Practical Tutorial
Remote Protection Scheme with Anti-DDoS Pro
Using Anti-DDoS Pro Together with WFA
Suggestions on Stress Tests
Solutions to Real Server IP Exposure
Creating an Anti-DDoS EIP
Configuration Directions and Notes on CC Protection Policies
Syncing Forwarding Rules to New Anti-DDoS Advanced Instances
‌Smart Scheduling of CTCC/CUCC/CMCC Traffic
Troubleshooting
Business IPs Blocked Due to High-traffic Attacks
‌Business IPs Blocked When DDoS Attack Traffic Doesn't Reach the Threshold
How to Fix a 502 Bad Gateway Error
"No ICP filing" Prompted During Domain Name Connection
A public IP suffered DDoS attacks
API Documentation
History
Introduction
API Category
Making API Requests
Anti-DDoS Advanced Instance APIs
Resource List APIs
Protection Configuration APIs
Other APIs
Alarm Notification APIs
Connection Configuration APIs
Intelligent Scheduling APIs
Black hole unblocking APIs
Statistical Report APIs
Data Types
Error Codes
FAQs
Blocking
Attacks
Features
Billing
Service Level Agreement
Product Policy
Privacy Policy
Data Processing And Security Agreement
Glossary

Attacks

PDF
Focus Mode
Font Size
Last updated: 2024-07-01 11:41:51

Will I receive alerts for DDoS attacks?

Yes. You will get alert notifications when the inbound traffic exceeds a specified threshold. To learn how to set thresholds, see Configuring Security Event Notifications.

Why does my business suffer DDoS attacks without my business running on the server?

A DDoS attack is an attack involving multiple devices attempting to make your business, rather than the IP or domain name of the server, inaccessible for users.
Your business may be at risk of DDoS attacks if it communicates over the public network.

Why is my business attacked again after I have Anti-DDoS products deployed?

Your business may be at risk of DDoS attacks if it communicates over the public network.
Your business may still be targeted even though it is protected by Anti-DDoS products, but the attacks are less likely to cause losses.

What are the targets when the server is attacked?

DDoS attacks target your IP or business by attacking the server.

What are the common types of attacks?

Network layer attacks: include UDP reflection attacks, SYN floods, and connection attacks. Attacks of this type cause a denial of service by consuming server bandwidth and connection resources.
Application layer attacks: include DNS floods, HTTP floods, and CC attacks. Attacks of this type cause a denial of service by exhausting server performance.

Where can I view the logs of attacks on the server?

On the Overview page, you can view the attack logs for different time ranges.

Where can I view the details of the attack source IP?

On the Overview page, select the attack event you want to view, and then click View details to check the information and region of the attack source, attack traffic, and attack packet size.



What should I do when my Lighthouse server is under DDoS attacks?

We recommend you purchase an Anti-DDoS Advanced to defend against DDoS attacks and guarantee the availability of your server and business.

How should I identify an attack by the amount of attack traffic?

An attack is identified as long as attack traffic is detected. You can set an alert threshold based on the amount of attack traffic.

I have added the access source IP to the blocklist configured for the Anti-DDoS Pro instance when my business is attacked, but the IP still has access to my business. Is the instance not working?

The access restriction for the IP will not take effect right after it is added to the blocklist. Only when the incoming traffic exceeds the cleansing threshold, the IP will be denied directly from accessing your business.

Help and Support

Was this page helpful?

Help us improve! Rate your documentation experience in 5 mins.

Feedback