NeoProtect down

edited October 30 in General

Looks like they ate a massive attack and Datapacket(their only upstream that was also used for mitigation of large attacks) has nullrouted them. All locations are down, and downstreams are affected.

Last update:

https://bgp.tools/as/199414
https://status.neoprotect.net/incidents/kdmtx0wk3h1l

Comments

  • MikeAMikeA Hosting ProviderOG
    edited October 30

    I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.
    Edit: There's many large dedicated server companies like Limestone that use Neoprotect, I'm guessing that means all of the clients of those datacenters/server providers that have IPs for mitigation are also down eh, pretty bad situation to be in.

    For them to get dropped from CDN77/DP is surprising. I use them in Singapore and they've eaten multi-terabit attacks against some of my clients with no problems.

  • edited October 30

    @MikeA said: I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.

    They use them for pre-filtering basically, they have their own filtering for more sophisticated and application layer attacks, but all these big attacks are tanked by DP.
    NeoProtect doesn't have much of their "own" capacity, they heavily rely on Datapacket filtering large attacks.

    They have updated their status with this, now

    Thanked by (1)MikeA
  • NeoonNeoon OGContent WriterSenpai

    @treesmokah said:

    @MikeA said: I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.

    They use them for pre-filtering basically, they have their own filtering for more sophisticated and application layer attacks, but all these big attacks are tanked by DP.
    NeoProtect doesn't have much of their "own" capacity, they heavily rely on Datapacket filtering large attacks.

    They have updated their status with this, now

    Spicy, now they know a few TB's will make the BGP sessions drop.
    It doesn't even have to last for one hour to take them down for 1 day or more.

  • edited October 30

    @Neoon said:

    @treesmokah said:

    @MikeA said: I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.

    They use them for pre-filtering basically, they have their own filtering for more sophisticated and application layer attacks, but all these big attacks are tanked by DP.
    NeoProtect doesn't have much of their "own" capacity, they heavily rely on Datapacket filtering large attacks.

    They have updated their status with this, now

    Spicy, now they know a few TB's will make the BGP sessions drop.
    It doesn't even have to last for one hour to take them down for 1 day or more.

    To be fair, I don't blame Datapacket for dropping them at all, realistically NeoProtect are a small customer abusing the fuck out of DP's dirt cheap, large capacity ddos protection.
    Datapacket charges only $100 for their "advanced" protection, that they use all the time to tank massive attacks, its their entire business model.

    As i said, they had little of own capacity, and only filtered what wasn't already filtered by DP protection.

    Afaik these recent attacks caused issues for the whole Datapacket infra.

    It reminds me of TCPShield getting kicked out of OVH recently, because entire Miami location was having issues due to their attacks. It operated in a similar fashion, abusing low-cost mitigation.

    Edit: I have no idea if NeoProtect also paid $100 per location, like I was quoted, they could have some special agreement that I'm not aware of, but judging by how this situation was handled, I doubt it.

  • NeoonNeoon OGContent WriterSenpai

    @treesmokah said:

    @Neoon said:

    @treesmokah said:

    @MikeA said: I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.

    They use them for pre-filtering basically, they have their own filtering for more sophisticated and application layer attacks, but all these big attacks are tanked by DP.
    NeoProtect doesn't have much of their "own" capacity, they heavily rely on Datapacket filtering large attacks.

    They have updated their status with this, now

    Spicy, now they know a few TB's will make the BGP sessions drop.
    It doesn't even have to last for one hour to take them down for 1 day or more.

    To be fair, I don't blame Datapacket for dropping them at all, realistically NeoProtect are a small customer abusing the fuck out of DP's dirt cheap, large capacity ddos protection.
    Datapacket charges only $100 for their "advanced" protection, that they use all the time to tank massive attacks, its their entire business model.

    As i said, they had little of own capacity, and only filtered what wasn't already filtered by DP protection.

    Afaik these recent attacks caused issues for the whole Datapacket infra.

    So you telling me, they gonna Deadpool next week?

  • @Neoon said:

    @treesmokah said:

    @Neoon said:

    @treesmokah said:

    @MikeA said: I've never used Neoprotect or any services like them so excuse my ignorance, but do they just rely on CDN77/DP for volumetric mitigation? I always assumed they had their own filtering and could use any upstream.

    They use them for pre-filtering basically, they have their own filtering for more sophisticated and application layer attacks, but all these big attacks are tanked by DP.
    NeoProtect doesn't have much of their "own" capacity, they heavily rely on Datapacket filtering large attacks.

    They have updated their status with this, now

    Spicy, now they know a few TB's will make the BGP sessions drop.
    It doesn't even have to last for one hour to take them down for 1 day or more.

    To be fair, I don't blame Datapacket for dropping them at all, realistically NeoProtect are a small customer abusing the fuck out of DP's dirt cheap, large capacity ddos protection.
    Datapacket charges only $100 for their "advanced" protection, that they use all the time to tank massive attacks, its their entire business model.

    As i said, they had little of own capacity, and only filtered what wasn't already filtered by DP protection.

    Afaik these recent attacks caused issues for the whole Datapacket infra.

    So you telling me, they gonna Deadpool next week?

    Afaik pretty much their all infra was just dedis from Datapacket, rented. So if they were to get kicked out entirely, I could see it being a massive issue, larger than it already is.

  • edited October 31

    Still down, 16h and counting. So are many of their downstreams, which appeared to be singlehomed with NeoProtect.
    No further updates have been posted to their status page.

  • edited October 31

    @sh97 said:
    Latest update: they've been completed booted by CDN77.

    https://status.neoprotect.net/incidents/kdmtx0wk3h1l

    Sucks, we all benefit from more DDoS protection providers, but its completely reasonable for DP to pull the plug considering the issues these attacks brought.

    Hopefully their backup "game protection" infra at OVH won't get targeted, as they would also get kicked out from there.

    I would love to see their on-premise offering be competitive to something like Wanguard, there is even less of good on-premise mitigation companies, than remote.

    Thanked by (1)sh97
  • BanatSyncBanatSync Hosting Provider

    R.I.P NeoProtect

  • Bad news for all other DDOS protection providers that use CDN77/DP ?

Sign In or Register to comment.