DDoS Protection - Icon accepted

DDoS ProtectionIcon (ICX) accepted

★★★★★ 4.83/5

Always-on DDoS protection with unmetered mitigation for volumetric and L4 protocol attacks. Mitigation begins in under 10 seconds with automatic layered shielding.

Automatic layered shielding

Automatic Layered Shielding

Protection is always on and automatically engages the right layer as attacks evolve.

Adaptive filtering

Adaptive Filtering

Edge filtering adapts to attack patterns to reduce false positives and keep real users online.

Fast mitigation

Mitigation in Under 10 Seconds

Automatic scrubbing starts within seconds to keep services available for legitimate users.

Included by default

Included by Default

Both volumetric and full shield modes are included with every server subscription.

Unmetered mitigation

Unmetered Mitigation

Always-on protection with no traffic caps, regardless of attack size.

DDoS protection is included free of charge with our Dedicated Servers and Confidential Servers. It is not sold as a standalone product.

Dedicated Servers

High-performance bare metal with always-on DDoS shielding included by default.

View dedicated servers

Confidential Servers

Hardware-enforced isolation with built-in DDoS protection and privacy-first infrastructure.

View confidential servers

Reviews ()

Here's what our valued customers are saying about our undefined ddos protection configuration. If you'd like to share your own opinion, please ensure you are signed in.

Looks like there's no reviews for undefined ddos protection configuration yet, or none of the reviews match filter conditions. If you want to submit a review on a ddos protection configuration, please click the button below.

Review: ddos protection
Close dialog

Icon (ICX) Accepted

Icon is a decentralized network that aims to enable seamless interoperability between different blockchains, allowing them to communicate and share value with one another. The platform utilizes a unique consensus algorithm called Loop Fault Tolerance (LFT), which combines elements of Delegated Proof of Stake (DPoS) and Practical Byzantine Fault Tolerance (PBFT) to achieve high scalability and security. Icon's native token, ICX, is used for transactions, staking, and governance. The platform's goal is to create a connected and decentralized ecosystem that enables the seamless exchange of value and information between different blockchain networks.

Dozens of Payment Options

It's in the name! COIN.HOST accepts cryptocurrencies such as Bitcoin (BTC), Tether (USDT), Ethereum (ETH), Dash, Litecoin (LTC), Nextcoin (NXT) and many other tokens and stablecoins. Besides crypto, we accept a wide range of other payment methods and digital currencies including PayPal, VISA, MasterCard, American Express, Discover and Bank Wire.