DDoS Protection Overview

DDoS Protection is a multi-layer defense system that detects and mitigates distributed denial-of-service attacks in real time. It is deployed in select regions where dedicated mitigation infrastructure is available.

Key Capabilities

  • Traffic cleaning: Diverts suspicious traffic to a scrubbing center via BGP, filters it, and redelivers clean packets to your instance — without interrupting legitimate traffic.

  • Protocol filtering: Validates traffic at the protocol level (TCP, UDP, ICMP) and drops malformed or suspicious packets before they reach your instance.

  • Fingerprint detection: Matches traffic against known attack signatures — specific payload patterns, port ranges, and packet sizes — to block attacks that evade simple rate limits.

  • Geographic filtering: Block inbound traffic by country. Useful for services that don't operate in certain regions and want to reduce exposure without managing individual IPs.

  • IP allow/block lists: Explicitly permit or deny traffic from specific source addresses. Useful for protecting APIs that only serve known partners.

  • Blackhole routing: Under extreme volumetric attacks that exceed cleaning capacity, all traffic to the affected EIP is blackholed as a last resort to protect the broader infrastructure.

For step-by-step instructions on configuring these capabilities, see the DDoS Protection Configuration Guide.

Regional Availability

DDoS Protection is currently available in the following regions. In regions where it isn't deployed, EIP Blocked Rules provide threshold-based protection for all EIPs.

Availability Zone
Location
DDoS Protection

asia-southeast-5a

Hanoi

Available

asia-southwest-1a

Singapore

Available

asia-southeast-2a

Jakarta

Available

sa-south-1a

Santiago

Available

asia-southeast-4a

Ho Chi Minh City

Available

asia-southeast-1a

Hong Kong

Coming soon

asia-southeast-3a

Kuala Lumpur

Coming soon

asia-southeast-6a

Manila

Coming soon

na-central-2a

Dallas

Coming soon

na-east-1a

Washington, D.C.

Coming soon

na-south-1a

Miami

Coming soon

na-west-1a

Los Angeles

Coming soon

sa-east-1a

São Paulo

Coming soon

sa-north-1a

Bogota

Coming soon

sa-south-2a

Buenos Aires

Coming soon

sa-west-1a

Lima

Coming soon

europe-central-1a

Frankfurt

Coming soon

europe-east-1a

Istanbul

Coming soon

europe-south-1a

Marseille

Coming soon

me-central-1a

Riyadh

Coming soon

This list is updated as new regions come online.

How Cleaning Is Triggered

When the analysis system determines that an EIP is under attack, traffic is automatically rerouted to a cleaning center, scrubbed, and redelivered to your instance. The entire process completes within seconds and requires no action on your part.

For a detailed walkthrough of the cleaning pipeline — including detection, BGP diversion, scrubbing stages, and re-injection — see How Traffic Cleaning Works.

Cleaning Event Lifecycle

Each cleaning event goes through a defined set of states. Understanding this lifecycle helps you interpret notifications and plan your response:

State
Description
What Happens Next

Cleaning

Attack detected; traffic diverted to cleaning center.

If attack subsides → End Cleaning. If it exceeds cleaning capacity → Blackhole.

End Cleaning

Attack mitigated; traffic returns to normal path.

Normal operation resumes. No action needed.

Blackhole

Attack exceeds cleaning capacity. All traffic to the EIP is blackholed.

Auto-expires after block duration (default: 2 hours), or can be manually released.

End Blackhole

Blackhole released. Traffic restored.

Normal operation resumes.

To manually release a blackhole before it expires, use the DDoS Protection page in the management consolearrow-up-right.

Notifications: Event notifications are delivered via email and the management console. To configure notification preferences or add additional recipients, see the Notification Settingsarrow-up-right page in the console.

Relationship to EIP Blocked Rules

If your region has DDoS Protection, you get everything EIP Blocked Rules offers — threshold-based blocking — plus traffic cleaning, fingerprint detection, protocol filtering, and geo-blocking. EIP Blocked Rules are always active as a second layer, even when DDoS Protection is running.

Last updated