Network Diagram

FeldHost™ is also a member of the RIPE association. We operate our own autonomous system AS206712 and IP addresses. All network elements are in redundant connections.

DC Tower Data Centre Parameters

DC TOWER is a highly secure building built specifically for servers and other technologies. It has a powerful cooling system, a backup power supply, preferential supplies of fuel, and non-stop security. It is located within a no-fly zone and outside the flood zone. Data in the data center is truly secure and simultaneously available.

How FeldHost™ Cloud Station Works?

Cloud storage is backed by HPE Primera A670 All-Flash storage system, equipped with 32 × 8TB SSD disks, which has two controllers. This ensures redundancy at the hardware level.

The computing nodes, on which the virtual machines (VM) are running, are connected through two optical switches on the storage cluster. They share each other’s data storage and can be migrated from one node to the other one during their run, e.g. in case of maintenance, need to distribute load or a failure.

High performance of the virtual machines ensures the equipping with advanced AMD EPYC Milan processors, DDR4 memory, storage cluster SSD SAS drives, and network connectivity through dual 10GbE technology.

FeldHost™ Anti-DDoS System

Prevention of DDoS attacks and protection against their impacts

What are DoS, DDoS and BDoS attacks and why are they dangerous?

The goal of Denial of Service (DoS) attacks is to make a service unavailable. This can be achieved by exploiting software vulnerabilities, overloading the system, or exhausting key resources such as CPU, memory, disk space, or network capacity. Whenever an attack results in a service becoming inaccessible, it is considered a DoS attack.

The difference between DoS (Denial of Service) and DDoS (Distributed Denial of Service) lies in the number of sources from which the attack originates. While a classic DoS attack comes from a single device, a DDoS attack is launched from a distributed network of compromised machines — often including servers, computers, and even smart appliances. Modern DDoS attacks can involve tens or even hundreds of thousands of devices acting simultaneously.

In so-called Brain Denial-of-Service (BDoS) attacks, the attacker’s primary objective is not to disable the service itself, but to distract system administrators. While they focus on mitigating the visible overload, the attacker quietly executes their real mission elsewhere — such as data theft, system intrusion, or reconnaissance within the infrastructure. This is why intelligent detection and automatic mitigation are critical elements of modern protection systems.

How does the Anti-DDoS system with NETSCOUT Arbor technology work?

Our new Anti-DDoS protection is powered by NETSCOUT Arbor technology provided by České Radiokomunikace (CRA). It is a state-of-the-art solution that protects the FeldHost™ infrastructure in real time against all types of DoS, DDoS, and BDoS attacks — ensuring uninterrupted service availability.

The system automatically distinguishes between legitimate, suspicious, and malicious traffic. This enables it to block only harmful requests while allowing normal operation to continue unaffected. The mitigation process starts automatically, with a reaction time of under 3 minutes.

netscout

CRA’s Anti-DDoS infrastructure leverages a robust backbone network and advanced real-time traffic analysis to create a secure perimeter that attackers cannot see through. They have no visibility into what lies behind the protected network, making their attacks ineffective. Our collaboration with CRA brings enterprise-grade protection — once reserved for major corporations and financial institutions — to all FeldHost™ customers.

Attention!

The DDoS service does not replace any firewall, and does not solve the preset equipment or faulty preset equipment, or any points with weak passwords.

FENIX will hold you

The project FENIX was established within the scope of a Czech peering node NIX.CZ in 2013 as a reaction to intensive DoS attacks to which important Czech media, banks and operators faced in March 2013.

In case of a DoS attack, FENIX provides their members with the availability of at least the most important internet services and contents.

fenix