{"id":21150,"date":"2024-02-14T12:18:56","date_gmt":"2024-02-14T10:18:56","guid":{"rendered":"https:\/\/${domain}\/blog\/?p=21150"},"modified":"2024-02-14T17:28:01","modified_gmt":"2024-02-14T15:28:01","slug":"what-is-ddos-and-how-do-you-stand-against-it","status":"publish","type":"post","link":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/","title":{"rendered":"What is DDoS, and how do you stand against it?"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">Varying attacks on websites and other online infrastructures are not rare. There are a lot of examples, such as <a href=\"https:\/\/www.polygon.com\/24009631\/insomniac-games-leak-hack-rhysida-files-breach\" rel=\"nofollow\">recent game-development hacks<\/a>, which have led to massive information leaks. Since many users think that attacks can only happen to huge companies, smaller companies become an easier target for hackers.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this article, we will look closely at DDoS attacks, show who can become the victim, and how to stand against hackers.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_81 counter-hierarchy ez-toc-counter ez-toc-white ez-toc-container-direction\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-69dfcf22c69e8\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-69dfcf22c69e8\" checked aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#What_is_a_DDoS_attack\" >What is a DDoS attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#What_are_the_goals_of_a_DDoS_attack\" >What are the goals of a DDoS attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#How_do_you_ensure_you_are_not_a_part_of_a_DDoS_attack\" >How do you ensure you are not a part of a DDoS attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#How_does_Weblium_protect_your_websites\" >How does Weblium protect your websites?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_is_a_DDoS_attack\"><\/span><span style=\"font-weight: 400\">What is a DDoS attack?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;<a href=\"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/1-3.png&#038;#8221\">https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/1-3.png&#038;#8221<\/a>; alt=&#8221;ddos how to be safe online&#8221; title_text=&#8221;1&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">DDoS (Distributed Denial-of-service) is an attack method focused on interrupting or stopping the work of a particular resource.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The main goal of a DDoS attack is to make a website unavailable for its users. DDoS can target not only specific websites but also the servers of large companies. The attack occurs by sending numerous packets to the website, making it spend all its resources to process them.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Hackers create a virtual network of devices or use many physical devices to make their actions effective. However, in many cases, hackers can process the attack using only one PC.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Furthermore, even your device can be a part of the network. We will tell you further in the text how to know whether you are a part of a DDoS network.\u00a0<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_goals_of_a_DDoS_attack\"><\/span><span style=\"font-weight: 400\">What are the goals of a DDoS attack?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;<a href=\"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/2-3.png&#038;#8221\">https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/2-3.png&#038;#8221<\/a>; alt=&#8221;ddos goals how to get protected from ddos&#8221; title_text=&#8221;2&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">The main aim of the attack is to make the website unavailable. In some cases, the attack might have no specific goal. For example, suppose there is a massive attack on some company. In that case, the overload of the site can be just an additional influence method, even if the website is just a navigational hub for visitors.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">In some cases, DDoS is aimed at stopping the work of the store. The longer the website is down, the more money the company will lose.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">The reasons for the attack might be different and, usually, individual. Most often, reasons why someone can DDoS you. They include the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Competitors. Competition is always an extra motivation. However, in some cases, people can go too far and order a DDoS attack on your store. It is not that hard to find specialists who can overload the competitor&#8217;s website, and their services can be pretty cheap: up to $20 per hour for the website not responding.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unsatisfied customers. You never know how far a customer can go if he dislikes your store\u2019s service. Having specific skills or resources, he can start an attack.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Random attackers. Sometimes, your store can become a random target. When the website is overloaded, criminals can send you a list of their demands.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">However, it is hard to know the exact reasons for the attack. It is possible only in cases where the attacker contacts you. But the main thing you need to know is how to overcome the consequences of attacks. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221;][et_pb_column _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; type=&#8221;4_4&#8243;][et_pb_image _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; src=&#8221;<a href=\"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/01\/2.2.png&#038;#8221\">https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/01\/2.2.png&#038;#8221<\/a>; url=&#8221;<a href=\"https:\/\/app.weblium.com\/signup?utm_source=en_blog&#038;utm_medium=article&#038;utm_campaign=banner_article&#038;#8221\" rel=\"nofollow\">https:\/\/app.weblium.com\/signup?utm_source=en_blog&#038;utm_medium=article&#038;utm_campaign=banner_article&#038;#8221<\/a>; hover_enabled=&#8221;0&#8243; sticky_enabled=&#8221;0&#8243;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_you_ensure_you_are_not_a_part_of_a_DDoS_attack\"><\/span><span style=\"font-weight: 400\">How do you ensure you are not a part of a DDoS attack?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">As we mentioned before, any PC can become a part of an attacker\u2019s network and become a part of criminal activity. Potentially, any customer can be in a risk zone. The following things can make the situation worse:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Downloading pirated software. You never know what is included in the software you download. If you decide to use pirated software, you can call trouble because it might make your device a part of a DDoS attack.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Downloading software from unknown sources. Sometimes, you might need an application to complete some minor tasks. You find one, use it, and, in the best case, delete it. However, you will never know what is implemented in this application.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">You should only download legit applications from trusted sources. This way, you can be sure that your device will be safe. To exclude the possibility that your device will be infected, you should do the following steps:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Install antivirus software. It is a simple step, but you should at least activate the default Windows Defender. It will be able to detect whether there are issues with the system.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reinstall the OS. This step is never pleasant, but it will help you start working with your PC from scratch. From this point, you can begin downloading only licensed and trusted applications.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">You should also pay attention to all changes in the work of your PC or phone. Sudden interruptions can mean that there is a virus on your device. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_does_Weblium_protect_your_websites\"><\/span><span style=\"font-weight: 400\">How does Weblium protect your websites?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_image src=&#8221;<a href=\"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/3-3.png&#038;#8221\">https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/3-3.png&#038;#8221<\/a>; alt=&#8221;ddos attacks how to get protected&#8221; title_text=&#8221;3&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">The safety of websites is <a href=\"https:\/\/weblium.com\">Weblium<\/a>&#8216;s priority. DDoS is one of the most common types of attack. This is why we have a lot of measures to prevent DDoS.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">The analysis of activity. The constant analysis allows us to react to all the threats immediately.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Using cloud servers. Cloud servers can process much higher load than local services. It means that even while the attack is happening, the website will be available to users, and our support team will have time to stop the attack preventing losses.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Redirecting the packages. It is essential to understand that DDoS is always about a vast amount of data. This is why if suspicious activity is detected and our specialists see huge loads of data transferred to the website, the actions will be taken. Harmful data will be redirected so that the website will continue its work.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">When the attack is in action, our support team does everything required to exclude all possible issues as soon as possible.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"font-weight: 400\">Conclusion<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.11.1&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400\">DDoS is one of the most common methods of attacking yet one of the most effective. Anyone can order the attack at any time.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">But Weblium protects users\u2019 safety. We regularly update our security measures and implement new tools to make your websites even more secure. Moreover, if you notice strange activity on your website, report it to our support team for further investigation. <\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Varying attacks on websites and other online&#8230;<\/p>\n","protected":false},"author":27,"featured_media":21169,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[79],"tags":[],"class_list":["post-21150","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-help","has-thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is DDoS, and how do you stand against it? - Weblium Blog<\/title>\n<meta name=\"description\" content=\"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is DDoS, and how do you stand against it? - Weblium Blog\" \/>\n<meta property=\"og:description\" content=\"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Weblium Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weblium\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-14T10:18:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-14T15:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1213\" \/>\n\t<meta property=\"og:image:height\" content=\"663\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Dmytro Myroshnychenko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Weblium\" \/>\n<meta name=\"twitter:site\" content=\"@Weblium\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dmytro Myroshnychenko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/\"},\"author\":{\"name\":\"Dmytro Myroshnychenko\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#\\\/schema\\\/person\\\/153dde4c8bf3669f58502434767340dc\"},\"headline\":\"What is DDoS, and how do you stand against it?\",\"datePublished\":\"2024-02-14T10:18:56+00:00\",\"dateModified\":\"2024-02-14T15:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/\"},\"wordCount\":1479,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wp.en.weblium.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/eng.png\",\"articleSection\":[\"Help\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/\",\"url\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/\",\"name\":\"What is DDoS, and how do you stand against it? - Weblium Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wp.en.weblium.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/eng.png\",\"datePublished\":\"2024-02-14T10:18:56+00:00\",\"dateModified\":\"2024-02-14T15:28:01+00:00\",\"description\":\"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wp.en.weblium.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/eng.png\",\"contentUrl\":\"https:\\\/\\\/wp.en.weblium.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/eng.png\",\"width\":1213,\"height\":663,\"caption\":\"ddos attacks and how to prevent them\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/what-is-ddos-and-how-do-you-stand-against-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wp.en.weblium.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Help\",\"item\":\"https:\\\/\\\/wp.en.weblium.com\\\/category\\\/help\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What is DDoS, and how do you stand against it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#website\",\"url\":\"https:\\\/\\\/wp.en.weblium.com\\\/\",\"name\":\"Weblium Blog\",\"description\":\"Weblium Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wp.en.weblium.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#organization\",\"name\":\"Weblium\",\"url\":\"https:\\\/\\\/wp.en.weblium.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/weblium.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Logo-square-dark-blue.png\",\"contentUrl\":\"https:\\\/\\\/weblium.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/Logo-square-dark-blue.png\",\"width\":200,\"height\":200,\"caption\":\"Weblium\"},\"image\":{\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/weblium\\\/\",\"https:\\\/\\\/x.com\\\/Weblium\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wp.en.weblium.com\\\/#\\\/schema\\\/person\\\/153dde4c8bf3669f58502434767340dc\",\"name\":\"Dmytro Myroshnychenko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g\",\"caption\":\"Dmytro Myroshnychenko\"},\"url\":\"https:\\\/\\\/wp.en.weblium.com\\\/author\\\/dmytromyroshnychenko\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is DDoS, and how do you stand against it? - Weblium Blog","description":"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/","og_locale":"en_US","og_type":"article","og_title":"What is DDoS, and how do you stand against it? - Weblium Blog","og_description":"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.","og_url":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/","og_site_name":"Weblium Blog","article_publisher":"https:\/\/www.facebook.com\/weblium\/","article_published_time":"2024-02-14T10:18:56+00:00","article_modified_time":"2024-02-14T15:28:01+00:00","og_image":[{"width":1213,"height":663,"url":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","type":"image\/png"}],"author":"Dmytro Myroshnychenko","twitter_card":"summary_large_image","twitter_creator":"@Weblium","twitter_site":"@Weblium","twitter_misc":{"Written by":"Dmytro Myroshnychenko","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#article","isPartOf":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/"},"author":{"name":"Dmytro Myroshnychenko","@id":"https:\/\/${domain}\/blog\/#\/schema\/person\/153dde4c8bf3669f58502434767340dc"},"headline":"What is DDoS, and how do you stand against it?","datePublished":"2024-02-14T10:18:56+00:00","dateModified":"2024-02-14T15:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/"},"wordCount":1479,"commentCount":0,"publisher":{"@id":"https:\/\/${domain}\/blog\/#organization"},"image":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","articleSection":["Help"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/","url":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/","name":"What is DDoS, and how do you stand against it? - Weblium Blog","isPartOf":{"@id":"https:\/\/${domain}\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#primaryimage"},"image":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#primaryimage"},"thumbnailUrl":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","datePublished":"2024-02-14T10:18:56+00:00","dateModified":"2024-02-14T15:28:01+00:00","description":"DDOS attacks became really popular and even more dangerous now. Anyone can become a victim of them. Read the article to learn how to avoid being attacked.","breadcrumb":{"@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#primaryimage","url":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","contentUrl":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","width":1213,"height":663,"caption":"ddos attacks and how to prevent them"},{"@type":"BreadcrumbList","@id":"https:\/\/${domain}\/blog\/what-is-ddos-and-how-do-you-stand-against-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/${domain}\/blog\/"},{"@type":"ListItem","position":2,"name":"Help","item":"https:\/\/${domain}\/blog\/category\/help\/"},{"@type":"ListItem","position":3,"name":"What is DDoS, and how do you stand against it?"}]},{"@type":"WebSite","@id":"https:\/\/${domain}\/blog\/#website","url":"https:\/\/${domain}\/blog\/","name":"Weblium Blog","description":"Weblium Blog","publisher":{"@id":"https:\/\/${domain}\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/${domain}\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/${domain}\/blog\/#organization","name":"Weblium","url":"https:\/\/${domain}\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/${domain}\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/weblium.com\/blog\/wp-content\/uploads\/2020\/06\/Logo-square-dark-blue.png","contentUrl":"https:\/\/weblium.com\/blog\/wp-content\/uploads\/2020\/06\/Logo-square-dark-blue.png","width":200,"height":200,"caption":"Weblium"},"image":{"@id":"https:\/\/${domain}\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weblium\/","https:\/\/x.com\/Weblium"]},{"@type":"Person","@id":"https:\/\/${domain}\/blog\/#\/schema\/person\/153dde4c8bf3669f58502434767340dc","name":"Dmytro Myroshnychenko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f34e3cd57eec1891bbf295ad77884d0afd9bdcb013cfcf1eb6f2c5800e188a2d?s=96&d=mm&r=g","caption":"Dmytro Myroshnychenko"},"url":"https:\/\/${domain}\/blog\/author\/dmytromyroshnychenko\/"}]}},"jetpack_featured_media_url":"https:\/\/${domain}\/blog\/wp-content\/uploads\/2024\/02\/eng.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/posts\/21150","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/comments?post=21150"}],"version-history":[{"count":23,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/posts\/21150\/revisions"}],"predecessor-version":[{"id":21211,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/posts\/21150\/revisions\/21211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/media\/21169"}],"wp:attachment":[{"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/media?parent=21150"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/categories?post=21150"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/${domain}\/blog\/wp-json\/wp\/v2\/tags?post=21150"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}