PacketsDecreaser Docs
PacketsDecreaser Docs
  • ℹ️Informations
    • Location
  • DDoS Protection
    • Informations
    • Layer 4
      • How we mitigate DDoS Attacks
        • Pre-Filter
        • Generic Filter
        • Additional Mitigation Techniques
        • Time to Mitigate
      • Known technical impact
      • Application Filters
        • Wireguard
        • OpenVPN
        • SSH
        • Teamspeak 3
      • Gamefilters
        • FiveM
          • FiveM Layer 4
          • FiveM Layer 7
        • Minecraft Java
        • Valve Source Engine
        • SCP: Secret Laboratory
        • Minecraft Bedrock
        • BeamNG MP
        • Rust
        • Factorio
        • Palworld
      • TCP-Track
    • Layer 7
      • Informations
      • Getting Started
      • SSL Guide
      • How we mitigate DDoS Attacks
        • Edge
        • Filter
        • Clean Proxy
  • Remote DDoS Protection
    • GRE Tunnel
    • Wireguard Tunnel
  • KVM vSERVER
    • Known technical impact
    • Storage vServer
      • Add Storage
      • Upgrade Storage
  • 🕹️Gameserver
    • Information
    • Gamechanger
    • Supported Games
Powered by GitBook
On this page

Was this helpful?

  1. DDoS Protection
  2. Layer 4

Known technical impact


The following traffic types can be rate limited:

  • TCP traffic(Applies only if there is a TCP attack ongoing)

  • UDP traffic(Applies only if there is an UDP attack ongoing)

  • DNS Traffic(DNS is limited to the common resolvers: 1.1.1.1,1.0.0.1, 8.8.8.8,8.8.4.4,9.9.9.9)

  • TCP traffic forces an authentication, which leads to the first connection being reset.

  • ICMP Traffic will be ratelimited or blocked under attack.

  • By default, we have a destination limit for all UDP ports that are not protected by the specific filters.

Permanent protection can lead to the first connection attempt being reset. This usually results in the client retrying the connection, after which the TCP handshake is completed. Note: Cloudflare or other CDNs may not work due to the TCP reset once mitigation is active. Do not open any tickets about issues with Cloudflare or other CDN services.

If you encounter any other impact, please contact our customer support. Due to extensive logging and flow collection, we are mostly able to track down any reported anomaly.

If you have problems with the destination limit, please open a ticket. Other Protocols then TCP / UDP and ICMP can be ratelimited or blocked.

PreviousTime to MitigateNextApplication Filters

Last updated 22 days ago

Was this helpful?