Evolution Host Logo

Evolution Host
Invent the Future



Remote DDoS Protection with EvoShield


Stop All DDoS Attacks. Now.

Remotely protect any network or application with an impenetrable Anti-DDoS solution from Evolution Host.

IncludedProtect your entire network IncludedEasy to use control panel IncludedBlock all attacks
IncludedRange of protection profiles IncludedDiscord Attack Notifications IncludedGRE Tunnel or Reverse Proxy
IncludedInstant Deployment IncludedFeature Rich API Available Included1 Click Auto Tunnel Setup

Stop The Attack Now.

Get EvoShield
Remote DDoS Protection from EvoShield
Unbeatable Protection Real-time always on mitigation Highly Configurable
Remotely protect your server

What is Remote DDoS Protection?

Remote DDoS Protection from Evolution Host is a way of protecting all of the applications/servers/gameservers on your entire network from DDoS attacks without the need to change hosting providers. A remote Anti-DDoS solution is perfect for scenarios where you are happy with your current host and would prefer to keep your services hosted there. We can bring our impenetrable DDoS protection solutions to you remotely. Stop losing customers because of DDoS attacks today.

BYOIP (bring your own IP addresses) is available with the Level 5 tier EvoShield plan. This service allows you to migrate a subnet you already own/are leasing onto the Evolution Host network thereby fully protecting every IP address that resides within that subnet.

Some things you can do with EvoShield

  • Protect any gameserver or application
  • Designed for individuals and companies
  • Re-selling DDoS protection services
  • External integration available via the API
  • Protect your hosting company's network

EvoShield Remote DDoS Protection Plans

Level 1 Level 2 Level 3 Level 4 Level 5
Firewall Slots361020
Max PlayersUnlimitedUnlimitedUnlimitedUnlimitedUnlimited
Support LevelStandardStandardStandardPriorityPriority Discord
Monthly Upload5TB10TB15TB20TBUnmetered
Upload Speed1Gbps - 10Gbps1Gbps - 10Gbps1Gbps - 10Gbps1Gbps - 10Gbps1Gbps - 10Gbps
Mitigation Capacity17Tbps17Tbps17Tbps17Tbps17Tbps
BYOIPAvailable
SSHSSHSSHSSHSSHSSH
RDPRDPRDPRDPRDPRDP
HTTPsHTTPsHTTPsHTTPsHTTPsHTTPs
HTTPHTTPHTTPHTTPHTTPHTTP
SSL/TLSSSL/TLSSSL/TLSSSL/TLSSSL/TLSSSL/TLS
TCP (Generic)TCP (Generic)TCP (Generic)TCP (Generic)TCP (Generic)TCP (Generic)
UDP (Generic)UDP (Generic)UDP (Generic)UDP (Generic)UDP (Generic)UDP (Generic)
ICMPICMPICMPICMPICMPICMP
Counter-Strike 2Counter-Strike 2Counter-Strike 2Counter-Strike 2Counter-Strike 2
Team Fortress 2Team Fortress 2Team Fortress 2Team Fortress 2Team Fortress 2
Left 4 Dead 2Left 4 Dead 2Left 4 Dead 2Left 4 Dead 2Left 4 Dead 2
Minecraft Java EditionMinecraft Java EditionMinecraft Java EditionMinecraft Java EditionMinecraft Java Edition
Minecraft Bedrock EditionMinecraft Bedrock EditionMinecraft Bedrock EditionMinecraft Bedrock EditionMinecraft Bedrock Edition
MumbleMumbleMumbleMumbleMumble
Call of DutyCall of DutyCall of DutyCall of DutyCall of Duty
TeamSpeakTeamSpeakTeamSpeakTeamSpeakTeamSpeak
Half-Life 2: DeathmatchHalf-Life 2: DeathmatchHalf-Life 2: DeathmatchHalf-Life 2: DeathmatchHalf-Life 2: Deathmatch
Garrys ModGarrys ModGarrys ModGarrys ModGarrys Mod
Counter Strike: SourceCounter Strike: SourceCounter Strike: SourceCounter Strike: SourceCounter Strike: Source
Counter-Strike 1.6Counter-Strike 1.6Counter-Strike 1.6Counter-Strike 1.6Counter-Strike 1.6
UnturnedUnturnedUnturnedUnturnedUnturned
cPanelcPanelcPanelcPanelcPanel
OpenVPNOpenVPNOpenVPNOpenVPNOpenVPN
WireGuardWireGuardWireGuardWireGuardWireGuard
SA-MPSA-MPSA-MPSA-MPSA-MP
open.mpopen.mpopen.mpopen.mpopen.mp
Multi Theft AutoMulti Theft AutoMulti Theft AutoMulti Theft AutoMulti Theft Auto
Project ZomboidProject ZomboidProject ZomboidProject Zomboid
Lineage 2Lineage 2Lineage 2Lineage 2
Arma 3Arma 3Arma 3Arma 3
RustRustRustRust
MordhauMordhauMordhauMordhau
DayZDayZDayZDayZ
PalworldPalworldPalworldPalworld
Conan ExilesConan ExilesConan ExilesConan Exiles
TerrariaTerrariaTerrariaTerraria
RageMPRageMPRageMP
alt:Valt:Valt:V
ARK: Survival EvolvedARK: Survival EvolvedARK: Survival Evolved
RedMRedM
FiveMFiveM
Cost€10.00€20.00€40.00€60.00€300.00
Configure

Application not listed? Let us know!
The generic TCP and UDP profiles can be used to protect any application.

Mitigation Endpoint Locations

With mitigation endpoints available in the following locations, EvoShield remote DDoS protection can be provided directly from these regions. Your machine/network does not need to be located in any of these regions to benefit from EvoShield's remote Anti-DDoS technology and infrastructure.

With endpoints available in most corners of the world, we are able to service the vast majority of regions.

  • USA flag Oregon, USA
  • USA flag Virginia, USA
  • Germany flag Frankfurt, Germany
  • Canada flag Montreal, Canada
  • UK flag London, UK
  • Poland flag Warsaw, Poland
  • France flag Roubaix, France
  • France flag Gravelines, France
  • France flag Strasbourg, France
  • Singapore flag Singapore, Asia
  • Australia flag Sydney, Australia
  • India flag Mumbai, India
Remote DDoS Protection FAQ

Remote DDoS Protection FAQ

What is Remote DDoS Protection?

Remote DDoS Protection is a service that filters DDoS attack traffic before it reaches your server, without requiring the server to be hosted by the provider. All attack traffic is absorbed by the mitigation endpoints of the protection service, thus ensuring only clean traffic reaches the protected machine/server.

What type of attacks does your remote DDoS protection block?

Our remote DDoS protection blocks a comprehensive range of attack types across all layers. These include:

Layer 3 & 4 (Network & Transport Layer):
  • UDP Floods
  • TCP SYN/ACK/RST Floods
  • ICMP (Ping) Floods
  • IP Fragmentation Attacks
  • Smurf Attacks
  • IP Null and Spoofed Packets
  • GRE Floods
Layer 7 (Application Layer):
  • The large list of Layer 7 protection profiles can be viewed in the package table above
  • Each profile implements layer 7 validation and mitigation for the underlying protocol of the application
Amplification & Reflection Attacks:
  • DNS Amplification
  • NTP Amplification
  • CLDAP Amplification
  • Memcached Amplification
  • SNMP & SSDP Reflection
  • LDAP Reflection
Other:
  • Multi-vector attacks
  • Volumetric attacks (up to and beyond 17Tbps)
  • Firewall exhaustion & connection-based attacks

Our system provides real-time detection and mitigation to ensure maximum uptime and protection for your infrastructure.

How strong is the DDoS Protection? How big of an attack can it handle?

Our network benefits from a 12Tbps network surplus. The largest DDoS attack in recorded history was 3.8Tbps. This translates to: even if your server was targeted with a DDoS attack double the size of the largest attack in recorded history - you wouldn't even notice. All of the attack traffic would be absorbed by our network.

I run a hosting company, can this be used to protect my entire network?

Yes, our remote DDoS protection is fully compatible with hosting providers and data centers. You can route traffic from your infrastructure through our global DDoS filtering network without moving your servers or changing your existing hosting setup.

This allows you to:

  • Protect multiple IP ranges or subnets
  • Maintain your current server infrastructure and location
  • Offer your clients enhanced DDoS protection as a value-added service
  • Mitigate large-scale volumetric and application-layer attacks across your entire network
  • Automate your protection configuration via the EvoShield API
  • Bridge your own IP address subnet over if you have one available via BYOIP

EvoShield Remote DDoS Protection is an ideal solution for VPS providers, web hosts, game server hosts, or any service that requires guaranteed uptime during an attack.

Is there any added latency?

Very minimal latency is introduced, typically under 1 ms, thanks to global mitigation endpoint distribution.

Do I need to change my hosting provider?

No, Evolution Host's remote protection allows you to keep your current host while routing traffic through our protection network.

How long until I'm protected?

Seconds. Setup is automatic and instant. Once you have created a tunnel (instant) and setup protection profiles (instant) via the control panel - your server is fully protected.

Remote DDoS Protection for your entire network

EvoShield enables you to bring our industry leading remote DDoS protection to your entire network infrastructure. Interact with our easy to use API or the intuitive EvoShield control panel to customise the DDoS protection to suit your needs.

Automatically set up new protection profiles using the dedicated EvoShield API, streamlining the user experience for yourself and your clients. The days of worrying about DDoS attacks are over.

Protect your network

Protection built for you

How does EvoShield Remote DDoS protection work?

Your entire network can be protected from DDoS attacks with EvoShield Remote DDoS protection. Upon ordering the service you will be assigned a remote DDoS protected IP address(es). This will be the public-facing IP address(es) for your server(s). All traffic will be routed through your remotely assigned address allowing for real-time deep packet inspection of the inbound traffic, absorbing and eliminating all malicious packets on the Evolution Host network and forwarding only the clean traffic to your host machine(s).

You will be able to download the EvoShield router application for Windows or Linux servers which will establish the connection between our network and your server automatically, typically via a GRE tunnel or reverse proxy.

All traffic will be filtered in real-time with minimal latency overhead, immediately eliminating impacts from layer 3/4 attacks. Additionally, application specific EvoShield rules implement full layer 7 validation with heuristic analysis to provide all encompassing DDoS protection for even the most sophisticated attacks. EvoShield rules can be added easily using the control panel, and advanced users can automate rule management with the EvoShield API.

Additional Resources

The EvoShield API reference lists all of the available API endpoints, details their usage and provides code examples.

The API can be used to automate the creation of DDoS protection tunnels and profiles or to integrate EvoShield within your own control panel/interface.

View API Reference

The EvoShield user guide contains step by step instructions which you can follow to fully protect your server and network from DDoS attacks.

For quick start instructions as well as an in-depth guide to EvoShield, check out the user guide.

EvoShield User Guide
Get EvoShield