Latitude.sh builds and manages its DDoS Protection infrastructure instead of offloading it to a third-party service. This means Latitude.sh has full control and visibility over denial-of-service attacks coming into the infrastructure and takes proactive actions to mitigate attacks before they impact your services With 7 Tbps of capacity, Latitude.sh’s scrubbing centers are equipped to handle any distributed attack, no matter its shape or form. Latitude.sh’s DDoS Protection can handle all known types: Network LevelDocumentation Index
Fetch the complete documentation index at: https://www.latitude.sh/docs/llms.txt
Use this file to discover all available pages before exploring further.
- TCP Flood
- UDP Flood
- ICMP Flood
- DNS Flood
- NTP Flood
- SNMP Flood
- SSDP Flood
- Overlapping
- Missing
- Too Many
- Repetitive GET
- Slowloris
- SlowRead
- Stack
- Protocol
- Buffer