Screenshot of

Detailed View of Mitigation

Traffic In/Out

Protocol Breakdown by Application

Break down by UDP/TCP/ICMP/etc.

Traffic Graph - By Country

Alert Counters

Detail List of Alerts/Mitigations

Alert Details

Mobile Website: Alpha | Provide Feedback
Storm on Demand DDoS Attack Protection
Essential Protection for Your Hosting Infrastructure.

Distributed Denial of Service Attacks can have a significant impact on your company. Downtime, lost revenue and brand tarnishment just to name a few. It doesn’t matter if you are a large enterprise, small business, e-commerce company or government institution. If your website is internet facing, you’re vulnerable to Denial of Service attacks, so it is vital that you detect and stop these attacks before they impact your business.

Since 1997, Liquid Web, Storm On Demand's parent company, has been helping their customers detect and mitigate DDoS attacks before they impact business. Recently Liquid Web made a million dollar investment into a state-of-the-art DDoS protection system that will help protect our clients from nefarious activities on the internet. Our state-of-the-art DDoS Mitigation System is comprehensive and has three critical functions: detection, mitigation and reporting.

Our DDoS Prevention has the Capability to:
  • Detect and block emerging application-layer
    DDoS attacks.
  • Deploy a turnkey solution to stop threats
  • Accelerate responses to DDoS attacks to
    prevent legitimate services from going down.
  • Prevent illegitimate botnet communications by
    leveraging real-time security intelligence
  • Mitigate volumetric attacks
  • Block illegitimate traffic from costing you money
    in bandwidth charges.

How Our DDoS Attack Prevention Works

When a customer signs up for Storm On Demand DDoS Mitigation, the customer will identify a group of IP addresses, which will be setup for detection and mitigation. A network object will be created and applied to the Analytics and Threat Detection System which will monitor all network traffic in real-time by doing statistical analysis of packets at the border layer of our network.

When the Analytics and Threat Detection System identifies an attack, the network traffic is routed to our Threat Mitigation System which is a dedicated piece of specialized hardware that will deploy countermeasures based upon the specific attack.

The countermeasures will scrub all of your network traffic at the border layer, not just web traffic like many providers, and separate legitimate from illegitimate traffic and only pass along the legitimate traffic to your server. When the attack subsides your network object will be removed from the Threat Mitigation System and traffic will begin flowing as normal. If the Analytics and Threat Detection System identifies a new threat the process will be repeated.

Advantages of Storm On Demand DDoS Prevention

Other Hosting providers which do not have a comprehensive DDoS Mitigation System will not be able to adequately handle a large DoS attack that is targeting one of their customers. This will often times result in the DDoS attack having a negative effect on other customers which may utilize the same server or the same networking infrastructure.

As a result, the hosting provider will often demand that the target client be removed from the network or asked to enlist a 3rd party DDoS system which may cost thousands of dollars, require DNS changes and may result in hours or days of downtime. This is obviously not a good solution because it will result in significant downtime and loss of revenue.

In contrast, the Storm On Demand DoS Mitigation System can be deployed in line without the need of DNS changes and can be implemented in minutes instead of hours or days.

Comparing Storm DDoS Prevention to Other DDoS Solutions

DoS Mitigation Options Disadvantages Cost
No DoS Protection
(Most hosts)
  • In the event of a DoS the customer could be Taken off-line for hours or days.
  • If DoS persists traffic could be Null routed taking you off-line.
  • Potentially asked to leave network and find a new host.

Loss of Revenue and Brand Tarnishment

3rd Party DoS Service
  • Require DNS Changes
  • Could take hours or days to configure
  • Doesn’t protect against all types of attacks (mainly web)
  • Adds latency

Thousands of Dollars per month

Dedicated DoS Hardware
  • DoS Mitigation systems cost hundreds of thousands of dollars
  • Most DoS Mitigation systems require significant network upgrades which could cost hundreds of thousands of dollars.
  • Requires a specialized administrator familiar with DoS mitigation best practices

Hundreds of thousands of dollars in hardware and potentially millions in network upgrades.

DDoS Prevention Pricing Structure

View DDoS Frequently Asked Questions
Protection for a DDoS that is: Protection for DDoS with a Volume of: Price
2 Gb/per second 3 million packets per second $500/month
4 Gb/per second 6 million packets per second $950 /month
8 Gb/per second 12 million packets per second $1,800/month
12 Gb/per second 18 million packets per second $2,640/month
15 Gb/per second 22.5 million packets per second $3,000/month

In addition to the monthly cost listed above, each DDoS Prevention plan requires a setup fee equal to one-month’s service. If you require a higher level of protection than what is listed, please contact a member of our sales team today. DDoS Mitigation monthly fees and setup fees are non-refundable.

To sign up, contact a sales agent today at (877) 330-7660 or Chat Now.

Call Us: Toll Free -  (877) 330-7660
or International: 1 (517) 322-0434


A distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its legitimate users. In general terms, DoS attacks are implemented by either forcing the targeted computer(s) to reset, or consuming its resources so that it can no longer provide its intended service or obstructing the communication media between the intended users and the victim so that they can no longer communicate adequately.

Today’s many types of attacks fall into two main categories:


Flooding attacks. Saturates and consumes network bandwidth and infrastructure. Examples: ICMP, UDP or TCP Syn Floods.


Harder to detect than Volumetric Attacks. Targets specific applications of services where they exhaust resources.
Examples : HTTP or DNS attacks.

Our system takes a layered approach that enable us to block both types of attacks.

The Storm On Demand DoS Mitigation Service includes a web based user interface where users can view detailed information about their incoming and outgoing network traffic. Reports include: total traffic, traffic by application type, traffic by network protocol, traffic by country, ongoing DoS alerts, ongoing Mitigations, and detailed information regarding the DoS attack.

View Screenshot Gallery