Remote Protection

Advanced Filters

With Advanced Filters module you can create customized rules that will block attack patterns on specific URLs.

24/7 Customer Support

With our 20+ Years in hosting & security experience, you're in safe hands. is here for you around the clock.

Geo Location filters

You can choose who can access your services based on country or Internet Service Provider.

SSL certificates

We provide free Let's Encrypt certificates. You can also get a Wildcard certificate or upload your own custom SSL

WAF Support

Web Application Firewall is enabled with all our plans along with Java challenge and click-to-pass options.

WS Swarm

All our plans can access the Swarm, which is a private database with IPs that were registered as offenders.

AI Sensor

We use Artificial Intelligence on our DDoS Protected infrastructure that adapts to changes in attack patterns.

Unlimited Domains

You can protect unlimited domains with our DDoS protection reverse proxy plans.

WebSocket Support

Enables real-time bidirectional communication between a client and a server over a single connection

1Tbps DDoS Protection

Instant Layer 4 DDoS mitigation of up to 1Tbps DDoS attacks - Remote DDoS Protection

Website DDoS Protection With a HTTP/HTTPS reverse proxy

Refers to a security measure that safeguards websites from Distributed Denial of Service (DDoS) attacks. It involves routing incoming web traffic through a proxy server, which acts as a shield between the website and potential attackers. The reverse proxy analyzes and filters the traffic, identifying and mitigating malicious requests, thus ensuring the website remains accessible and operational during DDoS attacks.

An unlimited number of domains can be protected with our Remote DDoS Protected plans and you dont have to host your websites with us – it can be hosted with any third party. We offer a secure IP address to redirect your domain name, ensuring your server’s real IP remains hidden. Incoming traffic is redirected through our DDoS Mitigation Infrastructure, effectively blocking malicious DDoS attacks. Our web-based HTTP reverse proxy then efficiently forwards only clean traffic to your actual server where your website is hosted.

Remote DDoS Protection via Reverse Proxy Servers

Remote DDoS protection via Worldshield Proxy is a robust solution for safeguarding websites against Distributed Denial of Service (DDoS) attacks. By utilizing a reverse proxy server, this approach enhances security and mitigates potential threats.

How it works:

  1. Traffic Routing: The reverse proxy acts as an intermediary between clients and the web server. It receives incoming requests and forwards them to the appropriate destination.

  2. Load Balancing: can distribute incoming traffic across multiple backend servers, ensuring optimal resource utilization and preventing overloads. This can be done by opening a support ticket with us and providing backend servers’ IP addresses.

  3. DDoS Filtering: provides various modules and configuration options to filter and analyze incoming requests. These modules can detect and block suspicious or malicious traffic associated with DDoS attacks.

  4. Rate Limiting: setting up rate limits to restrict the number of requests from a single IP address or within a specific time frame. This helps mitigate the impact of DDoS attacks by limiting the rate of incoming traffic.

  5. Caching: cache static content, reducing the load on backend servers and improving response times, even during high traffic volumes caused by DDoS attacks.

  6. SSL/TLS Termination: can handle SSL/TLS encryption and decryption, offloading this task from backend servers. This improves performance and frees up resources for handling DDoS attacks.

  7. Logging and Monitoring: provides extensive logging and monitoring capabilities, allowing administrators to track and analyze traffic patterns, detect anomalies, and take proactive measures against potential DDoS threats.

Overall, our remote DDoS protection Proxy provides an effective and scalable solution to defend websites against DDoS attacks. It leverages our firewall’s powerful features to intelligently filter and manage incoming traffic, ensuring website availability and enhancing security posture.

Web Application Firewall (WAF)

Worldshield’s web application firewall (WAF) helps protect web applications against a wide range of attacks. Some common types of attacks that a WAF can help with include:

  1. SQL Injection (SQLi): A WAF can detect and block attempts to inject malicious SQL queries into web application forms or parameters, preventing unauthorized access or manipulation of the application’s database.

  2. Cross-Site Scripting (XSS): WAFs can identify and block malicious scripts injected into web pages, preventing attackers from executing unauthorized code on users’ browsers and stealing sensitive information.

  3. Cross-Site Request Forgery (CSRF): WAFs can detect and block forged or unauthorized requests sent from a user’s browser, protecting against attacks that manipulate user actions or perform actions on behalf of the user without their consent.

  4. Remote File Inclusion (RFI) and Local File Inclusion (LFI): WAFs can prevent unauthorized inclusion of remote or local files into a web application, guarding against attacks that exploit file inclusion vulnerabilities to execute arbitrary code or gain unauthorized access to files.

  5. Distributed Denial of Service (DDoS): Some WAFs include DDoS protection mechanisms to detect and mitigate large-scale traffic floods or application-layer DDoS attacks, ensuring the availability and performance of web applications.

  6. Brute Force Attacks: WAFs can detect and block repeated and successive login attempts or authentication requests, protecting against brute force attacks aimed at guessing passwords or gaining unauthorized access.

  7. Application-Layer Protocol Attacks: WAFs can identify and mitigate attacks targeting specific application protocols, such as HTTP floods, Slowloris, or XML/SOAP attacks, protecting against protocol-level vulnerabilities and ensuring the integrity of the application.

  8. Web Scraping and Data Scraping: WAFs can detect and mitigate attempts to scrape or extract sensitive data from web applications, preventing unauthorized access to valuable information.

Best Practices with Remote DDoS Protected Plans

  • Whitelist the DDoS Protected IP you receive on your backend server’s firewall/network/infrastructure.
  • Configure Real Visitors IP on your backend server/application.
  • We recommend hosting your backend dedicated servers or virtual private servers on the same location as Remote DDoS Protected Services, because latency will be lower and communication between them will be faster. 
  • For any other questions or issues, please do not hesitate to contact us via support tickets.

Custom quote

If the protected plans above do not fit your needs, please message us and we'll create a custom plan for you.