Forensic Analysis Report of a DDoS Attack on a Belarusian Investigative Center Website 2026

Prepared by: RESIDENT.NGO ThreatLab

Detection Date: January 12, 2026

Incident Period: January 12-13, 2026

Classification: Distributed Denial of Service (DDoS) Attack – Layer 7 (HTTP Flood)

Publication Date: January 19, 2025

RESIDENT.NGO helped mitigate a significant 12-hour DDoS attack involving a botnet of approximately 245,000 unique IP addresses targeting https://investigatebel.org/, the website of the Belarusian Investigative Center – an independent Belarusian investigative journalism outlet that exposes corruption, debunks disinformation, and produces in-depth analytical reporting as part of a global network of investigative media. The report ends with practical technical recommendations that can be shared with specialists to address similar DDoS attacks.

Data Methodology Note

This analysis is based on curated malicious traffic data extracted from Cloudflare analytics. The dataset includes only confirmed malicious requests that meet the following criteria: almost all IPs were hitting only one single URL GET /en/investigations/politik-moshennik-i-biznesmen-kto-iz-belarusov-pryatal-dengi-v-shvejcarskom-banke

The actual attack volume included lower-frequency requests and other techniques like the using of random query strings and hitting other URLs like “/” were also used in parallel. But in this dataset and article we decided to focus on the botnet infrastructure that was used to hit one specific URL to reduce noise, possible mistakes and make the report more readable. As a result of this filtering approach, the dataset is considered to contain exclusively malicious traffic, with legitimate user activity effectively excluded.

Executive Summary

On January 12, 2026, at 15:45:00 UTC, investigatebel.org experienced a massive distributed denial-of-service attack targeting a specific investigative journalism article that was published in 2023 about Belarusian politicians and businessmen allegedly hiding money in Swiss banks with “GET /en/investigations/politik-moshennik-i-biznesmen-kto-iz-belarusov-pryatal-dengi-v-shvejcarskom-banke” requests. The attack persisted for approximately 12 hours, concluding on January 13, 2026, at 04:00:00 UTC.

Key Metrics (Curated Malicious Traffic Only)

  • Confirmed Malicious Requests: 2,629,704,138 (2.6+ billion).
    Average Request Rate: ~59.6 million requests/hour
  • Attack Duration: 12 hours, 15 minutes (over 12 hours)
  • Peak Traffic: Sustained throughout the entire duration
  • Massive botnet: 245,078 unique IP addresses spanning 10,676 ASNs
  • Real source IPs: Layer 7 HTTP attacks cannot easily spoof source IPs (TCP handshake required); these are genuine compromised/controlled endpoints
  • Unique ASNs: 10,676 autonomous systems
  • Geographic Span: 201 countries
  • Mitigation Success Rate: 97.3% (requests blocked or rate-limited)
  • Uniform traffic patterns: the same user agents and operating systems evenly distributed across requests.
  • Partial Managed Challenge bypass

Despite extensive automated mitigation and “Under attack” mode enabled, a portion of the attack traffic reached the origin server, requiring direct intervention by RESIDENT.NGO specialists to stabilize the service and mitigate the impact of the sustained Layer 7 attack.

Botnet Analysis

Scale & Distribution

This attack demonstrates the characteristics of a massive, globally distributed botnet:

  • Botnet Size: 245,078 compromised/controlled endpoints (minimum)
  • Network Diversity: 10,676 unique ASNs involved (spanning residential, commercial, datacenter, and mobile networks)
  • Geographic Distribution: 201 countries, indicating truly global infrastructure
  • Per-IP Request Volume: Average ~10,715 requests per IP (relatively low per-endpoint, suggesting distributed load)

The extreme diversity in both IP addresses and ASNs is consistent with:

  1. Large-scale IoT botnet (compromised routers, cameras, DVRs, smart devices)
  2. Residential proxy network or botnet-for-hire service
  3. Compromised residential computers and servers across multiple continents
  4. Mobile device botnet (given significant mobile user agent presence)

Top Source IPs

The highest-volume individual sources contributed relatively modest request volumes, further confirming distributed botnet behavior:

RankIP AddressRequests% of Total
1109.224.1.158139,5450.0053%
224.144.237.246114,1270.0043%
366.78.130.5107,8910.0041%
4198.232.115.102105,3630.0040%
5104.174.225.190101,8340.0039%
6207.172.185.41100,3170.0038%
7177.242.0.8595,6210.0036%
8162.155.70.19995,5200.0036%
971.57.241.16593,8570.0036%
10216.55.252.7592,8660.0035%

Analysis: No single IP contributed more than 0.006% of total traffic, indicating high distribution and coordinated attack behavior typical of professional botnets. The relatively even distribution suggests load balancing across the botnet infrastructure.

We analyzed top 199,000 IP addresses with IPinfo.io summarization service and can see that 17.8% of analyzed IPs are VPN services, 13.9% are mobile network IPs and 2.0% are classified as proxies:

Summary

MetricCountApproximate Percentage
Total199,000100.0%
Unique199,000100.0%
Anycast00.0%
Bogon20.0%
Mobile27,70613.9%
VPN35,36817.8%
Proxy200.0%
Hosting3,9992.0%
Tor00.0%
Relay130.0%
Summary categories represent overlapping IP characteristics, while usage types reflect a single primary classification per IP; therefore, counts and percentages are not directly comparable.


Top Usage Types

Usage TypeCountPercentage
ISP187,00494.0%
Business6,5023.3%
Hosting2,9011.5%
Education940.0%
Government230.0%


Top Privacy Services

ServiceCountPercentage
NordVPN5310.3%
Surfshark1320.1%
FastVPN340.0%
IPVanish300.0%
ProtonVPN250.0%

Geographic Analysis

Global Distribution

Attack traffic originated from 201 countries worldwide, with heavy concentration in the Americas region:

RankCountryRequests% of Total
1United States (US)933,801,10935.5%
2Brazil (BR)671,190,32825.5%
3Argentina (AR)189,319,4727.2%
4Mexico (MX)91,857,1413.5%
5Colombia (CO)58,126,8152.2%
6Chile (CL)41,381,3311.6%
7South Africa (ZA)41,108,7721.6%
8Canada (CA)35,542,5581.4%
9Philippines (PH)33,562,2761.3%
10Ecuador (EC)24,041,5810.9%
11India (IN)23,778,2940.9%
12France (FR)22,056,9180.8%
13Saudi Arabia (SA)21,978,0880.8%
14Thailand (TH)19,036,4510.7%
15Russia (RU)18,226,1560.7%
16Venezuela (VE)17,750,9620.7%
17Honduras (HN)16,982,5330.6%
18Indonesia (ID)16,899,1740.6%
19Turkey (TR)16,715,4860.6%
20Iraq (IQ)15,729,6630.6%
21Morocco (MA)15,414,9940.6%
22Ukraine (UA)14,710,5130.6%
23Malaysia (MY)13,026,8940.5%
24United Kingdom (GB)12,497,8460.5%
25Vietnam (VN)12,379,6420.5%

Regional Concentration

  • Americas (North & South America): ~68% of total traffic
    • United States + Brazil alone: 61% of all attack traffic
  • Europe: ~5%
  • Asia-Pacific: ~7%
  • Middle East & Africa: ~4%
  • Other/Distributed: ~16%

Network Infrastructure Analysis

Autonomous System Numbers (ASNs)

The attack leveraged 10,676 unique autonomous systems, indicating extremely broad network diversity. ASN numbers as provided by Cloudflare and ASN names obtained from Team Cymru whois service. Top 50 ASNs by request volume:

RankASNOrganizationCountryRequests% of Total
1AS7922COMCAST-7922US145,485,7755.5%
2AS7018ATT-INTERNET4US137,342,3035.2%
3AS20001TWC-20001-PACWESTUS113,839,0794.3%
4AS28573Claro NXT Telecomunicacoes LtdaBR67,190,1612.6%
5AS20115CHARTER-20115US59,830,5682.3%
6AS22927Telefonica de ArgentinaAR56,336,9562.1%
7AS8151UNINETMX46,123,7471.8%
8AS22773ASN-CXA-ALL-CCI-22773-RDCUS43,367,8081.6%
9AS10796TWC-10796-MIDWESTUS40,550,0751.5%
10AS21928T-MOBILE-AS21928US36,359,7811.4%
11AS7303Telecom Argentina S.A.AR36,050,4241.4%
12AS14593SPACEX-STARLINKUS34,553,5361.3%
13AS8167V talBR32,648,9501.2%
14AS701UUNETUS32,631,9691.2%
15AS26599TELEFONICA BRASIL S.ABR28,081,3651.1%
16AS27699TELEFONICA BRASIL S.ABR28,030,4091.1%
17AS11664Techtel LMDS Comunicaciones Interactivas S.A.AR24,543,6490.9%
18AS7738V talBR20,611,4960.8%
19AS27747Telecentro S.A.AR20,100,2060.8%
20AS33363BHN-33363US20,094,2170.8%
21AS17072TOTAL PLAY TELECOMUNICACIONES SA DE CVMX20,088,0380.8%
22AS28343UNIFIQUE TELECOMUNICACOES SABR17,766,7490.7%
23AS27884CABLECOLOR S.A.HN14,836,9310.6%
24AS6128CABLE-NET-1US14,713,4610.6%
25AS10620Telmex Colombia S.A.CO14,300,1790.5%
26AS13999Mega Cable, S.A. de C.V.MX13,682,4040.5%
27AS9299IPG-AS-AP Philippine Long Distance Telephone CompanyPH13,515,0100.5%
28AS11426TWC-11426-CAROLINASUS13,439,5920.5%
29AS28649Desktop Sigmanet Comunicacao Multimidia SABR12,946,4600.5%
30AS18881TELEFONICA BRASIL S.ABR12,727,9410.5%
31AS25019SAUDINETSTC-ASSA12,393,2220.5%
32AS12322PROXADFR11,434,4930.4%
33AS3816COLOMBIA TELECOMUNICACIONES S.A. ESP BICCO11,055,0240.4%
34AS11351TWC-11351-NORTHEASTUS10,607,2520.4%
35AS6167CELLCO-PARTUS10,144,1940.4%
36AS27901Pacifico Cable SPA.CL9,986,3010.4%
37AS55836RELIANCEJIO-IN Reliance Jio Infocomm LimitedIN9,970,0680.4%
38AS11427TWC-11427-TEXASUS9,785,3070.4%
39AS7418TELEFONICA CHILE S.A.CL9,522,7580.4%
40AS27651ENTEL CHILE S.A.CL9,021,9420.3%
41AS27947Telconet S.AEC8,945,8530.3%
42AS5650FRONTIER-FRTRUS8,639,6830.3%
43AS28210GIGA MAIS FIBRA TELECOMUNICACOES S.A.BR8,603,5740.3%
44AS9121TTNETTR8,377,7190.3%
45AS36903MT-MPLSMA8,347,0050.3%
46AS4788TTSSB-MY TM TECHNOLOGY SERVICES SDN. BHD.MY7,755,9740.3%
47AS7029WINDSTREAMUS7,645,1390.3%
48AS53006ALGAR TELECOM SABR7,327,6540.3%
49AS577BACOMCA7,230,1900.3%
50AS17639CONVERGE-AS Converge ICT Solutions Inc.PH7,198,4920.3%

Attack Vectors & Traffic Signatures

User Agents (Complete List – 16 Total)

The attack employed exactly 16 distinct user agent strings, all mimicking Google Chrome browsers across different platforms. The distribution shows suspicious uniformity:

#User AgentRequests% of Total
1Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36168,671,2616.4%
2Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36167,881,5506.4%
3Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36167,251,6556.4%
4Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36166,347,1616.3%
5Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36166,392,7396.3%
6Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36165,670,2156.3%
7Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36164,211,8456.2%
8Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Mobile Safari/537.36164,786,7036.3%
9Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36163,744,2446.2%
10Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Safari/537.36163,057,3956.2%
11Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/133.0.0.0 Mobile Safari/537.36163,246,8356.2%
12Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/134.0.0.0 Safari/537.36161,806,1696.2%
13Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36161,742,0206.2%
14Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Mobile Safari/537.36162,767,7346.2%
15Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Mobile Safari/537.36159,867,0346.1%
16Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36162,259,5786.2%

Chrome Version Distribution:

  • Chrome 132: ~25% (652,471,706 requests)
  • Chrome 133: ~25% (660,645,706 requests)
  • Chrome 134: ~25% (657,152,878 requests)
  • Chrome 135: ~25% (653,235,348 requests)

Platform Distribution (from User Agents):

  • Linux (X11): 4 variants, ~670M requests
  • Windows (NT 10.0): 4 variants, ~653M requests
  • macOS (10_15_7): 4 variants, ~655M requests
  • Android (10): 4 variants, ~651M requests

Analysis: The nearly perfect 25% distribution across Chrome versions 132-135 is statistically impossible in legitimate traffic and confirms these user agents are systematically rotated by the botnet software. Each platform (Linux/Windows/macOS/Android) has exactly 4 user agents (one per Chrome version), indicating deliberate programmatic generation.

Browser Distribution (Complete)

BrowserRequests% of Total
Chrome1,979,035,83275.2%
ChromeMobile650,668,30624.8%

The exclusive use of Chrome-based user agents (no Firefox, Safari, Edge, etc.) further confirms automated attack traffic with limited user agent diversity.

Operating System Distribution (Complete)

Operating SystemRequests% of Total
Linux670,151,62725.5%
macOS (Mac OS X)655,403,99924.9%
Windows653,480,20624.9%
Android650,668,30624.7%

Analysis: Perfect 25% distribution across all four major operating systems is artificial and impossible in real-world web traffic. Legitimate traffic typically shows 60-80% Windows dominance. This uniform distribution is a signature of programmatically generated attack traffic with systematic OS rotation.

Device Type Distribution (Complete)

Device TypeRequests% of Total
Desktop1,979,035,83275.2%
Mobile650,668,30624.8%

HTTP Referers (Complete List – 102 Total)

The attack included exactly 102 distinct HTTP referer values. All spoofed referers show highly uniform request counts (~18.5 million each):

#RefererRequests
1https://www.reddit.com/18,578,207
2https://www.twitch.tv/18,540,167
3https://www.memrise.com/18,528,188
4https://www.stackoverflow.com/18,526,015
5https://www.codecademy.com/18,521,340
6https://www.medium.com/18,520,961
7https://www.office.com/18,520,837
8https://www.amazon.com/18,520,423
9https://www.khanacademy.org/18,520,084
10https://www.flickr.com/18,517,280
11https://www.udemy.com/18,517,267
12https://www.live.com/18,516,253
13https://www.last.fm/18,516,006
14https://www.dribbble.com/18,512,700
15https://www.apple.com/18,504,987
16https://www.wikipedia.org/18,504,368
17https://www.freecodecamp.org/18,501,835
18https://www.discord.com/18,496,416
19https://www.github.com/18,489,620
20https://www.busuu.com/18,489,096
21https://www.blogger.com/18,488,794
22https://www.slack.com/18,487,781
23https://www.w3schools.com/18,487,641
24https://www.spotify.com/18,487,315
25https://www.soundcloud.com/18,484,626
26https://www.pinterest.com/18,478,988
27https://www.youtube.com/18,478,678
28https://www.vimeo.com/18,476,122
29https://www.microsoft.com/18,475,644
30https://www.yahoo.com/18,471,959
31https://www.genius.com/18,471,908
32https://www.skillshare.com/18,471,689
33https://www.deviantart.com/18,471,277
34https://www.behance.net/18,465,803
35https://www.duolingo.com/18,462,841
36https://www.wordpress.com/18,461,360
37https://www.google.com/18,457,769
38https://www.coursera.org/18,457,521
39https://www.quora.com/18,456,643
40https://www.udacity.com/18,454,660
41https://www.twitter.com/18,452,838
42https://www.netflix.com/18,448,279
43https://www.imgur.com/18,442,699
44https://www.tiktok.com/18,438,763
45https://www.linkedin.com/18,438,524
46https://www.ebay.com/18,436,198
47https://www.bing.com/18,434,292
48https://www.tumblr.com/18,432,171
49https://www.facebook.com/18,431,340
50https://www.lingoda.com/18,421,654
51https://www.instagram.com/18,419,972
52https://www.mixcloud.com/18,418,991
53https://www.babbel.com/18,415,576
54https://www.adobe.com/18,374,227
55https://www.masterclass.com/18,360,514
56https://www.cnbc.com/18,355,930
57https://www.notion.so/18,352,938
58https://www.expedia.com/18,346,967
59https://www.zillow.com/18,345,208
60https://www.buzzfeed.com/18,344,292
61https://www.squarespace.com/18,343,433
62https://www.canva.com/18,343,212
63https://www.foxnews.com/18,342,413
64https://www.accuweather.com/18,341,757
65https://www.ubereats.com/18,336,969
66https://www.paypal.com/18,335,851
67https://www.walmart.com/18,332,215
68https://www.strava.com/18,331,011
69https://www.airbnb.com/18,330,468
70https://www.fitbit.com/18,328,427
71https://www.figma.com/18,326,084
72https://www.lyft.com/18,325,915
73https://www.doordash.com/18,323,767
74https://www.nbcnews.com/18,321,216
75https://www.nytimes.com/18,320,371
76https://www.asana.com/18,319,055
77https://www.myfitnesspal.com/18,317,427
78https://www.trello.com/18,317,240
79https://www.zoom.us/18,316,600
80https://www.realtor.com/18,315,348
81https://www.forbes.com/18,315,019
82https://www.yelp.com/18,313,267
83https://www.dropbox.com/18,312,685
84https://www.tripadvisor.com/18,306,272
85https://www.webflow.com/18,304,013
86https://www.target.com/18,301,646
87https://www.washingtonpost.com/18,298,960
88https://www.wix.com/18,298,252
89https://www.grubhub.com/18,295,006
90https://www.bbc.com/18,293,791
91https://www.aliexpress.com/18,290,888
92https://www.etsy.com/18,282,680
93https://www.uber.com/18,279,957
94https://www.booking.com/18,275,884
95https://www.huffpost.com/18,267,541
96https://www.bloomberg.com/18,266,357
97https://www.weather.com/18,264,613
98https://www.cnn.com/18,263,489
99https://www.theguardian.com/18,262,050
100https://www.shopify.com/18,225,494
101https://www.rosetta.com/167,686
102https://investigatebel.org/en/investigations/politik-moshennik-i-biznesmen-kto-iz-belarusov-pryatal-dengi-v-shvejcarskom-banke4,074
(Empty/No Referer)789,343,293

Total with referers: 1,821,782,638 requests 
No referer (empty): 789,343,293 requests (43.4% of malicious traffic)

Mitigation Effectiveness

Mitigation Analysis

  • Total Blocked/Rate-Limited: 2,583,811,824 requests (97.3%)
  • Backend Errors: 44,396,954 requests (1.7%) – Traffic reached backend but failed
  • Origin Responses (200 OK): 404,326 requests (0.015%)

Origin Impact Assessment

Despite Cloudflare’s edge blocking, 44,801,280 requests reached the origin server. This represents an average request rate of 1015 requests/second over the 12 hour attack period. While this appears modest, these requests were issued to dynamic page and were sufficient to disrupt normal website operations.

Managed Challenge Bypass

Some sophisticated bots successfully bypassed Cloudflare’s “Managed Challenge” – the default challenge type when “Under Attack” mode is enabled. Analysis of origin-level logs identified specific IPs that passed challenge validation:

  • IP 2.49.246.154: Successfully sent 10,440 requests to the origin server
  • Additional IPs demonstrated similar challenge-passing capabilities

This indicates the botnet included headless browser automation or challenge-solving capabilities, allowing a subset of attack traffic to reach the origin despite active protection measures.

Mitigation Adjustments

During the attack, RESIDENT.NGO specialists made real-time adjustments to both Cloudflare protection rules and origin server configurations to mitigate the DDoS impact. For security reasons, the exact configurations cannot be disclosed, as doing so could help future attackers bypass these defenses.

In such situations, we recommend reducing the Challenge Passage duration and switching from Managed Challenge to Interactive Challenge. It is important to note that clients who previously passed a non-interactive challenge and received a valid cookie will not be challenged again after switching to Interactive Challenge. Their earlier, less secure challenge result remains valid for the duration of the configured Challenge Passage period.

We also configured rate-limiting rules to ensure that IP addresses generating an excessive number of requests were blocked for an appropriate period of time. In addition, we enabled caching for dynamic pages at Cloudflare’s edge and ensured that stale content could be served even if the origin server became slow or unresponsive.

Cloudflare Galileo Project

The organization benefited from Cloudflare’s Galileo Project, which provides free DDoS protection to at-risk public interest organizations, including independent media and investigative journalism outlets. Without this protection and the Business Plan features provided at no cost to eligible Galileo participants – the attack would have been significantly harder to mitigate.

Attribution

Threat Actor Profile

Based on the observed attack behavior and execution patterns, the activity is attributed to a highly capable and well-resourced threat actor. The operation exhibited professional-grade coordination, systematic request generation, and the use of a Layer 7 HTTP attack, indicating deliberate planning and technical sophistication beyond opportunistic or low-effort attacks.

The scale, consistency, and resource requirements are most consistent with the use of a commercial botnet-for-hire service, or infrastructure operated by a well-funded private or state-aligned entity. Potential actors include state-affiliated groups connected to Belarusian or Russian interests, as well as private entities seeking to suppress or retaliate against investigative reporting.

The pronounced concentration of attack traffic originating from Latin America, particularly Brazil and Argentina, strongly supports the hypothesis of commercial botnet rental rather than direct use of state-controlled infrastructure.


MITRE ATT&CK Enterprise Classification

IDTacticDescription
T1499ImpactEndpoint Denial of Service: The adversary attempts to make the web service unavailable by exhausting application resources.
T1499.004ImpactApplication Exhaustion Flood: High-volume HTTP/HTTPS requests overwhelm the application at Layer 7.
T1071Command and ControlApplication Layer Protocol: Standard web protocols (HTTP/HTTPS) are abused to deliver malicious traffic.

Technical Indicators of Compromise (IoCs)

IoC Distribution

Full IoC dataset available:

  • 245,078 confirmed malicious IP addresses
  • Sorted by request volume (highest threat first)
  • Ready for import to MISP, SIEM, firewall blocklists

Recommendations

In case you expect a DDoS attack, it is very important to prepare in advance:

  1. Set up a reliable DDoS mitigation service like Cloudflare.
  2. Activate a proper plan there that allows you to enable advanced mitigation options – apply to Project Galileo if eligible.
  3. Enable rate limiting rules on Cloudflare.
  4. Enable caching rules on Cloudflare. Make sure that your pages are cached and served stale in case your origin is not available.
  5. Enable rate limiting rules on your origin server.
  6. Enable caching on your origin server.
  7. Enable caching on application level.
  8. Tweak HTTPS configuration of your webserver to reuse TLS sessions that were already established between the origin server and Cloudflare to reduce CPU load.
  9. Make sure that your origin server IP is not exposed and adversaries can’t attack it directly bypassing DDoS mitigation infrastructure. If it was already exposed, change the IP address and make sure that new IP is not revealed.

Every website and setup is different, and every project has its own limitations, thus, the recommendations provided above may or may not fit your current setup. If you need help with setting up DDoS mitigation or you are under attack, feel free to contact RESIDENT.NGO at [email protected].