Update - Datapacket / CDN77 has decided to not turn our BGP sessions back on nor to provide services for such purpose going forward to anybody.
We as NeoProtect have been evaluating all scenarios and further steps to be taken preemptively as soon as we were aware of possible outcomes.
The decision from Datapacket / CDN77 is final, unfortunate, we deeply regret this being done and it is highly impacting to our business and the business of our customers.
As we have been evaluating options and searching for alternative solutions, we do not estimate that we could get the same or similar sized network / capacity up within a reasonable time-frame with the financial capabilities and staff capacity to the extent where it makes sense to do so.
We do not believe in delivering low quality services solely to ensure fast delivery. We do not see the benefit in doing so nor see a possibility to get good quality service up fast.
While the decision impacts the majority of our revenue, we have decided to discontinue Remote Shield as a product in its entirety for the time being.
We are looking to reach out to customers of our Remote Shield for questions on future setups that address below concerns in its entirety, but we don't aim to provide a semi-working solution at this time, solely for the sake of it being deployed in a timely manner.
Our team is always available and happy to consult on alternative solutions to our Remote Shield as well including both general providers in which's ability we believe as well as On Premise protected customer networks.
We see that, unfortunately, the overall DDoS protection service in current times is not doable without millions of available capital.
We also recognize that major providers such as CDN77 often lack to notice the impact potential this has in a general view to their network and that there is capital and potential that is not allocated towards this general problem.
To date, we have talked to a total of 7 other providers to switch infrastructure to, however the urgency of the situation would not allow for a smooth or workable transfer to any with also the majority not working out for the purpose of our Remote Shield service in the first place.
The research for such options will continue and our goal is to be able to provide customers a definite solution to today's peak DDoS threatened markets.
Our On Premise Shield and associated service portfolio will be built out, featuring incredible support servicing improvements along with focused growth development. While it already powers Terabit-scale traffic environments, we are aiming to make this product available to everybody and scaleable as much as possible.
We are looking to offer a full service to setup, provide and maintain DDoS mitigation infrastructure for networks of all sizes.
Our Sales team is happy to help with working out a solution for you as a potential impacted provider.
Service restoration for Game Shield bedrock is estimated to be fully done by End of Day. We will onboard infrastructure to another provider along with OVH to ensure premium routing remains and/or is improved for our primary Game Shield customer base.
We encourage you not to reach out in technical manners regarding your Remote Shield so to lighten load on our support team.
Billing for every Remote Shield subscription will be altered so that up until the point of impact service is billed, and anything after will either be cancelled or reimbursed by us.
As this is major load to handle, we estimate billing to be sorted out within the next week so until 9th November. You may not inquire about this until then as it will get sorted autonomously.
tl;dr on the impact:
- The company in itself is not affected and will remain to operate Non-Remote Shield products at similar scale to the current state
- Remote Shield will not be restored in the foreseeable future
- Game Shield Java is fully restored and updates for Routing optimization in the EU are ongoing with the ETA of EOD
- Game Shield Bedrock is partly restored, full restoration will come with the ETA of EOD
- On Premise customers are not affected
We want to thank each and every customer for their loyalty, understanding and patience regarding this massive issue. We are more than happy to assist in trying to find alternative solutions.
Yours,
Noah & Kilian
Oct 31, 2025 - 12:58 UTC
Update - Our Upstream CDN77 / Datapacket has deactivated all BGP sessions towards our network. This results in full downtime of all associated services such as all Remote Shield customers (aside from XC customers in AMS).
The ETR given by them at this time is "tomorrow", we are trying to get this reconsidered but we do not estimate for reconsideration to happen in our favor.
The root cause for this to happen was an attack targeted towards many prefixes announced by us that reached many Terabits and continued for over 20 minutes. The attack started at 2025-10-30 21:12:40 CEST with first BGP sessions being deactivated at 2025-10-30 21:30:00 CEST. All sessions were down/no traffic was visible anymore as of 2025-10-30 21:36:40 CEST.
The cause of this was not of any other nature.
Game Shield customers were only shortly affected and only Bedrock Ports are currently affected and will be restored ASAP over alternative infrastructure.
On Premise customers are unaffected.
Game Shield Java connections are currently resolved. We have purchased capacity for additional 20k concurrent players elsewhere to handle the peak load expected. Customers with dedicated bedrock ports may contact us, including "Bedrock port" in their request, preferably ticket title to be worked on in a fast manner so Bedrock connections are turned up again.
We understand the severity and impact this has on our customers and their business. We deeply regret this action being done and will ensure to share updates as available and will follow up with more details and background tomorrow.
Oct 30, 2025 - 21:26 UTC
Update - There is a major outage ongoing of our entire network, Game Shield is being re-routed to alternative infrastructure. We will provide updates as available. There is no ETR at this time.
Oct 30, 2025 - 20:41 UTC
Update -
The following shall aid to provide a sufficient overview of the current situation and the work done by NeoProtect.
Notice: Game Shield Customers may update their firewalls to reflect all currently listed IPs here: https://api.neoprotect.net/v2/public/servers/txt .
What happened?
Our network, that being multiple customers at the same time, was within the target scope of a major scale DDoS attack connected to the Aisuru botnet. We faced a total of 5 different attack vectors, each seen in different scale over time and reaching up to many Terabits per Second.
While the actual total peak size is not known, we estimate it to be at around 10-20 Tbit/s peak for one of those vectors.
Certain vectors unfortunately impacted several customers in varying locations, in multiple ways, resulting in frequent degraded service quality for ~60 seconds each.
This attack landscape is challenging for almost all networks targeted by this, as well due to the sole origin of malicious traffic being primarily from residential sources all around the world, with the U.S. being the most prominent source of origin.
When was impact noticed?
The primary impact started at 2025-10-24 21:52:40 CEST and issues occurred frequently until 2025-10-24 23:52:50 CEST. A second primary impact was noticed at 2025-10-25 20:58:42 CEST with no frequent recurrance seen.
Isolated customer impact was bespoken with those impacted and minimized wherever possible and sufficient information given.
We are working hard to address and minimize impact globally and have achieved success in doing so with the majority of vectors, with however one vector stil challenging parts of our infrastructure.
Main pain points are certain path's congesting during said attacks while overall capacity is handled in a proper manner. We are in close communication with CDN77 engineers to optimize this and are working to gain further insights resulting in accurracy while pinpointing impact paths.
Along with that, we have also made further progress on offloading implementations of ddos mitigation algorithms to ASICs, the way, speed and accurracy of safeguard systems acting as well as traffic steering and congestion control globally.
We are also in talks with multiple potential upstream providers as well with different lead times in terms of implementation to evaluate standing as we are.
Our main goal at NeoProtect was and has always been to provide technological excellence, optimal approaches to problems and a generally better and easier protection outcome for each and every user. The issues here however do not relate to technological capabilities of our software and/or hardware implementations, but solely the scale of operation.
We apologize for the impact these incidents caused and appreciate your understanding that we are working hard towards resolvement.
Our customer support and engineering appreciates impact details if any are or were noticed and specifically in regards to geographical scope, destination IP impacted and similar useful information.
Thank you in advance for your cooperation in aiding to resolve this matter quicker.
Oct 26, 2025 - 02:04 UTC
Investigating - We are investigating this issue since 2025-10-24 21:52:40 CEST. We will provide updates here as we have more information to share.
The issue occurs frequently for ~60 seconds each.
Our team is working hard to find alternate solutions to address this asap and wants to thank you for your understanding and patience in the meantime.
Oct 24, 2025 - 21:16 UTC