Your IP connectivity, colocation, IP security supplier!
Serverius is the largest all-in-one IT infrastructure supplier in the Netherlands. With its own IP connectivity, colocation, DDoS protection, Web Application Firewall, Internet Exchange, and Noc-as-Service (NOCaaS) services it is the most used place in Europe to host your private infrastructure.
All-in-one solution!
The combination of IP networking, colocation, IP protection and premium support offers users a base for any IT infrastructure.
100% Dutch!
Serverius is 100% Dutch. Economically and politically stable with a focus on international trade.
ISO compliant
Serverius is ISO 9001, 27001, 14001 and PCI-DSS compliant and full member of the Dutch Datacenter Association.
We're engineers!
Serverius is build and maintained by own engineers. We do not resell, we only offer our own services.
Own R&D
Our own Research & Development team is continuously creating new IP security software and adding new features to the client panel.
News & blogs about colocation, IP connectivity and cyber security
Serverius R&D won the hackathon on DDoS attacks organized by the Netherlands Internet Exchange (NL-IX).
Today 2 important software items have been implemented: 1. an important DDoS protection structure update. 2. the addition of a…
Serverius is transparent about how we offer our technical infrastructure solutions. Below you can view some of our latest Serverius lightboard lessons.
-

Service baseline threshold learning
To achieve best performance and to avoid any false positive, all thresholds should be periodically tuned to match the safe zone traffic. The thresholds can automatically be tuned by the "baseline learning mode". The system will analyze the traffic of the safe zone for a period of time and will adjust the thresholds based on the analytic results.
Note: when a defense is enabled the protection system will only collect statistics on the traffic and will activate the defense mechanism only in case the traffic exceeds the threshold.
Learning Cycle (Days) : This value indicates the period of time for each learning cycle. The learning result is applied to the defense policy only after such a learning cycle ends.
Value Is Larger Than the Current Value the system automatically applies baseline learning results to defense policies once the learning cycle ends if the recommended value is larger than the current value.
Value Is Larger or Less Than the Current Value the system automatically applies baseline learning results to service defense policies after the learning cycle ends, regardless of the learning results. -

Attack packet capture
It is useful to be able to capture a sample of an attack traffic. by clicking on the capture button, the system will start packet capturing on 1/1000 ratio.
The system captures the packets based on the attack type and the destination IP address.
The file will be saved when the system competed 1000 packets capturing or the system considered that the attack has been finished. -

Safe zone traffic limits
This value defines the maximum amount of traffic for all IP's in the safe zone, the exceeded amount of traffic will be discarded. -

IP reputation protection
After the IP reputation function is enabled, the protection system matches the source IP address of a packet against the IP reputation database. If a match is found, the system discards the packet. -

Flowspec rules explenation
Flowspec can be used to control your incoming traffic on a border router level. -

Filters for better DDoS protection
A knowledge base article of https://my.serverius.net about the filter which will allow users to adjust their security layer to their IP subnets. It can block or ratelimit data traffic like firewall rules. As a result it will make a Safe Zones even more personal.
Mostly it's used to block specific types of data traffic and it's the essential toolset to win the play of cat and mouse attacks.
Filter matching sequence
Packets match filters in the list from top to bottom. The matching stops only after the packets match any action defined in the filter. So for example, when a packet is sent from a IP of a source IP white list filter, the packets will be allowed and all filters below will not be applied anymore.
