There are two main types of cyber attacks: targeted attacks and automated robot attacks. In the case of robot attacks, intruders exploit known vulnerabilities in hundreds or even thousands of servers, turning them into ‘zombies’ in their own robots.
When robot attacks occur, intruders exploit known vulnerabilities in hundreds or even thousands of servers, turning them into ‘zombie’ devices for their own robots. Once compromised, they use these zombie devices as part of their robots to automatically execute attacks, infecting more and more devices and gaining control over them. On weak servers, robot networks are responsible for 40% of average web traffic.
Cloud Coden’s revolutionary power lies in our global database containing information about 7,000,000 IP addresses worldwide. Each server protected by Cloud Coden receives real-time updates, ensuring the safety of IP addresses and shielding them from malicious activities. As new servers join, the defensive shield grows stronger. If an attack occurs on a Cloud Coden-protected server and an IP address is blocked, the ban extends not only to that specific server but also to all Cloud Coden-protected servers worldwide. This advanced technology, known as the Defense Network, is an exclusive feature of Cloud Coden.
Global menus in grey, black and white are shared on all protected Cloud Coden servers. In addition, you can manage your user-level listings for all your servers in one place.
Instead of immediately blacklisting a harmful IP address, we invented a new technology called greylist. This leads to the prohibition of suspicious activity while it is still easy for people to verify the authenticity of real requests.
It is a global network of protected Cloud Coden servers that shares information about the latest attacks. With each new server, our defense network increases strength.
Our IP reputation list is constantly updated. When attacking any Cloud Codin protected server, the malicious IP address is instantly added to our blacklist.
Our defense network provides information about malicious IP addresses shared by all Cloud Coden-protected servers worldwide. With each new server added to the Cloud Coden community, the protection for every server increases. This advanced technology, known as the Defense Network, is an exclusive feature of Cloud Coden.
The ‘greylist’ is a flexible method used in antispam technologies where incoming emails are temporarily rejected initially, and the sending server is requested to retry the delivery after a certain time period. This is done to filter out spam emails sent from bots or compromised systems that typically do not retry a delivery.
When an IP address sends a suspicious request to a Cloud Coden-protected server, the IP address is initially placed in the greylist. If a legitimate human visitor attempts to connect to the server from an IP address listed in the greylist via HTTP, HTTPS, SMTP, or FTP protocols, they can remove the IP address with the assistance of CAPTCHA or Browser Integrity Check. These methods are used to facilitate confirmation that the request is genuine and allow browsing to continue.