Gaming industry under DDoS attack. Get DDoS protection now. Start onboarding
  1. Home
  2. Blog
  3. Mitigate DDoS attacks with geography-based Rate Limiter
Security
News

Mitigate DDoS attacks with geography-based Rate Limiter

  • November 24, 2022
  • 1 min read
Mitigate DDoS attacks with geography-based Rate Limiter

Rate Limiter is a Gcore Web Application DDoS Protection feature that allows you to block traffic by IP addresses from specific countries.

To determine the geographical location of IP addresses, we use a database that matches countries with IP addresses allocated for them. That way, if you’re subjected to DDoS attacks from particular countries, you can block traffic from them with Rate Limiter.

How to use our geography-based Rate Limiter

Configure this countermeasure against traffic from one or several specific locations. Rate Limiter can perform two actions based on your choice:

  • Allow traffic
  • Block traffic

That means you can use one of two strategies:

  1. List the source countries from where traffic should be allowed and block traffic from other countries.
  2. List the source countries from where traffic should be blocked and allow traffic from other countries.

Configure Rate Limiter

Table of contents

Try Gcore Security

Gcore all-in-one platform: cloud, AI, CDN, security, and other infrastructure services.

Related articles

Gcore successfully stops 6 Tbps DDoS attack

Gcore recently detected and mitigated one of the most powerful distributed denial-of-service (DDoS) attacks of the year, peaking at 6 Tbps and 5.3 billion packets per second (Bpps).This surge, linked to the AISURU botnet, reflects a growing

Gcore Radar Q1–Q2 2025: three insights into evolving attack trends

Cyberattacks are becoming more frequent, larger in scale, and more sophisticated in execution. For businesses across industries, this means protecting digital resources is more important than ever. Staying ahead of attackers requires not on

No capacity = no defense: rethinking DDoS resilience at scale

DDoS attacks are growing so massive they are overwhelming the very infrastructure designed to stop them. Earlier this year, a peak attack exceeding 7 Tbps was recorded, while 1–2 Tbps attacks have become everyday occurrences. Such volumes w

Protecting networks at scale with AI security strategies

Network cyberattacks are no longer isolated incidents. They are a constant, relentless assault on network infrastructure, probing for vulnerabilities in routing, session handling, and authentication flows. With AI at their disposal, threat

Introducing Gcore for Startups: created for builders, by builders

Building a startup is tough. Every decision about your infrastructure can make or break your speed to market and burn rate. Your time, team, and budget are stretched thin. That’s why you need a partner that helps you scale without compromis

Outpacing cloud‑native threats: How to secure distributed workloads at scale

The cloud never stops. Neither do the threats.Every shift toward containers, microservices, and hybrid clouds creates new opportunities for innovation…and for attackers. Legacy security, built for static systems, crumbles under the speed, s

Subscribe to our newsletter

Get the latest industry trends, exclusive insights, and Gcore updates delivered straight to your inbox.