New Site Promo! (1g on 10g 95 Percentile IP Transit - $250/m) (Available in any of our POPs - 9950x Dedicated Servers Available from $200/m)

When IP Transit Fails: What the NeoProtect Shutdown Reveals About Infrastructure Risk

IP Transit

Published on: 17/12/2025

Read time: 4

When IP Transit Fails: What the NeoProtect Shutdown Reveals About Infrastructure Risk

On October 30, 2025, thousands of servers and online services went dark. Game servers, SaaS platforms, proxies, and entire infrastructure setups relying on NeoProtect Remote Shield suddenly became unreachable.

What happened was not a software bug, not a misconfiguration, and not a regional outage.

NeoProtect’s IP transit provider, Datapacket / CDN77, turned off all of NeoProtect’s BGP sessions.

When the upstream pulled the plug, NeoProtect lost its ability to announce customer prefixes globally.

NeoProtect confirmed the shutdown publicly:

"Our Upstream CDN77 / Datapacket has deactivated all BGP sessions towards our network. This results in full downtime of all associated services." — NeoProtect Incident Report, Oct 30, 2025

This was not a partial outage. It was a total loss of routing capability.

And the cause exposes a fundamental lesson about network architecture and the importance of IP transit resilience.

What Triggered the Shutdown?

NeoProtect was hit by a massive DDoS attack linked to the Aisuru botnet. The company confirmed:

"We faced a total of 5 different attack vectors… reaching up to many Terabits per Second." — NeoProtect Incident Report

They estimate peak attack traffic reached:

"around 10–20 Tbit/s peak for one of those vectors."

This volume is among the largest public DDoS attacks ever recorded.However, the attack is not what caused NeoProtect to shut down.

The shutdown was triggered by their upstream.

"Datapacket / CDN77 has decided to not turn our BGP sessions back on nor to provide services for such purpose going forward to anybody." — NeoProtect Incident Report, Nov 2025

That single decision eliminated Remote Shield overnight.

The Real Root Cause: Single Upstream Dependency

The most important line in NeoProtect’s statement reveals the actual weak point:

"The issues here however do not relate to technological capabilities of our software and/or hardware implementations, but solely the scale of operation."

For a DDoS-focused network, NeoProtect relied on only one upstream transit provider.

Meaning:

ComponentNeoProtect Reality
IP Transit Providers1 (Datapacket / CDN77)
Redundancy (BGP multihoming)None
Ability to re-route trafficNone
Dependency on providerTotal

When CDN77 removed their BGP sessions, the entire network disappeared from the global routing table.

Why Couldn't NeoProtect Just “Switch Providers”?

NeoProtect tried:

"We have talked to a total of 7 other providers to switch infrastructure to, however the urgency of the situation would not allow for a smooth or workable transfer."

Finding a new IP transit provider is not like switching web hosts. Routing contracts, onboarding, provisioning cross-connects, these take weeks or months.

NeoProtect confirmed they no longer had the capacity or capital to rebuild:

"We do not estimate that we could get the same or similar sized network / capacity up within a reasonable time-frame with the financial capabilities and staff capacity."

And critically:

"DDoS protection service in current times is not doable without millions of available capital."

Remote Shield Officially Discontinued

NeoProtect reached a final conclusion:

"Remote Shield will not be restored in the foreseeable future."

The service generating the bulk of their revenue is now gone.

What Does This Mean for Customers?

If someone relied on Remote Shield to protect their servers or infrastructure, the implications were immediate:

RiskImpact
No BGP announcementTraffic cannot reach the servers
No mitigation tunnelAttack surface exposed
Forced migrationNo transition plan
Increased costsAlternatives (e.g., CosmicGuard) cost significantly more

NeoProtect plans to refund customers:

"Billing… will either be cancelled or reimbursed by us."

But that does not solve the migration problem.

What are the solutions to the Remote Shield Shutdown? 

find another DDoS mitigation provider immediately.

But here’s the problem:

The closest alternatives, Cloudflare Magic Transit, Path.net, CosmicGuard cost significantly more, often for similar traffic volumes.

For companies running game servers, infrastructure nodes, SaaS platforms, proxies, or critical latency-sensitive services, this meant:

  • Emergency migrations
  • Unexpected expenses
  • Service interruption risk

The tragedy isn’t just that Remote Shield went offline.

It’s that customers were fully dependent on it, without a backup plan or secondary mitigation provider.

What This Means for the Industry

NeoProtect’s shutdown didn’t just take down a product, it exposed a market weakness.

There is now a massive gap in the “affordable high-capacity remote DDoS protection” space.

Within hours of the incident, community channels lit up with messages from hosting providers, ISPs, and game server operators asking: “What’s the alternative to Remote Shield?”

There wasn’t a clear answer.

The industry suddenly realized that too many companies depend on a single DDoS network, and even more rely on upstreams without redundancy. Providers and small networks are now actively looking for:

  • Multihomed DDoS mitigation providers
  • Providers with Tier-1 diversity (not just resellers of one carrier)
  • Networks that don’t collapse when one upstream disconnects

This shutdown instantly shifted demand.

The industry is already moving. New providers, communities, and even investors are positioning themselves to fill the void that NeoProtect left behind.

The Lesson: IP Transit Is the Foundation of Resilience

This outage proves something fundamental: DDoS protection is worthless if your IP transit architecture is fragile.

A robust global network requires multiple upstream providers.

What IP Transit Should Look Like

StrategyBehavior During Attack
Single Transit ProviderTransit cuts BGP → Your network disappears
Multi-Transit (2–5 upstreams)Traffic reroutes to another upstream
Multi-Transit + PeeringAttack surface reduced, routing faster

Redundancy is not optional.

A resilient carrier-grade network requires:

  • Multiple IP transit providers
  • Diverse geographical Points of Presence (PoPs)
  • Proper BGP communities
  • Automated failover
  • Strategic peering (IXPs)

NeoProtect had software strength, but lacked infrastructure resilience.

Moving Forward: How to Avoid the Same Failure

If you operate a network, host servers, or run a SaaS platform, evaluate:

Do you control your routing, or does someone else?

Ask yourself:

  • Do you rely on a single upstream?
  • Can traffic reroute through another carrier?
  • Do you own your BGP announcements?
  • Do you have contracts that protect you during an attack?

Closing Thoughts

NeoProtect did not fail because the attack was too large. NeoProtect failed because their upstream transit provider could shut them down with one decision.

This outage exposed a painful truth:

Without control over IP transit and your infrastructure, your business is just renting reliability from someone else.

Shift helps networks avoid this kind of single‑upstream dependency by designing multi‑homed IP transit and infrastructure that stays online even when one provider does not. If you want to review your current setup, reach us at sales@shifthosting.com.

Recommended Blogs

How Much Internet Does a Startup Really Need?

How Much Internet Does a Startup Really Need?

If you build infra-heavy software, a SaaS platform, game backend, API product, or data pipeline, “the Internet” eventually stops being an abstract cloud thing and turns into a line item and a design problem. Early on, you just take whatever bandwidth your data center or cloud provider gives you. At some point, a graph, a bill, or a support ticket makes you wonder: how much Internet do we actually need and are we buying it the right way? This is a founder-friendly guide to thinking about commits

Carrier Hotel vs Edge DC: Where Should Your First Real PoP Live?

Carrier Hotel vs Edge DC: Where Should Your First Real PoP Live?

When a network is small, “data center” usually means “wherever had space and decent pricing when we signed the contract.” As you grow into a real ISP, WISP/FISP, or hosting provider, that choice stops being just about power and rent. It quietly decides which transit providers you can reach, which IXPs are within a cross‑connect, how clean your routes are and ultimately how your customers experience the Internet. The big strategic question for a first serious Point of Presence (PoP) is: do you a

IP Transit Red Flags: How to Spot Trouble Before It Becomes Your Problem

IP Transit Red Flags: How to Spot Trouble Before It Becomes Your Problem

On paper, IP transit looks simple: you pay someone to carry your traffic to the rest of the Internet. In reality, the difference between a solid transit provider and a bad one is the difference between “it just works” and “we’re chasing ghosts at 2 a.m.” Price per Mbps only tells a tiny part of the story; the rest hides in routing behavior, capacity planning, and how seriously your provider treats the health of their network. This guide walks through the biggest IP transit red flags to watch fo

IPv4 Is Exhausted. Here's What That Actually Means for Your Network.

IPv4 Is Exhausted. Here's What That Actually Means for Your Network.

The last large blocks of unallocated IPv4 addresses ran out at the regional registry level years ago. ARIN — the registry responsible for North America has been operating on a waiting list since 2015. If you're building or growing a network today and you need IP space, you can't just fill out a form and get a fresh /16 the way operators did in the early 2000s. The addresses are gone. That reality lands differently depending on where you are in your infrastructure journey. If you're a WISP that