Case Study with BitNinja's Sister Company
Eniko Toth

Case Study with BitNinja's Sister Company

When I joined the BitNinja team in 2016, I heard the story about how BitNinja was born. It is a sister company of one the leading Hungarian shared hosting businesses and firstly it was only an in-house project to eliminate the hackers and bots. I wanted to learn more about the story and about how BitNinja changed this company's life, so I asked their CTO then. We wrote the case study, however, it was only available for our resellers yet, but now I'd like to share it with you too:

The Company

Web-Server is a Hungarian web hosting company with more than 10 years of experience. Their main profiles are web hosting, websites, domain registration, and email service. Furthermore, they can offer solutions for special needs, for example, physical servers. They have more than 15.000 clients including Discovery Hungary, Vodafone, and Husqvarna, that’s why it is necessary for them to have a reliable server security system.


„Before we started using BitNinja, we got a lot of DDoS attack from our competitor websites and the protection against them was very hard for us. Now, thanks to BitNinja’s special modul, all the botnet request are being rejected.” - Daniel Mecsei

They also got lots of complaints when a vulnerable website got an attack.

„Our clients were usually angry, when their websites became a victim, but now the WAF rejects these illegitimate requests”  - Daniel Mecsei


„BitNinja offers a complete solution for us. It blocks the harmful attacks and puts the IP address to greylist at first, and after more attacks to the blacklist. These lists are centrally available and easy to access who, when and where started the attack.”  - Daniel Mecsei

Besides the listing Daniel Mecsei, the CTO of the Web-Server, highlighted the 2 topmost modules:

„It is very great, that BitNinja makes Honeypot sites, which are vulnerable, but there are no real data available, because BitNinja is in the background. If these sites get an attack, they put the attacker’s IP address also on their lists. We also like the Malware module very much, which cleans the infected files, which our clients want to upload their websites. If the Malware cannot clean it, than it won’t let it run”  - Daniel Mecsei


„BitNinja takes away all of our problems for what we spent 90% of our time before. In the past, our stability and availability were decreased, but BitNinja affected both of them very positively. 

Thanks to the weekly reports, finally we have statistics about how many attacks were blocked, from which IP addresses, from which country, which were the most commonly attacked sites etc.. It’s good to be aware which country attacks us and also we can inform the owners if their websites are being attacked on long-term.”  - Daniel Mecsei

Download this case study in PDF.

Are You Still Not Convinced?

Why don’t you try BitNinja for free? Register for the seven-day trial and enjoy the layered protection. Come and erase your security issues from your to-do list for good.

Sign up for a free trial

If you have any questions, please contact our team at We are always happy to help.

Share your ideas with us about this article

Previous posts

Satori IoT Botnet Stopped by BitNinja
Our Port Honeypot module proactively catches botnets very quickly, as botnets usually start to scan open ports, which is the first step of the attack cycle. We found an old IoT botnet that became active again. It strangely happened just 2 months after 21-year-old Kenneth Schuchman pleaded guilty to developing and deploying the Satori botnet. The Satori botnet The Satori malware family was discovered in December 2017 . It is a derivative of the famous Mirai botnet, however, the technique of leveraging default or weak passwords doesn’t seem as effective for hackers anymore. As users...
BitNinja Agent v2.6.4 Bug - Update
On 3 Dec 2019, we released a new agent version (2.6.4) to fix the cert update bug in the SSL Terminating module, but unfortunately, some dependencies caused serious issues (kernel panic, redirection problems) on some CentOS 6 and CentOS 7 servers. It affected only 2% of the BitNinja protected servers because it occurred only in the case of a special kernel version. The agent version was reverted and released as 2.6.6. We started a bulk update on the servers and we are in contact with the affected users.  Just to make sure that the right version of BitNinja is running on your server,...