What are IP stressers/booters?
IP stressers or booters are services that can be used with no technical expertise and for little money to carry out overload attacks on websites, web applications, APIs, and IT infrastructure.
Reading Time: .

01
A definition of IP stresser/booter
IP stresser or booter services enable overload attacks on websites, servers, or networks. They can be rented as a service for a modest fee from dubious providers, dozens of which abound on the internet and can be found via a simple web search. Their clientele consists primarily of criminals with no technical knowledge who want to take down websites or web applications with a few clicks via distributed denial of service (DDoS) attacks, for example, to blackmail the operators or distract them from other attacks.



02
How does an IP stresser/booter work?
IP stresser or booter services often offer a variety of different attack vectors to put together attacks using a modular principle. They usually offer a subscription model: Depending on the type of subscription, criminals can launch single attacks, a limited number of attacks, or an unlimited number of attacks lasting a few seconds to several hours. Prices range from a low double-digit amount to several hundred euros – depending on the duration and number of simultaneous attacks carried out. Payment is made anonymously in the form of cryptocurrencies such as Bitcoin.
Providers of DDoS-for-hire services are adopting an increasingly professional approach. Services range from an intuitive user interface to customer support and video tutorials. With just a few clicks in the web interface, criminal customers can select the desired type of attack, specify their target’s IP address, and launch the attack using the booter service’s attack infrastructure. A mass of automated requests or data packets deliberately overloads the system and network resources of websites, web applications, APIs, or IT infrastructure, rendering them completely unavailable or only available to a limited extent for legitimate users.
In the past, operators of web-based IP stresser or booter services rented a handful of servers from hosting providers, which they concealed behind proxies and used for targeted DDoS attacks on behalf of their clientele. Their firepower was thus limited by the number and performance of the servers used. DDoS-for-hire service providers now primarily offer easy access to self-operated or rented botnets, which have a significantly higher potential for damage. Such botnets can consist of hundreds of thousands of compromised computers and IoT devices that are remotely exploited for illicit activities such as DDoS attacks.

03
Are IP stressers/booters legal?
Most DDoS-for-hire service providers lend themselves a legal veneer by advertising their services as a stress test tool for website operators. This is also where the term “IP stresser” comes from. But by not requiring proof of identity when used and offering anonymous payment options, the providers open the floodgates to the illegal use of their services while also making law enforcement more difficult. As a general rule, stress tests performed on a company’s own IT infrastructure are perfectly legal. However, the unauthorized use of IP stresser or booter services against third-party targets is against the law in most countries. In Germany, this is considered computer sabotage under Section 303b of the German Criminal Code (StGB) and is subject to criminal prosecution. According to Europol, anyone who carries out a DDoS attack or develops, offers, or uses DDoS-for-hire services faces prison sentences and/or fines.
04
Known examples of IP stressers/booters
As previously mentioned, prosecuting users and operators of illegal IP stresser or booter services remains difficult. Nevertheless, investigators have repeatedly been successful in shutting down DDoS-for-hire services in the past few years:
vDoS
Webstresser.org
Quantum Stresser
05
What risks are posed by IP stresser and booter services?
DDoS-for-hire tools such as IP stressers and booters make it increasingly easy for even less technically savvy criminals to carry out effective overload attacks. As the BSI pointed out in 2019 in its situation report on IT security in Germany, a veritable “service industry for Cybercrime-as-a-Service” had arisen in the previous few years. Easier access to botnets via booter services and the increasing professionalization of illegal services are key factors in the continuing rise of the number of DDoS attacks.
IP stressers and booters enable attacks on the network layer (Layer 3/4) as well as on the application layer (Layer 7). Criminals are also increasingly combining several types of attacks into multi-vector attacks that target different network layers concurrently. The intention behind DDoS attacks is usually to blackmail the intended targets or to prepare, carry out, or cover up other criminal activities – the theft or manipulation of data, for example.


06
How can DDoS attacks be fended off?
DDoS attacks carried out by means of IP stresser or booter services pose a serious threat to companies in particular. To avoid financial damage and loss of reputation due to attack-related disruptions or outages, companies should take preventive measures to secure their web resources and IT infrastructure with dedicated DDoS protection for Layers 3, 4, and 7. Appropriate protection solutions can, for instance, be purchased as a managed service. They offer dynamic attack detection and filter out harmful traffic from the incoming data stream even before it reaches the company servers. As a service for companies and operators of larger websites, the BSI provides an overview of qualified DDoS mitigation service providers.




07
What you need to know about IP stressers/booters
IP stressers or booters are DDoS-for-hire services that can even be used by people with no technical expertise and in just a few clicks to carry out overload attacks on websites, web applications, APIs, and IT infrastructure. In return, the illegal services usually only charge a few euros in cryptocurrency for a subscription package. The increasing spread and professionalization of such Cybercrime-as-a-Service offerings are leading to a steady rise in DDoS attacks, which pose huge potential for damage. That is why companies should take preventive measures to protect themselves against them, with dedicated DDoS protection, for example.
If you are interested in futher informations, we are willing to send you our product sheet for free
How Myra DDoS Protection can reliably secure your website or web application against all DDoS attack vectors:
- How is the protection activated in case of attack?
- What are the advantages of Myra protection solution?
- What are the features of Myra DDoS Protection for web applications?