Most of the traffic that goes through both a regular ISP and a virtual ISP is encrypted with an SSL tunnel so its content is not visible to the ISP. Due to this the methods to secure the network and prevent illegal activities available to ISPs are limited and are mostly targeted at large scale DDoS prevention and domain blacklists. However at Bright Data we do a lot more:

ElementBright Data Virtual ISPRegular ISP
Requires registrationYesYes
Requires payment methodYesYes
Methods and procedures for reporting abuseYesYes
Online DDoS detectionYesYes
Full block of the most popular DDoS methods (*2)YesNo
KYC procedure per customerYesNo
Compliance alert if customer starts targeting domains not reported during KYCYesNo
Deploy active blocks for Ad frauds, fake reviews, fake likes, fake account creations, spamming, etcYes(*1)No
Block service level abuse or attack with non web traffic (*3)YesNo
  • *1 - Applied to 30% of the traffic and planned to reach >90% by end of 2022

  • *2 - Methods that were used in the top 90% of DDoS attacks of 2021: UDP fragmentation, DNS reflection, UDP volumetric, LDAP reflection, DNS query, NTP reflection, ICMP (volumetric),

  • *3 - Non web traffic is any traffic that is not HTTP protocol or targeting ports different from the standard HTTP ports of 80/443.

Bottom line, Bright Data virtual ISP network is much safer and less likely to be used for attacks and abuse than a regular ISP.

Bright Data does not allow using its products and systems to render any network resource unavailable to its intended users, including, without limitation, via “Denial-of-Service (DoS)” or “Distributed Denial-of-Service (DDoS)” attack