After activation, the service will be available in your dashboard — on the main page and in the My Services section.


To access the settings or view details, select the service from the list on the left or from the central block of the interface.

If there is only one protected object, its settings will open immediately in the left control panel.
If there are several objects, click the row of the desired object in the Objects section of the table.

This will open a menu on the left side of the page for managing the selected object.
In the menu that appears, select Protection.

A configuration area will open with the following fields:
- Geolocation Filter – restricts access to your resource based on the user’s country.
- Whitelist Rules – requests from the specified addresses will bypass filtering.
- Blacklist Rules – users with addresses from this list will be blocked from sending requests to your resource.
After you create the rules, they will appear in the Filtering Rules area.

Click the Add Rule button to create a restriction on the use of your resource.
How to Configure the GEO Filter
To set up geoblocking, fill out the form:
- Prefix – specifies which part of your network the rule will apply to.
- Description (optional).
- Countries – select the countries from the dropdown list.
Using the Allow and Deny toggles, you can configure either an allowlist or a blocklist.

How to Configure Blacklists and Whitelists
To configure the rules that place users into blacklists or whitelists, fill out the form:
- Destination Subnet – where the traffic is directed, i.e., the protected resource (your server, service, domain, etc.).
- Description (optional).
- Source IPs – who is accessing the resource, i.e., the client addresses you want to allow or block.
When adding IP addresses, enter each one on a new line. You can also upload them from a “.txt” file by clicking Choose File.
To apply the rule, set the Activate toggle to the ON position.

If you want to allow access to the server 203.0.113.10 from your corporate network 10.0.0.0/16 without filtering, the whitelist configuration will be as follows:
- Destination Subnet: 203.0.113.10/32
- Source IPs: 10.0.0.0/16
Attack Detector Management
In the IPs Switched to Protection section, you can manage the list of prefixes — either remove them from filtering or put them under protection.

To remove a single subnet from filtering, click the delete button in the Action column and confirm the removal in the dialog window.
To remove multiple prefixes from filtering, select them by checking the boxes in the first column of the table. Then click Remove Manual Protection (this button appears once one or more prefixes are selected).

The Force Protection for All button puts all prefixes under filtering, while the Stop Enforcement button cancels this action. Manually configured rules will remain in effect. Prefixes that will be removed from filtering when you click this button are marked with red icons on the right side of the table.
To add prefixes to the table, click the + Add Manual Protection button. In the field that opens, enter the required prefixes, one per line, and save the changes.

In the Automatic Detection Rules section, you can review both general and custom attack detection rules.

To make changes to the rules, please contact our technical support team.