How the Service WorksProtect your TCP/UDP services from DDoS attacks by choosing a tunneling or proxying setup.
OrderReview, select, and connect a DDoS protection plan for your TCP/UDP service.
ActivationActivate protection by running the setup script and configuring your firewall rules.
ProtectionConfigure geolocation filters, manage whitelists and blacklists, and control network access.
SettingsChoose and configure your preferred tunneling method for secure traffic routing.
Blocked IPsMonitor blocked IPs, manage your blocklist, and add new restrictions.
AnalyticsAccess your analytics dashboard to monitor real-time data and apply filters.
Attack HistoryReview attack history, analyze details, and export reports.
InformationReview key details and status for all your protected objects.















