TRAFFIC FILTERING

DDoS Protection

Layer-7 DDoS absorption and bot mitigation included with every plan. Our global edge network can absorb attacks up to 10 Tbps, keeping your site online even under sustained attack.

What we mean by DDoS

A DDoS (distributed denial-of-service) attack tries to overwhelm your site with so much traffic that legitimate visitors cannot get through. Some are crude floods of HTTP requests; others are sophisticated, targeting specific endpoints with patterns designed to consume database connections or CPU.

How we absorb attacks

  • Traffic hits our global edge before reaching your server
  • Behavioral fingerprinting separates real visitors from bots in milliseconds
  • Legitimate users are passed through with normal performance
  • Attack traffic is rate-limited, challenged, or blocked at the edge
  • You see normal request volume on your server — the flood never arrives

Always-on, not on-demand

We do not require you to flip a switch when an attack starts. Protection is always active, which means even short, sharp attacks that older systems would miss are handled automatically.

Bot mitigation, too

Not every bot is a DDoS — but scrapers, vulnerability scanners, and credential-stuffing bots can still hurt your site. We block known-bad user agents, behavioral fingerprints, and IP ranges associated with malicious activity.

10 Tbps
Edge capacity
< 50ms
Detection time
100%
Legitimate uptime
// THREATS BLOCKED

What we stop, every minute of every day

CRITICAL

SQL Injection

Crafted query strings that try to read or modify your database.

CRITICAL

Remote Code Execution

Exploits that try to run attacker code on your server.

HIGH

Brute-force

Bots cycling through password combinations on /wp-login.

HIGH

Cross-Site Scripting

Malicious JavaScript injected through forms or URLs.

HIGH

File Upload Exploits

Attempts to upload shells or backdoors disguised as media.

WATCH

Zero-day Exploits

Newly-disclosed vulnerabilities patched via virtual patches.

// PROTECTION LAYERS

Defense at every network layer

Layer 3-4Volumetric attacks (SYN floods, UDP floods, amplification) — absorbed at the network edge.
Layer 7HTTP/HTTPS request floods, slow loris, application-layer attacks — filtered before reaching your server.
BehavioralBot fingerprinting distinguishes humans from automated traffic in milliseconds, even for unseen patterns.
ReputationIPs and ASNs with recent malicious activity are pre-emptively blocked across the network.

Ready to get started?

Talk to our team and find the right protection for your site.