Operators and hosters
Peeryx adds a premium protection layer without forcing a single delivery model. The service integrates into real topologies with BGP and multiple handoff options.
Peeryx protects services that are already in production through a readable network model: exposure through BGP or protected IPs, adaptive mitigation, then legitimate traffic delivered back through cross-connect, GRE, IPIP, VXLAN or a router VM depending on your topology.
Protected IP transit, clean traffic delivery and readable network integration for environments that are already live.
Peeryx is built for operators, hosters, gaming platforms, SaaS and critical services that need a real network product: protect public exposure, keep BGP control and get legitimate traffic back cleanly without rebuilding the whole production environment.
Peeryx adds a premium protection layer without forcing a single delivery model. The service integrates into real topologies with BGP and multiple handoff options.
For latency-sensitive services, the goal is to absorb and filter the attack while keeping a return path aligned with sessions, egress and application constraints.
Peeryx is more usable than a simple blackhole or an opaque mitigation layer: the customer can understand where traffic enters, how it is filtered and how it returns to production.
The value of Peeryx is not a vague protection promise. It is a readable network model built around prefixes, mitigation, handoff, routing and service continuity.
Protected IP transit, clean traffic delivery and readable network integration for environments that are already live.
The right Peeryx scenario is not a blind replacement of your network. It is a protection layer that fits the existing environment, keeps production readable and preserves the right level of customer control.
Peeryx helps protect exposed customer workloads without forcing a full migration or a single connection model.
The service keeps a real network language: prefixes, handoff, BGP, target latency and clean traffic returned to the infrastructure that matters.
When latency, session stability and traffic-path clarity matter, Peeryx gives a more serious framework than a generic opaque scrubber.
Peeryx can act as the upstream anti-DDoS layer, then hand traffic back to your own XDP, DPDK or specialized proxy stack.
Peeryx can protect end to end or play the role of the upstream anti-DDoS layer before your internal network or application logic takes over.
Peeryx sits between the Internet and your production as a specialized network layer. Depending on the scenario, your prefixes are announced toward the platform or your services are exposed through protected IPs, then legitimate traffic is returned through the delivery model that best fits your environment.
BGP announcements for your prefixes or exposure through protected IPs depending on the level of control you want, rollout speed and the way your network already operates.
Filtering is designed to preserve legitimate traffic, with continuous observation, targeted signatures and upstream relief only when attack volume truly requires it.
Cross-connect, GRE, IPIP, VXLAN or a router VM: Peeryx does not force a single model. The right handoff depends on your edge, hoster, target latency and operating style.
Dedicated servers, clusters, gaming platforms, APIs and critical services can stay where they are. The goal is to protect what already runs before considering wider changes.
How Peeryx receives traffic, how mitigation is applied, how clean traffic comes back and how much network control the customer keeps.
The same mitigation layer can be delivered in different ways depending on whether you keep your own prefixes, your routing logic, your existing dedicated server or your current hosting topology.
For prefixes announced through BGP with clean traffic handed back toward your edge or network.
A readable model: protected ingress, mitigation, handoff decision and clean delivery aligned with your topology.
Keep an OVH or Hetzner dedicated server, or another production setup, and get clean traffic back through a tunnel or another suitable handoff.
Peeryx can clean traffic upstream and hand legitimate traffic back to a server that is already live.
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
Peeryx is for teams that want a service they can evaluate clearly: whether you keep your own prefixes, an existing dedicated server, your edge or asymmetric routing, the objective is to hand back clean traffic properly while preserving operations.
Readable pricing for teams comparing a real protected transit service with handoff models adapted to customer network constraints.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
Peeryx is not only about absorbing attacks. The offer is built to simplify BGP announcements, preserve network flexibility and keep filtering options that remain genuinely useful once clean traffic is delivered back.
Everything needed to announce your prefixes cleanly and integrate the service without friction on the routing side.
A serious mitigation baseline available from day one, without needing to assemble multiple separate layers first.
Rules and extensions that can grow with the environment without redesigning the whole delivery model.
Add a specialized filtering layer for services like Minecraft Java or FiveM while keeping the same network foundation and clean-traffic delivery model.
Up to 24 hours
Up to 72 hours
Activation in under 2 hours
Reverse Proxy Game offers extend the Peeryx core when an application needs more specific filtering. The foundation stays the same: network protection, serious mitigation and clean traffic delivery back to the customer environment.
Content written for technical buyers: delivery models, protection for infrastructure already in production, latency, asymmetric routing and the criteria that matter before you buy.
Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.
Read the articleWhat Flowspec does well, what it should never do alone and how to fit it into a safe multi-layer strategy.
Read the articleUpstream Anti-DDoS pre-filtering is not a magic layer. Used correctly, it removes obvious noise early, protects links and leaves the smarter layers enough room to keep working.
Read the articleA dedicated Anti-DDoS filtering server takes pressure away from production, allows finer logic and gives you better control over clean traffic delivery. It is not always mandatory, but it is often the best balance between cost and flexibility.
Read the articleMany websites talk about mitigation capacity and far fewer talk about clean traffic delivery. Yet a credible Anti-DDoS design does not stop at scrubbing: legitimate traffic still has to be delivered back to the right target properly.
Read the articleGaming does not only need volume absorption. It also needs player experience protection, low false-positive rates and handling of protocol behaviours that do not look like a normal web frontend.
Read the articleNo. The core Peeryx offer is Protected IP Transit Anti-DDoS for operators, hosters, SaaS, APIs, critical services and exposed infrastructure. Gaming offers are specialized add-ons.
No. Peeryx can protect infrastructure already in production and return clean traffic through BGP, GRE, IPIP, VXLAN, cross-connect or a router VM depending on your design.
Yes. BGP announcement is included, under-ASN support is available and AS-SET can be supported when the integration scenario requires it.
Yes. Depending on the architecture, Peeryx can absorb, clean and hand traffic back to your infrastructure so that you keep part of the control or additional filtering internally.
Share your prefixes, links, current hoster, routing model and the way you want clean traffic handed back. We will return with a credible deployment design and a quote.