Ingress and public exposure
Prefixes can be announced through BGP or delivered through protected IPs depending on whether you keep your own blocks and routing logic or want a faster initial rollout.
Anti-DDoS mitigation built for real network environments: prefixes announced through BGP or protected IPs, adaptive filtering, then legitimate traffic handed back through cross-connect, GRE, IPIP, VXLAN or a router VM.
Cross-connect, GRE, IPIP, VXLAN, router VM and BGP announcements depending on the integration model.
Peeryx is not just an abstract protection layer. The service sits in the network path to absorb the attack, separate legitimate traffic, then deliver that clean traffic back through the model that best matches your topology and operating constraints.
Prefixes can be announced through BGP or delivered through protected IPs depending on whether you keep your own blocks and routing logic or want a faster initial rollout.
Continuous legitimate traffic analysis, targeted filters and upstream relief only when attack volume requires it, without arbitrarily slowing useful traffic.
Cross-connect, GRE, IPIP, VXLAN or a router VM depending on the integration model and the level of network control your team expects.
Dedicated servers, hosting networks, gaming services, APIs or critical platforms can be protected without forcing a full migration of what is already in production.
Where traffic enters, how it is filtered, how it gets delivered back and what operational constraints that creates in the real environment.
The same mitigation layer can be delivered in different ways depending on whether you keep your own prefixes, your routing logic, your existing dedicated server or your current hosting topology.
For prefixes announced through BGP with clean traffic handed back toward your edge or network.
Adaptive mitigation and clean delivery
Keep an OVH or Hetzner dedicated server, or another production setup, and get clean traffic back through a tunnel or another suitable handoff.
Protection without full migration
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
Peeryx is designed for network teams, hosters, gaming platforms and critical services that need a protection model they can actually operate: where traffic enters, how it is filtered, how it returns to production and what that means for routing.
Clear pricing for operators, hosting providers, exposed TCP/UDP services and latency-sensitive infrastructure.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
BGP announcement included and free
No prefix announcement limit
Under-ASN support included
AS-SET parameter supported
Anti-DDoS firewall included
Behavioral AI-based protection included
5 post-filter firewall rules included
Additional rules available at low extra cost
Game Anti-DDoS filtering is available as a €190/month add-on for transit customers. It adds more specialized rules for gaming traffic while minimizing the risk of impacting legitimate sessions.
Up to 24 hours
Up to 72 hours
Activation in under 2 hours
Reverse Proxy Game offers answer targeted application needs. The core of the site, however, remains protected transit, network mitigation and clean traffic delivery toward existing infrastructure.
Content written for technical buyers: delivery models, protection for infrastructure already in production, latency, asymmetric routing and the criteria that matter before you buy.
Link saturation, 95th percentile, blackholing, asymmetric routing and clean traffic delivery: the fundamentals before comparing providers.
Read the articleHow to keep an OVH or Hetzner server in production and get legitimate traffic back without rebuilding the whole infrastructure.
Read the articleThe strengths, limits and deployment cases of the main anti-DDoS delivery models depending on topology and network control.
Read the articleYes. BGP is included by default on the transit offer, whether delivery is made through tunnel, cross-connect or router VM.
No. Prefix announcements are not artificially limited, and under-ASN operation with AS-SET support is available.
Yes. Peeryx can provide a router VM if you prefer to manage tunnels yourself and return traffic through iBGP or eBGP.
The offer includes Anti-DDoS mitigation, a post-filter firewall and behavioral AI-based analysis, plus five included firewall rules.
Share your prefixes, links, routing model, current hoster and the way you want clean traffic delivered back. We reply with a credible deployment design and a quote.