Controlled network exposure
BGP announcements for your prefixes or exposure through protected IPs depending on the level of control you want, rollout speed and the way your network already operates.
Peeryx protects prefixes, exposed services and latency-sensitive environments with a readable model: volumetric mitigation, BGP, protected IP transit and clean traffic delivery back to production.
Protected IP transit, clean traffic delivery and readable network integration for environments that are already live.
Marseille is the initial scrubbing center. Paris is part of the launch design for handoff and network integration. Frankfurt, Amsterdam and Madrid follow in the next expansion phases.
Peeryx sits between the Internet and your production as a specialized network layer. Depending on the scenario, your prefixes are announced toward the platform or your services are exposed through protected IPs, then legitimate traffic is returned through the delivery model that best fits your environment.
BGP announcements for your prefixes or exposure through protected IPs depending on the level of control you want, rollout speed and the way your network already operates.
Filtering is designed to preserve legitimate traffic, with continuous observation, targeted signatures and upstream relief only when attack volume truly requires it.
Cross-connect, GRE, IPIP, VXLAN or a router VM: Peeryx does not force a single model. The right handoff depends on your edge, hoster, target latency and operating style.
Dedicated servers, clusters, gaming platforms, APIs and critical services can stay where they are. The goal is to protect what already runs before considering wider changes.
How Peeryx receives traffic, how mitigation is applied, how clean traffic comes back and how much network control the customer keeps.
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
Each offer fits a concrete need: protecting live prefixes, keeping your own filtering logic or adding a specialised layer for selected public gaming services.
BGP, clean traffic, readable handoff and network integration for exposed prefixes or IPs.
Keep your own XDP, eBPF or routing logic behind a first volumetric protection layer.
Build your own filtering stack behind upstream protection.
For selected public gaming services that need a specialised layer.
Peeryx is designed for teams that want a service they can defend technically: keep your prefixes, use protected IP transit, add upstream filtering, deploy a router VM, a dedicated Anti-DDoS server or a gaming reverse proxy depending on the real scenario.
Readable pricing for teams comparing a real protected transit service with handoff models adapted to customer network constraints.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
Peeryx is not only about absorbing attacks. The offer is built to simplify BGP announcements, preserve network flexibility and keep filtering options that remain genuinely useful once clean traffic is delivered back.
Everything needed to announce your prefixes cleanly and integrate the service without friction on the routing side.
A serious mitigation baseline available from day one, without needing to assemble multiple separate layers first.
Rules and extensions that can grow with the environment without redesigning the whole delivery model.
Add a specialized filtering layer for services like Minecraft Java or FiveM while keeping the same network foundation and clean-traffic delivery model.
Up to 24 hours
Up to 72 hours
Activation in under 2 hours
Gaming reverse proxy offers extend the Peeryx core when an application needs more specific logic. The principle stays the same: serious network protection, controlled latency and clean traffic delivered back to the customer environment.
Content written for network teams, hosters, operators and exposed services: protected IP transit, tunnels, BGP, latency, clean handoff, multi-site designs and architecture choices before buying.
Link, PPS, CPU, upstream relief and clean handoff: the real framework behind credible 100Gbps mitigation.
Read the article
What Flowspec does well, what it should never do alone and how to fit it into a safe multi-layer strategy.
Read the article
In Anti-DDoS architecture, mitigation alone is not enough: legitimate traffic still has to be delivered back correctly. This guide explains why clean traffic handoff matters as much as scrubbing, how to choose the right delivery model and which mistakes break daily operations. It also helps compare clean traffic delivery, clean handoff, GRE, IPIP, VXLAN and cross-connect with an operator-grade architecture, operations and buying logic.
Read the article
Gaming needs Anti-DDoS protection built around sessions, latency, false positives and real protocol behaviour. This guide explains why generic filtering is not always enough and how to design a more serious gaming protection model. It also helps compare gaming Anti-DDoS, false positives, session stability and game-specific filtering with an operator-grade architecture, operations and buying logic.
Read the article
No. The core Peeryx offer is Protected IP Transit Anti-DDoS for operators, hosters, SaaS, APIs, critical services and exposed infrastructure. Gaming offers are specialized add-ons.
No. Peeryx can protect infrastructure already in production and return clean traffic through BGP, GRE, IPIP, VXLAN, cross-connect or a router VM depending on your design.
Yes. BGP announcement is included, under-ASN support is available and AS-SET can be supported when the integration scenario requires it.
Yes. Depending on the architecture, Peeryx can absorb, clean and hand traffic back to your infrastructure so that you keep part of the control or additional filtering internally.
Share your prefixes, ports, current hoster, routing model and the way you want clean traffic delivered back. We will come back with a realistic design that is readable for both operations and buying teams.