Protecting your websites 24/7
Every IP address that’s connected to our IP network is protected by our cloud firewall. It blocks malicious traffic from reaching your websites. You will have access to it using our dashboard. You can use our bot detector to block bad bots, create rules based on custom user agent patterns, IP addresses, or IP ranges.
The cloud firewall works like the firewall in your datacenter or home computer. It analyses network traffic and decides if it lets the traffic through or not. It can detect when the network is being attacked and will block offenders or slows traffic down. Every datacenter location that we have has its own firewall system set up, so if one IP node/datacenter is affected, it won’t affect other datacenters.
You will have full access to our cloud firewall, and you will be able to apply different rules to individual domains or all of your domains in all of your networks. You will be able to create black or whitelists for IP addresses or IP ranges. For example, if you don’t want Ahrefs crawlers visiting your sites, you can block all of their IP ranges instead of individual IP addresses.
Besides the cloud firewall, your websites are protected by our WAF, as well. Every day we block hundreds of thousands of malicious requests related to hacks, SQL injection, and more. This feature will ensure that your websites are as safe as possible. Our WAF monitors our IP network in real-time to automatically react to potential threats.
The WAF or web application firewall is a particular type of firewall which works on the 7th layer in the network stack while the cloud firewall works on the 3rd level. The WAF will allow you to block specific HTTP requests based on rules. For example:
if the query string contains eval then block the request. Our engineers are adding new rules daily to make sure your websites are protected from the latest threats.
The WAF will scan every single HTTP request that your website gets, and based on rules, it will react when a potential threat is found. Below you can find a list of threats the WAF can block: