How to use panel is the DDoS mitigation control panel that provides for you to manage your DDoS protected proxies.

Once you receive the login details and login in panel, click on Manage to start the configuration of your proxy server.
Below is an explanation of each module. 

1. Backend IP and port. On the backend IP module, you need to add the server we will be protecting and the specific ports. The port to port option, will forward traffic on your website from eg. to your backend_ip:8080

2. Manage SSL Certificates. First, add your domain here, then click on edit and add the Certificate + CA Certificate and the SSL Key each in its specific box then click on Update. If you do not have a SSL certificate contact us and we will generate one for free. This option will be added later on the panel.

3. Block User Agent. On this module, you can block any user agents that you do not need to access your service. You can check the user agent in logs in the "Search in proxy logs" or "Live Access logs" modules.
Example of user agent: Mozilla/5.0 (QtEmbedded; U; Linux; C) AppleWebKit/533.3 (KHTML, like Gecko) MAG200 stbapp ver: 4 rev: 1549 Mobile Safari/533.3

4. Block Referrer. On this module, you can block the domain that sends traffic to your website. Eg.,, and so on.

5. Allowed HTTP Methods. Are the methods to be accepted on your service.

6. Deny URLs. On this module, you can block any URL on your website that is or can be used for DDoS attacks. Eg. /client/assets/img/, this will not blacklist the IP that is loading this URL but only block this request.

7. MAC Spam Mod. When this module is enabled, it will check if one IP is using different mac addresses.

8. Deny HTTP Protocols. On this module, you can disable http1.0 or http2.0 if one of them is not needed.

9. GEO IP Blocking. On this module, you can block any countries that you wish to not access your service. If your website servers only the visitors of a specific country, its recommended to block the rest.

10. Activate in house WAF. This module will protect against SQL injections and other common HTTP attacks like Cross-site Scripting (XSS).

11. Web security challenge.  This feature will verify that an IP that accesses your service is a real visitor or a bot. You can enable Javascript Challenge or Click to Pass. Javascript Challenge will do a transparent redirect in order to fender off possible bots, and the Click to Pass option will add a new layer of security that requires your visitor to click on it in order to get the desired webpage.
On the URL Location exception box, you can add the URLs where the Web Security Challenge should not apply.

12. Most requests per IP. You can limit the requests per IP. For instance, an IP can request your page only 100 times per hour. If the number of requests goes above 100, the IP will be blacklisted.

12. Advanced Filters. On the advanced filters module, you can set a more complex way to block invalid requests. You can enter block time (the period the IP address remains blocked), How many requests - in the Matches box, and the interval of time these requests are counted - in Time to Match.
Eg below, will check and block more than 2 requests in 10 seconds interval for 3600 seconds. That load the URL: "GET /unmetered-vps.php HTTP"

14. Username connecting from multiple IPs. This module will show the username and from which IPs it is connecting. You can block the username or the IPs.

15. Search in proxy logs and Live access logs. You will be able to check out the proxy logs from

If you have any questions or need any help, feel free to always contact us.



  • 4 Users Found This Useful
Was this answer helpful?

Related Articles

How to install and use MTR on Windows and Mac OS X

Install and use MTR on Windows Download WinMTR (Windows) (Windows) Run WinMtr.exe...

How to get Real Visitors IPs on your backend

How to Get Real Visitor IPs in Web Server Access Logs In order to receive the real visitor IPs...

How to use the MTR command on Linux

How to use the MTR command on Linux   MTR (Matt’s traceroute) is a...

How to Install PowerDNS and Poweradmin on CentOS 7

Step 1 - Install EPEL and Remi Repositories First of all, we need to install dependencies for...

How to update Kernel on CentOS 7

How to Update CentOS Kernel Version The yum package manager allows kernel updates. However,...