Protected IP transit
Filtered ingress and clean delivery for operators, hosters, exposed services and performance-sensitive environments.
Filtered ingress, clean traffic delivery and handoff through cross-connect, GRE, IPIP, VXLAN or router VM, with BGP depending on the deployment model.
Cross-connect, GRE, IPIP, VXLAN, router VM and BGP announcements depending on the integration model.
The website should make the real scope obvious: protected IP transit, clean traffic delivery toward infrastructure already in production, specialized protection for selected use cases and integration options that make sense for network teams.
Filtered ingress and clean delivery for operators, hosters, exposed services and performance-sensitive environments.
Protect a server or an already deployed topology via tunnel, protected IPs or another suitable handoff without forcing a full migration on day one.
Use BGP when it adds real operational value, or choose a simpler delivery model when speed and straightforward integration matter most.
Reverse proxy game protection and dedicated policies when the application layer requires it, without diluting the main positioning of the site.
Where traffic enters, how it is filtered, how it is delivered back and what that means for day-to-day operations.
Depending on your topology, clean traffic can be delivered through protected IPs, GRE, IPIP, VXLAN, cross-connect or a router VM. The right choice depends mainly on the infrastructure already in place and the level of network control you need.
A practical way to start quickly with clean public exposure and lower early complexity.
A standard model for protecting an existing dedicated server without rebuilding the full architecture.
Best suited when your own prefixes and routing policies need to remain in place.
The objective remains to add protection without disrupting the customer’s daily operations.
Peeryx focuses on delivery models that are actually usable in production: protected IP transit, protection for existing infrastructure through tunnels or cross-connect, and realistic integration for already deployed environments.
Clear pricing for operators, hosting providers, exposed TCP/UDP services and latency-sensitive infrastructure.
Commit pricing
Commit pricing
Commit pricing
Commit pricing
BGP announcement included and free
No prefix announcement limit
Under-ASN support included
AS-SET parameter supported
Anti-DDoS firewall included
Behavioral AI-based protection included
5 post-filter firewall rules included
Additional rules available at low extra cost
Game Anti-DDoS filtering is available as a €190/month add-on for transit customers. It adds more specialized rules for gaming traffic while minimizing the risk of impacting legitimate sessions.
Up to 24 hours
Up to 72 hours
Activation in under 2 hours
Gaming offers are available when you need service-specific shielding, but the main focus of Peeryx remains protected transit for networks and critical services.
We publish clear articles on protected IP transit, mitigation strategy, asymmetric routing, clean traffic delivery and the criteria that actually matter before you buy.
A practical guide to link saturation, 95th percentile billing risk, blackholing, asymmetric routing, adaptive filtering and the importance of both Gbps and Mpps.
Read the articleAdaptive mitigation and clean delivery
A practical guide for protecting a production dedicated server hosted at OVH, Hetzner or another provider without migrating the whole stack, using GRE with or without BGP.
Read the articleProtection without full migration
Simple GRE tunnel, GRE + BGP or protected IP delivery: here is how to choose the right model depending on your architecture, routing control requirements and deployment speed.
Read the articleProtection without full migration
Yes. BGP is included by default on the transit offer, whether delivery is made through tunnel, cross-connect or router VM.
No. Prefix announcements are not artificially limited, and under-ASN operation with AS-SET support is available.
Yes. Peeryx can provide a router VM if you prefer to manage tunnels yourself and return traffic through iBGP or eBGP.
The offer includes Anti-DDoS mitigation, a post-filter firewall and behavioral AI-based analysis, plus five included firewall rules.
Share your environment, routing model and delivery constraints. We come back with a realistic deployment scenario and a quote.