Transit filtering first
Large-volume events should be handled upstream before they reach the game node itself.
Layered anti-DDoS
The goal is continuity: keep game traffic flowing, keep the panel reachable, and keep the buying promise grounded in how mitigation actually behaves when something noisy happens upstream.
Large-volume events should be handled upstream before they reach the game node itself.
Lower-level packet handling helps cut down obvious bad traffic before it wastes more expensive resources.
Good traffic and bad traffic are not always separated by simple rate limits. Game-aware rules are part of the story.
Traffic path
This visual keeps the sequence concrete: traffic enters from the internet, high-volume abuse gets cut upstream, 0lag.host filtering software applies deeper rules, and only the cleaned flow reaches the game service.
Internet
Ingress mixUpstream
Transit scrub0lag.host
Deep inspectionCustomer
Clean deliveryInternet
Players and hostile packets enter together before any filtering decision exists.
Upstream prefiltering
The upstream layer absorbs large noisy floods first, with 17 Tbps+ of filtering capacity before traffic reaches the local stack.
0lag.host filtering software
XDP and protocol-aware logic handle leaks, bypasses, and more sophisticated attacks that make it past upstream filtering, with local filtering tuned for up to 20 Gbps and 29.6 Mpps.
Customer
The buyer sees the outcome that matters: reachable game traffic, usable tooling, and less collateral damage.
| Layer | Primary role | What the buyer should care about |
|---|---|---|
| Upstream filtering | Absorb obvious high-volume abuse before it reaches the node, with 17 Tbps+ of upstream filtering capacity. | Better continuity during broader events and far less wasted local capacity. |
| XDP controls | Drop or shape leak traffic, bypasses, and other attacks that survive transit, up to 20 Gbps and 29.6 Mpps locally. | More protection against the noisier and more sophisticated traffic that should not consume full stack resources. |
| Protocol-aware rules | Differentiate legitimate game traffic from abuse patterns more accurately. | Cleaner survivability for game traffic and fewer blunt-force false positives. |
| Operational response | Keep visibility public and the support story grounded. | Status updates and realistic language instead of empty “100% protected” promises. |
Yes. Protection is part of the platform rather than a paid extra hidden behind higher tiers.
Traffic is not treated as a single on-off switch. The position described on the site combines upstream filtering with local controls such as XDP and protocol-aware rules.
Because most buyers want to know whether the service stays reachable, whether the panel stays usable, and whether support avoids hand-wavy promises. The page is written around those outcomes.
Yes. The public status page is linked from the main navigation and footer.
Secure checkout
Orders are completed in the secure client portal operated by IllusionCloud FZ-LLC. The portal opens in a new tab so you can return to this page while you compare plans.
The portal is part of the same operating company and will open in a new tab.