Independent infrastructure project

Protected reverse proxy and DDoS mitigation for small online services.

LAN Company helps route, filter, and stabilize inbound traffic for customer infrastructure. The service focuses on reverse proxy protection, L3/L4/L7 filtering, real-time attack visibility, and operational simplicity for teams that need a cleaner edge in front of their origin.

Measured mitigation capacity up to 500 Gbps per customer 99.9% SLA for protected service availability Purchase and onboarding handled manually via Telegram @lan1337

Public brand: LAN Company. Legal operator: LAN Bulletproof Hosting Ltd. Service is offered as a protected reverse proxy and network protection service, not as conventional web hosting.

Traffic Control Panel
Inbound traffic 184.7 Gbps Peak on current event
Filtered requests 41.8M RPS Automatic rule response
Unique IP sources 276,412 Across current window
Tunnel status Healthy GRE / IPIP / WireGuard
Attack timeline Packets, requests, geo distribution, event logs
Protected Reverse Proxy L3 / L4 / L7 Filtering Anycast Mitigation Network WAF & Managed Firewall Traffic Monitoring Manual onboarding
Service scope

What the service does

LAN Company is positioned as a network protection layer placed between the public internet and the customer origin. It does not provide VPS, dedicated servers, colocation, ASN leasing, or conventional website hosting.

Protected reverse proxy

Inbound traffic is routed through filtering nodes before it reaches the customer origin.

  • Origin isolation
  • Configurable reverse proxy rules
  • Faster operational response to attack traffic

DDoS mitigation

Filtering covers volumetric and application-layer attack patterns with automatic and managed controls.

  • UDP, SYN, ICMP and amplification patterns
  • HTTP/HTTPS floods and malformed traffic
  • Mixed and multi-vector events

Visibility and control

Customers receive a dashboard with attack telemetry, logs, tunnel status, and filtering controls.

  • Traffic rate graphs
  • Blocked IP and geo statistics
  • WAF and tunnel management

Available modules

Reverse Proxy Anycast DDoS Mitigation WAF Managed Firewall GRE Tunnel IPIP Tunnel WireGuard Tunnel Real-time Analytics

Not offered

  • VPS / VDS
  • Dedicated servers
  • Colocation
  • Standalone ASN
  • Traditional shared website hosting
Dashboard

Attack visibility that remains readable on desktop and mobile.

Each customer receives access to a personal web dashboard with recent events, current mitigation status, tunnel health, traffic charts, attack composition, and filtering controls.

  • Current attack volume and cleaned traffic figures
  • Bits per second, packets per second, and requests per second
  • Blocked IP counts, unique source counts, and country breakdowns
  • Recent event logs and configuration change history
  • Management of WAF rules and tunnel parameters
Mitigation summary Last 15 minutes
Active
Clean traffic 7.2 Gbps
Dropped packets 3.7B
Rule matches 129k
Top vectorHTTPS Flood
Top countryDE
TunnelWireGuard
Origin statusReachable
Network and operations

Capacity claims are stated conservatively.

Public claims are limited to what the operator is prepared to stand behind: measured mitigation capacity up to 500 Gbps per customer, automatic mitigation start within seconds, and a 99.9% uptime SLA for the protected service layer.

Infrastructure model

  • Global anycast filtering for incoming traffic distribution
  • Separate control plane and dashboard systems in Europe
  • Customer origin stays under customer control
  • Exact node locations are not published for operational security

Capacity note

  • Up to 500 Gbps mitigation per customer in normal conditions
  • No public promise of aggregate terabit capacity
  • Performance depends on vector, route, and geography
  • No guarantee against every possible attack profile
1. Routing

Customer traffic reaches filtering nodes through the network edge.

2. Filtering

Volumetric and application-layer anomalies are evaluated and mitigated.

3. Forwarding

Clean traffic is delivered to the configured origin through proxying or tunnel transport.

4. Visibility

Customers inspect logs, rates, source distribution, and rule activity in the dashboard.

FAQ

Operational basics

How do purchases work?

Purchases and onboarding are handled manually through Telegram at @lan1337. Pricing, deployment details, and configuration requirements are discussed there.

Which payment methods are accepted?

Payment is accepted only in cryptocurrency, with pricing denominated in USD equivalent. No bank cards, PayPal, or recurring automated billing are used.

Do you provide hosting or servers?

No. The service is a protected reverse proxy and network protection layer in front of infrastructure that remains under customer control.

Is there a trial period?

No public trial period is offered. Customers can review setup information and service scope before purchase.

Is the service available worldwide?

The service is offered worldwide except in sanctioned or restricted jurisdictions and other regions the operator declines to serve.

Start manually

Need onboarding, rates, or configuration details?

Purchase, activation, and deployment discussion take place via Telegram. Legal, privacy, and abuse contacts are available separately by email.

Purchase via Telegram