Cutting edge security features

Admin protection

Block external access to exposed admin pages. This may be useful if you are running third-party software or would like to reduce the risk of a malicious actor gaining administrative access to your application.

Anonymous IP list

Block requests from services that allow obfuscation of viewer identity. This can include request originating from VPN, proxies, Tor nodes, and hosting providers. This is useful if you want to filter out viewers that may be trying to hide their identity from your application.

Linux operating system

Block request patterns associated with exploitation of vulnerabilities specific to Linux, including LFI attacks. This can help prevent attacks that expose file contents or execute code for which the attacker should not have had access.

Core rule set

Contains rules that are generally applicable to web applications. This provides protection against exploitation of a wide range of vulnerabilities, including those described in OWASP publications.

Known bad inputs

Block request patterns that are known to be invalid and are associated with exploitation or discovery of vulnerabilities. This can help reduce the risk of a malicious actor discovering a vulnerable application.

SQL database

Block request patterns associated with exploitation of SQL databases, like SQL injection attacks. This can help prevent remote injection of unauthorized queries.

What is AWS Shield?

AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS.

We use AWS Shield Advanced, which provides additional detection and mitigation against large and sophisticated DDoS attacks, near real-time visibility into attacks, and integration with AWS WAF, a web application firewall.

KYC Compliance

The process of verifying the identity of your customers, either before or during the time that they start doing business with you. We verify ID Documentation, Email Address and Phone Number after a user has earned any bonuses.

Verify User Photo and ID Documentation
Verify Email
Verify Phone

Prevent Credit Card Fraud

We identify high-risk activity in e-commerce payments, platform user activity, incentivized traffic, and more.