Skip to main content

complete Network Security

The FREAKHOSTING Firewall Panel is a centralized, enterprise-grade dashboard designed to provide absolute control over your network security. By using industry-leading mitigation technology, we empower you to manage sophisticated filtering rules, analyze real-time attack telemetry, and automate your security posture via a strong API. Whether you are hosting a high-population game server or a critical web application, our firewall infrastructure ensures your services remain online and performant under the most intense network stress.

Difficulty

Beginner

Time

5 Minutes

Strategic Dashboard Navigation

The Firewall Panel is architected into specialized modules to streamline your security management.
  • IP Addresses: The primary hub for managing protection profiles and granular filtering rules for your assigned assets.
  • Attack Logs: A complete repository of historical and real-time DDoS event data, including peak bandwidth and packet-per-second (PPS) metrics.
  • API Management: Generate and restrict secure keys for programmatic integration with your own applications and monitoring tools.
  • Notifications: Configure real-time security alerts to be delivered via Discord, Slack, or Email.
  • Audit Logs: A complete historical record of all administrative actions performed within the panel, ensuring team accountability.

DDoS Protection Infrastructure

FREAKHOSTING integrates with two world-class DDoS mitigation providers to offer optimized protection based on your specific workload requirements.
Protection LayerIdeal WorkloadSpecialized Features
DataforestGame Servers & General AppsExtensive game-specific profile library and advanced layer 7 TCP/UDP filtering.
CosmicguardPerformance-Critical EnginesProprietary A2S caching for Valve titles and ultra-low latency stateful inspection.

Automated Provider Assignment

Your IP address is intelligently assigned to a specific protection layer based on your geographical region and service tier. You can identify your current provider within the IP Addresses management tab.

Management Capabilities

Deploy dozens of pre-configured profiles optimized for specific network protocols and game engines, such as Minecraft, Rust, FiveM, and standard Web (HTTP/HTTPS) traffic. These profiles contain expertly tuned rulesets designed to block malicious traffic while prioritizing legitimate user data.
For advanced administrators, we offer granular control over TCP, UDP, and ICMP traffic. You can establish custom allow/deny rules based on port ranges, payload size, and source geography to create a bespoke security perimeter.
Our RESTful API allows you to programmatically update filtering rules and retrieve network telemetry. This is ideal for developers who wish to build custom management dashboards or automated response systems.

Real-Time Monitoring

use the Attack Logs to identify patterns in malicious activity. By understanding the vectors used against your server, you can more effectively tune your protection profiles for maximum efficiency.

Need Extra Help?

If you encounter any issues, our support team is ready to assist:

Save on Your Hosting

Ready to get a new server? Use code KB20 at checkout for 20% off your first month!

Last Updated: January 2026 | Security: Absolute protection for your digital assets.