Locations

Edge protection
near your players.

Vyrant currently operates in Singapore and India. Incoming traffic is inspected at the edge so valid game traffic can pass and malicious traffic can be dropped early.

Singapore

SGP-1
  • Primary SEA routing
  • Low-jitter links
  • Always-on filtering

India

IN-1
  • Regional latency focus
  • Redundant upstream paths
  • Always-on filtering

Traffic shield model

Green packets represent valid traffic that matches expected protocol behavior. Red packets represent malformed, spoofed, or flood traffic blocked before it reaches your container.

Allowed traffic: passed to game node
Blocked traffic: dropped at edge

1. XDP first-pass filtering

eBPF programs attached with XDP run before most of the Linux network stack. This allows fast drops of obvious garbage traffic with minimal CPU overhead.

2. TCP state validation

State-aware rules track valid handshake flow (SYN → SYN/ACK → ACK). Packets that do not match expected state are rate-limited or dropped.

3. Adaptive mitigation

During attack spikes, policy thresholds adapt and noisy sources are isolated quickly. No provider can guarantee mitigation of every possible attack, but this pipeline reduces impact significantly.