Skip to content
BGP-native threat defense

Block threats
at the edge

Bring signals in from anywhere, apply a safety-first policy model, and distribute decisions to your network and downstream systems. Built for operators who need speed and control without the chaos.

No credit card required. Start small and expand safely.

Threat Nullification
RTBH / FlowSpec
System Sources
Enable/disable
Your Sources
Feeds + webhooks
Allow/Deny Lists
Policy control
File Exports
BIRD, JSON, RPZ
Audit + Alerts
Change visibility

Use Cases

Built for real incident workflows

Whether you are responding to an active attack or improving day-to-day hygiene, Spectops helps you turn inputs into controlled outputs with clear visibility.

DDoS Response

Publish blocking decisions fast, with guardrails that make rollback and auditing straightforward.

SOC Automation

Ingest signals from your tooling and push updates via API keys, webhooks, and exports.

Downstream Exports

Generate downloadable lists for firewalls, DNS tooling, and edge policies in the formats you need.

Per-Peer Policy

Control what is published to which peers, without maintaining separate pipelines per destination.

Safer Defaults

Whitelist-first rules and clear precedence help prevent “oops” outages during high-pressure events.

Visibility & Reporting

Understand what changed, what is active, and what is trending over time.

The Challenge

DDoS mitigation works best at the edge

Traditional firewalls and scrubbing centers react after traffic reaches your infrastructure. Threat nullification at the BGP edge drops malicious traffic before it touches your network.

Without Spectops

  • Traffic reaches your edge before you can react
  • Sources live in scripts or spreadsheets with no owner
  • Allow/deny lists drift across teams and routers
  • No unified view of what was applied and when
  • Exports are rebuilt manually for each downstream system
  • BGP changes are risky without guardrails or rollback

With Spectops

  • Centralized sources with clear ownership and status
  • Bring your own feeds and webhooks; enable system sources
  • Consistent allow/deny lists with tags and approvals
  • Nullification engine propagates changes automatically with audit logging
  • Exports generated on demand in the formats you need
  • Audit trail and alerts for changes and session health

Hybrid Model

Control inputs and outputs. We run enforcement.

Not everything is managed. You decide what comes in and how you consume it. Spectops operates the edge engine and keeps it safe.

What You Control

Your sources, policies, and outputs stay in your hands.

  • Enable/disable system sources at any time
  • Add your own feeds and webhook inputs
  • Manage allow/deny lists and tags
  • Choose export formats and destinations

What We Run

Threat nullification with safety built in.

  • BGP blackhole enforcement at the edge
  • Session health checks and safety limits
  • Deduplication and overlap detection
  • Real-time propagation with audit logging

Outputs & Integrations

Use the data where you already work.

  • File exports for BIRD, Juniper, Cisco, MikroTik, JSON, RPZ
  • Webhook events for automation
  • REST API for custom tooling
  • Alerts and audit history

Getting Started

From idea to enforcement quickly

Three steps from your first input to a controlled, auditable output. Start small, validate, then scale.

1

Connect Sources and Policies

Enable system sources, add your own feeds or webhooks, and set allow/deny lists. Every source has clear status and ownership.

2

Connect Your Edge

Create a BGP session to your router or route server and let Spectops handle safe propagation.

3

Operate and Export

Monitor changes, receive alerts, and download exports in the formats you need. Adjust sources and policies anytime.

Operations

Clarity for day-to-day operations

Know what changed, what is active, and who approved it. Stay ahead of incidents without chasing spreadsheets.

Session Health

Live state, prefix counts, and alerts for session issues.

Source Quality

Deduplication, overlap insights, and staleness tracking for every feed.

Export Transparency

See exactly what was published and when, with audit trails.

Automation Hooks

Webhook events for changes and alerts to integrate with your tooling.

Policy Guardrails

Allow/deny lists and safe defaults to prevent mistakes.

Change Visibility

Clear change history for sources, policies, and exports.

FAQ

Questions, answered

Short answers to the most common questions from operators and security teams.

Start protecting your edge

Create an account, connect your sources, and start suppressing malicious traffic in minutes. No credit card required.

Questions? Reach out at sales@localhost