Block threats
at the edge
Bring signals in from anywhere, apply a safety-first policy model, and distribute decisions to your network and downstream systems. Built for operators who need speed and control without the chaos.
No credit card required. Start small and expand safely.
Use Cases
Built for real incident workflows
Whether you are responding to an active attack or improving day-to-day hygiene, Spectops helps you turn inputs into controlled outputs with clear visibility.
DDoS Response
Publish blocking decisions fast, with guardrails that make rollback and auditing straightforward.
SOC Automation
Ingest signals from your tooling and push updates via API keys, webhooks, and exports.
Downstream Exports
Generate downloadable lists for firewalls, DNS tooling, and edge policies in the formats you need.
Per-Peer Policy
Control what is published to which peers, without maintaining separate pipelines per destination.
Safer Defaults
Whitelist-first rules and clear precedence help prevent “oops” outages during high-pressure events.
Visibility & Reporting
Understand what changed, what is active, and what is trending over time.
Product
Designed for operators
Everything is built around the real operational loop: ingest signals, apply policy, distribute outputs, and keep an audit trail.
Policy Model
Whitelist/blacklist precedence and safety-first controls that match real incident response.
API Reference
Interactive API docs (login required).
Exports & Integrations
Use export lists, webhooks, and APIs to connect to the tooling you already run.
Security & Access
Account security, authentication, and operational best practices.
The Challenge
DDoS mitigation works best at the edge
Traditional firewalls and scrubbing centers react after traffic reaches your infrastructure. Threat nullification at the BGP edge drops malicious traffic before it touches your network.
Without Spectops
- Traffic reaches your edge before you can react
- Sources live in scripts or spreadsheets with no owner
- Allow/deny lists drift across teams and routers
- No unified view of what was applied and when
- Exports are rebuilt manually for each downstream system
- BGP changes are risky without guardrails or rollback
With Spectops
- Centralized sources with clear ownership and status
- Bring your own feeds and webhooks; enable system sources
- Consistent allow/deny lists with tags and approvals
- Nullification engine propagates changes automatically with audit logging
- Exports generated on demand in the formats you need
- Audit trail and alerts for changes and session health
Hybrid Model
Control inputs and outputs. We run enforcement.
Not everything is managed. You decide what comes in and how you consume it. Spectops operates the edge engine and keeps it safe.
What You Control
Your sources, policies, and outputs stay in your hands.
- Enable/disable system sources at any time
- Add your own feeds and webhook inputs
- Manage allow/deny lists and tags
- Choose export formats and destinations
What We Run
Threat nullification with safety built in.
- BGP blackhole enforcement at the edge
- Session health checks and safety limits
- Deduplication and overlap detection
- Real-time propagation with audit logging
Outputs & Integrations
Use the data where you already work.
- File exports for BIRD, Juniper, Cisco, MikroTik, JSON, RPZ
- Webhook events for automation
- REST API for custom tooling
- Alerts and audit history
Getting Started
From idea to enforcement quickly
Three steps from your first input to a controlled, auditable output. Start small, validate, then scale.
Connect Sources and Policies
Enable system sources, add your own feeds or webhooks, and set allow/deny lists. Every source has clear status and ownership.
Connect Your Edge
Create a BGP session to your router or route server and let Spectops handle safe propagation.
Operate and Export
Monitor changes, receive alerts, and download exports in the formats you need. Adjust sources and policies anytime.
Operations
Clarity for day-to-day operations
Know what changed, what is active, and who approved it. Stay ahead of incidents without chasing spreadsheets.
Session Health
Live state, prefix counts, and alerts for session issues.
Source Quality
Deduplication, overlap insights, and staleness tracking for every feed.
Export Transparency
See exactly what was published and when, with audit trails.
Automation Hooks
Webhook events for changes and alerts to integrate with your tooling.
Policy Guardrails
Allow/deny lists and safe defaults to prevent mistakes.
Change Visibility
Clear change history for sources, policies, and exports.
FAQ
Questions, answered
Short answers to the most common questions from operators and security teams.
Start protecting your edge
Create an account, connect your sources, and start suppressing malicious traffic in minutes. No credit card required.
Questions? Reach out at sales@localhost