Cloudflare and world class investment firms invest $100 Million to deliver powerful tools for the Internet.
Improve your site with free and paid apps:
Cloudflare Developer Fund
Cloudflare and world class investment firms invest $100 Million to deliver powerful tools for the Internet. The Cloudflare Developer Fund is looking for companies that are building apps on Cloudflare’s platform.
Rate Limiting protects against denial-of-service attacks, brute-force login attempts, and other types of abusive behavior targeting the application layer.
Cloudflare’s 10 Tbps global anycast network is 10X bigger than the largest DDoS attack ever recorded, allowing all internet assets on Cloudflare’s network to withstand even massive DDoS attacks.
Rate Limiting provides the ability to configure thresholds, define responses, and gain valuable insights into specific URLs of websites, applications, or API endpoints. It adds granular HTTP/HTTPS traffic control to complement Cloudflare’s DDoS protection and Web Application Firewall (WAF) solutions. Cloudflare charges based on “good” requests i.e requests that match a rule you have created and are allowed to origin servers. This also reduces bandwidth costs by eliminating unpredictable traffic spikes or attacks.
Start Rate Limiting malicious traffic for free today.
Already a Cloudflare customer? Activate Rate Limiting
Layer 7 DDoS Mitigation
High precision distributed denial-of-service protection through granular configuration options.
API Protection
Set API usage limits to ensure availability and protect against abuse.
Brute Force Protection
Protect sensitive customer information against brute force login attacks.
Cost Savings
Avoid unpredictable costs associated with traffic spikes or attacks on auto-scaling resources by only allowing good traffic through.
This example demonstrates the ability to limit the number of login attempts. Visitors get 2 login attempts per minute. If they exceed this threshold, the will be denied the ability to login for 5 minutes.
Brute Force Login Protection
This example demonstrates the ability to limit the number of login attempts. Visitors get 2 login attempts per minute. If they exceed this threshold, the will be denied the ability to login for 5 minutes.
Login
Sophisticated DDoS attacks are difficult to mitigate because they come from a large number of unique IP addresses and mimic legitimate traffic. The demo below uses Rate Limiting to allow up to 2 requests per minute before blocking a potential DDoS attack.
Configure Thresholds
Protect your website URLs or API endpoints from suspicious requests that exceed defined thresholds. Granular configuration options including request limits, requests methods, and more.
Define Responses
Website and API visitors hitting defined request thresholds can trigger custom responses, such as mitigating actions (challenges or CAPTCHAS), response codes (Error 401 - Unauthorized), timeouts, and blocking.
Analytical Insight
Gain deep insights into traffic patterns to help scale and protect your resources. See how much malicious traffic is blocked by rule, how many requests make it to your origin, and more.
Cloudflare Rate Limiting can be activated for free. Self-serve plans include 10,000 free requests per month and Enterprise plans allow for unlimited rate limiting. We only charge for good traffic passing through the rate limited endpoints of your website or API. Good traffic means requests that do not exceed your rate limited thresholds.
Already a Cloudflare customer? Activate Rate Limiting
Cloudflare speeds up and protects millions of websites, APIs, SaaS services, and other properties connected to the Internet. Our Anycast technology enables our benefits to scale with every server we add to our growing footprint of data centers.
Cloudflare is dedicated to enabling the best possible performance for our customers. Our global network speeds up and streamlines connections from visitors to their online destinations in a number of key ways:
As applications move to the cloud, their security needs to move with them. Cloudflare’s security services operate at the edge of the network, making it possible to identify and mitigate threats faster than on-premise solutions.