Lectron protects your server from DDoS attacks
then supercharges it to improve your user experience
Rising startups that build 2D Metaverse, 3D Metaverse, virtual reality, augmented reality experiences are protected under Lectron
Lectron FiveM avast DDoS protection for FiveM game servers features some of the most popular FiveM servers in the world
Lectron effective TCP shield DDoS protection features some notable customers. Some of the most popular Minecraft Java servers in the world use our service
A few upcoming Minecraft Bedrock servers in the world use our service to protect from malicious UDP flood attacks
Lectron Proxy protects HTTP and HTTPS traffic on any port, as well as provide free SSL certificate on all ports from 0 to 65535
Lectron Tunnel enables layer 7 packet validation for TeamSpeak 3 connections
Lectron Tunnel enables layer 7 packet validation for OpenVPN UDP traffic
Lectron Tunnel enables layer 7 proxy for Source Engine queries. Can be enabled together with RakNet or HL2/Source filter.
Lectron Tunnel enables layer 7 packet validation for RakNet game packets. Can be enabled together with the Source Engine Query filter.
Lectron Tunnel enables full packet validation for incoming TCP connections. Requires that the return traffic is routed through Path.
Lectron Tunnel enables packet validation for Half Life 2/Source UDP traffic.
Lectron Tunnel enables layer 7 packet validation for HLDS UDP traffic
Lectron Tunnel enables layer 7 packet validation for GoldSrc UDP traffic
Lectron Tunnel enables layer 7 packet validation for DNS queries over UDP
Lectron Tunnel enables layer 7 packet validation for WireGuard VPN servers.
Lectron Tunnel enables layer 7 packet validation for ARMA 3 game servers. DayZ is currently unsupported.
Lectron Tunnel enables layer 7 packet validation for STUN servers
Lectron Tunnel enables layer 7 proxying for SA-MP (San Andreas Multiplayer) server queries.
Lectron Tunnel enables layer 7 proxying for Source games using L4D2's Source engine version. Includes Left 4 Dead, Left 4 Dead 2, Counter-Strike: Global Offensive, and Portal 2.
Lectron Tunnel enables layer 7 proxying for Source games using L4D2's Source engine version. Includes Left 4 Dead, Left 4 Dead 2, Counter-Strike: Global Offensive, and Portal 2.
Lectron Tunnel enables layer 7 proxying for Source games using L4D2's Source engine version. Includes Left 4 Dead, Left 4 Dead 2, Counter-Strike: Global Offensive, and Portal 2.
Lectron Tunnel enables layer 7 proxying for Source games using L4D2's Source engine version, which includes Portal 2.
Lectron Tunnel enables layer 7 validation for SA-MP game traffic
Lectron Tunnel enables layer 7 packet validation for QUIC
Lectron Tunnel enables layer 7 packet validation for SIP
Lectron Tunnel enables layer 7 packet validation for DTLS
Lectron Tunnel enables layer 7 packet validation for RTP
Lectron Tunnel enables layer 7 packet validation for Renegade X game traffic
Lectron Tunnel enables layer 7 packet validation for DayZ game traffic
Lectron Tunnel enables layer 7 packet validation for Squad game traffic
Protect BTC, ETH and most major token pools to improve network quality rating.
Protecting staking pool such as ETH 2.0 and Cardano staking pools and improve reliability rating of your pool.
Zoom alternatives such as Jitsi are on the rise in growing countries and in desparate needs of protection
The Secure Shell Protocol is important to connect to a Linux server securely over an unsecured network.
The File Transfer Protocol is important to transfer file over an unsecured network to your Linux server
Protect bidirectional interactive text oriented communication facility using a virtual terminal connection.
Most domain registrars and hosting companies in developing country have email server solutions that need protection.
Help reduce the attack surface of your mission critical financial applications such as trading software.
You might be making a game, and we are right here to help you protect it!
The popular Windows Remote Desktop software runs on TCP and UDP port 3389, usually unsecured.
The most susceptible domestic devices that were used to initiate Mirai attacks because of no protection.
Help reduce the attack surface of your mission critical financial applications.
📲 Open our dashboard
📲 Add billing information
📲 Buy Lec Points
📲 Create a proxy or tunnel
📲 DONE!