Detection, Mitigation & Response

Detect and mitigate DDoS attacks in under 1 second, respond automatically, and keep your users informed.

All features →
Learn
Documentation Quick Start API Reference Agent Setup DDoS Protection Landscape Free Certifications NEW
Popular Guides
memcached Amplification Dynamic Baselines PCAP Forensics PagerDuty Setup
Company
About Us Partners White Label Referral Program Pay with Crypto System Status
Legal & Support
Contact Us Terms Privacy SLA
Who Uses Flowtriq

From indie hosts to ISPs — see how teams like yours use Flowtriq to detect and stop DDoS attacks.

Talk to Us →
Infrastructure
Hosting Providers ISPs MSPs Small Operators
Gaming
Game Server Hosting Game Studios
Business
SaaS Platforms E-Commerce Financial Services

Quick Start

5 minutes from zero to your first detection

Step 1: Create your account

Sign up at flowtriq.com/signup. No credit card required. Your 7-day full-access trial starts immediately.

Step 2: Install the agent

The FTAgent runs on any Linux server with Python 3.8+. Full mode uses Scapy for packet capture (requires root). Use --limited if root is not available.

# Install the agent (all dependencies included) pip install ftagent --break-system-packages # Full mode (root required — PCAP, protocol analysis, IOC matching) sudo ftagent --setup # Limited mode (no root — PPS/BPS monitoring only) ftagent --setup --limited

Note: On Ubuntu 23.04+, Debian 12+, and other newer distros, the --break-system-packages flag is required for global pip installs. Alternatively, use a virtualenv.

The setup wizard will ask for your Flowtriq API key (found in your workspace under Settings → Nodes) and auto-detect your network interface.

Step 3: Verify it's running

# Check agent status sudo systemctl status ftagent # Or run in debug mode sudo ftagent --debug

You should see the agent send its first heartbeat and load IOC patterns from the remote config. After 5 minutes your node's baseline will be established.

Step 4: Configure alerts

Go to your workspace Console → Alert Channels and add at least one alert channel. Discord and Slack webhooks take about 30 seconds to configure.

Tip: Add a Discord channel first. It's the fastest to set up and you can test the connection with one click.

Step 5: Test detection

Use the --test flag to trigger a synthetic attack event:

sudo ftagent --test

This fires a simulated threshold crossing, opens a test incident, and sends alerts to all configured channels.