Traffic Control

Classify, route, and control traffic before it reaches origin

Peakhour turns a noisy mix of browsers, APIs, bots, scrapers, bursts, and expensive requests into edge decisions your operators can explain: allow, challenge, throttle, block, cache, log, or route to the right origin path.

Peakhour edge decision path showing requests classified by policy, routed through allow, challenge, throttle, block, cache, log, and clean origin delivery outcomes.

Unknown Traffic Becomes Expensive When It Reaches Origin Unclassified

Application traffic is rarely one clean stream. Human visits, partner APIs, crawlers, scraping tools, credential automation, inventory checks, bursty campaigns, and retry storms all compete for the same origin capacity unless the edge separates them first.

Mixed Intent

Legitimate users, partner services, SEO crawlers, scrapers, credential tools, and monitors can all hit the same routes with very different cost and risk profiles.

Origin Cost Pressure

Unsorted requests inflate compute, database, search, and third-party service usage even when the traffic never becomes revenue or a successful customer workflow.

Operational Guesswork

When decisions happen after the application is already under load, teams lose the chance to explain why traffic was allowed, slowed, redirected, or denied.

Edge operations console showing incoming web traffic, automation bursts, Peakhour controls, clean requests, and evidence streams.
Peakhour decision surface showing bot score, WAAP policy, rate limits, known user pass, block action, and logged evidence.

Route Each Request by Evidence, Policy, and Cost

Traffic Control moves the decision point to the edge. Peakhour classifies request context, applies policy, and chooses the lowest-friction action that protects origin while preserving clean user and API paths.

  • Classify at the Edge

    Use route, session, IP, ASN, geo, device, bot, rate, cache, and request history signals before traffic consumes application resources.

  • Apply Targeted Routing

    Send trusted traffic forward, steer region-sensitive requests, shift load away from unhealthy origins, and keep expensive or uncertain traffic on controlled paths.

  • Control Before Capacity Burns

    Throttle bursts, challenge suspicious sessions, block confirmed abuse, cache safe responses, and reduce the volume that reaches databases, APIs, and dynamic application tiers.

The Control Loop Stays Visible

Dashboard evidence supports the operating review. Teams can see the traffic class, matched policy, action taken, route outcome, and origin effect without reconstructing the decision from disconnected logs.

Classify Human, API, bot, burst Separate intent and cost before origin
Route Allow, cache, throttle, block Apply policy at the edge
Review Decision and origin effect Tune controls from evidence
Browsers, APIs, bots, crawlers, bursts, and retries are classified Traffic mix
Allow, challenge, throttle, block, cache, log, or route Policy action
Cleaner traffic, lower cost pressure, protected capacity Origin result

Operators can tune the policy loop from observed behavior instead of guessing which traffic caused cost, latency, or origin pressure.

Controls That Shape the Traffic Path

Bot and Browser Classification

Separate normal visitors, verified crawlers, suspicious automation, scrapers, and credential tools before they share the same origin path.

Route-Aware Rate Limits

Limit expensive endpoints by path, identity, IP, geography, method, and request pattern instead of applying one blunt threshold to the whole site.

Policy-Based Routing

Route clean requests to healthy origin paths while steering uncertain traffic through challenge, cache, throttle, or block outcomes.

Origin Shielding

Reduce unnecessary dynamic hits to databases, APIs, search backends, and application servers by enforcing decisions before the request reaches them.

Evidence-Led Tuning

Use enriched logs and dashboard review to adjust thresholds, allowlists, challenges, cache rules, and routing policies with a record of each decision.

Peakhour's traffic control solution has transformed our site. We now block over 20,000 unwanted requests daily, and our page load times have improved tenfold. As a result, we've seen a 30% jump in revenue. The visibility and control we now have over all our traffic has become essential to our success.

Caitlin Probert, CEO

Send Cleaner Traffic to Origin

Bring your current traffic mix. Peakhour can help classify what is costing money, decide what should route forward, and keep the control loop visible.

WAAP and bot control board showing traffic evaluated by web, API, bot, and rate limit policies before clean application delivery.

Relevant information from our blog

Layer 7 DoS attacks and Full Page Caching

Layer 7 DoS attacks and Full Page Caching

Discover how Full Page Caching can help mitigate layer 7 DoS attacks.

Read More
IP Threat Intelligence

IP Threat Intelligence

Discover and block threats through data enrichment using managed IP reputation lists.

Read More
Google Chrome's

Google Chrome's "IP Protection" and Online Privacy

An exploration of Google Chrome's new "IP Protection" feature, its promise of enhanced privacy.

Read More

© PEAKHOUR.IO PTY LTD 2025   ABN 76 619 930 826    All rights reserved.