Secure your HTTPS traffic and save up to 20% of the bandwidth

As your Internet data contains in average 80% of useless requests (ads, trackers, malware, phishing, scam ...) our software appliance SecurityBox will drop 99.9% of these unwanted requests and as a result it will make you save up to 20% of your overall HTTPS bandwidth.
It's an already pre-configured server under Linux in order to be installed within few minute. It contains an already pre-installed/configured 64 bits Linux OS and an optimized system including a web graphical console for easy configuration and management of your Security Center Box.
Download & Install... Buy now...
Main Features
Dedicated Server with 500Mbps HTTPS traffic
    Processor:
  • Intel i7 (8 cores minimum)
    Memory:
  • 64 GB RAM or higher
    Hard Disk:
  • 1x512 GB or bigger (SSD recommended)
    Network Interface:
  • 1 Gbps
Screen Shots
Dashboard
Websites
SHA keys
Categories
Certificates
Mikrotik Mangles
1 - Define the comment of your Mikrotik Route:
In Routes definition, edit the route for the UnveilTech SecurityCenterBox and comment "sslbox" (without quotes)
2 - Define the special Mangle for enabling/disabling:
Original code
/ip firewall mangle
add action=add-dst-to-address-list address-list=SSLBOX address-list-timeout=20s \
chain=prerouting comment="SslBox Hello Packet" dst-port=2048 protocol=udp \
src-address=10.2.0.3
  • address-list: Addr. list name of your IP ranges
  • address-list-timeout: timeout when the Mikrotik will ON/OFF the rule
  • src-address: IP address of the UnveilTech SecurityCenterBox
3 - Define the special Scheduler for enabling/disabling:
Original code
/system scheduler
add interval=10s name="MONITORING SSLBOX" on-event=":global SSLBOX\r\n\
:if ([/ip firewall address-list find list=SSLBOX] = \"\") do={\r\n\
:if (\$SSLBOX != \"down\") do={\r\n\
/ip route disable [find comment=\"sslbox\"]\r\n\
:set SSLBOX \"down\"\r\n\
:log info \"SSLBOX DOWN\"\r\n\
}\r\n\
} else={\r\n\
:if (\$SSLBOX != \"hidup\") do={\r\n\
/ip route enable [find comment=\"sslbox\"]\r\n\
:set SSLBOX \"hidup\"\r\n\
:log info \"SSLBOX UP\"\r\n\
}\r\n\
}" policy=ftp,reboot,read,write,policy,test,password,sniff,sensitive
4 - Block the HTTPS port 443 UDP with your Mikrotik router:
Google services (Youtube, Gmail, etc...)
Facebook and Instagram
Global Statistics

Top 10 Traffic - 7 days

tiktokcdn.com 27.97%
googlevideo.com 21.88%
fbcdn.net 21.82%
nflxvideo.net 17.50%
rbxcdn.com 3.11%
apple.com 2.47%
facebook.com 2.32%
phncdn.com 1.10%
dbankcdn.com 0.92%
xvideos-cdn.com 0.92%

Top 10 Blocks - 7 days

www.googleadservices.com 21.41%
ad.doubleclick.net 20.15%
sdkconfig.ad.intl.xiaomi.com 12.35%
tc-log.mattel163.com 8.37%
asia-comonrt-stsdk.vivoglobal.com 6.83%
mediation.pangle.io 6.56%
googleads.g.doubleclick.net 6.24%
mon-va.tiktokv.com 6.09%
obus-sg.dc.heytapmobile.com 6.05%
prod-mediate-events.applovin.com 5.95%

Top 10 SSH Attacks - 7 days

218.92.0.113 China 4.00%
180.101.88.231 China 3.97%
218.92.0.27 China 3.60%
218.92.0.26 China 3.45%
218.92.0.108 China 3.27%
218.92.0.112 China 3.25%
218.92.0.29 China 3.24%
180.101.88.250 China 3.22%
218.92.0.23 China 2.82%
218.92.0.22 China 2.78%

Top 10 HTTP/S Attacks - 7 days

78.135.85.252 Turkey 11.02%
91.151.89.197 Turkey 8.98%
65.109.227.119 Finland 8.39%
38.145.197.48 United States 8.20%
5.180.41.67 United States 7.32%
141.164.47.36 South Korea 4.85%
212.64.215.103 Turkey 3.86%
20.254.69.90 United Kingdom 3.19%
185.224.128.17 Netherlands 2.48%
62.210.28.46 France 2.31%
API
  • curl -s -x [sslbox_ip_address]:8190 -I -k -L http://[host_to_test] | grep "X-SslBox-MyKey"