Scan, Detect, Protect

The rollups
secure gateway 

Built for a secure and modular rollups.

Catch malicious transactions in real time

Stay ahead of security risks and maintain your rollup integrity.

Precision Security

Connect to high-accuracy security operators built specifically for rollups.

Actionable Alerts

Serve as triggers for your internal playbooks and processes, ensuring that your rollup operates securely.

Customized and Modular

Connect to operators that combine standard detection algorithms with customizable options.

Precision Security

Connect to high-accuracy security operators built specifically for rollups.

Actionable Alerts

Serve as triggers for your internal playbooks and processes, ensuring that your rollup operates securely.

Customized and Modular

Connect to operators that combine standard detection algorithms with customizable options.

A Network of Operators
Dedicated for Rollups

Read More

Broad Operators Variety

Access to an extensive range of security methods and techniques, and stay free from single vendor lock-in.

Plug-and-Play Compatibility

Seamlessly integrate into any stack with our easy-to-use SDK, enabling fast deployment and scalability.

Flexible Economic Model

Integrate security seamlessly into your ecosystem with a flexible economic model that allows you to customize fee structures and monetization strategies.

Non-Custodial & Neutral

Rollup Guard operates without direct access to funds or the ability to alter states. prioritize user safety without compromising reliable neutrality.

How It Works

Connect the Operator

Connect your rollup to a single operator or create a subnet of a set of operators.

Fee Configuration

Choose how your users will pay for security. Subsidize security costs or add these fees to the transaction gas.

Transaction Validation

Transactions sent to the operator are meticulously examined using predefined security methods.

Pricing

Ironblocks Plans:
Tailored Security Solutions

Choose your plan for next-level security.

The Security Sampler

An introductory option for anyone looking to explore what Ironblocks has to offer.

Free

Perfect for developers and innovators that want to safely test their blockchain projects.
$0 /mo
Basic package
No add-ons
Subscribe
Recommended

The Security Foundation

A balanced option that offers solid security for growing blockchain projects.

$ 1289 /month

Ideal for those seeking reliable protection at an economical price point.
2,000 Credits
Add-ons available
Subscribe

The Comprehensive Security Suite

Our most extensive plan, providing comprehensive security tailored to your organization's specific needs.

$ Custom /month

Tailored Security Solutions.
Dedicated Support and Consultation.
Custom Integration and Scalability.
Contact Us

Detector Types

Learn more about the specific detectors that Ironblocks deploys to protect your project.

Open Door

This set of detectors identifies suspicious functions that others might implement into your smart contracts. These functions are typically used as a “back door” mechanism that allows bad actors to extract funds from them.

Read more
Anchor Z

Anchor Z is Ironblock's flagship detector, monitoring both simple, classic hacks as well as the most sophisticated exploits. The Anchor Z detection system can easily identify reentrancy, flash-loans, balance changes, and many more potential hacking strategies.

Read more
Malicious Admin

These detectors are built to find and monitor withdrawals made by one or multiple protocol admins. Among other functions, this detector set can spot private key compromises, suspicious balance changes, and more.

Read more
Custom Detector

Ironblocks’ SDK platform provides a dockerized solution enabling users to create and integrate their own custom detectors and response mechanisms. By leveraging this powerful tool, DeFi projects can ensure their smart contracts are protected against the most recent hack verticals through a fast, secure, and seamless building procedure.

Read more
Asymmetric Balance

This set of detectors is typically used to monitor and protect bridges, triggering when a peer-to-peer balance becomes unequivalent.

Read more