Power Your Astar Applications

Unlock the Full Potential of Your Astar Experience

  • braces

    Seamless Integration

    Make POST requests using the JSON-RPC model to get started immediately.

    Start Your Integration

  • Built for Growth

    Access features like extensive node querying, archival data availability, and customizable nodes with our flexible plans.

    Explore Our Plans

  • Rate-Limiting Protection

    Start with 100 requests per minute, offering guaranteed access to the latest 2000 blocks—perfect for getting up and running quickly.

    Learn About Rate Limits

Credits

Efficiently scale your operations with our Credits, designed to handle diverse workloads with optimal performance. Whether you're processing blockchain queries, indexing data, or running intensive computations, our Credits provide the power and flexibility you need.

Key Benefits:

  • Optimized Performance - Ensure smooth execution of queries and computations.
  • Scalable Resources - Adjust capacity based on your project's needs.
  • Fair Usage Policy - Transparent limits to maintain reliability for all users.

Start leveraging Credits today and enhance your development experience!

Plans ComparisonMore information here

Proteus Shield offers flexible plans tailored to various project requirements and budgets.

  • Free

    $0

    For beginners and small projects.

    • Authorized endpoints
    • Adjustable rate limit
    • 10M CU/month
    • IP-based access control
  • Growth

    Pay-as-you-go

    For scaling applications with low to medium traffic.

    • All Free features +
    • Rate limit based on usage
    • Limited customization
    • Archival data access available (with fee)
  • Dedicated

    Fixed monthly fee

    For high-traffic projects with complex requests.

    • All Growth features +
    • Customizable rate limit
    • Dedicated infrastructure
    • Full control of customization
    • Free archival data access
  • Graph

    $0

    For ultra fast indexed data access.

    • Authorized endpoints
    • Subgraphs creation
    • IP-based access control