Triton One Docs
WebsiteCustomer Portal
  • Introduction
  • RPC Pool
    • Introduction
    • GeoDNS
    • Abuse prevention
    • Rate Limits
    • Proxying
    • Support FAQs
    • Privacy & Security
  • Chains
    • Solana
      • Geyser
      • BigTable Archive
      • Improved Priority Fees API
        • For RPC Providers
      • Sending TXs
      • Deprecated calls Solana 2.0
      • Buying Transaction Bandwidth
      • Providing Transaction Bandwidth
      • Web3JS Socket/Connection Issues
    • Pythnet
    • SUI
    • Others
  • Digital Assets API
    • Introduction
    • Fungible Assets
    • API Methods
      • Get Asset
      • Get Asset Proof
      • Get Assets By Authority
      • Get Assets By Owner
      • Get Assets By Group
      • Get Assets By Creator
      • Search Assets
      • Get Token Accounts
      • Get Signatures For Asset
      • Get NFT Editions
      • Get Asset Proofs
  • Project Yellowstone
    • Introduction
    • Dragon's Mouth gRPC Subscriptions
    • Old Faithful Historical Archive
      • Old Faithful Public Report
    • Steamboat Custom Indexes
    • Whirligig WebSockets
    • Fumarole
    • Vixen
      • Generate a Yellowstone Vixen Parser with Codama
  • Account Management
    • Payments
    • Account management API
      • Introduction
      • Auth & Headers
      • Accounts
      • Address Watch Lists
      • Subscriptions
      • Subscription Types
      • Endpoints
      • Tokens
      • Rate Tiers
  • Pro trading centers
    • Introduction
    • Shred streaming
    • Transaction prioritisation
  • Trading APIs
    • Introduction
    • Jupiter swap
    • Pyth Hermes
    • Bundle simulation by Jito
  • Validators
    • Introduction
    • Vote account setup
    • Node identity protection
  • Pyth Publishers
    • NGINX proxy
    • Testnet, Devnet and Pythnet
Powered by GitBook
On this page

Was this helpful?

  1. RPC Pool

Rate Limits

We set rate limits on all our nodes to protect nodes from abusive traffic. Our goal is that human users have a good experience without the annoyance of bad bots.

Rate limits are applied based on IP and other parameters. If you hit a rate limit, you will get a 429 HTTP response code. If you repeatedly hit our rate limits, you may see Connection refused errors. This means that our firewalls have temporarily blocked you.

If you see a 429 error, your code should back off and reduce the rate of requests to avoid any temporary banning of your IP.

The default rate limit on our shared service is 1200 requests per 10 seconds for a single method call. Many methods, like getProgramAccounts, have much lower rate limits. However, all rate limits are suitable for a well-written front-end application.

We can adjust the rate limits for dedicated nodes per your needs.

To see the overall rate limits applied to your endpoint, visit https://<endpoint>.rpcpool.com/ratelimits . For shared pools, we also provide HTTP headers X-Ratelimit-XYZin the HTTP responses.

PreviousAbuse preventionNextProxying

Last updated 1 year ago

Was this helpful?