disBalancer Opens Whitelist for Poolz IDO

2 min readApr 13, 2021


disBalancer is a highly promising project with a focus on international expansion. DDOS token is the utility token to be used in operations carried out within the disBalancer ecosystem. One of the key events in the project’s roadmap is DDOS Poolz IDO. The IDO will allow the community members to own a stake in the project to benefit from its further growth.

Recently, Poolz selected disBalancer considering its great demand and potential to conduct the DDOS IDO on its platform.

As a step further toward the IDO, we today announce that we are opening the whitelisting process for the DDOS IDO. Users who are interested in getting an IDO allocation of DDOS must fulfill the IDO whitelisting requirements to be eligible for the lottery ticket selection process.

As disBalancer is a Binance Smart Chain project, the users will be able to buy the DDOS against Binance’s native token BNB. So, please ensure that you connect your wallet to Binance Smart Chain prior to the IDO.

Below are the requirements for the DDOS IDO on Poolz.

How Will IDO Whitelisting Work?

You will have to fulfill the criteria outlined below to be eligible for whitelisting for the DDOS IDO on Poolz:

● Stake your POOLZ tokens on the staking page

● Participate in the tasks described below:

To be fully eligible for DDOS IDO whitelist, please make sure you

1. Follow Poolz on Twitter

2. Follow disBalancer on Twitter

3. Retweet the pinned tweet on Poolz & disBalancer’s Twitter account along with a quote and tag 2 friends. Add link

Make sure to include the cashtags $POOLZ and $DDOS.

Link to pinned tweet:

4. Join disBalancer Telegram group

5. Fill the whitelist form here

6. DDOS IDO staking page link

We cannot be more excited about seeing you participate in the DDOS IDO on Poolz. So, complete the whitelisting requirements and maximize your chance to win a DDOS allocation.

About disBalancer

disBalancer is an innovative solution to protect companies from DDoS attacks that has a network structure. The malicious traffic targeting customers’ web resources is distributed among the nodes united in a system. Any owner of a device can earn DDoS tokens by renting out the free computing power of his laptop or smartphone to the network by connecting to one of the main nodes deployed in his region. Only verified companies are eligible to deploy main nodes. When staking DDoS tokens on the main node, the client companies become resistant to DDoS attacks and can prevent financial and reputational losses caused by the potential crash of their web resources.

Website | Telegram | Twitter | Medium




A decentralized cybersecurity solution that performs stress testing to identify DDoS vulnerabilities and protect projects against fraudsters.