Last time checked: 2024-09-11 09:35
Name | Used | Status | Host/IP |
---|---|---|---|
SG1 | FULL from 20 | Online | sg1.serverssh.net |
SG2 | 8 from 20 | Online | sg2.serverssh.net |
SG3 | 0 from 20 | Online | sg3.serverssh.net |
SGX1 | FULL from 15 | Online | sgx1.serverssh.net |
SGX2 | FULL from 15 | Online | sgx2.serverssh.net |
SGM1 | FULL from 5 | Online | sgm1.serverssh.net |
SGM2 | FULL from 5 | Online | sgm2.serverssh.net |
CAM | FULL from 5 | Online | cam.serverssh.net |
SG1 SOCKS | 0 from 20 | Online | sg1socks.serverssh.net |
SGX3 | FULL from 15 | Online | sgx3.serverssh.net |
SG2 SOCKS | 0 from 20 | Online | sg2socks.serverssh.net |
SG1 Vmess | 6 from 25 | Online | sg1ray.serverip.my.id |
SG2 Vmess | 0 from 25 | Online | sg2ray.serverip.my.id |
ID1 Vmess | 7 from 25 | Online | idray.serverip.my.id |
UK Vmess | 0 from 25 | Online | ukray.serverip.my.id |
PT Vmess | 4 from 25 | Online | ptray.serverip.my.id |
SG1 VPN | 6 from 10 | Online | sg1vpn.serverssh.net |
SG2 VPN | 6 from 10 | Online | sg2vpn.serverssh.net |
US | 11 from 20 | Online | us.serverssh.net |
SG1 UDP DNS | FULL from 20 | Online | sg1ray.serverip.my.id |
GE Vmess | 0 from 25 | Online | deray.serverip.my.id |
DE | 6 from 20 | Online | de.serverssh.net |
BR | 0 from 20 | Offline | br.serverssh.net |
GB | 2 from 20 | Online | uk.serverssh.net |
USX | 18 from 20 | Online | usx.serverssh.net |
UKX | 11 from 20 | Online | ukx.serverssh.net |
BRX | 0 from 20 | Offline | brx.serverssh.net |
DEX | 8 from 20 | Online | dex.serverssh.net |
DEM | FULL from 5 | Online | dem.serverssh.net |
USM | FULL from 5 | Online | usm.serverssh.net |
UKM | FULL from 5 | Online | ukm.serverssh.net |
SG2 UDP DNS | 0 from 20 | Online | sg2ray.serverip.my.id |
UK UDP DNS | 15 from 20 | Online | ukray.serverip.my.id |
PL UDP DNS | 15 from 20 | Online | plray.serverip.my.id |
DE UDP DNS | FULL from 20 | Online | deray.serverip.my.id |
PT UDP DNS | 15 from 20 | Online | ptray.serverip.my.id |
CA VPN | 3 from 10 | Online | cavpn.serverssh.net |
SG1 gRPC | 0 from 20 | Online | sg1grpc.serverip.my.id |
SG2 gRPC | 0 from 20 | Online | sg2grpc.serverip.my.id |
PT gRPC | 0 from 20 | Online | ptgrpc.serverip.my.id |
DE gRPC | 3 from 20 | Online | degrpc.serverip.my.id |
UK gRPC | 0 from 20 | Online | ukgrpc.serverip.my.id |
HK gRPC | 0 from 20 | Offline | hkgrpc.serverip.my.id |
SG1 Vless | 5 from 25 | Online | sg1ray.serverip.my.id |
SG2 Vless | 0 from 25 | Online | sg2ray.serverip.my.id |
ID Vless | 3 from 25 | Online | idray.serverip.my.id |
UK Vless | 2 from 25 | Online | ukray.serverip.my.id |
PT Vless | 1 from 25 | Online | ptray.serverip.my.id |
DE Vless | 2 from 25 | Online | deray.serverip.my.id |
PL Vmess | 0 from 25 | Online | plray.serverip.my.id |
PL Vless | 3 from 25 | Online | plray.serverip.my.id |
PL gRPC | 0 from 25 | Online | plgrpc.serverip.my.id |
HK Vmess | 0 from 25 | Offline | hkray.serverip.my.id |
HK Vless | 0 from 25 | Offline | hkray.serverip.my.id |
ID gRPC | 1 from 25 | Online | idgrpc.serverip.my.id |
HK UDP DNS | 0 from 20 | Offline | hkray.serverip.my.id |
BR UDP DNS | 0 from 20 | Offline | br.serverssh.net |
DE VPN | 1 from 10 | Online | devpn.serverssh.net |
US VPN | 3 from 10 | Online | usvpn.serverssh.net |
UK VPN | 0 from 10 | Online | ukvpn.serverssh.net |
SGM1 Vmess | 3 from 5 | Online | sgm1ray.serverip.my.id |
SGX4 | 10 from 20 | Online | sgx4.serverssh.net |
SG4 | 0 from 20 | Online | sg4.serverssh.net |
SGX5 | 11 from 20 | Online | sgx5.serverssh.net |
SG5 | 1 from 20 | Online | sg5.serverssh.net |
SGM2 Vmess | 0 from 5 | Offline | sgm2ray.serverip.my.id |
SGM1 Vless | 1 from 5 | Online | sgm1ray.serverip.my.id |
SGM2 Vless | 0 from 5 | Offline | sgm2ray.serverip.my.id |
SGM1 gRPC | 0 from 2 | Offline | sgm1grpc.serverip.my.id |
SGM2 gRPC | 0 from 2 | Offline | sgm2grpc.serverip.my.id |
SG3 SOCKS | 2 from 20 | Online | sg3socks.serverssh.net |
By using a public network that controls data, server SSH tunnel technology uses the working system by encrypting all data passing through it.
With the help of encryption technology, data confidentiality can be better controlled.
Although in addition to the server SSH line itself, there are people who can eavesdrop on the data transmitted over the Internet, but they may not be able to read the data because the data has been scrambled.
By implementing this encryption system, no one can easily access and read data network content.
When passing through the Internet, the data actually travels far away in various countries.
During the journey, its content may be disturbed, lost, damaged, and manipulated by people who cannot move.
In Server SSH technology, it is necessary to be able to maintain the integrity of the data from the beginning of sending the data until the data reaches the destination.
SSH server technology can verify the source of the sent data to be received. The SSH server will check all incoming data and retrieve information from the data source.
Then, the data source address will be completed successfully, and the authentication process is successful.
Therefore, the SSH server guarantees all data sent and received from the receiving source. No data has been tampered with or sent by other parties.