FAQ Print

  • 960

Q1: Is the IP a local address (original IP)?

A: We first need to declare: native IP is a pseudo-concept. If the answer is based on the IP address database, then the result depends on the website you are querying. We generally use https://www.iplocation.net/ip-lookup to check the location of the IP. We consider it to have reached more than three destinations. That is, it meets the requirements of IP ownership. If you have strict requirements on IP addresses, it is not recommended to purchase our services.

 

Q2: How to get a refund if it is not applicable?

A: At present, we only refund the balance, and the following conditions must be met:

1. Within 24 hours.

2. There is no ban on IP. (based on https://ping.pe)

3. There is no traffic abuse. (traffic based on data at the time of refund)

 

Q3: Is there a test address?

A: https://totyun.com/knowledgebase/2/NETWORK-TEST.html

 

Q4: If there is a difference in payment using the balance, can the final difference be combined for payment?

A: Yes.

 

Q5: Does the balance support withdrawal?

A: Not currently supported.

 

Q6: Can you build a VPN?

A: Yes, but we do not provide additional support for VPNs.

 

Q7: Why is the bandwidth not enough? How about troubleshooting?

A: There are many factors, and it may depend on the bandwidth of the other party's server, line congestion, etc. Our standard is that the local server reaches 95% of the purchased bandwidth, which is considered qualified. For example, when purchasing in Hong Kong, it reaches 95% in Hong Kong.

No matter how you submit the fault acceptance, please try your best to collect fault data and provide it to us for analysis. We cannot accurately process just a few words. We can only conduct basic checks (global tcp icmp mtr detection of the IP that submitted the fault) to determine whether There is a problem.

 

Q8: Why are there more USDT payments?

A: Due to the high processing fees, we discourage users from using USDT. The current ratio is 1.15 USD (±0.001~0.005).

 

Q9: How to renew the suspended machine? How long do you keep expired unrenewed servers?

A: Users can pay attention to the clear status of the server, which are "running", "paused" and "deleted". The server in the "paused" status can be automatically restored directly with the corresponding bill payment, and the server in the "deleted" status is permanently considered It cannot be restored. The overdue server will be retained for the user for at most five days. It will be deleted at 15:00 on the five day after it expires and cannot be restored. Please do not pay for servers in "Deleted" status.

 

Q10: How do I know about the region/country web streaming website access restrictions?

A: We do not have the ability to "unblock streaming media". This is a country or region restriction and does not belong to our management scope. An IP address that can pass through a country's firewall does not mean that this IP address can access all streams in this country. Media websites, some streaming media operators may restrict some IP addresses that they do not want to be accessed, which is not within our management scope, users can test it on our test page before purchasing, and repeat: Yes IP addresses have strict requirements, and it is not recommended to purchase our services.

 

Q11: Can I upgrade my current server?

A: Yes, work order processing needs to be activated, and can only be upgraded based on the package. Single attributes cannot be upgraded.

 

Q12: What is the difference between each network line?

A: The full name of CIA is China International Access, which includes direct connection optimization to China, and is the first choice for users in China; the full name of GIA is Global International Access, which is an international line, without any optimization for China. The full name of CDIA is China Datacenter International Access, which is a line. Through Japan Telecom, the connection performance to China is average, but better than GIA.

 

Q13: How to change the IP address of the current server?

A: We need to initiate work order processing and prepare the corresponding bill. To replace the IP, we need to pay 5 USD and ensure that the replaced IP can pass the ping.pe test.(After replacing the IP address of the same server more than 3 times, the fee will be doubled, and the maximum number of replacements shall not exceed 5 times) If a newly purchased server has purchased IP protection services and encounters regional blockages with the initial IP address, it can directly enjoy a replacement IP service.

Detailed announcement: https://totyun.com/announcements/73/Update-of-new-purchase-rules.html

 

Q14: How to replace or upgrade a product that is not suitable?
A: If the purchased product is not suitable and needs to be replaced, please initiate a work order and meet the following conditions:
1. If the region is changed, the used traffic cannot exceed 5%. Changing the region will destroy the current server. If upgrading and changing regions require additional price differences, we will prepare corresponding bills.
2. There is no IP ban. Based on https://ping.pe )
3. First time replacement, and can only be done once.

 

Q15: Is there any additional traffic that can be purchased when the traffic is exhausted? Is your flow control technology standardized? Is my server being attacked counted in the traffic statistics?

A: If the traffic is exhausted, we can only wait for the next renewal day for the system to reset the traffic. There are no additional traffic packages to purchase, and everything is designed and configured according to the specifications. If it exceeds the specifications and generates additional traffic, the price is not affordable for normal users. We believe that it is not necessary to purchase extended traffic packages. Users are advised to plan their traffic usage and ensure server security to prevent traffic loss caused by intrusion into the zombie network.

Our network devices are equipped with industry standardized traffic control technology, and communication between devices is not included in user traffic statistics. The traffic meter in the user server management interface is at the operating system level, and you can trust this traffic meter.

When a server is attacked by DDOS, our traffic analysis system will react within seconds, sealing the server network into a black hole system. The attack traffic will not flow into the user level network system, nor will it be counted in the traffic meter of the user server management interface.

 

Q16: Can I apply to adjust a server to expire at the same time as my other server?

A: Yes, open the work order description, we will prepare a time difference bill for you, and notify us of adjustments after the payment is completed.

 

Q17: Are you sure your server network bandwidth is exclusive?

A: Yes, we have not considered creating a shared bandwidth product at the moment. The bandwidth of all products is exclusive, as we have configured a maximum outbound bandwidth of 20 to 40Gbps for each computing node to ensure that every user can exclusively enjoy the bandwidth labeled in our existing products.

 

Q18: How to perform configuration downgrading, such as downgrading 3 IPs to 1 IP and downgrading 4C8G to 2C4G?

A: Yes, but with conditional limitations; Please open the work order to indicate the server that needs to be downgraded. The server will be restarted once and then the downgrade will be completed. The downgrade does not support refunds for the remaining price difference. When the renewal period is monthly, to prevent abuse, it is necessary to use it for at least 3 months before the IP quantity and configuration can be downgraded. Please confirm your needs when purchasing,Hardware configuration and single attribute degradation of traffic cannot be performed.

 

Q19: Can I change IP and increase or decrease IP rules at the same time?

A: No. For example, because the cost of changing an IP may be higher than the cost of adding an IP, the user does not send a work order to change the IP, but sends a work order to add an IP. After adding the IP, the user then sends a work order to delete the original IP, so that the user can pay less. The cost of changing the IP is used to achieve the purpose of changing the IP. We do not allow this. First of all, this will inevitably lead to abuse, and we will continue to eliminate all possible low-cost abuse.

 

Q20: Why is my server being attacked? Are you responsible for this?

A: A common attack is DDOS (Distributed Denial of Service Attack), and the other is penetration intrusion, which requires certain technical abilities to ultimately obtain server permissions. Almost all foreseeable attacks fall into these two categories.

Ⅰ. Why are you subject to DDOS attacks?

1) The type of business causes your peers to compete.

2) Random selection by the attacker.

3) For the purpose of blackmail.

4) Sensitive business.

5) Others.

How to fight against DDOS attacks?

When using a CDN (content distribution network), no DNS records are exposed on the source server, and the system firewall prohibits all external connections and only allows CDN node connections. It is recommended to use large CDN service providers such as Cloudflare and AWS, and set up relevant custom rules. With all this, it can defend against most DDOS attacks on the market, and can continue to adjust the rules according to the attack characteristics after being attacked, so that users can continue their business without being too affected.

 

II. Why is it subject to infiltration and invasion?

Penetration and invasion begins the moment the server is connected to the public Internet. This is a long-established black information industry chain.

You can find SSH and RDP blasting in the LOGs of various systems. If you have built Web-related programs, you can also find many penetration attempts in the LOGs of nginx and apache.

Of course, most of them are attempts. Whether you can succeed depends on whether there are loopholes in the entire system you build.

How to fight against infiltration and invasion?

You need to know how to view and analyze the system LOG, and make early warnings and corresponding rule adjustments for various attempted penetrations. For example, if you find that there is an attempt to perform SQL injection in the LOG, then according to the LOG prompts, analyze the URL from which the attack instructions are transmitted, and Vulnerability patching, blocking or ACL restrictions at the application layer or network layer require detailed analysis of specific situations.

 

Ⅲ. Are we responsible for the attack?

If the amount of DDOS reaches enough to affect internal network equipment, a black hole reaction will be triggered, and the server IP will enter a blocked state. However, if it is a small-traffic semi-connected TCP attack (CC), the traffic identification system may not be able to accurately analyze, and the user May still be affected. If you are attacked by small traffic, users can use VNC to perform software-level protection (block the attack source IP, capture packets, and control attack characteristics by rules) through VNC when they are unable to connect remotely. Most firewall software can To meet the prevention and control of small traffic attacks, of course this requires users to operate it themselves, and we do not provide technical support for this. If the server enters the black hole system, it will be automatically unblocked 5-10 minutes after the attack stops. Final note: We are not responsible for anything other than blackhole processing of servers subject to DDOS attacks and unblocking servers promptly after the attack is over. If necessary, you can check the regions that support DDOS protection add-on purchase to purchase DDOS protection IP.

 

Continually updated...


Was this answer helpful?

« Back