G2S Hosting - Powerful Ryzen VPS Hosting - Fast Support
G2S Hosting is a new hosting provider based in the UK, however we offer hosting in both New York and London, our main USP at the moment is offering a competitive price without compromising on performance or support.
G2S Hosting is trading as Mem Star Distribution LTD, a business incorporated in 2014 which focuses on memory and SSD distribution.
VPS-01
1 Core - 2 vCore's
2GB DDR4 / DDR5
50GB SSD Storage
Unmetered Bandwidth
1 IPv4 Address
1Gbps Network
24/7 Support
£5 Fixed Amount Each Month, VAT Included. ($6.32)
VPS-02
2 Core's - 4 vCore's
4GB DDR4 / DDR5
75GB
Unmetered Bandwidth
1 IPv4 Address
1Gbps Network
24/7 Support
£7.80 Fixed Amount Each Month, VAT Included. (Use Discount Code LET for this deal) ($9.85)
Some Additional Facts
At the moment we just offer a month to month payment basis. Additionally we offer services such as web hosting and game hosting. Payments are processed by PayPal and Stripe.
Our VPS's run on either 5950X's or 7950X Processors depending on availability.
If you have any questions please feel free to comment below or reach out to our support, or public discord.
Comments
IPv6 subnet size?
IPv6 on-link or routed?
Test IPv4 and IPv6 addresses?
List of upstream providers?
BGP session availability?
Price for extra IPv4 address?
Price reduction for not needing any IPv4 address?
YABS report?
Maximum allowable persistent CPU usage?
Maximum allowable persistent bandwidth usage?
DDoS protection?
Mail ports blocked?
Customer ID verification needed?
VAT removal for non-EU customers?
Fee for service transfer between billing accounts?
Hi Sunny,
Currently our services don't include any IPv6 addresses although this is something we are looking into adding in the near future. Additional IPv4 Addresses are priced at £3.49, we don't require ID verification but we will ask that customers use correct billing details for accounting and legal purposes. There's no fee for transferring hosting between different billing accounts. Basic DDoS Protection is included as standard with our London location offering improved protection compared to NYC.
I hope this answers some of your questions!
No IPv6 hall of shame
Include IPv6 for no extra cost on every plan in every location to get delisted.
,
What would yopu consider no IPV6 what if it was less then a /64 per server
OP: Can I ask what location in London/Datacentre, own ASN or network? if you do what about BGP?
Currently we don't operate our own ASN, and we do not offer BGP
And what DC do you use? Always interested in more UK locations
UK is not EU
We currently rent dedicated servers from OVH, for our VPS - Lineup
why are you advertising these here as unmetered bandwith when the information on your site says otherwise.
Hi Varingon, Thanks for bringing this to my attention. The error should now be resolved
Additionally if anyone joins our discord we have a 25% discount offer hidden in there!
Looking Glass or test IPs for both if your location?
Why are you listing IPv4&IPv6✅ on the website while none exists?
Border Gateway Protocol: The glue of the Internet has a weak point
A newly discovered vulnerability in the Border Gateway Protocol allows attackers to potentially seal off parts of the Internet.
A security researcher known by the pseudonym Benjojo has uncovered a vulnerability in the Border Gateway Protocol (BGP), which is responsible for routing between networks of different Internet service providers (ISPs). In a blog post, the researcher called BGP the "most important routing protocol in the world" as well as the "glue that holds the Internet together."
The vulnerability discovered in it, he said, allows attackers to trigger misbehavior that spreads through the network like a computer worm. The reason for this lies in the so-called BGP updates, through which routers involved in data traffic inform the network which data packets they can forward and which they cannot.
These update packets contain various attributes, whereby not every router can process all of them due to different system versions, the researcher explained. A bit called transistive tells the routers to simply forward the respective attribute unprocessed to the subsequent routers if they cannot handle it themselves.
Manipulated BGP attributes cut network connections on the Internet
While this mechanism enabled the introduction of new BGP features in the first place, at the same time it "seems like an incredibly bad idea" because it "may blindly propagate unknown information through systems that do not understand the implications of what they are forwarding."
This is especially problematic in terms of error handling when an attribute cannot be decoded, he said. The reaction to this differs depending on the BGP implementation of the respective router manufacturer. Since not all BGP implementations support the same attributes, an attribute unknown to one router could cause another to terminate connections to certain destinations on the network.
This, he said, could allow attackers to design a BGP update, for example, that would propagate unscathed through the Internet until it reached a specific provider and completely disconnected that provider's network from the Internet. Even restarting a session is of limited help, he said, because the target router immediately cuts the connection again as soon as it receives the tampered payload again. "This can lead to prolonged Internet or peering outages," Benjojo said.
Reaction of router manufacturers was sobering
The researcher was disappointed with the reaction of the respective router manufacturers, such as Nokia, Extreme and Juniper, which he contacted to inform them about the vulnerability. For the most part, the companies were difficult to reach or not at all interested in solving the problem. Consequently, he also saw no reason to "make a responsible disclosure." He also admonished other vulnerability discoverers in this regard, saying it was "not an effective solution to contact the vendors."
He later contacted some of the vendors' customers directly and advised them to adjust the configuration of their routers, Benjojo explained. This proved "much more effective" - the researcher was able to get several ISPs, a major CDN (content delivery network) and two Tier 1 networks to protect their routers from potential attacks, he said. How widespread the problem actually still is, however, is not clear from his report.
Sorry Sunny, this has been corrected.
Oh, new hosting, but I have to tell you, without ASN BGP, such a sale may be harder, and the price is higher for other hosting providers.
Thanks for the feedback, Ill have our team look into other possible options to persuade new clients over, but overall we want to make a profitable business offering powerful but well-priced servers for our clients
Use code discord for 25% off!
Similar to G2A. Incoming law suit.
Legally speaking I think G2A wouldn't be able to touch the name due to the fact its a different brand / type of service and a different set of letters, but your concern is appreciated!
Anyone got any ideas on what we can do here at G2S to improve our service's to clients?
Routed IPv6 and BGP session, for no extra cost.
Hmmm. I find it to be quite affordable, especially considering it's equipped with the Ryzen 5000-7000 series.
@Harry400
I'm glad you find our pricing reasonable. Any cost cutting methods we put in place get given back to the clients.
IPv6 is in the works and we hope to have it released next week
If you post your order number here, We will add an additional 1GB of memory and 25GB's of storage to your VPS's free of charge!
Already deadpooled?
Website has been gone
Glad to see LET vets their patron providers so carefully