All new Registrations are manually reviewed and approved, so a short delay after registration may occur before your account becomes active.
weird aeza network issue, need someone who can contact them
Me and my friend have a promo aeza vps, mine works OK (not perfect but i can accept it for the price), but his vps has a weird network issue where only some tcp connections are throttled to 0.5 mbit/s upload, testing with "iperf3 -R -c 77.221.141.144" from any windows pc results in 0.5 mbit/s, but testing from any linux pc or android results in full speed, but if i disable tcp timestamps on the vps then all tcp connections are throttled, makes me think that their anti-ddos is to blame.
If you can test his server with iperf, please do and post your results of this command
iperf3 -R -c 77.221.141.144
my result: https://i.imgur.com/emYZjaR.png
i also started iperf3 on my vps for reference (tcp timestamps are also disabled)
iperf3 -R -c 77.232.142.79
result: https://i.imgur.com/3AHURFd.png
Their telegram support sucks and i can't create a ticket because of promo vps and need someone who can contact them about it.
notes: os on both vps is fresh ubuntu 24.04, bbr is enabled and tcp timestamps are disabled (sysctl -w net.ipv4.tcp_timestamps=0), uploading from his aeza vps to my aeza vps is also slow, speedtest cli upload is also slow https://i.imgur.com/0FrY2uG.png, iperf3 on windows is slow even if both vps and windows have tcp timestamps enabled, udp is not throttled.
iperf3 for windows can be downloaded from here
Comments
Sounds like ToS violation
Only if there was a way to contact aeza outside of theirs support.
Only if there was a way to contact aeza on LET.
Oh wait, @AezaHost WHO THIS?!
Overclock the NIC is the only solution
Promo €1/m VPS?
i discovered 2 malicious dns servers on their network which redirected some domains, reported them 7 months ago on telegram and abuse email, and they are still up.
https://i.imgur.com/qP3owgM.png
found it here https://www.reddit.com/r/HomeNetworking/comments/1f3sipr/this_router_is_hacked_right/
@AezaHost anything?
It is not “malicious”. Just some cretin added domains which he does not own. It means nothing, just don’t use random nameservers.
@Levi did you read the reddit thread? this ip was found on a hacked router, it's also on abuseipdb.com and just googling it reveals multiple hacked routers with it
You bought a VPS from a shady Russian provider, well known for selling tunneled VPSs with fake locations and a history of abuse, and RDNS (dns-fast.aeza.network and Dns-Asia.aeza.network) for both IP addresses indicates that they are Aeza's own name servers, so have fun being ignored.
they are not, "dns-fast" is just a vps name which was assigned as rdns automatically and it can be changed to anything, i just changed my rdns to "dns-slow.aeza.network" on 77.232.142.79. also these dns servers are super laggy, unusable in production
It really doesn’t matter much. Read the following to get an idea of who you’re dealing with.
https://correctiv.org/en/fact-checking-en/2024/07/22/inside-doppelganger-how-russia-uses-eu-companies-for-its-propaganda/
they just blocked my vps with an ip of 77.232.142.79 with this message:
i believe this is a mistake, port 443 was used for nginx for more than a year and 2 days ago i changed it to serve an xray proxy with authentication (the same proxy works fine on another vps provider for multiple months)
Hello, your server may have been compromised and malware may have been installed on it. We cannot influence this situation, as we do not know the exact scenario of server usage. This situation occurred due to an abuse from Spamhaus, just like the support message says.
There is a warning about the limitations of the PROMO tariff before order.
Very good read, thanks. People should stay away from them.
@AezaHost Why didn't you forward the original abuse report to the client?
this is...fucking nuts. I don't at all understand the effort to infiltrate lowendtalk of all places though if this has some truth to it. like what data is there to gather from the customers here? why spend any effort on this forum? this is a fairly benign crowd.
so it's possible to answer the ticket after renting a regular vps for an hour (and they even give a balance for it), they agreed to allow access for 1 hour and then they will reinstall the OS. i believe the issue is in the self signed TLS cert i used (second command from here https://stackoverflow.com/a/10176685, the same command was probably used in a botnet software or something like that), because another VPS on another provider with the same proxy and cert is listed on spamhaus with the same win.sliver, I'll setup the same proxy on another IP but with a different tls cert to confirm this theory.
and im going away from them after the paid period ends.
I doubt the issue lies in a TLS certificate. I would have a look at an xray software instead.
@tentor this is my config file https://pastebin.com/ZAjbf2ww for https://github.com/XTLS/Xray-core/, it's working on another vps for 2 months and i periodically checked its logs, didn't notice anything unusual, and the ip address is not on abuseipdb
that actually meant ssh access to a system rescue live cd which they activate on their side, but VNC access also starts working and it's possible to reboot the system and boot it normally (i needed to verity that the database was shut down properly and make a proper backup with pg_dump)