Dedicated Server Hosting,
Customized for Your Needs.

1
Order

Contact sales for quotation.

2
Payment

Use credit card online payment or bank transfer to pay the invoice.

3
Delivery

In general we build the server for 72 hours, customize server please contact us to provide the date.

EX-16
$189/m

best for web application

  • Intel® E3-1230 Quad-Core, 8x 3,7 Ghz
  • 16GB ECC RAM
  • 1TB Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

EX-16-SSD
$189/m

best for High I/O application

  • Intel® E3-1230 Quad-Core, 8x 3,7 Ghz
  • 16GB ECC RAM
  • 120GB SSD Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

LX-16
$190/m

best for web application

  • Intel® E5-2630L v2 Six-Core, 12x 2,8 Ghz
  • 16GB ECC RAM
  • 1TB Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

SX-32
$399/m

best for High performance application

  • Dual E5-2620 v4 Qcta-Core, 32x 3,0 Ghz
  • 16GB ECC RAM
  • 1TB Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

EX-16-Ⅱ
$199/m

best for web application

  • E3-1230 v3 Quad-Core, 8x 3,7 Ghz
  • 16GB ECC RAM
  • 1TB Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

DX-16
$209/m

best for web application

  • Intel® D-1531 Six-Core, 12x 2,7 Ghz
  • 16GB ECC RAM
  • 1TB Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

LX-16-SSD
$190/m

best for High I/O application

  • Intel® E5-2630L v2 Six-Core, 12x 2,8 Ghz
  • 16GB ECC RAM
  • 120GB SSD Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

SX-32-SSD
$399/m

best for High I/O application

  • Dual E5-2620 v4 Qcta-Core, 32x 3,0 Ghz
  • 16GB ECC RAM
  • 120GB SSD Disk
  • 10TB Traffic with 100Mbps port
  • /29 IPv4 (5 Usable IPs)
  • Free 30Gbps DDoS Mitigation

Order

Have a question in mind?
Feel free to check common questions.

Processors

Customize your dedicated servers with high performing Intel E5-2600, E5-2600 v3, E5-4600, and E5-4600 v3 processors that can enable your workloads to run faster and more efficiently while lowering overall cost of ownership. Configure your 2U or 4U server with up to four processors to deliver high performance for diverse workloads.

Solid state drives (SSDs)

As you seek to harness the power of information, the demand for data-intensive and transactional workloads such as data warehousing, real-time analytics and virtualized environments is expanding. Select enterprise-class solid state drives (SSDs) that offer significant performance benefits over traditional disk drives. This is ideal for applications requiring high random I/Os per second (IOPS) performance with low latency.

Hardware RAID controller

Hardware RAID controllers create redundant storage arrays for protection against drive failures. All RAID controllers include Flash-Based Write Cache (FBWC), which is designed to increase overall performance, especially in write-intensive application environments. In addition to 12GB/s SAS support, RAID controllers include onboard battery backup.

Memory

Add up to 3TB of DDR4 RAM during initial deployment, or increase memory capacity during the life of your server to meet your business growth. With next generation DDR4 memory support, your overall memory bandwidth increases and is optimized for your workloads.

SATA hard drives

SATA drives are optimal for high-capacity storage servers and provide the lowest $/GB. They are an ideal choice for non-mission critical applications with low-utilization workloads of 40% or less like web applications and mail servers. SATA III hard drives include a 6.0 Gbps interface with 64MB of cache and utilize NCQ for enhanced performance.

DDoS Protection and Mitigation

DDoS Mitigation helps maintain availability for your Managed Hosting services through a unique hardware-based protection system. It combines two powerful alerting technologies to identify an attack (network-level packet scanning and server-level anomaly detection) and then precision elimination of DDoS traffic to mitigate its effects.