Budget

256MB RAM
1 Core
30GB Disk
400GB Bandwidth

FROM
linux vps

9

pm

Custom

Customize RAM
Customize CPU
Customize Storage
Customize Bandwidth
Linux of your choice

FROM
$

10

pm

Extreme 2

2GB RAM
4x 3.4 Ghz Cores
120 GB Raid-10 Storage
3000GB Bandwidth
Linux of your choice

FROM
$

35

pm

cPanel

1GB+ RAM
4x 3.4 Ghz Cores
50GB+ Raid-10 Storage
1500GB+ Bandwidth
cPanel auto installed

FROM
$

49

pm

Extreme 8

8GB RAM
4x 3.4 Ghz Cores
200GB Raid-10 Storage
6000GB Bandwidth
Linux of your choice

FROM
$

135

pm

VPS Hosting Features

59 Second Activation

Your Linux VPS will be activated immediately after your first payment, so you dont wait.

99.9% Uptime

We guarantee your Linux VPS will have an uptime of 99.9% and strive for 100%. Reliable fast linux VPS hosting

14 Day Moneyback Guarantee

If your unhappy with the service within 14 days we'll refund your money! There are no contracts, its just a month to month service.

Full Root Access

Just like having your own dedicated server but cheaper than ever. Even tun/tap is supported.

24/7/365 Support

We’re here 24/7, weekends, holidays, day and night to assist you.

Global Locations

We have severs located all over the world for you to choose from. Check our locations page

Choice of operating systems

We specialise in Linux VPS's. The latest and older releases of Centos, Ubuntu, Debian, OpenSuse are available.

cPanel/WHM

You can order cPanel for $15 per month on any of our Linux VPSs that have 1024MB or more of RAM. We will automatically install the latest version of cPanel for you.

IP Adresses

All plans include 1 x IPv4 address. Up to 10 Additional IPv4 addresses may be ordered. IPv6's addresses are also available at some of our data centeres on request. Reverse DNS entries are available for all IPs.

Upgrades with no downtime

On all our non KVM plans you can easily upgrade your ram, disk or CPU with no downtime at all. KVM plans will require a quick reboot.

Our Data Centers

No matter where you or your clients are in the world we have a Data Center located nearby to provide you with fast connectivity all at once standard price. We currently deploy virtual private servers in 7 locations and are rapidly expanding into more locations. Below is a list of our current data center locations:

  • Dusseldorf, Germany
  • Zurich, Switzerland
  • New York, USA
  • Cape Town, South Africa
  • Auckland, New Zealand
  • Singapore
  • Hong Kong

See also our more detailed Locations or test files, IP addresses and locations


Payment Methods

Testimonials

Roberto Tramontano, MediaNote

I really appreciate the great support VPSNINE has given me so far, and I can recommend your company as the best VPS provider I've ever had. (And I've had approximately 12 other VPS providers before you!). I am really impressed with the quick support and service that your company is able to provide to me as a customer. You can expect my full loyalty as a customer as I've decided that I will only and always, from now on, buy my future servers with your company. I thank you again for the great support!

Jordan McQueen, Technical Stop

I have used many hosts that have good prices, adequate customer support and bearably services. This is not the case at VPSNINE, the prices are great, customer support is superb and the quality overall is outstanding.The support has helped me countless times, from installing operating systems to adding domains. If you have not tried VPSNINE, I suggest you do so now because you will be surprised as I cannot find any downfalls to their superb services with great prices.

Pavel Djunev, W-SEO

VPSNine is serious company, with perfect support. In five minutes they setup my VPS and everything was perfect, easy, quality. For months now I have no complaint. I wish the company success!

Blog posts

Set Date and Time for Each Command You Execute in Bash History

January 16th, 2017

I think one of the not so well known secrets of Linux sysadmin is the .bash_history file. Very useful if you want to see what a colleague did to break something or even if you forgot how you did something yourself a few months ago. This little trick makes it even more neat and that is the ability to add a timestamp to the file! Read on thanks to techmint ….

By default, all commands executed by Bash on the command line are stored in history buffer or recorded in a file called ~/.bash_history . This means that a system administrator can view a list of commands executed by users on the system or a user can view his/her command […]

Read more...

PhotoRec – Recover Deleted or Lost Files in Linux

January 9th, 2017

Everyone had an issue now and again where they wish there was a quick easy way to get a file back either due to a typo, deleting it by mistake or some script gone mad. Restoring backups tend to take a bit long for those who a busy or less patient, so this handy tool may be just the answer, Usual for sysadmins to add it to their linux toolkit.

When you delete a file accidentally or intentionally on your system using ‘ shift + delete ‘ or delete option or empty Trash, the file content is not destroyed from the hard disk (or any storage media). It is simply removed from the the directory structure and you cannot […]

Read more...

Latest Industry News

CloudLinux 7 and 6 Users Receive Security Kernel Update to Patch CVE-2017-2636

CloudLinux’s Mykola Naugolnyi is announcing today the immediate availability of new stable kernel security updates for the CloudLinux 7 and CloudLinux 6 operating system series. The newly updated CloudLinux 7, CloudLinux 6 and Hybrid kernel is here to fix the recently discovered and patched CVE-2017-2636 vulnerability that was affecting the Red Hat Enterprise Linux 6, Red Hat Enterprise Linux 7, and Red Hat Enterprise MRG (Messaging, Realtime and Grid) 2 operating systems.

Apache Struts Vulnerability Under Attack

The open-source Apache Struts 2 technology is a widely used framework component in Java applications and it's currently under attack. The attacks follow the March 6 disclosure by the Struts project for a Remote Code Execution (RCE) vulnerability identified as CVE-2017-5638.

Debian-Based Elive 2.8.6 Beta Makes the Live Mode Twice as Fast, Updates Artwork

The developers of the Debian-based Elive Linux distro announced today the availability of yet another Beta milestone towards the operating system’s major 3.0 release, Elive 2.8.6 Beta. The Elive 2.8.6 Beta development snapshot comes exactly one month after the release of the previous milestone, namely Elive 2.8.0 Beta, and promises to be the greatest update so far, implementing numerous stability and performance improvements, as well as various optimizations to the live mode, making it twice as fast.

8 Best WordPress Mailing List Plugins For Getting More Subscribers

With over 1 Billion users on Gmail alone, marketers now claim email to be one of the best marketing strategies that bring in a 4,300% Return On Invest (ROI), offering a return of $44 for every dollar spent on email marketing. Yet it’s sad to see that most bloggers and marketers often give up on email marketing considering it an outdated strategy, just because they fail to grow their email list.

Collabora Rolls Out CODE 2.0 Update

Collabora has announced an update to their Online Development Edition 2.0 platform. Collabora Online Development Edition 2.0 is part of the consulting firm's effort around improving LibreOffice Online.

Voyager 16.04.2 Distro Uses Linux Kernel 4.8 for Kaby Lake Support, Xfce 4.12.3

The developer of the Voyager Live Linux distribution announced today the official release and general availability of Voyager 16.04.2 LTS, a maintenance update to the long-term supported 16.04 series of the operating system. Based on the recently released Xubuntu 16.04.2 LTS, Voyager 16.04.2 LTS offers a completely redesigned Xfce 4.12.3 desktop environment, but ships with all the goodies (security updates, latest package versions, updated graphics and kernel stack from) from the Ubuntu 16.04.2 LTS (Xenial Xerus) operating system.

New Steam Client Update Adds Steam Controller Configuration Links, Many Changes

Valve pushed a new stable update of the Steam Client for Linux, Mac, and Windows users, as well as on its Debian-based SteamOS gaming operating system, adding, as expected, numerous improvements and some new exciting features. The March 9 Steam Client Update is awaiting you next time you fire up your Steam desktop client, no matter the operating system you’re currently using, and it will add a new option in the setting that lets you disable group announcement and event notifications, and removes the sing-on notifications for in-game/online friends.

The impact GitHub is having on your software career

Over the next 12 to 24 months (in other words, between 2018 and 2019), how people hire software developers will change radically. I spent from 2004 to 2014 working at Red Hat, the world's largest open source software engineering company.

Latest Security Announcements

Mar 21 07:00 CakePHP Cache Corruption Code Execution (CVE-2010-4335) A remote code execution vulnerability exists in CakePHP. The vulnerability is due to the way the security component of CakePHP fails to validate user input. A remote attacker can exploit this issue by sending a specially crafted HTTP request.

Mar 21 07:00 Fatek Automation PLC WinProladder Stack Buffer Overflow (CVE-2016-8377) A stack-based buffer overflow exists in Fatek Automation PLC WinProladder. The vulnerability is due to improper validation of user supplied data before copying to a stack-based buffer. A remote attacker could exploit this vulnerability by sending a crafted pdw

Mar 21 07:00 Brocade Network Advisor Directory Traversal (CVE-2016-8207; CVE-2016-8206) A directory traversal vulnerability exists in Brocade Network Advisor. The vulnerability is due to lack of authentication and insufficient input validation when processing HTTP requests. A remote, unauthenticated attacker can exploit this vulnerability by

Mar 21 07:00 FusionVM Security Scanner FusionVM is a vulnerability scanning product. Remote attackers can use FusionVM to detect vulnerabilities on a target server.

Mar 21 07:00 AVTECH Devices Multiple Vulnerabilities Multiple vulnerabilities exist in AVTECH devices. An attacker could exploit this vulnerability via direct requests. Successful exploitation of this vulnerability could allow a remote attacker to gain access to the devices.