User account

Bring your own IPs

If you’re a RIPE member and have your own IP prefix(es), you can bring your own IP addresses and we’ll announce them from our AS number. The service is available in Bucharest and London. In the following months it will also be available in Dallas and Fremont.

We can announce IPv4 and IPv6 for you.

You can use the IP addresses on the IntoVPS unmanaged VPS plans or on our managed VPS plans. Contact us if you’re looking for dedicate servers.

This service is free if charge. Data traffic will be charged at usual rates.


New OpenStack KVM VPS locations: Dallas and Fremont

Our new KVM VPS’es platform, powered by Fleio and OpenStack, is now available in Dallas and Fremont.

You get the same benefits as in the previously opened locations (Amsterdam and Bucharest):

  • blazing fast full SSD local storage
  • brand new powerful Intel Xeon powered servers
  • generous traffic included
  • our fast and friendly 24/7 support for network, hardware and Fleio self-service portal

The virtual machines cost starts at one cent and half per hour for 2GB of RAM.

And some useful add-ons are available for the virtual machines:

  • Windows license for less than a cent per hour
  • affordable cPanel/WHM and DirectAdmin licenses
  • affordable extra IPv4 addresses

The new platform will soon be available in London too.


Double memory

We’ve doubled the amount of guaranteed memory for all virtual machines. This is already active for existing machines and no restart is required. We have also removed the “burst memory”, which is now guaranteed.

All other package characteristics have remained the same, including price.

If you happen to encounter any issue caused by the upgrade open a support ticket.


Heartbleed OpenSSL Vulnerability

On April 7, 2014  CVE-2014-0160 vulnerability, also known as “Heartbleed”, was released that could allow attackers to view sensitive information in a server’s memory such as secret keys and passwords. Given the severity of this problem, IntoVPS has taken the necessary steps to secure our web sites and keep our customers’ information safe from potential attacks.

A tool has been published that allows administrators to test the vulnerability of their system. If your site has an SSL certificate, go to the Heartbleed test page, enter your website URL, and run the vulnerability test.

If you are vulnerable please update openssl as soon as possible and restart your web server.

On Ubuntu/Debian:
sudo apt-get update
sudo apt-get upgrade
sudo /etc/init.d/apache2 restart

On Centos:
yum -y install openssl
/etc/init.d/httpd restart

Also Ars is reporting that a bot has been exploiting heartbleed in the wild since at least nov 2013. Therefore, we strongly suggest to reissue all the affected SSL certificates.