We have decided to give EVERYTHING for free! What are you waiting for?


Here we will cover how to deploy a virtual private Linux server instance on Vultr. Feel free to use the following link for http://bit.ly/cuevultr for 50$ USD worth of credit.

You can use your favorite server provider if you don’t want to use vultr but we won’t cover the different details regarding every specific provider.

  1. Log into your Vultr account
  2. Click Products
  3. Click the + blue sign that displays “Deploy New Server”
  4. And Click Cloud Compute
  5. Then Choose Tokyo (better ping if you are using Binance as your trading platform)
  6. Server type is 64 bits: Ubuntu 19.04 x64
  7. Server size is 55 GB SSD, 1 CPU, 2048MB memory and 2000GB Bandwidth
  8. Don’t enable additional features
  9. Set up hostname with something like “server” (without the quotes) , and, set a label that you can use to identify the server (this can be bot1 or any other word)
  10. Click “Deploy Now” and wait until the server is ready
  11. Depending on your OS:
  12. Linux/macOS: Open a terminal and write ssh root@serverip (server ip should be something like xx.xx.xx.xx
  13. Lastly, Windows: Download PutTTy from https://the.earth.li/~sgtatham/putty/latest/w64/putty-64bit-0.71-installer.msi and follow this guide https://mediatemple.net/community/products/dv/204404604/using-ssh-in-putty-

After login as root, we need to create a new username you should see root@hostname, where hostname is the hostname you set up before, you don’t need to type # as it’s used to denote that you are logged in as root and have admin permissions.

# adduser username (replace username with the desired name)
# usermod -aG sudo username (give your user admin permissions)

We need to change ssh port, disable root login and import ssh-key, to edit files we will use a program called nano, make sure to save files when modifying them by pressing Control+O, use Control+x to exit
# nano /etc/ssh/sshd_config
Search for PermitRootLogin, remove the # if its commented and change it from Yes to No (use arrow keys to move through your file).

You can change port 22 to other port, make sure to remember this port as you’ll need it when you log in with the other username on ssh or using PuTTy. Optional (more secure login):

Search for PubKeyAuthentication on /etc/ssh/sshd_config/ and remove the # and set it to yes if it says no.

Generating an SSH key

For Windows: https://www.ibm.com/support/knowledgecenter/en/HW94I/svc_generatingsshkeypair_2mu1y4.html
For Linux/macOS: https://www.ibm.com/support/knowledgecenter/en/HW94I/svc_generatesshopen.html

Enabling UFW (firewall), allow SSH connections, installing fail2ban

# ufw default deny incoming
# ufw default allow outgoing
# apt install fail2ban

# cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
# ufw allow ssh (this is assuming you’re using port 22, replace ssh with another port if you used another port)
# ufw enable
# nano /etc/fail2ban/jail.local

Search for ssh then erase the # from [sshd] and the enabled = true below it

That’s it, your server should be ready to go, from now on we’ll log in as the new username rather than the root account we’ll cover how to install specific bots in another post.

Leave a Reply

Your email address will not be published. Required fields are marked *

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Consent to display content from Youtube
Consent to display content from Vimeo
Google Maps
Consent to display content from Google
Consent to display content from Spotify
Sound Cloud
Consent to display content from Sound
Cart Overview