Great discount if you pay using cryptocurrencies! Bitcoin, Litecoin & Dash accepted.


Registering on Vultr and deploying an instance

Here we will cover how to deploy a virtual private server instance on Vultr. Feel free to use the following link for for 50$ USD worth of credit.
You can use your favorite server provider if you don’t want to use vultr but we wont cover the different details regarding every specific provider.

  1. Log into your Vultr account
  2. Click Products
  3. Click the + blue sign that displays “Deploy New Server”
  4. Click Cloud Compute
  5. Choose Tokyo (better ping if you are using binance as your trading platform)
  6. Server type is 64 bits: Ubuntu 19.04 x64
  7. Server size is 55 GB SSD, 1 CPU, 2048MB memory and 2000GB Bandwidth
  8. Don’t enable additional features
  9. Set up host name with something like “server” (without the quotes) and set a label that you can use to identify the server (this can be bot1 or any other word)
  10. Click “Deploy Now” and wait until server is ready
  11. Depending on your OS:
  12. Linux/Macos: Open a terminal and write ssh root@serverip (server ip should be something like xx.xx.xx.xx
  13. Windows: Download PutTTy from and follow this guide

After login as root we need to create a new username you should see root@hostname, where hostname is the hostname you set up before, you don’t need to type # as its used to denoted that you are logged in as root and have admin permissions
# adduser username (replace username with the desired name)
# usermod -aG sudo username (give your user admin permissions)
We need to change ssh port, disable root login and import ssh-key, to edit files we will use a program called nano, make sure to save files when modifying them by pressing Control+O, use Control+x to exit
# nano /etc/ssh/sshd_config
Search for PermitRootLogin, remove the # if its commented and change it from Yes to No (use arrow keys to move through your file)
You can change port 22 to other port, make sure to remember this port as you’ll need it when you login with the other username on ssh or using PuTTy. Optional (more secure login):
Search for PubKeyAuthentication on /etc/ssh/sshd_config/ and remove the # and set it to yes if it says no.

Generating a SSH key

For windows:
For linux/macos:

Enabling UFW (firewall), allow SSH connections, installing fail2ban

# ufw default deny incoming
# ufw default allow outgoing
# apt install fail2ban

# cp /etc/fail2ban/jail.conf /etc/fail2ban/jail.local
# ufw allow ssh (this is assuming you’re using port 22, replace ssh with another port if you used another port)
# ufw enable
# nano /etc/fail2ban/jail.local

Search for ssh then erase the # from [sshd] and the enabled = true below it

That’s it, your server should be ready to go, from now on we’ll login as the new username rather than the root account we’ll cover how to install specific bots in another post.

Leave a Reply

Your email address will not be published. Required fields are marked *

Privacy Settings
We use cookies to enhance your experience while using our website. If you are using our Services via a browser you can restrict, block or remove cookies through your web browser settings. We also use content and scripts from third parties that may use tracking technologies. You can selectively provide your consent below to allow such third party embeds. For complete information about the cookies we use, data we collect and how we process them, please check our Privacy Policy
Consent to display content from Youtube
Consent to display content from Vimeo
Google Maps
Consent to display content from Google
Consent to display content from Spotify
Sound Cloud
Consent to display content from Sound
Cart Overview