ID Lite
- Host dhwu9f.hidessh.my.id
- Server Indonesia
- Method Websocket, GRPC
- Path Websocket /hidessh-trojan
- Path GRPC hidessh-gprc-trojan
- Port 443
- Port Speed 1
- Remaining 10 Accounts
You can select your favorite server
Latest News Server HideSSH:
Example Payload : GET / HTTP/1.1[crlf]Host: sg1.hidessh.com[crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]
Example Config Payload : id.hideserver.xyz:81/config.zip
FIX Problem and New Features Tunneling:
Warning :
Important note:
All services come with up to 1Gbps Unlimited Data Premium Bandwidth! Powerful compute backed by 100% SSD storage. Get instantly !!!
Trojan-Go is a complete Trojan agent implemented in Go language, compatible with the Trojan protocol and the original configuration file format. It supports and is compatible with most functions of the Trojan-GFW version, and has expanded more practical functions.
The primary goal of Trojan-Go is to ensure transmission security and concealment. Under this premise, the transmission performance and ease of use should be improved as much as possible. A complete Trojan proxy implemented using Go, compatible with the original Trojan protocol and configuration file format.
Safe, efficient, lightweight and easy to use. Trojan-Go supports multiplexing to improve concurrency performance. uses routing modules to achieve domestic and foreign traffic distribution. supports CDN traffic transfer (based on WebSocket over TLS).
Trojan VPN is an unidentifiable mechanism that helps you bypass GFW. The Trojan has multiple protocols over TLS to avoid both active/passive detection and ISP QoS limitations. Trojan VPN imitating the most common services and behave identically Trojan-Go supports multiplexing to improve concurrency performance; uses routing modules to achieve domestic and foreign traffic distribution; supports CDN traffic transfer
supports pluggable The unplugged transport layer plug-in allows to replace TLS and use other encrypted tunnels to transmit Trojan protocol traffic. The pre-compiled binary executable file can be downloaded on the Release page. It can be run directly after decompression, no other components depend on it.
Statistics from all of Our tunneling servers.