The Best Server TrojanGo

Select Account Validity

You can select account validity as you want.

Latest News Server HideSSH:

Warning : Please do not share your account. If you share your account, We will immediately delete your account. You can use 1 SSH account for 2 connections at once.

  • All Server Support Wilcard Domain:  (any).(server.)hidesvr.xyz

  • Support : SSH Websocket, SSH SSL/TLS , SSH Over Websocket CDN  CloudFront

                     Example  Payload   : GET / HTTP/1.1[crlf]Host: sg1.hidessh.com[crlf]Connection: Keep-Alive[crlf]User-Agent: [ua][crlf]Upgrade: websocket[crlf][crlf]   

  • Download Config OVPN : nameserver.com:81/config.zip         

                    Example Config Payload : id.hideserver.xyz:81/config.zip

Note: 

  1. before creating an account, first check the Server Status
  2. if there is a problem creating an account can Live Chat or Contact US

RESET TIME ACCOUNT PREMIUM :  check the website below

Please Support this Website ( Share Website to Sosial media : Facebook, Instagram, Twitter, Anymore)

Select Account Validity

Choose validity account what you want

3 Days Validity

1 Servers

Guide and Informations About TrojanGo

What is Trojan Go VPN ?

Trojan-Go is a complete Trojan agent implemented in Go language, compatible with the Trojan protocol and the original configuration file format. It supports and is compatible with most functions of the Trojan-GFW version, and has expanded more practical functions.

The primary goal of Trojan-Go is to ensure transmission security and concealment. Under this premise, the transmission performance and ease of use should be improved as much as possible. A complete Trojan proxy implemented using Go, compatible with the original Trojan protocol and configuration file format.

Safe, efficient, lightweight and easy to use. Trojan-Go supports multiplexing to improve concurrency performance. uses routing modules to achieve domestic and foreign traffic distribution. supports CDN traffic transfer (based on WebSocket over TLS).

Trojan VPN is an unidentifiable mechanism that helps you bypass GFW. The Trojan has multiple protocols over TLS to avoid both active/passive detection and ISP QoS limitations. Trojan VPN imitating the most common services and behave identically Trojan-Go supports multiplexing to improve concurrency performance; uses routing modules to achieve domestic and foreign traffic distribution; supports CDN traffic transfer 

supports pluggable The unplugged transport layer plug-in allows to replace TLS and use other encrypted tunnels to transmit Trojan protocol traffic. The pre-compiled binary executable file can be downloaded on the Release page. It can be run directly after decompression, no other components depend on it.


Protocol Trojan GO

  • Trojan TLS
  • Trojan Websocket
  • TLS Trojan
  • gRPC TLS
  • Trojan TLS
  • Shadowrocket Trojan
  • TLS QV2ray

Features Trojan Go

  • TLS tunneling.
  • UDP proxy.
  • Transparent proxy based on TProxy (TCP / UDP)
  • Countermeasures against GFW passive detection/active detection mechanism. Socks5 / HTTP proxy automatic adaptation.
  • Websocket transmission support to realize CDN traffic transfer (based on WebSocket over TLS) and counter GFW man-in-the-middle attacks.

Server Statistics

Statistics from all of Our tunneling servers.

43

SSH Servers

237703

SSH Account Created

9

SlowDNS Servers

9851

OpenVPN Account Created

6209

WireGuard Account Created

4290

L2TP/IPSec Account Created

11107

V2Ray/VMess Account Created

1485

Shadowsocks Account Created

859

TrojanGo Account Created