You are viewing demo account.
LAMP (Linux / Apache / MySQL / PHP) - PHP 8.2 / MySQL 8.0 - Disk Usage: 0.201 / 1GB (20.1%) - Hosting Plan (Premium)
SSH Access

SSH allows secure file transfer and remote logins over the internet. Your connection via SSH is encrypted allowing the secure connection. In this section you can manage your SSH keys to allow automation when logging in via SSH. Using public key authentication is an alternative to password authentication. Since the private key must be held to authenticate, it is virtually impossible to brute force. You can import existing keys, generate new keys, as well as manage/delete keys.

SSH (Secure Shell) is a program to log into another computer/server over a network securely. It provides strong authentication and secure communications over insecure channels. Your login, commands, text are all encrypted when using ssh.

Manage SSH Keys

The public and private key are similar to a puzzle. They are created together to use during the login/authentication process. The public key resides on the server (the remote location). The private key resides locally on your computer/server. When you attempt to login to a server, the public and private key are compared. If they match, then you will be allowed to login to the server location.

** You can download the private/public keys here and import into PuTTY (or other SSH clients) if you prefer using something else for SSH connections. Or, if you have been using PuTTY, you can import the public keys by clicking on Import a Public Key.

Create a key pair

Key Pairs

Description Fingerprint Actions
default d4:d7:e0:0d:92:3c:cb:ee:dc:67:26:67:c4:e7:1e:a1 Manage
Import a public key

Public Keys

No SSH public keys found.

SSH connection setup
macOS or Linux
  1. Download the default key pair, or import your public key into our system.
  2. Set the proper SSH private key file permission.
    chmod 600 /home/user/.ssh/id_rsa
  3. Open Tor Daemon or Tor Browser, and connect to Tor.
  4. Open a Terminal session.
  5. Run the following command. The "/home/user/.ssh/id_rsa" represents your private key.

    If the Tor Daemon is used, the proxy is 127.0.0.1:9050. Use the following command.
    ssh www-user@demo6mlm22qrq3bg5ewrwotcpndiyp3euwic6klmbvv6x6yvr2ehslyd.onion -p 2222 -i /home/user/.ssh/id_rsa \
    -o "ProxyCommand=ncat --proxy 127.0.0.1:9050 --proxy-type socks5 %h %p"
    If the Tor Browser is used, the proxy is 127.0.0.1:9150. Use the following command.
    ssh www-user@demo6mlm22qrq3bg5ewrwotcpndiyp3euwic6klmbvv6x6yvr2ehslyd.onion -p 2222 -i /home/user/.ssh/id_rsa \
    -o "ProxyCommand=ncat --proxy 127.0.0.1:9150 --proxy-type socks5 %h %p"
PuTTY
  1. Download the default key pair, or import your public key into our system.
  2. In the Category window, browse to Connection>Data.
  3. Set the Auto-login username to "www-user"
  4. Open Tor Daemon or Tor Browser, and connect to Tor.
  5. In the Category window, browse to Connection>Proxy.
  6. Set Proxy type to SOCKS 5
  7. In the Proxy hostname, enter "localhost". In the Port box, enter "9150" (or "9050" if the Tor Daemon is used).
  8. Set "Do DNS name lookup at proxy end:" to Yes.
  9. In the Category window, Browse to Connection>SSH>Auth.
  10. Select Browse. Find the saved private key downloaded from our system.
  11. In the Category window, select Session to return to the main connection window.
  12. In the Host Name (or IP address) box, enter "demo6mlm22qrq3bg5ewrwotcpndiyp3euwic6klmbvv6x6yvr2ehslyd.onion". In the Port box, enter "2222".
  13. Select Open to test the session. A message indicating "Authenticating with public key" will appear in the SSH connection window if key-based authentication was configured correctly.