Terms of Use and Privacy Policy

Welcome to our service. By using this service, you agree to the following terms:

1. Use of Service

You agree to use this service solely for lawful purposes and in compliance with all applicable laws and regulations. You are prohibited from using this service for any illegal activities or activities that infringe upon the rights of others.

Furthermore, you acknowledge and agree that we may place advertisements in hidden areas on this website. This is to help us cover the costs of our server and domain through advertisements that you may inadvertently click on.

2. User Accounts

You are responsible for maintaining the confidentiality of your account information, including your password. You agree to notify us immediately of any unauthorized use of your account or any other breach of security.

3. Content

You are responsible for all content that you upload, post, or share through this service. You warrant that you have the necessary rights or permissions to use and distribute such content.

4. Privacy

We value your privacy. Your personal information will be processed in accordance with our Privacy Policy. By using this service, you consent to the collection and use of your information as described in our Privacy Policy.

5. Intellectual Property

All content and materials provided through this service, including but not limited to text, graphics, logos, icons, images, audio clips, digital downloads, and data compilations, are the property of us or our licensors and are protected by copyright laws.

6. Limitation of Liability

We shall not be liable for any direct, indirect, incidental, special, or consequential damages arising from the use or inability to use this service.

7. Changes to Terms

We reserve the right to modify these terms at any time. Changes will take effect immediately upon being posted on our website. Continued use of our service after such changes constitutes your acceptance of the revised terms.

8. Governing Law

These terms shall be governed by and construed in accordance with the laws of Indonesia, without regard to its conflict of law provisions.

By clicking 'I Agree', you acknowledge that you have read, understood, and agree to all the terms outlined above.

Advanced Security

We encrypt your data to protect your Internet connection so you may surf the web safely at home, at work, or in public.

Digital Privacy

Surf the internet anonymously by masking your IP address. Stop your internet service provider from spying on you and keep your location private.

Liberty

Avoid censorship and safely access any website, app, or channel. Get around any restrictions and use the internet for free.

Tips

To get the maximum speed of connection choose the location nearest to your country.

What is the V2Ray Protocol?

V2Ray is a next-generation proxy framework developed as part of the Project V initiative. Unlike traditional VPN protocols, V2Ray is not a single protocol — it is a platform that supports multiple proxy protocols including Vmess, Vless, Trojan, and Shadowsocks, all within one unified client and server.

The defining advantage of V2Ray is its ability to disguise proxy traffic as ordinary web traffic. Using transports such as WebSocket + TLS, your connection becomes virtually indistinguishable from a normal HTTPS browsing session. This makes it exceptionally difficult for firewalls, ISPs, and government censorship systems to detect or block your connection — even in countries with aggressive deep packet inspection (DPI).


Why V2Ray is better than a regular VPN

A conventional VPN uses well-known protocols like OpenVPN or WireGuard. While these are secure, their traffic patterns are easily fingerprinted by modern DPI systems. ISPs and governments can detect, throttle, or block VPN traffic even without decrypting it — simply by recognizing the connection signature.

V2Ray solves this problem with traffic obfuscation. When configured with WebSocket + TLS over port 443, your V2Ray traffic is wrapped inside what appears to be regular HTTPS web traffic. From the outside, there is nothing unusual to block. This design was specifically built to work in environments like China's Great Firewall, where conventional VPNs frequently fail.


How to use your V2Ray account

After creating your account above, you will receive a configuration file or a set of connection parameters including the server address, port, UUID, and transport settings. You can import this configuration into a V2Ray-compatible client.

Recommended clients include v2rayNG for Android, V2RayX or V2RayU for macOS, and Nekoray or Qv2ray for Windows and Linux. Most of these clients support importing configuration via a URL or QR code — simply scan or paste your config link and tap connect.

V2Ray Global Network Illustration

Supported Protocols

VmessVless
TrojanWebSocket + TLS

What makes V2Ray different from a regular VPN?

V2Ray doesn't just encrypt your traffic — it disguises it completely. Here is what sets V2Ray apart from every other privacy tool.

  • Traffic disguised as HTTPS — undetectable by deep packet inspection used by ISPs and governments
  • CDN-compatible — WebSocket+TLS transport works through Cloudflare, making your server IP nearly impossible to block
  • Multi-protocol support — one client handles Vmess, Vless, Trojan, and Shadowsocks
  • Multiple transports — WebSocket, gRPC, QUIC, and mKCP adapt to any network condition
  • Works in the most restricted networks — China, Iran, Russia, and other countries with heavy censorship
  • Actively maintained — open-source community with regular updates and security improvements
V2Ray Privacy Protection
Update cookies preferences