Napísať recenziu

FastComet verzus GreenCloudVPS

Porovnané možnosti Navštíviť FastComet Navštíviť GreenCloudVPS
15 plány hostingu 42 plány hostingu
Počiatočná cena 2,20 € / mesiac 3,54 € / mesiac
Bezplatná doména Nie Nie
Kupóny 3 kupóny Nie
Hodnotenia používateľov
Spoľahlivosť 5.0
Cena 4.5
Ľahko použiteľné 5.0
Podpora 5.0
Služby 5.0
Recenzie používateľov
1171 recenzií 81 recenzií
Najnovšia pozitívna recenzia
Som veľmi rád, že som začal využívať služby Fastcomet
Juraj Novodomec,
Mal som problém s mojimi šiestimi doménami u poskytovateľa webhostingu, ktorý bol v porovnaní s FastComent dvakrát drahší, no keď som začal využívať služby Fastcomet, prekvapilo ma, akí priateľskí boli zamestnanci podpori. Tí... Viac m podpory reaguje pri riešení problémov veľmi rýchlo. Server je veľmi rýchly a môj web sa teraz načítava naozaj inak. Menej
greencloudvps is very good
demo key,
I have been using Green Cloud for a long time and I have always been very satisfied with Green Cloud's services. Both the speed of feedback and the performance of the server can meet my current needs.
Najnovšia negatívna recenzia
FastComet is the WORST I've EVER - 3 year customer
Roy Tousignant,
As I'm finally slamming the door and leaving FastComet behind me, I'd like to warn others to find another host. I just looked back at my support tickets with them since 2018, and it's atrocious. In that time, FastComet has ma... Viac naged to corrupt and destroy months worth of our data multiple times and by multiple means. If they weren't just rebooting our server half a dozen times a month, (crashing our nodeJS application in the middle of write-to-disk operations) then they were letting the shared server's disk drives fill up while our paid account still showed 15gb's "free." (also crashing write-to-disk operations)
FastComet: They'll sell you the disk space whether they've got it or not.
Worse though is that in attempting to resolve these issues, support staff entered our account, looked through our application's code, and instantiated multiple instances of our script -- without our request or authorization. In other words, FastComet's support had no concern for the privacy / security of our intellectual property as it exists in our code, not to mention that of the data we collect. FastComet support breached our account that day because whoever was working the desk - with a spectacular act of ego - just assumed that these continuous, repeating crashes and errors we'd been reporting must be a problem in the code /we'd/ written. Rather than a problem in their fly-by-night server management -- selling disk space they don't have, with server up-time claims they can't actually produce.
And when they started trying to "fix" our script, (instead of their borked server configurations) they apparently didn't notice or care that there was already an instantiation of our script running. So we ended up with multiple scripts running in parallel, (which the script was not written to accommodate) each triggering on the same conditions in a cascade, competing with each other for read/write access over the same files, putting our data at risk yet again. Which all happened while we were LIVE with the endpoint that our nodeJS application serves. All this... as a support response, days after their disk space issue corrupted months of our data.
Now, that was some time ago. (2018) And I would've left FastComet then and there had they not given us a year of free hosting to apologize. (Ultimately, the application and data being collected is supportive / non-critical.) And while I can say things have improved since then (one should hope so!), I'm still sitting here closing out our account. At least once a month I still end up having to reboot the script, their billing department is a nuisance, phoning me at the end of every month to remind me to send payment. (because I refuse to authorize them with recurring billing) And this month, when the script went offline and I went to restart it, I found that I couldn't 'term' into the server over SSH anymore, for some reason. Haven't been able to for two weeks.
And I'm just sick of trying to figure out what's gone wrong /this time/ with FastComet. So I'm sitting here waiting for my entire directory structure to download via FTP, so I don't have to deal with them anymore... Which I have to do by FTP, because FastComet's near-useless backup systems don't allow you to just download one of the zipped backups. You can only restore them in place. Brilliant.
So yeah: If you're looking for a host... There's a ton of 'em out there. FastComet is one you can cross off the list immediately, and keep looking.
Terrible Service Provided by GreenCloud vps
Frank Josh,
I bought a windows vps from Greecloud on November 2019 fast forward to 2021 it almost 2years the service has been great aside their normal maintenance notification. This morning i got an email saying Service Suspension Notif... Viac ication
with prior notification and all avenue to contact them has been block both my account and they don't want to reply my email. Below is the mail they sent
This is a notification that your service has now been suspended. The details of this suspension are below:
Product/Service: HyperUS1.5
Domain: Server.1573587096
Amount: $129.60 USD
Due Date: 12th November 2021
Suspension Reason: [ EGP Cloudblock RBL / 1633438272.94181 ] [ RBL ] x.x.x.x/32 (PTR: added [ strike 1: 1 day minimum ] *** THIS EMAIL ORIGINATED OUTSIDE THE ORGANIZATION *** x.x.x.x/32 (root IP: x.x.x.x) (PTR: was added to the EGP Cloudblock RBL for the following reason: "Caught scanning for web/mail exploits / compromised hosts" ============================================================= BEWARE: AUTOMATIC DELISTING POLICY - DO NOT REQUEST DELISTING ------------------------------------------------------------- The EGP Cloudblock RBL has an automated removal policy. The MINIMUM amount of days that x.x.x.x will be listed depends on the amount of times x.x.x.x was listed by us before. The current list status for x.x.x.x is: [ strike 1: 1 day minimum ] The countdown to automatic delisting starts at the timestamp of this notification. Listings will ONLY be removed after the minimum listing period (see 'strike') has lapsed. Delistings will be retried once every hour. The current automatic delisting periods for single IP addresses (/32) are: * strike 1: after a minimum of 1 day * strike 2: after a minimum of 3 days * strike 3: after a minimum of 7 days * strike 4: after a minimum of 30 days * strike 5: after a minimum of 60 days * strike > 5: after a minimum of 90 days Expanded listings occur automatically when at least 50% of a CIDR block is listed: CIDR /29: 4/8 blocked IP's -> the entire /29 is listed CIDR /28: 8/16 blocked IP's -> the entire /28 is listed CIDR /27: 16/32 blocked IP's -> the entire /27 is listed CIDR /26: 32/64 blocked IP's -> the entire /26 is listed CIDR /25: 64/128 blocked IP's -> the entire /25 is listed CIDR /24: 128/256 blocked IP's -> the entire /24 is listed Expanded listings (listings greater than a single IP address (/29, /26, /24, etc.)) are always listed for a minimum of 90 days. ============== ABOUT THIS RBL -------------- * The EGP Cloudblock RBL is a semi-private RBL; its listings are not made public, and cannot be queried from the outside. They are, however, shared in real-time within our networks and our partners' and subscribers' networks, and they are used for firewalling, greylisting, tarpitting, and other types of blocking (mail, web, DNS, and others). * The purpose of this email (and a separate email, containing details about the abusive traffic) is to perform a basic, civic Internet duty: to make you aware of abuse coming from an IP address or network under your supervision. * How you decide to handle these reports (if at all) is entirely up to you. We do not require a reply, a ticket, an acknowledgment, or even any action from you. Just note that repeated abuse from your IP space will lead to an increasingly longer, and increasingly broader, refusal to accept any traffic from you to any of our networks, or our partners' networks. * We invite you to look at this information and to take action to prevent it from reoccurring or spreading. This may be a private list; public lists are even harder to get out of. It may not be too late to salvage your IP space's reputation. Consider this an early warning. * If you need to get in touch with us, the only point of contact is . Requests for delisting (or exemption) will not be taken into consideration; the process is fully automated. * We offer as much information in our reports as we possibly can. Additional information will only be given to you if it is in our own interest to do so. We do not respond to demands, threats, or protests. * A NOTE TO RESEARCH AND SECURITY SCANNERS: ============================== Why did *YOU* get this e-mail? ------------------------------ * We like to operate in a transparent and predictable fashion and think you should be made aware of abuse emanating from your IP space; so we will inform you about listing. Your e-mail address , was retrieved (best-guessed) automatically from public WHOIS/RDAP data (e.g. and and other public IP/domain-related information. If , is not the correct e-mail address to report abuse and security issues inside your network(s), please update your public WHOIS/RDAP data or ask your ISP or IP owner to do so. * Check,, and for possible other issues with x.x.x.x/32. * Note that we also list (and expand listings) based on traffic flow analysis and DNS/BGP/AS/RIR/LIR data without actual evidence of abuse on record; i.e. we take broader network hygiene and reputation into account. * Warning: the continued presence of either an 'SBL' or an 'XBL' listing at will lead to automatic (re)listing when x.x.x.x contacts any of our servers, and it will prevent automatic delisting from the EGP Cloudblock RBL. Is x.x.x.x /32 listed in the Spamhaus CSS / Spamhaus SBL? No. Is x.x.x.x /32 listed in the Spamhaus XBL / Abuseat CBL? No. * Warning: Residential or Dynamic hosts should NEVER connect directly to a public SMTP server, they should only send outgoing mail through the relay server of their own ISP or network. These IP addresses will always be blacklisted upon connection to our SMTP servers. Network owners dealing with residential or dynamic hosts are strongly advised to disallow all outbound connections to SMTP servers on their border firewalls. Is x.x.x.x /32 listed in the Spamhaus PBL? No. ---------------------------------------------------------------------------------------------------- Below is an overview of recently recorded abusive activity from x.x.x.x /32 (time zone: CEST) ---------------------------------------------------------------------------------------------------- Fields: IP / Contacted host / Local time / Log line (see notes below) ---------------------------------------------------------------------------------------------------- x.x.x.x 20210831/20:39:37 20:39:30.980403 rule 0/0(match): block in on vmx0: x.x.x.x .63143 > Flags [S], seq 3972047010, win 0, options [mss 1460], length 0 x.x.x.x 20210831/20:39:38 20:39:31.390755 rule 0/0(match): block in on vmx0: x.x.x.x .63143 > Flags [S], seq 3972047010, win 0, options [mss 1460], length 0 x.x.x.x 20210901/11:27:35 11:27:28.125190 rule 0/0(match): block in on vmx0: > Flags [S], seq 2421480152, win 0, options [mss 1460], length 0 x.x.x.x 20210901/11:27:36 11:27:28.544626 rule 0/0(match): block in on vmx0: x.x.x.x .52595 > Flags [S], seq 2421480152, win 0, options [mss 1460], length 0 x.x.x.x 20211005/13:55:28 13:55:15.583329 rule 0/0(match): block in on em0: x.x.x.x .59088 > Flags [S], seq 78435668, win 0, options [mss 1460], length 0 x.x.x.x 20211005/13:55:29 13:55:15.983839 rule 0/0(match): block in on em0: x.x.x.x .59088 > Flags [S], seq 78435668, win 0, options [mss 1460], length 0 x.x.x.x 20211005/13:55:30 13:55:16.374507 rule 0/0(match): block in on em0: x.x.x.x .59088 > Flags [S], seq 78435668, win 0, options [mss 1460], length 0 x.x.x.x 20211005/14:51:11 14:51:10.098806 rule 0/0(match): block in on vmx0: x.x.x.x .57642 > Flags [S], seq 990832545, win 0, options [mss 1460], length 0 ============================================= Notes: --------------------------------------------- * Any line containing a 'GET' or a 'POST' request refers to an attempt to access, exploit, or test for, a vulnerability or an attack vector on a webserver. The most prevalent attempts are 'wp-login' and 'wp-admin', and Joomla/Drupal equivalents. We host zero WordPress/Joomla/Drupal installations. This is usually a sign of a computer that is itself infected with a trojan or other malware, and is looking to infect other machines. * Connections must have completed the three-way handshake before being logged and processed; spoofed connection attemtps are not logged and not listed. * We will not help you solve your problem. Please talk to a professional systems administrator, and/or scan your system using up-to-date antivirus software, and/or talk to your ISP or hoster. ---------------------------------------------------------------------------------------------------- Current EGP Cloudblock RBL listings in x.x.x.x /32: ---------------------------------------------------------------------------------------------------- x.x.x.x /32 Caught scanning for web/mail exploits / compromised hosts [strike 1: 1 day minimum] @@1633438272 -- Regards, EGP Abuse Dept. EGP Cloudblock RBL:
365 Group LLC
Trading as
Zdieľaný hosting
3 plány od 2,20 € do 4,41 €
Menej ako 4 $


2,49 € / Mes.
  • Priestor: 15 GB
  • Šírka pásma: Neobmedzené
  • Panel: cpanel
  • Počet stránok: 1
Zobraziť plán FastCloud
Menej ako 8 $

FastCloud Extra

4,99 € / Mes.
  • Priestor: 35 GB
  • Šírka pásma: Neobmedzené
  • Panel: cpanel
Zobraziť plán FastCloud Extra
Viac ako 10 $ Nie Nie
4 plány od 34,44 € do 80,41 € 42 plánov od 3,54 € do 141,47 €
Menej ako 4 $ Nie


4,00 € / Mes.
  • Priestor: 200 GB
  • Šírka pásma: Neobmedzené
Zobraziť plán StoragePromo-1
Menej ako 8 $ Nie

Budget Windows VPS US1

8,00 € / Mes.
  • Priestor: 25 GB
  • Šírka pásma: Neobmedzené
Zobraziť plán Budget Windows VPS US1
Viac ako 10 $

VPS Cloud 1

38,95 € / Mes.
  • Priestor: 50 GB
  • Šírka pásma: Neobmedzené
Zobraziť plán VPS Cloud 1

Budget Windows VPS US1.5

12,00 € / Mes.
  • Priestor: 30 GB
  • Šírka pásma: Neobmedzené
Zobraziť plán Budget Windows VPS US1.5
Dedikovaný server
4 plány od 79,89 € do 200,58 €
Menej ako 4 $ Nie Nie
Menej ako 8 $ Nie Nie
Viac ako 10 $

DS 1

90,35 € / Mes.
  • Priestor: 80 GB
  • Šírka pásma: Neobmedzené
Zobraziť plán DS 1
Cloud hosting
4 plány od 34,44 € do 80,41 €
Menej ako 4 $ Nie Nie
Menej ako 8 $ Nie Nie
Viac ako 10 $

Cloud 1

38,95 € / Mes.
  • Priestor: 50 GB
  • Šírka pásma: 2 TB
Zobraziť plán Cloud 1
Data Centers
4 z 6 3 z 6
Severná Amerika Áno Áno
Európa Áno Áno
Ázia Áno Áno
Oceánia Áno Nie
Južná Amerika Nie Nie
Afrika a Stredný východ Nie Nie
Služby podpory
6 z 6 3 z 6
Chat na živo Áno Áno
Telefónna podpora Áno Nie
E-mailová podpora Áno Áno
Podpora fóra Áno Nie
Video návody Áno Nie
Báza poznatkov Áno Áno
Podpora CMS
5 z 6 5 z 6
WordPress Áno Áno
Joomla Áno Áno
Drupal Áno Áno
Magento Áno Áno
Softaculous Nie Nie
PrestaShop Áno Áno
OS Podpora
1 z 2 1 z 2
Windows Nie Nie
Linux Áno Áno
Jazyková podpora
4 z 8 7 z 8
PHP Áno Áno
Java Nie Áno
Python Áno Áno
Node.js Áno Áno
Django Nie Áno
Perl Áno Áno
Ruby on Rails Nie Áno
Podpora databázy
3 z 3 3 z 3
MongoDB Áno Áno
MySQL Áno Áno
PostgreSQL Áno Áno
Podpora typov platieb
3 z 6 6 z 6
PayPal Áno Áno
kreditná karta Áno Áno
Moneybookers Nie Áno
bankový prevod Áno Áno
Webmoney Nie Áno
Bitcoin Nie Áno