Build your own cloud!
Discover the newest dedicated servers in our portfolio! Perfect for virtualization, cloud computing, data analytics, machine learning and much more!
Start at €89.00 ►
Dedicated Server Features
iLO Remote Console
DDoS Protection
Enterprise Line by HP
High Grade Hardware Network
Hardware specialists
Square Corners
Why do our dedicated servers stand out?
DDoS Protection Included
In Iceland, Romania and the Netherlands, we have made it standard for all services to be protected against disruptive DDoS attacks at no extra cost. Yes, completely free!
Network Connectivity
FlokiNET connects only to the best carriers and providers available, providing premium uncongested access to the internet. 1 or 10 Gbps connection options are readily available.
Customizable
Choose the specific hardware components, such as RAM, storage (HDD, SSD, NVMe), and network connectivity, to match your specific workload requirements.
Management Options
By placing you in direct contact with our experienced technicians, we ensure efficient and attentive issue resolution and useful recommendations.
Server Specs
Dedicated server specification & pricing details
Frequently Asked Questions
FlokiNET provides a secure network environment that allows each client to authenticate and access only the management interface of the purchased Dedicated Server.
What's more, all FlokiNET Dedicated Servers come with the latest version of Hewlett-Packard's integrated lights-out firmware.
These two features, combined with customized configuration optimizations, provide the best possible security standard for your FlokiNET Dedicated Server management interface.
The most common reason is that Windows has not been activated with a valid license.
Since do not provide Windows licenses, you will need to provide your own license for the Windows operating systems you have installed.
FlokiNET Dedicated Servers serve a wide range of applications, so estimating how many visitors you can have daily is fairly complex.
We always recommend a server that fits your budget first, as upgrades are fast and flexible, and our support staff is always there to give you the best advice.
To upgrade your server, you simply need to contact our support team via ticket with your needs.
There are some technical limitations we have to take into account, but our hardware team will always advise you before any upgrade.
Replacing the processor unit is currently not possible, but basically everything else in the server can be upgraded.
FlokiNET will not throttle your network speed or terminate your connection because you have reached your bandwidth quota.
Additional bandwidth packages are available in all locations and can be added on the fly. If you have any questions feel tree to contact us at any time!
FlokiNET is proud to be completely TOR-friendly!
Feel free to host .onion websites and/or Tor nodes. We provide support for configuration and routing through TOR.
TOR or The Onion Router is free software and an open network which allows users to enhance their privacy and security on the Internet.
The primary audience for Tor are journalists, legal activists, whistleblowers, and people living in countries with censorship. Other key users include bloggers, business executives, IT professionals and law enforcement officers.
Definitely!
Although the supply of IPv4 is limited, you can purchase them in the client area or simply contact our staff and we will assist you!
All our locations support IPv6. If you need more /64 just let us know.
10Gbit uplinks are reserved for large networks and demanding servers, Usually these are clients with the latest generation of Dedicated Servers.
If you are not sure if this applies, simply calculate if the 1Gbit provided network is capping your network/server requirements and let us know. We will definitely assist you expanding those network limits up to 100gbit uplink.
- Malicious Activities
- Any activity related to spam (relays, sites, links, proxy)
- Netscan/portscan activities
- DDoS originations of any kind
- Malware distribution, hacking attempts (e.g., SQL injection attacks, remote code execution)
- Operating or participating in a botnet, doorway pages, or carding activities
- Phishing, scam or impersonation platforms for stealing information/money (e.g., credit card, password scam sites, fake cryptocurrency exchanges)
- Impersonation platforms (e.g., eBay, PayPal, or any other known institutions)
- Illegal and Harmful Content
- Hosting or sharing child pornography
- Selling pharmaceuticals without a license
- Sharing or distributing materials related to terrorism
- Doxxing: revealing or sharing personal and private information without consent (privacy violation)
- Server Abuse
- Chia mining on shared hosted accounts, VPS or dedicated servers