Skip to main content

High traffic and VPN usage in Time4VPS servers

Updated over a week ago

When the traffic is too high from the server, Time4VPS opens the abuse ticket. The high traffic is affecting the Time4VPS network, and as a result, we need to open a ticket that must be resolved, or the server will be suspended.

When the ticket is opened, we usually provide in the evidence section when high traffic was detected and pkts/s number, for example:

Sending UDP 171467 pkts/s Graphs 2026-02-16 11:17:55

If the pkts/s rate exceeds the recommended limit, the abuse team will open an abuse ticket. A client might not see anything suspicious; bandwidth usage in this case usually is not reached, but networks are often limited by packets per second (pps), not just Mbps.

We have noticed that this issue is being caused by VPN usage on the server.

Time4VPS does not prohibit VPN usage on the server, but due to high pkts/s, the network is being affected.

1. Understand Why UDP Traffic Is High

Most VPN protocols use UDP for performance reasons (OpenVPN in UDP mode, WireGuard, etc.). High packet rates can happen if:

  • You have many simultaneous clients connected.

  • Some clients are doing high-bandwidth transfers, like torrents (it is not allowed to be used in Time4VPS) or streaming.

  • Your server is misconfigured, causing excessive keepalive messages or retries.

  • There is a DDoS attack coming from your server (compromised machine or open VPN endpoints being abused).

2. Check Traffic Sources

You need to see what is generating this traffic:

  • On Linux:

sudo iftop -i eth0 sudo nload sudo iptables -L -v -n
  • Or use vnStat to monitor overall bandwidth.

  • Check VPN logs (WireGuard/OpenVPN) for abnormal usage or repeated connections from the same IPs.

3. Mitigation Steps

If the traffic is legitimate VPN traffic:

  1. Limit connections per user: Donโ€™t allow unlimited clients if your VPS is small.

  2. Throttle bandwidth: Many VPNs allow rate limiting per user.

  3. Switch VPN protocol if needed: WireGuard is more efficient than OpenVPN in UDP.

  4. Enable logging and monitoring to catch abuse early.

If traffic is malicious:

  • Block suspicious IPs with iptables or ufw.

  • Consider rate-limiting UDP packets:

sudo iptables -A INPUT -p udp --dport 1194 -m limit --limit 1000/s -j ACCEPT
  • Ensure your VPN credentials are not being shared publicly.

4. Torrent Usage

Time4VPS doesn't allow Torrenting on servers, and if you use a server as a VPN server, you must ensure torrenting is blocked on the VPS.

The server configuration, security, and all activity originating from it are entirely the responsibility of the VPS owner, in accordance with our Terms of Service. Even if the server is being used by multiple users, the VPS owner will be responsible for all the illegal activities.

You can block common torrent ports:

iptables -A FORWARD -p tcp --dport 6881:6999 -j REJECT 
iptables -A FORWARD -p udp --dport 6881:6999 -j REJECT

Torrent traffic creates huge connection counts and high PPS.

Limit connections per client:

iptables -A FORWARD -p udp -m connlimit --connlimit-above 100 -j REJECT

Torrent clients connect to hundreds of peers simultaneously.

You can limit connections per client IP:

iptables -A FORWARD -p tcp -m connlimit --connlimit-above 80 -j REJECT

Normal users:

  • Browsing = 10โ€“30 connections

  • Streaming = < 50

  • Torrent = 200โ€“1000+

Did this answer your question?