Hide your footprint with Radepa
Disclaimer: This project is only for personal learning and communication, please do not use it for illegal purposes, please do not use it in a production environment
radepa-x-ui panel supporting multi-protocol, Multi-lang (English,Farsi,Chinese,Russian)
If you think this project is helpful to you, you may wish to give a 🌟
bash <(curl -Ls https://raw.githubusercontent.com/4xmen/radepa-x-ui/master/install.sh)
apt-get install certbot -y
certbot certonly --standalone --agree-tos --register-unsafely-without-email -d yourdomain.com
certbot renew --dry-run
or you can use x-ui menu then number '16' (Apply for an SSL Certificate)
- Port: 2086
- username and password will be generated randomly if you skip to modify your own security(x-ui "7")
- database path: /etc/x-ui/x-ui.db
- xray config path: /usr/local/x-ui/bin/config.json
Before you set ssl on settings
After you set ssl on settings
Variable | Type | Default |
---|---|---|
XUI_LOG_LEVEL | "debug" | "info" | "warn" | "error" |
"info" |
XUI_DEBUG | boolean |
false |
XUI_BIN_FOLDER | string |
"bin" |
XUI_DB_FOLDER | string |
"/etc/x-ui" |
Example:
XUI_BIN_FOLDER="bin" XUI_DB_FOLDER="/etc/x-ui" go build main.go
copy and paste to xray Configuration : (you don't need to do this if you have a fresh install)
- traffic
- traffic + Block all Iran IP address
- traffic + Block all Iran Domains
- traffic + Block Ads + Use IPv4 for Google
- traffic + Block Ads + Route Google + Netflix + Spotify + OpenAI (ChatGPT) to WARP
WARP Configuration (Optional)
If you want to use routing to WARP follow steps as below:
-
If you already installed warp, you can uninstall using below command:
warp u
-
Install WARP on socks proxy mode:
curl -fsSL https://gist.githubusercontent.com/hamid-gh98/dc5dd9b0cc5b0412af927b1ccdb294c7/raw/install_warp_proxy.sh | bash
-
Turn on the config you need in panel or Copy and paste this file to Xray Configuration
Config Features:
- Block Ads
- Route Google + Netflix + Spotify + OpenAI (ChatGPT) to WARP
- Fix Google 403 error
- System Status Monitoring
- Search within all inbounds and clients
- Support Dark/Light theme UI
- Support multi-user multi-protocol, web page visualization operation
- Supported protocols: vmess, vless, trojan, shadowsocks, dokodemo-door, socks, http
- Support for configuring more transport configurations
- Traffic statistics, limit traffic, limit expiration time
- Customizable xray configuration templates
- Support https access panel (self-provided domain name + ssl certificate)
- Support one-click SSL certificate application and automatic renewal
- For more advanced configuration items, please refer to the panel
- Support to change configs by different items provided in panel
- Support export/import database from panel
- Stable APIs
- Hide your panel form GFW
X-UI supports daily traffic notification, panel login reminder and other functions through the Tg robot. To use the Tg robot, you need to apply for the specific application tutorial. You can refer to the blog Set the robot-related parameters in the panel background, including:
- Tg robot Token
- Tg robot ChatId
- Tg robot cycle runtime, in crontab syntax
- Tg robot Expiration threshold
- Tg robot Traffic threshold
- Tg robot Enable send backup in cycle runtime
- Tg robot Enable CPU usage alarm threshold
Reference syntax:
- 30 * * * * * //Notify at the 30s of each point
- 0 */10 * * * * //Notify at the first second of each 10 minutes
- @hourly // hourly notification
- @daily // Daily notification (00:00 in the morning)
- @weekly // weekly notification
- @every 8h // notify every 8 hours
- Report periodic
- Login notification
- CPU threshold notification
- Threshold for Expiration time and Traffic to report in advance
- Support client report menu if client's telegram username added to the user's configurations
- Support telegram traffic report searched with UID (VMESS/VLESS) or Password (TROJAN) - anonymously
- Menu based bot
- Search client by email ( only admin )
- Check all inbounds
- Check server status
- Check depleted users
- Receive backup by request and in periodic reports
cpsess7945419007/frontend/jupiter/api/v1/login
withPUSH
user data:{username: '', password: ''}
for login/cpsess7945419007/frontend/jupiter/api/v1
base for following actions:
Method | Path | Action |
---|---|---|
GET |
"/list" |
Get all inbounds |
GET |
"/get/:id" |
Get inbound with inbound.id |
GET |
"/getClientTraffics/:email" |
Get Client Traffics with email |
POST |
"/getData" |
Get single client usage, not need login ,required paramaters: email and password |
GET |
"/createbackup" |
Telegram bot sends backup to admins |
POST |
"/add" |
Add inbound |
POST |
"/del/:id" |
Delete Inbound |
POST |
"/update/:id" |
Update Inbound |
POST |
"/clientIps/:email" |
Client Ip address |
POST |
"/clearClientIps/:email" |
Clear Client Ip address |
POST |
"/addClient" |
Add Client to inbound |
POST |
"/:id/delClient/:clientId" |
Delete Client by clientId* |
POST |
"/updateClient/:clientId" |
Update Client by clientId* |
POST |
"/:id/resetClientTraffic/:email" |
Reset Client's Traffic |
POST |
"/resetAllTraffics" |
Reset traffics of all inbounds |
POST |
"/resetAllClientTraffics/:id" |
Reset traffics of all clients in an inbound |
POST |
"/delDepletedClients/:id" |
Delete inbound depleted clients (-1: all) |
*- The field clientId
should be filled by:
client.id
for VMESS and VLESSclient.password
for TROJANclient.email
for Shadowsocks
You need go lang 1.2
git clone https://github.com/4xmen/radepa-x-ui.git
cd radepa-x-ui.git
go get
go run main.go
This panel extended from 3x-ui with no break changes, stable release and hidden panel from GFW system.
- Ubuntu 20.04+
- Debian 10+
- CentOS 8+
- Fedora 36+
sudo apt update
sudo apt-get install nginx -y
sudo nano /etc/nginx/sites-enabled/default
Paste this:
# HTTP — redirect all traffic to HTTPS
server {
if ($host = your.domain.name) {
return 301 https://$host$request_uri;
}
listen 80;
listen [::]:80 ;
server_name your.domain.name;
return 404;
}
then to active ssl:
sudo nano /etc/nginx/sites-enabled/default
Paste this:
# rade pa proxy api
server {
# Enable HTTP/2
listen 443 ssl http2;
listen [::]:443 ssl http2;
server_name your.domain.name;
# Use the Let’s Encrypt certificates
ssl_certificate /etc/letsencrypt/live/your.domain.name/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/your.domain.name/privkey.pem;
location / {
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Host $host;
proxy_pass http://localhost:2086/;
proxy_http_version 1.1;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection "upgrade";
}
}
Don't forget you must change
ssl_certificate
andssl_certificate_key
and server port default is2086
then:
# Check if all configured correctly
sudo nginx -t
# Restart nginx
sudo systemctl restart nginx.service
sudo systemctl status nginx.service
# Auto renew SSL certificate
sudo certbot renew --dry-run
# Show certificates
sudo certbot certificates
-
Install Docker:
bash <(curl -sSL https://get.docker.com)
-
Clone the Project Repository:
git clone https://github.com/4xmen/radepa-x-ui.git cd radepa-x-ui
-
Start the Service
docker compose up -d
OR
docker run -itd \ -e XRAY_VMESS_AEAD_FORCED=false \ -v $PWD/db/:/etc/x-ui/ \ -v $PWD/cert/:/root/cert/ \ --network=host \ --restart=unless-stopped \ --name radepa-x-ui \ ghcr.io/4xmen/radepa-x-ui:latest