⌘K
Change language Switch ThemeSign In
Narrow Mode
Best Practices for Securing a New VPS with Tailscale and Cloudflare ===================================================================
Best Practices for Securing a New VPS with Tailscale and Cloudflare ===================================================================  ### @levelsio
@levelsio
When I set up a new Hetzner VPS first thing I do install Tailscale and once I'm in via Tailscale lock down the firewall to only accept web traffic on HTTPS 443 for Cloudflare IPs and SSH 22 for Tailscale IP
That way nobody can get in
I know I keep repeating this but it should be basics of setting up a new VPS
So basic IMHO it should be part of any VPS service to default install Tailscale and enable it so it's the only way to get in
Why?
A VPS server is just like your laptop or destop computer but now imagine if it's connected to the entire internet with 8 billion people that can access it and try hack it
You want to only have it accessible to you
And if you want to host a website on your VPS (like I do), you should only let Cloudflare access your VPS so it can stand in front and block any hack attempts
Never expose a VPS to the world wide web which realistically is the world WILD web Show More
#### Areeb ur Rub
@areeburrub · 2h ago @levelsio @nfcodes I created a redis instance on hetzner with public port open for few minutes and someone was running a cryptominer the next moment taking 50% CPU 💀
After that I always use @Tailscale 👌
3
1
35
101.9K
Mar 16, 2026, 2:11 PM View on X
72 Replies
53 Retweets
1,243 Likes
123.3K Views  @levelsio @levelsio
One Sentence Summary
The author recommends a security baseline for new VPS setups: using Tailscale for private SSH access and Cloudflare to proxy all public web traffic.
Summary
This tweet outlines a robust security workflow for setting up a new Virtual Private Server (VPS). The author advocates for installing Tailscale immediately to handle SSH (Port 22) access privately, while locking down the firewall to only accept HTTPS (Port 443) traffic from Cloudflare IP addresses. This 'Zero Trust' approach ensures the server is never directly exposed to the public internet, significantly reducing the attack surface against automated bots and hackers.
AI Score
84
Influence Score 407
Published At Today
Language
English
Tags
VPS Security
Tailscale
Cloudflare
DevOps
Cybersecurity HomeArticlesPodcastsVideosTweets
Best Practices for Securing a New VPS with Tailscale and ... ===============