/3x-ui

Xray panel supporting multi-protocol multi-user expire day & traffic & ip limit (Vmess & Vless & Trojan & ShadowSocks & Wireguard)

Primary LanguageJavaScriptGNU General Public License v3.0GPL-3.0

English | Chinese | Español

Image

An Advanced Web Panel • Built on Xray Core

GO Version Downloads License

Disclaimer: This project is only for personal learning and communication, please do not use it for illegal purposes, please do not use it in a production environment

Certificate

sudo ufw allow 80/tcp
sudo ufw allow 443/tcp

sudo certbot certonly --standalone -d domain.com
# Certificate is saved at: /etc/letsencrypt/live/domain.com/fullchain.pem
# Key is saved at:         /etc/letsencrypt/live/domain.com/privkey.pem
sudo certbot renew --dry-run

Docker compose file

So the final version of our docker-compose.yml will look something like this:

---
version: "3"

services:
3x-ui:
    image: ghcr.io/mhsanaei/3x-ui:latest
    container_name: 3x-ui
    hostname: domain.com
    volumes:
    - $PWD/db/:/etc/x-ui/
    - /etc/letsencrypt/:/etc/letsencrypt/:rw
    environment:
    XRAY_VMESS_AEAD_FORCED: "false"
    tty: true
    network_mode: host
    restart: unless-stopped
docker compose up -d

After that you will be able to login to your panel with default credentials (admin/admin) on

http://domain.com:2053/

Navigate to Panel Settings and under the General tab we will add our SSL certificate paths:

publich key path: /etc/letsencrypt/live/domain.com/fullchain.pem
private key path: /etc/letsencrypt/live/domain.com/privkey.pem

Image

Press Save but do not restart the panel just yet. Instead head to Authentication and change your password (and username). Now you can save and restart the panel after which make sure to login using https://domain.com:2053.

Setting up a tunnel

To setup a tunnel, head to Inbounds and click on Add Inbound button.

Do not yet touch the Client configuration, we will deal with it in the next step.

In the Remark field it is good to give the tunnel an appropriate name.

Choose a Port number. It is good idea to use some common web port, such as https 443. In my case it is already in use so I set my port to 8080.

For Security you should chose REALITY.

As uTLS you can chose any browser you like, in my case I use firefox.

In the Dest and SNI fields we will add the URLs that the traffic will pretend to be destining to.

Finally in the bottom click on Get New Cert button.

For all the other options you should use the defaults.

Image

Setting up users

Now you can click open the Client section. You can see an auto-generated client. You can modify an Email field if you want or live it as is.

There is no need to modify additional fields if you do not want to limit the traffic quota etc for the user.

Now you can press Create to create your client.

If you want to add additional users, you can do so by pressing the 3 dots next to the tunnel name and selecting Add Client option from the list:

Image

sudo ufw allow 8080/tcp

Install & Upgrade

bash <(curl -Ls https://raw.githubusercontent.com/mhsanaei/3x-ui/master/install.sh)

Install Custom Version

To install your desired version, add the version to the end of the installation command. e.g., ver v2.3.11:

bash <(curl -Ls https://raw.githubusercontent.com/mhsanaei/3x-ui/master/install.sh) v2.3.11

SSL Certificate

Click for SSL Certificate details

ACME

To manage SSL certificates using ACME:

  1. Ensure your domain is correctly resolved to the server.

  2. Run the x-ui command in the terminal, then choose SSL Certificate Management.

  3. You will be presented with the following options:

    • Get SSL: Obtain SSL certificates.
    • Revoke: Revoke existing SSL certificates.
    • Force Renew: Force renewal of SSL certificates.

Certbot

To install and use Certbot:

apt-get install certbot -y
certbot certonly --standalone --agree-tos --register-unsafely-without-email -d yourdomain.com
certbot renew --dry-run

Cloudflare

The management script includes a built-in SSL certificate application for Cloudflare. To use this script to apply for a certificate, you need the following:

  • Cloudflare registered email
  • Cloudflare Global API Key
  • The domain name must be resolved to the current server through Cloudflare

How to get the Cloudflare Global API Key:

  1. Run the x-ui command in the terminal, then choose Cloudflare SSL Certificate.
  2. Visit the link: Cloudflare API Tokens.
  3. Click on "View Global API Key" (see the screenshot below):
  4. You may need to re-authenticate your account. After that, the API Key will be shown (see the screenshot below):

When using, just enter your domain name, email, and API KEY. The diagram is as follows:

Manual Install & Upgrade

Click for manual install details

Usage

  1. To download the latest version of the compressed package directly to your server, run the following command:
ARCH=$(uname -m)
case "${ARCH}" in
  x86_64 | x64 | amd64) XUI_ARCH="amd64" ;;
  i*86 | x86) XUI_ARCH="386" ;;
  armv8* | armv8 | arm64 | aarch64) XUI_ARCH="arm64" ;;
  armv7* | armv7) XUI_ARCH="armv7" ;;
  armv6* | armv6) XUI_ARCH="armv6" ;;
  armv5* | armv5) XUI_ARCH="armv5" ;;
  s390x) echo 's390x' ;;
  *) XUI_ARCH="amd64" ;;
esac


wget https://github.com/MHSanaei/3x-ui/releases/latest/download/x-ui-linux-${XUI_ARCH}.tar.gz
  1. Once the compressed package is downloaded, execute the following commands to install or upgrade x-ui:
ARCH=$(uname -m)
case "${ARCH}" in
  x86_64 | x64 | amd64) XUI_ARCH="amd64" ;;
  i*86 | x86) XUI_ARCH="386" ;;
  armv8* | armv8 | arm64 | aarch64) XUI_ARCH="arm64" ;;
  armv7* | armv7) XUI_ARCH="armv7" ;;
  armv6* | armv6) XUI_ARCH="armv6" ;;
  armv5* | armv5) XUI_ARCH="armv5" ;;
  s390x) echo 's390x' ;;
  *) XUI_ARCH="amd64" ;;
esac

cd /root/
rm -rf x-ui/ /usr/local/x-ui/ /usr/bin/x-ui
tar zxvf x-ui-linux-${XUI_ARCH}.tar.gz
chmod +x x-ui/x-ui x-ui/bin/xray-linux-* x-ui/x-ui.sh
cp x-ui/x-ui.sh /usr/bin/x-ui
cp -f x-ui/x-ui.service /etc/systemd/system/
mv x-ui/ /usr/local/
systemctl daemon-reload
systemctl enable x-ui
systemctl restart x-ui

Install with Docker

Click for Docker details

Usage

  1. Install Docker:

    bash <(curl -sSL https://get.docker.com)
  2. Clone the Project Repository:

    git clone https://github.com/MHSanaei/3x-ui.git
    cd 3x-ui
  3. Start the Service:

    docker compose up -d

    OR

    docker run -itd \
       -e XRAY_VMESS_AEAD_FORCED=false \
       -v $PWD/db/:/etc/x-ui/ \
       -v $PWD/cert/:/root/cert/ \
       --network=host \
       --restart=unless-stopped \
       --name 3x-ui \
       ghcr.io/mhsanaei/3x-ui:latest
  4. Update to the Latest Version:

    cd 3x-ui
    docker compose down
    docker compose pull 3x-ui
    docker compose up -d
  5. Remove 3x-ui from Docker:

    docker stop 3x-ui
    docker rm 3x-ui
    cd --
    rm -r 3x-ui

Recommended OS

  • Ubuntu 20.04+
  • Debian 11+
  • CentOS 8+
  • Fedora 36+
  • Arch Linux
  • Parch Linux
  • Manjaro
  • Armbian
  • AlmaLinux 9+
  • Rocky Linux 9+
  • Oracle Linux 8+
  • OpenSUSE Tubleweed

Supported Architectures and Devices

Click for Supported Architectures and devices details

Our platform offers compatibility with a diverse range of architectures and devices, ensuring flexibility across various computing environments. The following are key architectures that we support:

  • amd64: This prevalent architecture is the standard for personal computers and servers, accommodating most modern operating systems seamlessly.

  • x86 / i386: Widely adopted in desktop and laptop computers, this architecture enjoys broad support from numerous operating systems and applications, including but not limited to Windows, macOS, and Linux systems.

  • armv8 / arm64 / aarch64: Tailored for contemporary mobile and embedded devices, such as smartphones and tablets, this architecture is exemplified by devices like Raspberry Pi 4, Raspberry Pi 3, Raspberry Pi Zero 2/Zero 2 W, Orange Pi 3 LTS, and more.

  • armv7 / arm / arm32: Serving as the architecture for older mobile and embedded devices, it remains widely utilized in devices like Orange Pi Zero LTS, Orange Pi PC Plus, Raspberry Pi 2, among others.

  • armv6 / arm / arm32: Geared towards very old embedded devices, this architecture, while less prevalent, is still in use. Devices such as Raspberry Pi 1, Raspberry Pi Zero/Zero W, rely on this architecture.

  • armv5 / arm / arm32: An older architecture primarily associated with early embedded systems, it is less common today but may still be found in legacy devices like early Raspberry Pi versions and some older smartphones.

  • s390x: This architecture is commonly used in IBM mainframe computers and offers high performance and reliability for enterprise workloads.

Languages

  • English
  • Farsi
  • Chinese
  • Russian
  • Vietnamese
  • Spanish
  • Indonesian
  • Ukrainian

Features

  • System Status Monitoring
  • Search within all inbounds and clients
  • Dark/Light theme
  • Supports multi-user and multi-protocol
  • Supports protocols, including VMess, VLESS, Trojan, Shadowsocks, Dokodemo-door, Socks, HTTP, wireguard
  • Supports XTLS native Protocols, including RPRX-Direct, Vision, REALITY
  • Traffic statistics, traffic limit, expiration time limit
  • Customizable Xray configuration templates
  • Supports HTTPS access panel (self-provided domain name + SSL certificate)
  • Supports One-Click SSL certificate application and automatic renewal
  • For more advanced configuration items, please refer to the panel
  • Fixes API routes (user setting will be created with API)
  • Supports changing configs by different items provided in the panel.
  • Supports export/import database from the panel

Default Panel Settings

Click for default settings details

Username & Password & webbasepath:

These will be generated randomly if you skip modifying them.

  • Port: the default port for panel is 2053

Database Management:

You can conveniently perform database Backups and Restores directly from the panel.

  • Database Path:
    • /etc/x-ui/x-ui.db

Web Base Path

  1. Reset Web Base Path:

    • Open your terminal.
    • Run the x-ui command.
    • Select the option to Reset Web Base Path.
  2. Generate or Customize Path:

    • The path will be randomly generated, or you can enter a custom path.
  3. View Current Settings:

    • To view your current settings, use the x-ui settings command in the terminal or View Current Settings in x-ui

Security Recommendation:

  • For enhanced security, use a long, random word in your URL structure.

Examples:

  • http://ip:port/*webbasepath*/panel
  • http://domain:port/*webbasepath*/panel

WARP Configuration

Click for WARP configuration details

Usage

For versions v2.1.0 and later:

WARP is built-in, and no additional installation is required. Simply turn on the necessary configuration in the panel.

For versions before v2.1.0:

  1. Run the x-ui command in the terminal, then choose WARP Management.

  2. You will see the following options:

    • Account Type (free, plus, team): Choose the appropriate account type.
    • Enable/Disable WireProxy: Toggle WireProxy on or off.
    • Uninstall WARP: Remove the WARP application.
  3. Configure the settings as needed in the panel.

IP Limit

Click for IP limit details

Usage

Note: IP Limit won't work correctly when using IP Tunnel.

  • For versions up to v1.6.1:
    • The IP limit is built-in to the panel

For versions v1.7.0 and newer:

To enable the IP Limit functionality, you need to install fail2ban and its required files by following these steps:

  1. Run the x-ui command in the terminal, then choose IP Limit Management.

  2. You will see the following options:

    • Change Ban Duration: Adjust the duration of bans.
    • Unban Everyone: Lift all current bans.
    • Check Logs: Review the logs.
    • Fail2ban Status: Check the status of fail2ban.
    • Restart Fail2ban: Restart the fail2ban service.
    • Uninstall Fail2ban: Uninstall Fail2ban with configuration.
  3. Add a path for the access log on the panel by setting Xray Configs/log/Access log to ./access.log then save and restart xray.

  • For versions before v2.1.3:

    • You need to set the access log path manually in your Xray configuration:

      "log": {
        "access": "./access.log",
        "dnsLog": false,
        "loglevel": "warning"
      },
  • For versions v2.1.3 and newer:

    • There is an option for configuring access.log directly from the panel.

Telegram Bot

Click for Telegram bot details

Usage

The web panel supports daily traffic, panel login, database backup, system status, client info, and other notification and functions through the Telegram Bot. To use the bot, you need to set the bot-related parameters in the panel, including:

  • Telegram Token
  • Admin Chat ID(s)
  • Notification Time (in cron syntax)
  • Expiration Date Notification
  • Traffic Cap Notification
  • Database Backup
  • CPU Load Notification

Reference syntax:

  • 30 \* \* \* \* \* - Notify at the 30s of each point
  • 0 \*/10 \* \* \* \* - Notify at the first second of each 10 minutes
  • @hourly - Hourly notification
  • @daily - Daily notification (00:00 in the morning)
  • @weekly - weekly notification
  • @every 8h - Notify every 8 hours

Telegram Bot Features

  • Report periodic
  • Login notification
  • CPU threshold notification
  • Threshold for Expiration time and Traffic to report in advance
  • Support client report menu if client's telegram username added to the user's configurations
  • Support telegram traffic report searched with UUID (VMESS/VLESS) or Password (TROJAN) - anonymously
  • Menu based bot
  • Search client by email ( only admin )
  • Check all inbounds
  • Check server status
  • Check depleted users
  • Receive backup by request and in periodic reports
  • Multi language bot

Setting up Telegram bot

  • Start Botfather in your Telegram account: Botfather

  • Create a new Bot using /newbot command: It will ask you 2 questions, A name and a username for your bot. Note that the username has to end with the word "bot". Create new bot

  • Start the bot you've just created. You can find the link to your bot here. token

  • Enter your panel and config Telegram bot settings like below: Panel Config

Enter your bot token in input field number 3. Enter the user ID in input field number 4. The Telegram accounts with this id will be the bot admin. (You can enter more than one, Just separate them with ,)

  • How to get Telegram user ID? Use this bot, Start the bot and it will give you the Telegram user ID. User ID

API Routes

Click for API routes details

Usage

  • /login with POST user data: {username: '', password: ''} for login
  • /panel/api/inbounds base for following actions:
Method Path Action
GET "/list" Get all inbounds
GET "/get/:id" Get inbound with inbound.id
GET "/getClientTraffics/:email" Get Client Traffics with email
GET "/getClientTrafficsById/:id" Get client's traffic By ID
GET "/createbackup" Telegram bot sends backup to admins
POST "/add" Add inbound
POST "/del/:id" Delete Inbound
POST "/update/:id" Update Inbound
POST "/clientIps/:email" Client Ip address
POST "/clearClientIps/:email" Clear Client Ip address
POST "/addClient" Add Client to inbound
POST "/:id/delClient/:clientId" Delete Client by clientId*
POST "/updateClient/:clientId" Update Client by clientId*
POST "/:id/resetClientTraffic/:email" Reset Client's Traffic
POST "/resetAllTraffics" Reset traffics of all inbounds
POST "/resetAllClientTraffics/:id" Reset traffics of all clients in an inbound
POST "/delDepletedClients/:id" Delete inbound depleted clients (-1: all)
POST "/onlines" Get Online users ( list of emails )

*- The field clientId should be filled by:

  • client.id for VMESS and VLESS

  • client.password for TROJAN

  • client.email for Shadowsocks

  • API Documentation

  • Run In Postman

Environment Variables

Click for environment variables details

Usage

Variable Type Default
XUI_LOG_LEVEL "debug" | "info" | "warn" | "error" "info"
XUI_DEBUG boolean false
XUI_BIN_FOLDER string "bin"
XUI_DB_FOLDER string "/etc/x-ui"
XUI_LOG_FOLDER string "/var/log"

Example:

XUI_BIN_FOLDER="bin" XUI_DB_FOLDER="/etc/x-ui" go build main.go

Preview

1 2 3 4 5 6 7

A Special Thanks to

Acknowledgment

  • Iran v2ray rules (License: GPL-3.0): Enhanced v2ray/xray and v2ray/xray-clients routing rules with built-in Iranian domains and a focus on security and adblocking.
  • Vietnam Adblock rules (License: GPL-3.0): A hosted domain hosted in Vietnam and blocklist with the most efficiency for Vietnamese.

Stargazers over Time

Stargazers over time