Listing Thumbnail

    Uptime Kuma : Secured W/ Nginx + Flatcar Linux

     Info
    Sold by: Decyphertek 
    Deployed on AWS
    Free Trial
    AWS Free Tier
    This product is a professionally repackaged version of the open-source Uptime Kuma, enhanced with advanced security features and offered as a ready-to-deploy solution.

    Overview

    Open image

    Professionally Repackaged for Security

    This product is a professionally repackaged version of the open-source Uptime Kuma, enhanced with advanced security features and offered as a ready-to-deploy solution. While the core software remains open-source, Decyphertek charges a fee for the added security enhancements and streamlined deployment process. This ensures users receive a secure, reliable, and enterprise-grade monitoring solution without the complexities of manual setup.

    Built on Immutable Infrastructure

    Decyphertek has fortified Uptime Kuma by running it within Docker on Flatcar Linux, an immutable operating system designed for security and stability. The immutable nature of Flatcar Linux ensures that the underlying system cannot be altered, significantly reducing the risk of unauthorized changes or vulnerabilities. Additionally, Uptime Kuma is secured behind an Nginx reverse proxy with self-signed certificates, providing an extra layer of protection against potential threats. To simplify Docker container management, Portainer is included, allowing users to easily monitor and control their containers.

    Packed with Powerful Features

    Uptime Kuma is packed with powerful features that make it one of the best monitoring tools available. It supports monitoring for HTTP/HTTPS URLs, TCP ports, DNS records, Docker containers, SQL databases, and even game servers. With beautiful ping charts, SSL certificate monitoring, and 20-second monitoring intervals, it provides enterprise-grade monitoring capabilities. The sleek, modern UI/UX includes dark and light modes, multi-language support, and the ability to host multiple status pages.

    Why Choose Decyphertek?

    Decyphertek delivers secure, ready to deploy solutions built on open-source foundations. We prioritize security, ease of use, and scalability, allowing you to focus on your core business without worrying about the complexities of technology. Decoding technology, so you don't have to.

    Highlights

    • Features: Web Monitoring , Docker Monitoring , Push Notifications , Self-Hosted , SSL Certificate Monitoring , Beautiful Ping Charts , 20-Second Monitoring Intervals , Multi-Language Support - Dark and Light Mode - Proxy Support - Two-Factor Authentication - API Key Support - Multiple Status Pages
    • Security: Immutable OS , Nginx Reverse Proxy , Manage via Portainer , Create Passwords on First Login
    • Why Choose Us?: Secure, Ready to Deploy Solutions , Built on Open Source Foundations , Prioritize Security, Ease of Use, and Scalability. Decoding Technology, So You Don't Have To.

    Details

    Delivery method

    Delivery option
    64-bit (x86) Amazon Machine Image (AMI)

    Latest version

    Operating system
    OtherLinux Flatcar Linux Stable

    Deployed on AWS
    New

    Introducing multi-product solutions

    You can now purchase comprehensive solutions tailored to use cases and industries.

    Multi-product solutions

    Features and programs

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Pricing

    Free trial

    Try this product free for 5 days according to the free trial terms set by the vendor. Usage-based pricing is in effect for usage beyond the free trial terms. Your free trial gets automatically converted to a paid subscription when the trial ends, but may be canceled any time before that.

    Uptime Kuma : Secured W/ Nginx + Flatcar Linux

     Info
    Pricing is based on actual usage, with charges varying according to how much you consume. Subscriptions have no end date and may be canceled any time.
    Additional AWS infrastructure costs may apply. Use the AWS Pricing Calculator  to estimate your infrastructure costs.
    If you are an AWS Free Tier customer with a free plan, you are eligible to subscribe to this offer. You can use free credits to cover the cost of eligible AWS infrastructure. See AWS Free Tier  for more details. If you created an AWS account before July 15th, 2025, and qualify for the Legacy AWS Free Tier, Amazon EC2 charges for Micro instances are free for up to 750 hours per month. See Legacy AWS Free Tier  for more details.

    Usage costs (452)

     Info
    • ...
    Dimension
    Cost/hour
    t2.medium
    Recommended
    $0.03
    t2.micro
    $0.03
    t3.micro
    $0.03
    d3.xlarge
    $0.03
    c5ad.large
    $0.03
    inf2.24xlarge
    $0.03
    m5a.4xlarge
    $0.03
    c5a.xlarge
    $0.03
    c5ad.8xlarge
    $0.03
    r6idn.xlarge
    $0.03

    Vendor refund policy

    Refunds available upon request.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Vendor terms and conditions

    Upon subscribing to this product, you must acknowledge and agree to the terms and conditions outlined in the vendor's End User License Agreement (EULA) .

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    64-bit (x86) Amazon Machine Image (AMI)

    Amazon Machine Image (AMI)

    An AMI is a virtual image that provides the information required to launch an instance. Amazon EC2 (Elastic Compute Cloud) instances are virtual servers on which you can run your applications and workloads, offering varying combinations of CPU, memory, storage, and networking resources. You can launch as many instances from as many different AMIs as you need.

    Resources

    Support

    Vendor support

    While we do not offer formal support, we provide comprehensive technical documentation via Read the Docs to assist with setup, configuration, and troubleshooting. If you encounter any bugs or misconfigurations, please feel free to email us at adminotaur@decyphertek.io  , and we will address them as part of our commitment to improving the platform.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    10
    In Device Management
    Top
    100
    In Data Analytics
    Top
    10
    In Analytics

    Overview

     Info
    AI generated from product descriptions
    Monitoring Capabilities
    Supports monitoring for HTTP/HTTPS URLs, TCP ports, DNS records, Docker containers, SQL databases, and game servers with 20-second monitoring intervals
    Reverse Proxy Security
    Secured behind Nginx reverse proxy with self-signed certificates providing an additional layer of protection
    Immutable Infrastructure
    Runs on Flatcar Linux, an immutable operating system that prevents unauthorized system alterations and reduces vulnerability risks
    Authentication and Access Control
    Includes two-factor authentication, API key support, and password creation on first login
    Container Management
    Includes Portainer for simplified Docker container monitoring and management
    Indicator of Compromise Lookup
    Query threat intelligence database using malware file hashes, domains, URLs, and IPv4 addresses to identify known malicious indicators with comprehensive metadata including threat categories, severity scores, CVE information, malware family names, and threat actor details.
    Known-Good Value Filtering
    Check suspected indicators against known-good values database to identify benign entities such as common Windows system files, well-known DNS servers, and CDN IP addresses to reduce false positive alerts.
    WHOIS Domain Registration Lookup
    Retrieve WHOIS registration data for domains to verify domain ownership and registration details for threat investigation and phishing scenario mitigation.
    Real-Time Threat Intelligence Updates
    Access continuously updated threat intelligence database sourced from reputable security vendors, threat researchers worldwide, and research communities with rapid identification and categorization of known threats.
    API Integration with Security Infrastructure
    Seamlessly integrate with existing security platforms including TIP, SIEM, and SOAR systems through documented API endpoints with sample code for minimal implementation effort.
    Cyber Threat Intelligence Collection
    Monitoring of thousands of sources including dark web forums, criminal marketplaces, encrypted chat channels, and open web to track cyber threat actors, ransomware, and malware with finished intelligence reports and indicators of compromise.
    Vulnerability Intelligence and Prioritization
    Vulnerability database with 328,000+ records enriched with EPSS scores, ransomware likelihood scores, social risk scores, exploit availability data, and temporal analysis for vulnerability prioritization and remediation.
    Identity Threat Detection
    Monitoring and detection of stolen credentials across company and customer accounts with account takeover mitigation capabilities and proactive credential buyback functionality.
    Financial Fraud Intelligence
    Analysis and monitoring of financial fraud threats including credit card scraping, cryptocurrency analysis, check fraud mitigation, and card shop intelligence.
    Physical Security Threat Monitoring
    Real-time geolocation-based threat monitoring across global locations with social media and open source aggregation for physical security intelligence and time-based threat analysis.

    Contract

     Info
    Standard contract
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    0 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    0%
    0%
    0%
    0 reviews
    No customer reviews yet
    Be the first to review this product . We've partnered with PeerSpot to gather customer feedback. You can share your experience by writing or recording a review, or scheduling a call with a PeerSpot analyst.