InterNetX: Difference between revisions
No edit summary |
No edit summary |
||
Line 6: | Line 6: | ||
| ownership = [[United Internet Holdings]] (as of 2004) | | ownership = [[United Internet Holdings]] (as of 2004) | ||
| headquarters = Maximilianstraße 6,<br/>D-93047 Regensburg | | headquarters = Maximilianstraße 6,<br/>D-93047 Regensburg | ||
| employees = | | employees = 75 | ||
| revenue = 15 million euros (2006) | | revenue = 15 million euros (2006) | ||
| keypeople = [[Thomas Moerz]], CEO<br> | | keypeople = [[Thomas Moerz]], CEO<br> |
Revision as of 08:30, 3 December 2010
Industry: | Domain Services, Server Solutions |
Founded: | 1998 |
Founder(s): | Hakan Ali, Curd Bems |
Ownership: | United Internet Holdings (as of 2004) |
Headquarters: | Maximilianstraße 6, D-93047 Regensburg |
Employees: | 75 |
Revenue: | 15 million euros (2006) |
Website: | InterNetX.com |
Key People | |
Thomas Moerz, CEO Hakan Ali, Dir of Mktg and Sales |
InterNetX GmbH was founded in 1998 in Regensburg, Germany. The company provides Internet business solutions, domain sales, virtual and dedicated servers, as well as customized server solutions for resellers and providers. They manage over 2.9 million domains and more than 1,400 physical servers with a focus on professional users in the European marketplace. [1]
InterNetX is accredited with VeriSign, Afilias, PIR, NeuStar and quite a few other registries, providing domains in over 300 TLDs. Via its subsidiary PSI-USA it is an official ICANN registrar. [2]
Products and Services
- Virtual and dedicated, as well as custom server solutions
- AutoDNS: Domain registration, DNS and management. In service since 1998 and currently awaiting it's 3rd revision.
- IX-TKÜV is another software developed by the company; created for the purpose of monitoring the contents of email traffic (of course in keeping with national laws). [3]
Recent news
The company recently came under a severe DDoS attack that came close to bringing down its services. Since the attack the firm has devoted considerable resources to understanding the methodology behind the attack. [4]