Knowledge Base

Acceptable Use Policy

We strictly prohibit illegal activities and content that can harm our infrastructure or other users.

What's not allowed:

  • Content violating intellectual property, privacy, or laws.
  • Deceptive, violent, or obscene content.
  • Malware, hacking attempts, or DDoS attacks.
  • Spam, mass marketing, or investment scams.
  • Brute-force attacks or vulnerability scans.
  • Traffic exchange/relay websites or public proxies.
  • Mass file storage like image/video hosting or torrents.
  • Excessive resource usage impacting other customers.
  • Unsecured services attracting constant attacks.
  • Scraping, overloading websites, or running web automation tools.
  • Cryptocurrency mining exceeding allocated resources.

We have sole discretion over acceptable content and reserve the right to remove inappropriate material. You are liable for damages caused by violating these terms.

Additional Restrictions:

  • Creating multiple accounts for the same user or exceeding deposit limits.
  • Abusing bugs in our billing system.
  • Mass mailing without prior approval.

Consequences of violating these terms include account termination, service interruption, and denial of incorrectly priced orders.

Resource Usage Limits:

  • CPU: Usage cannot exceed 50% average over 2 hours (except dedicated CPU plans).
  • Load: Average load cannot exceed assigned cores.
  • Mail: Limit of 100 emails per hour (custom plans may differ).
  • I/O: Limits on disk write speeds, write operations, and utilization.
  • Network: Limit of 50,000 concurrent connections and allocated bandwidth usage.

We reserve the right to prioritize resources to avoid congestion.

Please rate this article to help us improve our Knowledge Base.

0 0