Acceptable Use

Zero abuse tolerance protects the network, customers, and upstream partners.

Updated: January 27, 2026

1. Purpose

This policy defines prohibited uses of our cloud services and ensures safe, lawful, and reliable operation for all customers.

2. Prohibited activities

The following activities are prohibited:

  • Spam, unsolicited bulk messaging, or open relays.
  • DDoS attacks, booter services, or traffic amplification.
  • Malware, botnets, phishing, credential theft, or fraud.
  • Unauthorized access, exploitation, or privilege escalation.
  • Illegal content or content that violates third-party rights.

3. Network abuse and resource impact

Activities that degrade network performance or impact other customers are prohibited, including excessive scanning, abusive automation, or sustained traffic patterns that overwhelm shared resources.

4. Security testing

Penetration testing is allowed only for assets you own and only with prior written approval. Unauthorized testing is prohibited.

5. Content and compliance

Customers are responsible for all content hosted on our services. We reserve the right to remove or suspend content that violates the law or this policy.

6. Enforcement

We may throttle, suspend, or terminate services immediately when abuse is detected. Security of the network takes priority.

7. Cooperation

We cooperate with CERT teams and authorized authorities when required by law or necessary to protect infrastructure.

8. Reporting abuse

[email protected]