Acceptable Usage Policy
All services provided by the Provider may be used solely for lawful purposes. Any illegal activities are strictly prohibited, including:
1.1. Distribution of malicious programs such as viruses, worms, and Trojan horses.
1.2. Use of botnets and related technologies.
1.3. Committing destructive actions, including flooding, sending email "bombs," DDoS attacks, and any actions that disrupt the stability of the network and network equipment.
1.4. Spam.
1.5. Sale and distribution of narcotic drugs.
1.6. Distribution, transmission, storage, publication, and display of child pornography.
1.7. Unlawful or unauthorized access to computers or networks, including hacking attempts, port scanning, "stealth" scanning, and information gathering for unauthorized access.
1.8. Fraudulent schemes and projects.
1.9. Sale and distribution of stolen bank cards.
1.10. Phishing and related fraudulent activities.
1.11. Illegal trade of medical drugs.
1.12. Terrorist activities.
Additionally, the use of services for purposes that violate the legislation of the country and the established rules of the region is prohibited.
2. Prohibited actions
2.1. Providing VPN/Proxy services to third parties as a service is prohibited in all locations except in the cases outlined in clause 3.2.
2.2. Anonymous Hosting services are prohibited.
2.3. Running a Tor Exit Node is prohibited
2.4. Torrents are prohibited.
2.7. In locations Germany (Falkenstein), Finland, Germany (Dusseldorf), Germany (Dusseldorf-2), the use of applications for cryptocurrency mining is prohibited. This includes, but is not limited to, mining, farming, and plotting as well as cryptocurrency nodes and blockchain services.
3. Allowed actions wtih conditions
3.1. Websites with adult content (pornography) is allowed in all locations except Germany (Falkenstein), Finland and Russia (Moscow).
3.2. The use of VPNs and proxies is permitted for personal purposes, as well as for internal tasks within business accounts..
3.3. Using hosting services is allowed for business accounts only.
3.4. In all locations except Germany (Falkenstein), Finland, Germany (Dusseldorf), Germany (Dusseldorf-2), the use of applications for cryptocurrency mining has a resctriction: only plotting prohibited; storage (farming) is allowed.
4. SMTP traffic
4.1. For security and spam prevention purposes, the Provider reserves the right to impose restrictions on the use of SMTP protocols both during the activation of the Customer's order and at any time during the use of the service if suspicious activity is detected.