Abuse & acceptable use
We investigate spam, phishing, malware, copyright issues, and resource abuse on our network. Reports should include timestamps, URLs, and evidence where possible.
Outbound email: bulk and marketing mail must comply with law and our policies. Dedicated SMTP providers are often required for large lists.
Resource fairness: shared plans are subject to soft limits; sustained CPU or disk I/O that impacts neighbors may be throttled or moved to a higher tier.
Full legal terms, prohibited content, and enforcement live in the Terms of Service. The contact form can route abuse reports when configured.