← Back home

Abuse & acceptable use

We investigate spam, phishing, malware, copyright issues, and resource abuse on our network. Reports should include timestamps, URLs, and evidence where possible.

Outbound email: bulk and marketing mail must comply with law and our policies. Dedicated SMTP providers are often required for large lists.

Resource fairness: shared plans are subject to soft limits; sustained CPU or disk I/O that impacts neighbors may be throttled or moved to a higher tier.

Full legal terms, prohibited content, and enforcement live in the Terms of Service. The contact form can route abuse reports when configured.

₹1 checkout WA