1. Use of Service
All services provided by the Provider can be used for legitimate purposes only. The following illegal actions are prohibited:
1.1. The spread of viruses, "worms", "Trojan horses".
1.2. Botnets and everything associated with them.
1.3. Destructive actions: flood, email "bombs" or DDOS attacks, as well as actions that disrupt the operation of the network and network equipment.
1.4. Spam.
1.5. Sale and distribution of narcotic drugs.
1.6. Dissemination, transfer, storage, publication and display of child pornography.
1.7. Illegal or unauthorized access to computers or networks.
Access, illegal or unauthorized, to computers, websites, bank accounts or networks belonging to another person / persons, or attempts to penetrate another person's systems ("hacking").
In addition, any action that can be used as a precursor to attempts to enter the system (for example, port scanning, "stealth" scanning or other information gathering).
1.8. Fraudulent projects.
1.9. Sale and distribution of stolen bank cards.
1.10. Phishing
1.11. Illegal trade of medical products.
1.12. Terrorism.
Also any action that contradicts the laws of the country and the rules of location is prohibited.
2. Prohibited actions
2.1. Providing VPN/Proxy services to third parties as a service is prohibited in all locations except in the cases outlined in clause 3.2.
2.2. Anonymous Hosting services are prohibited.
2.3. Running a Tor Exit Node is prohibited
2.4. Torrents are prohibited.
2.5. The Customer undertakes not to publish any content that infringes upon the rights of third parties. This includes, in particular, materials of an extremist nature, content that violates societal norms of decency, as well as gambling, materials that may negatively impact the morality of children or young people. This also includes the posting of defamatory content, insults, or humiliations towards individuals or groups of people.
2.6. The Customer undertakes not to publish any content that violates copyright rights, name rights, trademark rights, and data protection rights.
2.7. In locations Germany (Falkenstein), Finland, Germany (Dusseldorf), Germany (Dusseldorf-2), the use of applications for cryptocurrency mining is prohibited. This includes, but is not limited to, mining, farming, and plotting as well as cryptocurrency nodes and blockchain services.
3. Allowed actions wtih conditions
3.1. Websites with adult content (pornography) is allowed in all locations except Germany (Falkenstein), Finland and Russia (Moscow).
3.2. The use of VPNs and proxies is permitted for personal purposes, as well as for internal tasks within business accounts..
3.3. Using hosting services is allowed for business accounts only.
3.4. In all locations except Germany (Falkenstein), Finland, Germany (Dusseldorf), Germany (Dusseldorf-2), the use of applications for cryptocurrency mining has a resctriction: only plotting prohibited; storage (farming) is allowed.
4. SMTP traffic
4.1. For security and spam prevention purposes, the Provider reserves the right to impose restrictions on the use of SMTP protocols both during the activation of the Customer's order and at any time during the use of the service if suspicious activity is detected.