Skip to main content

Prohibited Applications and Activities

Our Acceptable Use Policy (AUP) explains the terms of using our services. You must comply with these policies and engage only in legal activities. The following violations will result in account termination or legal action: We split the rules into three quick-reference sections so you can confirm compliance easily.

1. Zero-Tolerance Offences

The following violations will result in account termination and legal action:

🚨 Child Sexual Abuse Material CSAM

  • Hosting or distributing CSAM will lead to immediate account termination and reporting to authorities.

🦠 Malware & Botnets

C2 Servers, sinkholes, droppers, phishing kits or similar tools lead to immediate termination - no warnings are sent.

🔓 Unauthorized Access

Attempts to tamper with EDBB infrastructure or upstream carriers void your service agreement immediately.

🌪️ DDoS Operations

Launching attacks (booter services), any kind of stress testing, or using EDBB infrastructure for attacks is prohibited.

🛍️ Counterfeit Commerce, "fake shops"

  • Hosting websites selling counterfeit products (e.g., fake Nike, Adidas, Moncler, …) leads to account suspension.

2. Network and Platform Safeguards

The following activities are forbidden and will lead to account suspension or termination.

📨 SPAM & Bulk Messaging

Unsolicited email, SMS, or direct messages are not allowed. Verified complaints suspend the service; repeat offences result in cancellation without refund.

🧮 IPv6 Usage

  • Maximum of 10 simultaneously configured IPv6 addresses per VPS.
  • Rapid rotation or randomized usage (random IPv6 proxies) are not allowed.
  • Flooding the Neighbor Discovery cache leads to account termination.

🕵️ Scanning

Unauthorized port scans, vulnerability probing against third-party infrastructure are not allowed. (Get in touch to obtain an exempt if you are a security firm conducting contractual work).

🛡️ TOR & Anonymity

Entry nodes and middle relays are allowed; TOR exit nodes, I2P outproxies, and similar egress services are forbidden.

💬 IRC Hosting

IRC workloads attract attacks. Review the Advisory for High-Risk Clients before deploying IRC-related services.

⛏️ Cryptocurrency Mining

Cryptocurrency mining activities are prohibited on EDBB VPS plans (and no longer profitable anyway)

3. Content and Conduct Rules

Users must respect the dignity, rights, and safety of others. The following activities are strictly forbidden and will result in account termination:

📚 Intellectual Property

  • Distributing, hosting, or endorsing content that infringes on intellectual property rights, including copyrights, trademarks, and patents.

🗞️ Defamation

  • Publishing or sharing knowingly false information with the purpose of damaging the reputation of individuals or organizations.

🔐 Privacy

  • Unauthorized sharing of private information, images, videos, or other content that violates personal privacy.

💙 Self-Harm Advocacy

Content that promotes, instructs, or glorifies self-harm or suicide is not allowed.

🚫 Extremist Content

  • Distributing or endorsing materials that promote radical ideologies, hate speech, or discrimination.

⚖️ Illegal Content

Hosting any illegal content (e.g. “warez”) will result in account suspension.

4. Staying Compliant

  • Keep your contact details up-to-date so you can respond quickly to abuse notifications.
  • Apply strong passwords, MFA, and regular patching to prevent compromised workloads.
  • Unsure about an edge case? Contact EDBB Support for clarification before deploying.
Following these guidelines keeps the network safe for everyone and ensures your services stay online without interruption.

5. Security Research and Authorized Testing Activities

We actively support verified security research and controlled commercial testing. If your work includes hosting sinkholes, operating honeypots, monitoring network segments, conducting forensic or traffic analysis, or performing authorized stress and resilience tests — we can provide suitable exemptions and infrastructure guidance. Security software developers, accredited research teams, and governmental entities conducting legitimate investigations are welcome to collaborate under predefined security frameworks.