This Acceptable Use Policy (“AUP”) sets forth the conditions under which Customers and end users (“Users”) may access or use the Services provided by VELOXNODES (“Company,” “we,” “us,” or “our”) through veloxnodes.com.
The AUP is incorporated by reference into the Terms of Service (“TOS”) and applies to all use of Company infrastructure, networks, systems, and resources, whether directly or indirectly accessed.
The AUP aims to protect network integrity, ensure lawful conduct, safeguard users, and prevent misuse that may compromise the operation, reputation, or security of the Company, its datacenter providers, or the Internet at large.
Breach of this AUP constitutes a material breach of the TOS and may result in immediate suspension or termination of Services without refund or prior notice.
GUIDING PRINCIPLES
Users must employ the Services responsibly and in compliance with all applicable laws, regulations, and datacenter policies.
The Company reserves the right to interpret and enforce this AUP in its sole discretion, taking into account technical circumstances, network stability, and legal obligations.
The Company’s decision in any matter relating to this AUP shall be final and binding, subject only to applicable law.
PROHIBITED ACTIVITIES
Illegal or Unlawful Use. Users may not use the Services for any activity that is illegal under the laws of the Russian Federation, the Kyrgyz Republic, or the User’s jurisdiction, including:
(a) possession, distribution, or transmission of child sexual abuse material (CSAM);
(b) human trafficking, exploitation, or extremist activity;
(c) fraud, impersonation, or identity theft;
(d) unauthorised access to computer systems (hacking);
(e) distribution of pirated or counterfeit goods;
(f) gambling, lottery, or betting without required licences;
(g) sale or promotion of narcotics, weapons, or controlled substances;
(h) activity violating international sanctions or export-control laws.
Network and System Abuse. Users may not:
(a) launch or participate in Denial-of-Service (DoS) or Distributed Denial-of-Service (DDoS) attacks;
(b) probe, scan, or test the vulnerability of any system or network without authorisation;
(c) access, monitor, or interfere with another person’s data or traffic without consent;
(d) intentionally overload systems, transmit viruses, worms, or trojans;
(e) use open resolvers, proxies, or relays for anonymity in malicious activity;
(f) falsify headers, forge IP packets, or manipulate identifiers to conceal origin.
Spam and Unsolicited Communications.
(a) Users shall not send bulk, unsolicited, or deceptive emails (“spam”) or facilitate such transmissions.
(b) Operating email marketing, newsletters, or listservs requires opt-in consent compliant with anti-spam laws (e.g., CAN-SPAM Act, GDPR, CASL).
(c) Running open mail relays or misconfigured mail servers is strictly prohibited.
(d) The Company reserves the right to blacklist or suspend IPs generating spam complaints.
Intellectual Property Infringement.
(a) Hosting, linking to, or distributing copyrighted, trademarked, or patented materials without authorisation is prohibited.
(b) Upon receipt of a valid infringement notice, the Company may remove or disable access to the offending content in accordance with its takedown policy.
(c) Users are responsible for the legality of all hosted materials.
Distribution of Malicious Code. Users may not upload, host, or distribute:
(a) ransomware, keyloggers, remote access trojans, or similar software;
(b) code designed to harvest or intercept data without consent;
(c) exploits, password crackers, or denial-of-service tools.
Resource Misuse.
(a) Users must not consume excessive bandwidth, CPU, or disk resources that degrade network performance or affect other customers.
(b) Activities such as cryptocurrency mining or data scraping may be restricted at the Company’s discretion.
RESTRICTED CONTENT AND REGULATED ACTIVITIES
Adult Material. Hosting adult or pornographic content is permissible only where lawful in the datacenter’s jurisdiction and compliant with consent, age-verification, and decency standards. The Company may restrict such content without notice if complaints arise.
Gambling and Betting. Gambling, betting, or gaming platforms may only operate under valid local licences. Unlicensed operations may be immediately suspended.
Cryptocurrency-Related Services. Cryptocurrency exchanges, wallets, or mining operations may be hosted only if they comply with applicable laws and datacenter restrictions. The Company reserves the right to decline service to high-risk crypto projects.
Anonymity and Proxy Services. Operation of Tor exit nodes, public VPNs, or open proxy networks is prohibited unless explicitly authorised in writing by the Company.
Sanctions Compliance. Users may not access or use the Services from countries or regions subject to comprehensive sanctions (including but not limited to Iran, North Korea, Syria, and Crimea). Use by or for the benefit of individuals or entities on OFAC, EU, or UK sanctions lists is strictly prohibited.
CUSTOMER RESPONSIBILITIES
Account Security. Users are responsible for securing login credentials, SSH keys, and passwords, and for preventing unauthorised access to their servers.
Software Maintenance. Users must promptly apply software and operating-system updates to prevent exploitation of known vulnerabilities.
Abuse Response. Users must respond to abuse notifications or requests for information within 24 hours. Failure to do so may result in suspension.
Resale Obligations. Where Users resell Services to third parties, they must impose equivalent AUP terms on downstream users and remain responsible for their conduct.
Backups. Users are solely responsible for data backups. The Company is not liable for loss of data due to enforcement actions or server failures.
Logging. Users shall maintain logs sufficient to identify misuse emanating from their systems and cooperate in incident investigations.
NETWORK INTEGRITY AND PROTECTION
The Company and its datacenter providers reserve the right to implement filtering, rate-limiting, or null-routing to maintain network stability or mitigate attacks.
The Company may quarantine, reassign, or revoke IP addresses associated with abusive traffic.
Users shall not circumvent or disable security controls, firewalls, or intrusion detection mechanisms implemented by the Company or its partners.
MONITORING AND PRIVACY
The Company may monitor network traffic, logs, and usage patterns to ensure compliance with this AUP, maintain network health, and detect malicious activity.
Monitoring is limited to technical necessity and carried out in accordance with the Privacy Policy.
Where legally required, data may be disclosed to competent authorities following proper legal process.
ENFORCEMENT AND REMEDIES
Investigation. The Company may investigate suspected violations and gather information by reviewing logs, contacting Users, or liaising with datacenter partners.
Immediate Suspension. The Company may suspend or restrict Services immediately if:
(a) the User’s conduct threatens network integrity;
(b) the User fails to respond to abuse complaints;
(c) law enforcement or a datacenter provider demands suspension.
Termination. For severe or repeated violations, the Company may terminate Services and delete data without refund.
Notification. Where practicable, the Company will notify the User of enforcement actions, but may act without notice if delay would increase risk or liability.
Restoration and Fees. Reactivation following suspension may incur administrative fees or require a written assurance of compliance.
Indemnity. Users agree to indemnify and hold harmless the Company, its officers, and partners from any claim, loss, or damage arising from violation of this AUP.
Non-Waiver. Failure to enforce any provision of this AUP in one instance shall not constitute a waiver of enforcement in future cases.
REPORTING VIOLATIONS
Abuse reports should be submitted to [email protected] and include:
• the IP address or domain in question;
• timestamps and log excerpts;
• description of the suspected violation; and
• evidence substantiating the complaint.
Anonymous or incomplete reports may not be processed.
The Company will investigate credible reports promptly and take appropriate action, which may include warning, suspension, or termination of the offending User.
LIABILITY AND DISCLAIMER
The Company is not responsible for monitoring or controlling user-generated content except as required by law.
The Company disclaims all liability for loss, damage, or claims arising from enforcement of this AUP, including data deletion, suspension, or interruption of Services.
Users accept that enforcement actions may occur without prior notice and agree that such actions are a necessary safeguard for the stability of shared infrastructure.
POLICY UPDATES
The Company may amend this AUP from time to time to reflect evolving laws, datacenter policies, or industry standards.
Updates become effective upon publication on the Website.
Continued use of the Services after publication constitutes acceptance of the updated AUP.
CONTACT INFORMATION
Questions or abuse reports may be directed to:
VELOXNODES
Email: [email protected]
Website: https://veloxnodes.com
Jurisdiction: Moscow, Russia
ACKNOWLEDGMENT
By using the Services, you acknowledge that you have read, understood, and agreed to this Acceptable Use Policy. You are responsible for ensuring that your use, and that of your customers or end users, remains compliant at all times.