Exception-Host Exception-Host
  • View Cart 0
  • News
    • News
    • Status page
  • Support
    • Contact Us
    • Knowledgebase
  • Theme (selection)
    • default
    • depth
    • futuristic
    • modern
  • English
    Dansk
    English
    Deutsch
Exception-Host
  • Root-Server
    • Root-Server (Intel Xeon)Ideal solution for a wide range of applications. Reliable and fast
    • Root server (AMD Ryzen)NEWHigh performance and efficiency for demanding applications.
    • Root-Server (AMD EPYC)NEWOutstanding computing power for data-intensive applications and virtualization. Efficient and powerful.
    • Root-Server (Storage)Ideal solution for extensive data storage and processing. Generous storage capacity.
    • Root-Server (configurator)Customizable root server. Choose the resources you need.
  • Dedicated servers
    • Dedicated serversExperience maximum performance and control with our dedicated servers, exclusively for your applications and data.
    • Dedicated servers (special items)Benefit from reduced prices on our dedicated server special items. Ideal for cost-effective, exclusive performance.
    • KVM-Cloud-SystemCreate, customize and delete root servers independently. Flexible resource allocation, sub-user management and API integration.
  • Domains
    • Register domainSecure your desired domain quickly and easily. Large selection, low prices and immediate registration.
    • Domain transferSwitch your domain to us in just a few steps. Smooth transfer and full support.
  • Other
    • WebspacePowerful web space with Plesk. Simple management, reliable performance and comprehensive functions.
    • NextcloudYour private cloud for files, calendars and contacts. Secure, flexible and accessible anywhere.
    • Storage-BoxLarge storage space for your data. Secure, scalable and available at all times.
  • Company
    • Payment methodsSoon
    • Data center
    • Referral program
    • Partnership
    • Parent information
    • Abuse policy
  • Login
  • Register

Abuse reports: Information and procedure

We attach great importance to protecting our infrastructure and complying with legal regulations. In order to prevent misuse and act effectively, we provide you with all the important information on abuse reports, our approach and what we expect from customers.

What is an abuse report?

An abuse report is a notification of suspected misuse or unauthorized use of our servers and services. Examples of misuse:

  • Sending spam (e-mail, SMS, etc.)
  • Hosting of malicious software (malware, phishing)
  • Brute force attacks or DDoS attacks
  • Copyright infringements or illegal content
  • Hosting of fake websites or fraudulent sites (phishing, identity theft, etc.)

How do we proceed with an abuse report?

Our procedure for reported abuse activity comprises three escalation levels that take into account the severity and frequency.

Stage 1: First abuse report

  1. The affected server will be temporarily blocked.
  2. The customer will be informed immediately by e-mail and requested to submit a written statement on the cause and the planned measures.
  3. Blacklist removal:
    • We take care of removing the IP address from the blacklist.
  4. As soon as the blacklist removal has been completed and we have received the customer's statement, the server will be unblocked.

Level 2: Repeated abuse reports

  1. In the event of another incident, the affected server will be blocked immediately.
  2. The customer must independently take measures to remove the server from blacklists and provide evidence of this, as well as submit a statement on the cause and planned measures.
  3. Additional restrictions such as port blocking or reinstalling the server can be implemented.
  4. The server is only unlocked again once all the requirements from point 2 have been met.

Level 3: Serious or persistent violations

  1. In the event of repeated or serious cases of misuse, we reserve the right to permanently block the ports concerned or to impose a complete network block.
  2. In extreme cases, the contractual relationship may be terminated.
  3. If a customer has several servers and receives abuse messages distributed across all servers, we reserve the right to block all affected servers if a certain number of incidents occur.

Your responsibility as a customer

  • Make sure that your applications and systems are regularly checked for vulnerabilities.
  • Always keep your software (e.g. CMS, plugins, operating systems) up to date.
  • Monitor your server for suspicious activities.
  • Respond quickly and cooperatively to abuse reports to avoid further escalation.

How can you report abuse?

We take abuse reports from third parties very seriously. Please make sure that your report contains the following information:

  • Description of the abusive activity (e.g. spam emails, attacks)
  • Date and time (with time zone) of the activity
  • IP address or domain involved
  • Evidence (e.g. log files, email headers)

If you would like to submit a general abuse report, please use our Abuse-Formular  or send an e-mail to: [email protected]. For abuse reports under the Digital Services Act (DSA), you can contact us at the following email: [email protected]. For content or activities covered by the TCO Regulation, please use: [email protected] (contact requests are possible in German and English).

Exception-Host

Get in touch with us!

  • icons8-tick-tack-48.png
Copyright © 2026 Exception-Host. All Rights Reserved.
  • Imprint
  • Terms of Service
  • Privacy policy
  • Withdrawal
  • Terminate contract

Generate Password
Please enter a number between 8 and 64 for the password length