Exception-Host Exception-Host
  • View Cart 0
  • News
    • News
    • Status page
  • Support
    • Contact Us
    • Knowledgebase
  • Theme (selection)
    • default
    • depth
    • futuristic
    • modern
  • English
    Dansk
    English
    Deutsch
Exception-Host
  • Root-Server
    • Root-Server (Intel Xeon)Ideal solution for a wide range of applications. Reliable and fast
    • Root server (AMD Ryzen)NEWHigh performance and efficiency for demanding applications.
    • Root-Server (AMD EPYC)NEWOutstanding computing power for data-intensive applications and virtualization. Efficient and powerful.
    • Root-Server (Storage)Ideal solution for extensive data storage and processing. Generous storage capacity.
    • Root-Server (configurator)Customizable root server. Choose the resources you need.
  • Dedicated servers
    • Dedicated serversExperience maximum performance and control with our dedicated servers, exclusively for your applications and data.
    • Dedicated servers (special items)Benefit from reduced prices on our dedicated server special items. Ideal for cost-effective, exclusive performance.
    • KVM-Cloud-SystemCreate, customize and delete root servers independently. Flexible resource allocation, sub-user management and API integration.
  • Domains
    • Register domainSecure your desired domain quickly and easily. Large selection, low prices and immediate registration.
    • Domain transferSwitch your domain to us in just a few steps. Smooth transfer and full support.
  • Other
    • WebspacePowerful web space with Plesk. Simple management, reliable performance and comprehensive functions.
    • NextcloudYour private cloud for files, calendars and contacts. Secure, flexible and accessible anywhere.
    • Storage-BoxLarge storage space for your data. Secure, scalable and available at all times.
  • Company
    • Payment methodsSoon
    • Data center
    • Referral program
    • Partnership
    • Parent information
    • Abuse policy
  • Login
  • Register
Legal

Additional conditions for root, cloud, dedicated servers, KVM cloud system and web space

  • Impressum
  • AGB
  • Datenschutz
  • Widerrufsbelehrung
  • Zusatzbedingungen

To ensure that we can offer our customers a high-performance and reliable network, the following actions are prohibited:

  • Manually changing the hardware address (MAC): Changing the MAC address can lead to network problems and is therefore not permitted.
  • Cryptocurrency mining: The operation of applications for mining cryptocurrencies is prohibited, as these can lead to high loads on the hardware and the network.
  • Network scanning: The scanning of third-party networks or third-party IP addresses is prohibited in order to ensure the integrity and security of our network and other networks.
  • Torrents, file sharing and P2P file sharing networks: The operation of torrents, file sharing and P2P file sharing networks is prohibited on our servers in order to prevent the misuse of our infrastructure.
  • Use of falsified source IPs: The use of falsified source IPs to conceal the identity or origin of data traffic is not permitted.
  • Click & traffic generators / traffic exchangers: Tools for generating traffic, clicks or advertising revenue are prohibited, as they can impair network stability.
  • Use of IP addresses: Only IP addresses that have been officially assigned to the server by Exception-Host may be used.
  • Mass mailings: The sending of mass mailings (e.g. newsletters without explicit verifiable consent, spamming or similar) is prohibited in order to maintain the quality of our email service and protect our IP reputation.
  • High CPU, write or read load without direct yield: The prolonged application of high loads on the CPU, write or read speed or the network without direct yield, such as in benchmarks, is not permitted.
  • Illegal applications: Only applications that do not violate the law of the Federal Republic of Germany and EU law may be executed on our servers.
  • Overclocking dedicated servers: Overclocking dedicated servers to increase performance at the expense of hardware durability is prohibited. Any damage caused by this action may be charged to the customer.
  • Email inboxes: Email inboxes may only be used for processing email traffic. It is strictly forbidden to use e-mail inboxes as storage space for other files and data.
  • Violation of the Abuse Policy: Actions such as sending spam (e-mail, SMS, etc.), hosting malicious software (e.g. malware, phishing), brute force or DDoS attacks, copyright violations or illegal content as well as hosting fake websites or fraudulent sites (phishing, identity theft, etc.) are strictly prohibited. Further details can be found in our Abuse Policy.

If one of the above conditions is violated, Exception-Host is entitled at any time to restrict or completely block the affected service of the customer without prior notice.

Useful tips

  • Regular backups: We strongly recommend that you make regular backups of your data. Exception-Host accepts no responsibility for loss of data.
  • Security updates: Always keep your applications and operating systems up to date to avoid security gaps.
  • Support: If you have any questions or problems, our support team is always available to help. Contact us at [email protected] or create a ticket.

By complying with these conditions, you help to ensure the quality and reliability of our service. We thank you for your cooperation.

Exception-Host

Get in touch with us!

  • icons8-tick-tack-48.png
Copyright © 2026 Exception-Host. All Rights Reserved.
  • Imprint
  • Terms of Service
  • Privacy policy
  • Withdrawal
  • Terminate contract

Generate Password
Please enter a number between 8 and 64 for the password length