To ensure that we can offer our customers a high-performance and reliable network, the following actions are prohibited:
- Manually changing the hardware address (MAC): Changing the MAC address can lead to network problems and is therefore not permitted.
- Cryptocurrency mining: The operation of applications for mining cryptocurrencies is prohibited, as these can lead to high loads on the hardware and the network.
- Network scanning: The scanning of third-party networks or third-party IP addresses is prohibited in order to ensure the integrity and security of our network and other networks.
- Torrents, file sharing and P2P file sharing networks: The operation of torrents, file sharing and P2P file sharing networks is prohibited on our servers in order to prevent the misuse of our infrastructure.
- Use of falsified source IPs: The use of falsified source IPs to conceal the identity or origin of data traffic is not permitted.
- Click & traffic generators / traffic exchangers: Tools for generating traffic, clicks or advertising revenue are prohibited, as they can impair network stability.
- Use of IP addresses: Only IP addresses that have been officially assigned to the server by Exception-Host may be used.
- Mass mailings: The sending of mass mailings (e.g. newsletters without explicit verifiable consent, spamming or similar) is prohibited in order to maintain the quality of our email service and protect our IP reputation.
- High CPU, write or read load without direct yield: The prolonged application of high loads on the CPU, write or read speed or the network without direct yield, such as in benchmarks, is not permitted.
- Illegal applications: Only applications that do not violate the law of the Federal Republic of Germany and EU law may be executed on our servers.
- Overclocking dedicated servers: Overclocking dedicated servers to increase performance at the expense of hardware durability is prohibited. Any damage caused by this action may be charged to the customer.
- Email inboxes: Email inboxes may only be used for processing email traffic. It is strictly forbidden to use e-mail inboxes as storage space for other files and data.
- Violation of the Abuse Policy: Actions such as sending spam (e-mail, SMS, etc.), hosting malicious software (e.g. malware, phishing), brute force or DDoS attacks, copyright violations or illegal content as well as hosting fake websites or fraudulent sites (phishing, identity theft, etc.) are strictly prohibited. Further details can be found in our Abuse Policy.
If one of the above conditions is violated, Exception-Host is entitled at any time to restrict or completely block the affected service of the customer without prior notice.
Useful tips
- Regular backups: We strongly recommend that you make regular backups of your data. Exception-Host accepts no responsibility for loss of data.
- Security updates: Always keep your applications and operating systems up to date to avoid security gaps.
- Support: If you have any questions or problems, our support team is always available to help. Contact us at support@exception-host.com or create a ticket.
By complying with these conditions, you help to ensure the quality and reliability of our service. We thank you for your cooperation.