1. Service Scope
Services may include managed hosting and operations for websites, SSL, RPC endpoints, blockchain explorers, network statistics dashboards, and IPFS services. Unless explicitly stated in writing, services are provided as managed deployments and do not include shell, root, or administrative access for customers.
2. Managed Operations Model
Managed services are deployed, secured, monitored, and maintained by the provider. Customer interaction is limited to agreed endpoints (web, API, dashboards). Requests for changes are handled through provider support channels.
3. Acceptable Use Policy (Strict)
Abuse includes, but is not limited to:
- Port scanning, network probing, vulnerability scanning, or reconnaissance activity
- Spam, phishing, unsolicited email campaigns, or bulk messaging
- Cryptocurrency mining, mining pools, or any compute abuse (unless explicitly contracted)
- Malware hosting or distribution, botnet activity, command-and-control services
- DDoS attacks or participation, amplification, or traffic flooding
- Illegal content hosting or distribution
- Any activity that threatens network stability, IP reputation, or upstream provider compliance
4. Enforcement Policy (Single Warning)
Confirmed abuse may result in immediate suspension or termination. The provider may issue a single warning at their discretion; warning is not guaranteed for severe or high-risk incidents.
5. No Refunds for Abuse / Termination
No refunds will be issued for abuse-related suspension or termination, policy violations, or upstream-provider enforced disconnections. Setup fees are non-refundable under all circumstances.
6. Data Retention After Termination
Upon termination, customers may request a copy of their hosted content and configuration data. Requests must be made within 48 hours of termination. After 48 hours, data may be permanently deleted and is not guaranteed to be recoverable.
7. Setup Fees & Subscription
Services may include a one-time setup fee plus an ongoing subscription. Setup includes provisioning, configuration, security hardening, and initial deployment.
8. Provider Discretion
The provider reserves discretion in architecture, security configuration, maintenance procedures, and enforcement actions required to protect infrastructure and compliance.