Hosticon provides global hosting services and is committed to protecting our clients while delivering top-quality service. By using Hosticon Web Services (Hosticon.com), all registered clients agree to abide by our Terms of Service, Privacy Policy, and this Acceptable Use Policy (AUP).
Clients agree to indemnify and hold Hosticon Web Services and its employees harmless from any claims arising from the use of our services that result in damages to the client or any third party.
This AUP serves as a guideline and is not exhaustive. Any activity that violates laws, regulations, or widely accepted Internet norms is prohibited, even if not explicitly stated here. We reserve the right to restrict any activity that harms our reputation or that of our affiliates. Hosticon Web Services retains sole discretion in determining violations of this policy.
Email & Spam Policy
All users must comply with applicable laws and regulations governing bulk and commercial email, including the CAN-SPAM Act of 2003.
Unsolicited Email & Mass Mailings
- Users may not send mass unsolicited emails to recipients who have not explicitly opted in.
- Users sending mass mailings must maintain complete and accurate records of all consents and opt-ins and provide them to Hosticon Web Services upon request. Failure to do so will result in the mailing being considered unsolicited.
- Mailing lists must only target recipients who have voluntarily signed up via an opt-in process.
Prohibited Activities
The following activities are strictly prohibited:
- Sending or receiving replies to unsolicited mass emails.
- Email header forgery (spoofing).
- Spamming via third-party proxies or using proxy mailing software.
- Configuring mail servers to send third-party messages without authentication.
- Hosting websites or services that support spam or are advertised in spam emails (spamvertising).
- Sending unsolicited bulk messages through blogs, chat rooms, guestbooks, newsgroups, pop-ups, instant messaging, SMS, or any similar medium.
- Encouraging or instructing others in prohibited activities.
Consequences of Violation
If a user’s actions cause Hosticon’s domains or IP addresses to be blacklisted, the associated server may be suspended or terminated upon investigation.
Prohibited Uses
The following activities are strictly prohibited on our network. Engaging in any of these may result in immediate account or service suspension without prior notice.
Illegal & Copyright Violations
- Hosting or linking to pirated content
- Copyright infringement
- Distribution of stolen credentials or private personal data
Network Abuse & Security Threats
- Open proxies and TOR exit nodes
- IP spoofing and port scanning
- Denial of Service (DoS/DDoS) attacks
- Vulnerability scanning and brute-force attacks
- Botnets and malware distribution
Spam & Artificial Traffic
- Mass mailing/SMS bombing
- Mail servers for bulk mailing
- HitLeap or any artificial traffic generation
- Social media crawlers
Unauthorized Software & Activities
- Stressers/booters
- Virtual currency mining (*coin mining)
- World Community Grid, Folding@Home, or similar distributed computing projects
- Phishing, scam websites, Ponzi/pyramid schemes
- Illegal pornography
Restricted Applications
- Open DNS resolvers
- Multics, CCcam, or any card-sharing software
- File hosting, cyberlockers, or leeching services
- Content delivery networks (CDN)
- Video streaming platforms
- Chinese private game servers and related websites
- Destructive tools (malware, phishing, cracking, etc.)
Port Restrictions
Certain network ports are blocked to prevent malicious activity and protect our infrastructure. Additional ports may be blocked/unblocked without notice. Please check our Knowledge Base (KB) article or contact support for up-to-date information.
DDoS Attacks
Customers experiencing frequent and disruptive DDoS attacks may face action against their service or account. If these attacks negatively impact other customers or our network, you will be notified via support ticket and asked to take measures to mitigate future attacks. In cases of persistent issues, we may require you to seek alternative hosting solutions.
Fair Usage Policy
While we offer unlimited and unmetered resources, they are subject to hardware, software, and fair use limitations. Our hosting plans are strictly intended for website-related content and do not permit:
- Backup storage
- File locker services
- Personal media storage (e.g., photos, videos, music, or other media)
If your resource usage exceeds what is considered reasonable for your hosting plan, you will be notified via ticket and required to reduce usage. If your resource consumption threatens platform stability, your service may be suspended to prevent disruptions.
Shared Hosting Policy
- All cPanel accounts are isolated using CloudLinux with resource limits that are not dedicated to individual users.
- Resource limits help prevent abuse and minimize disruptions for other customers on the same server.
- If you frequently exceed these limits, we may recommend an upgrade to a VPS or dedicated server.
- We reserve the right to modify resource limits without notice and take action against accounts negatively impacting server performance.
- Outgoing mail is limited to 200 emails per hour per cPanel account, including mailman lists and PHP mail.
Backup Policy
- Daily backups are retained for 30 days.
- Backups are provided as a best-effort fail-safe, but availability is not guaranteed.
- We may delete unauthorized data without notice, including:
- Locally stored cPanel and Softaculous backups
- Temporary files and logs from CMS platforms
- Large error logs
VPS (Virtual Private Servers) Policy
- CPU, network, and disk I/O are shared among users on the same node.
- If your VPS consistently overuses resources or impacts other users, we will notify you via ticket.
- Severe cases may result in a VPS reboot, shutdown, or suspension.
- Failure to respond to an abuse ticket will result in suspension.
Dedicated Servers Policy
- After termination, dedicated server drives are only quick-formatted.
- It is the customer’s responsibility to ensure all data is properly wiped before termination.
- Modifying or bypassing internal configurations (e.g., BMC/IPMI) is strictly prohibited and will result in immediate suspension.
- Intentional damage to server hardware will result in service suspension without notice.