This Acceptable Use Policy ("AUP") applies to all Services provided by Yhost. It is incorporated into the Terms of Service. Violations may result in suspension or termination, often without prior notice where necessary to protect the network or comply with law.
Our infrastructure runs on third‑party providers including Hetzner Online GmbH (Germany) and UpCloud Ltd (Finland). Their policies apply to your use of the Services. Where an upstream provider's policy imposes stricter requirements than this AUP, we will enforce the upstream rule to maintain service continuity for all customers. Any activity prohibited by our Infrastructure Providers is also prohibited under this AUP.
We may block outbound SMTP ports, impose rate limits, or require verified sender authentication (SPF/DKIM/DMARC). Deliverability is not guaranteed.
The operation of applications for mining, farming, or plotting cryptocurrencies is prohibited on all service tiers, including shared hosting, VPS, and managed plans. This includes, but is not limited to: proof‑of‑work mining, proof‑of‑space plotting, proof‑of‑stake validation requiring sustained compute, and any similar blockchain computation that consumes excessive resources. This restriction is imposed by our Infrastructure Providers and is enforced without exception.
Unless expressly approved in writing, you must not use the Services to sell or promote:
You are responsible for ensuring you have a lawful basis to process personal data and that you provide required notices to end users. Unless we explicitly agree in writing, you must not use the Services to process highly regulated data requiring specialised compliance frameworks, including:
You must use strong passwords and enable multi‑factor authentication where available. You are responsible for all actions performed via your credentials. Compromised accounts are a major cause of abuse; we may suspend services until you remediate.
You must keep your CMS, plugins, themes, frameworks, and server packages up to date. Outdated software is commonly exploited. If we detect a critical vulnerability on your service, we may notify you and require you to patch within a defined timeframe. In urgent cases, we may temporarily disable the vulnerable component. For Managed plans, software updates within the managed scope are handled by us; you remain responsible for application‑level code and content.
We may use WAF rules, bot filtering, and rate limits. You must not attempt to bypass them. If your legitimate traffic is blocked, contact support with details and we will investigate.
If your account is compromised, you must promptly reset credentials, patch vulnerable software, remove malicious files, and close attack vectors. We may require you to:
If repeated compromise occurs, we may require you to upgrade to a managed security service or we may terminate service to protect the network.
For dedicated IP services, you are responsible for maintaining good sending practices. We may require rDNS alignment, SPF/DKIM/DMARC configuration, and removal of compromised scripts. If your activity harms IP reputation (e.g., blocklisting), we may reassign or revoke IP resources or require use of external mail delivery services.
Report abuse to [email protected] and include: affected domain/IP, timestamps, log excerpts (if any), and a description of the issue. For copyright complaints, see the Terms of Service (Appendix E). For illegal content reports under the EU Digital Services Act, see the Terms of Service (Section 18.4).
We triage abuse based on severity:
Our Infrastructure Providers (Hetzner, UpCloud, and others) operate their own abuse teams and may independently detect and act on policy violations on infrastructure they provide. If an upstream provider contacts us about a violation, we may be required to act within their specified timeframe (which may be shorter than our standard cure periods). In some cases, an upstream provider may lock IP addresses or suspend services directly. We will communicate upstream actions to you as promptly as possible and work with you to resolve the issue.
Where we restrict or remove content, suspend an Account, or impose other restrictions in response to illegal content or a terms‑of‑service violation, we will provide you with a clear and specific statement of reasons as described in the Terms of Service (Section 18.5). This includes the restriction applied, the factual basis, the legal or contractual ground, and information about redress mechanisms.
We may suspend or terminate Services for AUP violations. We may remove or disable access to content that violates this AUP or Applicable Law. We may permanently block repeat offenders or accounts associated with fraud. In some cases (e.g., confirmed CSAM or fraud), we may refuse any future service.
We may preserve logs and relevant data to investigate abuse, comply with law, or respond to upstream providers. We may share necessary information with competent authorities or affected parties where legally permitted.
If you believe an enforcement action was taken in error, you may appeal via the client portal or by emailing [email protected]. Provide evidence and a clear explanation. We will review in good faith and respond within a reasonable timeframe, but we may keep a suspension in place until we are satisfied the risk is mitigated.
If you have purchased a Managed plan, the following additional terms apply:
To protect our network reputation, upstream providers, and other customers, we may restrict or rate‑limit outbound email (SMTP) and certain ports by default on some plans or for new accounts. We may require identity/business verification before enabling outbound email or removing restrictions. You must not use our services to send spam, unsolicited bulk messages, or messages that violate applicable law.
Self‑Managed means you are responsible for the security and operation of your applications and websites. You must keep your CMS, plugins, themes, and dependencies up to date, and you must promptly remediate compromised scripts, phishing pages, and malware within your account. Repeated compromise or failure to remediate may result in suspension or termination.
You must not register or use domains for phishing, brand impersonation, malware distribution, unlawful content, or other abusive activity. We may suspend DNS, redirect, lock, or disable domain‑related services where required by a registry/registrar, a lawful request, or to mitigate abuse.
We take IP rights seriously. If we receive a sufficiently detailed complaint (including identification of the protected work and the allegedly infringing material), we may disable access to the material and notify you. For U.S. complaints, we apply a DMCA‑style process as described in the Terms of Service (Appendix E). Repeat infringers may have their Services terminated.
If you have questions about this AUP, contact [email protected]. Abuse reports should be sent to [email protected].
We may update this AUP as our services and upstream requirements evolve. Material changes will be notified in accordance with the Terms of Service. Continued use after updates constitutes acceptance.
Nothing in this AUP prevents lawful security research or testing conducted exclusively on systems you own or have explicit permission to test, provided it does not impact our infrastructure or other customers.
Copyright © 2014‐2026 Yhost. All Rights Reserved