Acceptable Use Policy (AUP)

Last Updated: November 2025

This Acceptable Use Policy ("AUP") defines permissible and prohibited uses of Expanse services. By using our services, you agree to comply with this AUP in addition to the Terms of Service (ToS), Privacy Policy, and Service Level Agreement (SLA).

1. General Principles

The Customer must use Expanse services legally, ethically, responsibly, and without harming Expanse infrastructure, customers, or upstream providers. You are responsible for all activity originating from your services.

2. Prohibited Content & Activities

The following are strictly prohibited on all Expanse services:

2.1. 2.1 Illegal Content

  • Child sexual abuse material (CSAM)
  • Terrorism-related content
  • Hate, extremist, or violent content
  • Copyrighted content shared without authorization
  • Anything illegal under UK law or the customer’s jurisdiction

2.2. 2.2 Malicious Activity

  • Malware, viruses, worms, trojans
  • Botnets or command-and-control servers
  • Remote exploit kits
  • Keyloggers, stealers, RATs
  • Hosting or distributing malicious scripts
  • Any malicious activity triggers immediate termination

2.3. 2.3 Network Abuse

  • DDoS attacks (launching or participating)
  • Flooding, packet crafting, amplification, or stress-testing tools
  • Port scanning, OS fingerprinting, or brute force attempts
  • VPN/proxy services used for abuse
  • Bypassing DDoS protection systems
  • Using Expanse Minecraft proxies to reach external servers
  • IP spoofing, ARP spoofing, MITM attempts

2.4. 2.4 Spam & Email Misuse

SMTP abuse results in a 24-hour window to respond, then suspension.

  • Sending bulk unsolicited email
  • Running mailers, spam tools, or email bombers
  • Open SMTP relays
  • Sending phishing emails
  • Using compromised mailing lists

2.5. 2.5 Resource Abuse

Expanse may throttle, cap, or limit usage to maintain stability.

  • Excessively consuming CPU, RAM, or disk I/O to degrade node performance
  • Causing abnormal load (e.g., chunk pregeneration) without permission
  • Running infinite loops or faulty scripts causing crashes
  • Intentionally bypassing resource limits

2.6. 2.6 High-Risk Workloads

These workloads are banned across all services:

  • Stresser/stress-testing services
  • Botnet control or distribution
  • Crypto mining (any cryptocurrency)
  • TOR exit nodes or relays
  • Click-fraud, scalping, or automation bots
  • Mass scanning or scraping platforms
  • “Bulletproof hosting” activities
  • Any workload generating upstream provider complaints

3. Service-Specific Rules

3.1. 3.1 Minecraft Hosting

  • No malicious plugins, illegal modpacks, or compromised server jars
  • No using our MC proxy to connect to external servers
  • Heavy tasks (pregeneration, world expansion) must be approved
  • No automated bot swarms or high-risk modpacks
  • No bypassing DDoS protections

3.2. 3.2 Web Hosting

The following are prohibited:

  • Mass mailing scripts
  • Phishing pages
  • Hosting nulled/cracked files
  • Malicious CMS plugins
  • Warez or pirated content
  • Hosting videos/movies without proper rights

3.3. 3.3 VPS & Dedicated Servers

Private VPNs/proxies are allowed only if not used for abuse.

  • Crypto mining
  • TOR relays
  • Proxy/VPN services used for public traffic
  • Traffic tunneling used for attacks or evasion
  • Running anything that intentionally saturates the network

4. Security Requirements

Failure to secure services results in customer liability.

  • Keep software and plugins up to date
  • Secure servers against unauthorized access
  • Maintain strong passwords and authentication
  • Ensure web apps are not vulnerable (SQLi, RCE, LFI, etc.)
  • Prevent outbound attacks through misconfigurations

5. Abuse Handling

  • Verified abuse may result in immediate suspension
  • You must respond to abuse tickets within 24 hours
  • Continued abuse or no response leads to termination
  • Illegal activity will be reported to law enforcement
  • Null-routing may be applied to protect infrastructure

6. Fair Use Guidelines

  • Resource usage must be reasonable
  • Services must not degrade performance for other customers
  • Unlimited features are subject to fair use
  • Expanse may enforce rate limits
  • Expanse may migrate, throttle, or isolate noisy workloads

7. Enforcement & Penalties

Depending on severity, Expanse may:

  • Warn the customer
  • Throttle CPU/network
  • Block ports or traffic
  • Null-route IP addresses
  • Suspend service
  • Terminate service without refund
  • Ban the account
  • Report illegal actions to authorities

8. Reporting Abuse

Report abuse to: [email protected]