Overview
CloudNexus provides high-performance infrastructure for legitimate business, personal, and creative endeavors. By provisioning or using any CloudNexus service (including VPS, Cloud Compute, Managed Databases, or CDN), you agree to adhere to this Acceptable Use Policy (AUP). Failure to comply may result in the immediate suspension of your account without refund.
Account Security
You are solely responsible for maintaining the confidentiality of your account credentials and for all activities that occur under your account. You must:
- Use strong, unique passwords for all CloudNexus associated accounts.
- Enable Two-Factor Authentication (2FA) on your CloudNexus console.
- Immediately notify CloudNexus support if you suspect unauthorized access.
- Ensure all servers running under your account are secured against public exploitation.
ℹ️ Note
CloudNexus cannot be held liable for data loss or service interruption resulting from compromised credentials or negligent security practices by the user.
Prohibited Content
Our infrastructure may not be used to host, transmit, store, or distribute any content that:
- Violates any applicable local, state, national, or international laws.
- Defames, harasses, threatens, or intimidates any individual or group.
- Invades the privacy or publicity rights of others.
- Contains malware, viruses, worms, or any destructive code.
- Infringes on intellectual property rights (copyright, trademark, patents).
- Is related to illegal acts, including drug trafficking, human trafficking, or child exploitation.
Prohibited Activities
Using CloudNexus services for the following activities is strictly prohibited:
- DDoS Attacks: Launching, facilitating, or participating in Distributed Denial of Service attacks against any target.
- Scanning/Sniffing: Scanning, hacking, sniffing, or attacking any other network or system without explicit written permission.
- Spam: Sending unsolicited bulk email (spam) or setting up mail servers that fail to maintain strict reputation standards.
- Port Knocking/Hiding: Using techniques to hide network activity from abuse reports.
- Proxy/Tor Exit Nodes: Operating open proxies or Tor exit nodes without prior written authorization.
Cryptocurrency Mining
Mining cryptocurrencies is generally prohibited on shared infrastructure to ensure consistent performance for all users. However, CloudNexus offers specific "High Performance Compute" instances that are optimized and permitted for mining purposes.
⚠️ Warning
Mining on standard VPS, General Purpose, or Shared plans is strictly forbidden and will result in immediate service suspension.
Resource Limits
Users must not exceed the resource limits defined by their chosen plan. This includes CPU utilization, RAM, IOPS, and bandwidth. Burst usage is permitted where applicable, but sustained utilization above 100% of purchased resources on non-burstable plans is a violation.
IP Abuse Reporting
If you believe an IP address owned by CloudNexus is being used maliciously, please report it immediately. We take abuse reports seriously and investigate them within 24 hours.
- Email: abuse@cloudnexus.com
- Include the source IP, target IP, timestamp, and evidence (logs/screenshots).
Enforcement & Penalties
CloudNexus reserves the right to investigate any activity on our network. In the event of a violation:
- Minor Violations: A formal warning may be issued, requiring corrective action within 48 hours.
- Severe Violations: We may suspend or terminate your account immediately without notice or refund.
- Legal Action: We reserve the right to cooperate with law enforcement and pursue legal damages for severe abuse.