Acceptable Use Policy

An overview of our Acceptable Use Policy.

Last Modified: 1 October 2024

Prohibited Usage

Terabix’s services shall only be used for activities permitted under applicable law. The following list describes a non-exhaustive list of prohibited activities and usage:

  1. Illegal activity by law of any kind.

  2. Email spam and or unsolicited email.

  3. Denial of service attacks.

  4. Hacking, exploiting, port scanning, brute force, or malware activities of any kind.

  5. Hosting of sexual and pornographic content depicting children and minors.

  6. Cryptocurrency mining.

  7. IP spoofing.

  8. Illegally defaming or slandering any person, group or organization.

  9. Transmitting hate speech aimed toward any particular person, group, or organization.

  10. Hosting of anonymized networks such as, but not limited to running TOR exit nodes.

  11. Distribution of any copyrighted material.

  12. Distribution of any pirated or cracked software.

  13. Hosting or distribution of any fraudulent websites with the intention to scam or phish members of the public, such as (but not limited to) fake banking, financial, or cryptocurrency websites.

  14. Hosting of public proxies or public VPNs on Cloud VM.

Resource Abuse

Terabix prohibits the Customer abuse of service resources (“resource abuse”). Any action or activity that consumes server resources in a way that negatively impacts our systems, infrastructure, and other customers' resources is defined as resource abuse. Resource abuse may include but is not limited to CPU abuse, disk I/O abuse, and bandwidth or port speed abuse. In the event that resource abuse is detected, Terabix may throttle or suspend a Customer’s service or services without prior notice, followed by contacting the Customer and informing them of so, to allow for the Customer to remedy the situation. Repeated resource abuse even after sufficient warnings or chances to remedy the situation may result in the termination of a Customer’s service or services without any prior notice or refund. To prevent CPU abuse, a Customer may not use more than 80% of their allocated CPU cores for a prolonged period of time that leads to a negative impact on our systems, infrastructure, or customers.

Port 25

Terabix blocks Port 25 by default for all of our services to protect our network and IP reputation. We strongly suggest that Customers use a third-party email provider for email sending. Port 25 may be unblocked for a Customer following a stringent screening process at the sole discretion of Terabix. The screening process may include but is not limited to identity and/or business verification, use-case verification, and website and/or email domain verification. A Customer may open a support ticket to request to go through the screening process if they wish to request access to Port 25 on our services. Terabix reserves the right to not only determine the outcome of the screening process but also whether to accommodate the screening process to begin with. Customers acknowledge that no refunds will be given for the reasons of expecting Port 25 access prior to or after ordering a service, as well as prior to or after going through our screening process, regardless of the outcome.

Changes to Acceptable Use Policy

We may modify this Terms of Service at any time, with no prior notice and any changes will be effective immediately upon publishing. It is your responsibility to review the terms regularly. Any significant changes will be communicated to you by email prior to taking effect. Your continued use of Terabix services after the changes will indicate your acceptance of the updated terms.

Last updated