System Status • Support 24/7
EN RO Coming soon RU Coming soon
iHoster24 iHoster24
  • Home
    • Web Hosting
    • Business Hosting
  • VPS
  • Reseller
  • Domains
  • Help
  • Contact
Client Area
EN RO Coming soon RU Coming soon
  • Home
  • Web Hosting
  • Business Hosting
  • VPS
  • Reseller
  • Domains
  • Help
  • Contact
System Status • Support 24/7
Client Area

Acceptable Use Policy

This policy sets out what is allowed and what is not when using iHoster24 services. We expect all users to follow these rules.

1. Purpose of this policy

Our Acceptable Use Policy exists to protect our network, our customers, and the internet community. By using iHoster24 services, you agree to comply with this policy. Violations may result in suspension or termination of your account and, where appropriate, referral to law enforcement.

2. Prohibited activities

You must not use our services for any of the following:

Malware, phishing, and spam

  • Distributing malware, viruses, ransomware, or other harmful code.
  • Hosting or operating phishing sites or sending phishing emails.
  • Sending unsolicited bulk email (spam) or using our services to relay spam.
  • Operating or promoting pyramid schemes, chain letters, or similar schemes.

Illegal content and activity

  • Hosting, distributing, or linking to content that is illegal in the jurisdiction where our services are used or where you or we are located.
  • Content that infringes intellectual property rights, including unauthorised use of trademarks or copyrighted material.
  • Content that promotes violence, terrorism, child sexual abuse material, or other serious criminal activity.

Network abuse

  • Attempting to gain unauthorised access to our systems, other customers’ accounts, or any third-party systems.
  • Launching denial-of-service attacks, port scanning, or other activities that disrupt or degrade networks or systems.
  • Using our services to probe, scan, or test the vulnerability of systems without authorisation.

Resource abuse

  • Using excessive CPU, memory, disk, or bandwidth in a way that negatively affects other customers or our infrastructure.
  • Running processes or applications that are not appropriate for your service type (e.g. mining, long-running batch jobs on shared hosting where not permitted).
  • Circumventing or exceeding the limits of your plan in a way that is not permitted by your agreement with us.

3. Email usage rules

When using our services for email, you must:

  • Send email only to recipients who have consented or with whom you have a legitimate business relationship.
  • Include a clear way for recipients to opt out of future emails where required by law.
  • Not use our mail servers to send bulk unsolicited mail or to relay mail for third parties without our permission.
  • Comply with applicable anti-spam laws and best practices.

We may block or throttle email that we reasonably believe violates this policy or harms our reputation.

4. Security violations

You must not:

  • Share your account credentials or allow others to use your account in a way that breaches our terms.
  • Host or distribute tools designed to compromise security (e.g. exploit kits, password crackers) unless you have a legitimate, authorised purpose and our prior approval.
  • Ignore security updates or leave your account or applications in a known vulnerable state where this poses a risk to our network or other users.

You are responsible for securing your account and your applications. We may take action to contain threats (e.g. disabling a compromised account) to protect our network and users.

5. Enforcement actions

If we believe you have violated this policy, we may:

  • Contact you and request that you stop the offending activity and remedy the situation.
  • Suspend or terminate your account or specific services.
  • Remove or disable content that violates this policy.
  • Report the activity to law enforcement or other authorities.

We will act in a way we consider proportionate to the violation and the risk. In serious cases we may suspend or terminate services immediately without prior notice. We are not liable for any loss you suffer as a result of enforcement action taken under this policy.

6. Reporting abuse

If you become aware of abuse originating from our network or from an iHoster24 customer, please report it to us. Send a clear description of the abuse, including relevant URLs, IP addresses, timestamps, and any evidence, to our abuse contact. You can find our contact details on our website. We will investigate and take action as appropriate.

7. Policy updates

We may update this Acceptable Use Policy from time to time. We will post the updated policy on our website and update the "Last updated" date. Continued use of our services after the change constitutes acceptance of the updated policy. If you do not agree, you must stop using our services.

Last updated: February 4, 2026

Reliable European hosting for modern websites.

24/7 human support • EU infrastructure

Services

  • Web Hosting
  • Business Hosting
  • VPS Hosting
  • Reseller Hosting
  • Domain Names

Support

  • Contact Us
  • Knowledge Base
  • Submit Ticket
  • System Status

Legal

  • Terms of Service
  • Privacy Policy
  • Acceptable Use Policy
  • Refund Policy

© 2015–2026 iHoster24.com. All rights reserved.