Last updated: 2026-04-30
Acceptable Use Policy
uNode aims to host a wide variety of legitimate workloads with minimal restriction, but a small set of activities are prohibited because they harm the network, our customers, or third parties.
Prohibited activities
- Unsolicited bulk email or spam. Outbound port 25 is blocked by default; commercial transactional or bulk email must use a dedicated SMTP relay.
- Distribution of malware, viruses, ransomware, exploit kits, droppers, or malicious payloads.
- Phishing infrastructure, credential-harvesting sites, fake login portals, or lookalike abuse.
- Outbound port scanning of third-party networks. Lawful security research with written prior authorization is permitted; contact support@unode.net first.
- DDoS or DoS attacks, including reflection or amplification. UDP services such as memcached, NTP, and DNS open resolvers must be configured carefully.
- Botnet command-and-control hosting or infrastructure that coordinates compromised systems.
- CSAM, meaning child sexual abuse material. This is zero tolerance and results in immediate termination plus lawful reporting.
- Doxing, harassment campaigns, coordinated abuse, or infrastructure used to target specific people.
- Cryptocurrency mining through stolen credentials or stolen compute. Mining is permitted on packages we sell when you are using your own account and resources.
- Tor exit nodes without prior notice to support@unode.net. Tor exit nodes are permitted with notification so abuse complaints can be routed; Tor relays are unrestricted.
- VPN service abuse. VPN service is permitted; we do not log customer VPN traffic, but customers operating VPN-as-a-service must maintain their own AUP for their users.
- Hosting copyrighted content for unauthorized distribution.
Abuse procedure
- We respond to credible abuse complaints from third parties, law enforcement, and upstream providers.
- For first-time minor issues, we contact you and expect remediation within 48 hours.
- For severe or repeated issues, we may suspend service immediately. You have 14 days to retrieve data before termination.
- For CSAM or imminent-harm reports, we terminate immediately and make lawful reports with no recourse.
Privacy disclosure
- We do not log packet contents.
- We log connection metadata for network operations and abuse response, including source and destination IPs and timestamps, retained for 30 days.
- We retain customer billing information for legal and tax requirements, typically 7 years.
Changes
2026-04-30: Initial public AUP published with prohibited activities, abuse-response procedure, privacy disclosure, and reporting channels.
This AUP supplements but does not replace our Terms of Service. We may update this policy with 30 days notice for material changes; minor clarifications are immediate.