Last updated: 2026-04-30

Acceptable Use Policy

uNode aims to host a wide variety of legitimate workloads with minimal restriction, but a small set of activities are prohibited because they harm the network, our customers, or third parties.

Prohibited activities

  • Unsolicited bulk email or spam. Outbound port 25 is blocked by default; commercial transactional or bulk email must use a dedicated SMTP relay.
  • Distribution of malware, viruses, ransomware, exploit kits, droppers, or malicious payloads.
  • Phishing infrastructure, credential-harvesting sites, fake login portals, or lookalike abuse.
  • Outbound port scanning of third-party networks. Lawful security research with written prior authorization is permitted; contact support@unode.net first.
  • DDoS or DoS attacks, including reflection or amplification. UDP services such as memcached, NTP, and DNS open resolvers must be configured carefully.
  • Botnet command-and-control hosting or infrastructure that coordinates compromised systems.
  • CSAM, meaning child sexual abuse material. This is zero tolerance and results in immediate termination plus lawful reporting.
  • Doxing, harassment campaigns, coordinated abuse, or infrastructure used to target specific people.
  • Cryptocurrency mining through stolen credentials or stolen compute. Mining is permitted on packages we sell when you are using your own account and resources.
  • Tor exit nodes without prior notice to support@unode.net. Tor exit nodes are permitted with notification so abuse complaints can be routed; Tor relays are unrestricted.
  • VPN service abuse. VPN service is permitted; we do not log customer VPN traffic, but customers operating VPN-as-a-service must maintain their own AUP for their users.
  • Hosting copyrighted content for unauthorized distribution.

Abuse procedure

  • We respond to credible abuse complaints from third parties, law enforcement, and upstream providers.
  • For first-time minor issues, we contact you and expect remediation within 48 hours.
  • For severe or repeated issues, we may suspend service immediately. You have 14 days to retrieve data before termination.
  • For CSAM or imminent-harm reports, we terminate immediately and make lawful reports with no recourse.

Privacy disclosure

  • We do not log packet contents.
  • We log connection metadata for network operations and abuse response, including source and destination IPs and timestamps, retained for 30 days.
  • We retain customer billing information for legal and tax requirements, typically 7 years.

Changes

2026-04-30: Initial public AUP published with prohibited activities, abuse-response procedure, privacy disclosure, and reporting channels.

This AUP supplements but does not replace our Terms of Service. We may update this policy with 30 days notice for material changes; minor clarifications are immediate.