2. Prohibited Activities
2.1. Rules for VPS
We provide maximum freedom for your projects with minimal interference. Each case of use is considered individually. The use of services is prohibited only for the following purposes:
- Child pornography and any materials involving minors
- Terrorism, extremism, and incitement to violence
- Use of infrastructure for hacking attacks. Prohibited:
- DDoS/DoS and stress tests on third-party resources without written consent
- Organization or management of botnets, C2 panels
- Trade in prohibited goods and services (weapons, drugs, forged documents)
- Money laundering, participation in carding and financial pyramids
- Any actions that damage AbuseLayer infrastructure or the provider's reputation
- Installation and use of incorrectly configured control panels: phishing panels, RAT panels (Remote Access Trojan), and other malware control panels*
- Mass port scanning, mass IP scanning, network scanning, and other types of mass scanning*
- Brute force attacks and attempts to guess passwords, credentials, or encryption keys*
* Rules marked with an asterisk do not apply when Bulletproof IP service is purchased
2.2. Rules for Dedicated Servers
For dedicated servers, all rules specified for VPS (section 2.1) apply, and additionally prohibited:
- Fraud, scam projects, sale of stolen databases and credentials
- Installation, distribution or use of malicious software: viruses, trojans, worms and other malware
- Installation or distribution of pirated software or software products without appropriate licenses
- Attempts to breach security: unauthorized access to data, authentication bypass, port scanning, packet spoofing
- Network monitoring for the purpose of intercepting data not intended for the client
- Sending unsolicited mail (spam), phishing campaigns, email header forgery
9. Contact Information
Email: support@abuselayer.com
Abuse email: abuse@abuselayer.com
Telegram support: @abuselayer_support
Website: https://abuselayer.com
Last updated: December 12, 2025