Section 1

Hardware and physical systems

  1. Additional hardware tuning (also known as "overclocking") is not acceptable on our services without prior consent.
  2. Attempts to change, gain unauthorized access or disable any out-of-band access is strictly prohibited.
  3. Using our machines in a way that results in any "crypto mining" gain is prohibited without prior consent.
Section 2

Network and data flow

  1. We maintain control over our network, infrastructure and devices. Some of our devices may be controlled by data centers (upstreams) where we lease cabinet space and/or bandwidth as such we control your data and the data that flows on any systems maintained by us.
  2. You and/or customers (players) that connect through our network to access or distribute content are prohibited from obtaining and/or redistributing any unlawful materials, including but not limited to child pornography, intellectual property and/or unlawful hate-speech materials.
  3. Any use of "bandwidth mining" technologies falls under Section 1.3 and is not prohibited.
  4. IPTV (and/or any other media distribution services) is not prohibited on our network without prior consent and valid/current video streaming licenses for the content you are distributing.
Section 3

Lawful usage

  1. We abide by the "law of the land" your usage must abide by this convention based upon the geographical location your service is run.
  2. You are not to store, redistribute or harbour content that is unlawful, this includes but is not limited to protected material by copyright, trademark, trade secrets and/or any other intellectual property laws applicable in the country of operation.
  3. You are prohibited to use our service(s) for any illegal activities, this is includes but is not limited to denial of service attacks (DDoS) and/or protection of sites advertising such services.
Section 4

Operational security

  1. All systems on our network assume allow-list access methods. You must not attempt to gain unauthorized to our systems, other customer systems and/or external systems (regardless of if on our infrastructure). This also extends to attempting to gain access to expired or suspended products (regardless of reason).
  2. A user must not circumvent (also known as "hacking" or "cracking") any authentication method or security of any network, host or customer account. This extends to the temporary (or permanent) disruption to services known as DDoS attacks, see Section 3.3.
  3. No unauthorized access and/or use of data, systems or network including attempts to scan, test or circumvent. You are not to test the vulnerability of any system without prior consent from us and any involved provider(s).
Section 5

Restricted access

We reserve the right to restrict access to your service in the form of artificial network limitations and temporary (or permanent) suspensions in order to maintain a high service quality.

Some ways we may restrict your service are as follows (this is not an exhaustive list):

  1. Applying software limits to specific ports to reduce traffic of individual services.
  2. Temporary termination of services.
  3. Permanent termination of services and customer relations.

Please see conventions for "fair-use" and abuse of resources in Section 6, 7. These agreements may be revised at any time without prior notice to customers.

Section 6

Abuse of resources

Some services will reference "shared" (also known as fair-use) this introduces a varying degree of combined resources. Where possible we aim to balance our nodes fairly to ensure everyone is able to take full advantage of their service.

Abuse of resources is described as any activity (intentional or not) that consumes sufficient shared resources causing a degregation in service for other clients or equiptment.

We will aim to resolve any cases of abuse through remidal action via a ticket with the client. We hold the right to suspend and in extreme cases terminate if corrective actions are not followed.

Section 7

Unmetered solutions

We may offer our services with "Unmetered Bandwidth" to customers, if you onboard with this we expect the customer to follow a "fair-use" bandwidth model.

We will not charge you for your usage on the network, however in the case where we notice ports to be pinned or pushing large quanities of bogus traffic (as an example, running speed tests 24/7) we may apply rate-limits and reach out to the client to notify (Section 6).

In the situation where client bandwidth usage warrants, we may find it suitable to reach out to you requesting that we move you to a dedicated transit plan, this is to ensure we have enough networking capacity for all of our customers to enjoy.

You must not use "Unmetered Bandwidth" as an opportunity to cause disruption to other customers on the network.

Section 8

TOR and Anonymity Networks

We believe in the right to an open and free internet, we understand some clients may use our service to provide a level of anonymity.

You are permitted to run TOR nodes on our services. Any/all abuse emails relating to your service will be forwarded to you via email (or a ticket) and a remdial response is expected. For TOR in particualr you can find some common/best practices for these responses here.

We are always happy to assist you with any Abuse related queries, if you require further assistance we ask you to open a ticket with our support team.


We aim to provide simple yet elegant hosting solutions using high-performance and scalable hardware that disrupt the market offering affordability and quality.

(+44) 02080 505 241

Copyright © 2023 Scaleblade, Ltd.

Company Reg. 13976255 • VAT GB408025624