Abuse Policy Summary (Non-Binding)
This summary is provided for convenience only and does not replace the full Abuse Policy below.
- ExtaHost services may only be used for legal and ethical purposes
- Malware, DDoS attacks, phishing, spam, fraud, and illegal content are strictly prohibited
- Public proxies, VPN resale, and traffic anonymization for abusive purposes are not allowed
- Sustained or abusive resource usage that impacts the network is prohibited
- Abuse may result in immediate suspension or termination, with or without notice
- No refunds or credits are issued for services suspended or terminated due to abuse
- Customers are responsible for all activity originating from their services
Please review the full Abuse Policy below for complete terms and enforcement details.
Abuse Policy
Last updated: January 1, 2026
ExtaHost is a service operated by FPM Labs LLC, registered in Wyoming, United States.
We operate a strict zero-tolerance policy for abuse. Services involved in malicious activity may be suspended or terminated without prior notice.
ExtaHost is committed to maintaining a stable, secure, and lawful network. Our services may only be used for legal and ethical purposes. Abuse of our services is strictly prohibited and may result in immediate suspension or termination, with or without prior notice.
This Abuse Policy forms part of ExtaHost's Terms & Conditions.
1. Prohibited Activities
The following activities are strictly prohibited on all ExtaHost services, including but not limited to VPS, RDP, and hosting services.
Network & Security Abuse
- Distributed Denial of Service (DDoS) attacks
- Traffic flooding or network saturation
- Scanning, probing, or exploiting networks or systems without authorization
- Attempting to bypass security measures or access unauthorized systems
Malware & Harmful Software
- Hosting, distributing, or executing malware, viruses, trojans, ransomware, or spyware
- Botnet command-and-control activity
- Cryptocurrency mining malware or unauthorized cryptominers
- Any software designed to disrupt, damage, or gain unauthorized access
Spam, Phishing & Fraud
- Sending unsolicited bulk email (spam)
- Phishing, impersonation, or social engineering
- Hosting scam pages or fraudulent services
- Email abuse resulting in IP blacklisting
Illegal Content & Copyright Violations
- Hosting or distributing illegal content
- Copyright infringement or distribution of pirated material
- Content violating applicable US, EU, or international law
Proxies, VPNs & Resale Abuse
- Public proxy services
- VPN resale or relay services
- Traffic anonymization services intended to conceal abuse
- Use of services as part of larger abuse networks
Resource & Fair Use Abuse
- Sustained excessive bandwidth usage impacting network stability
- Continuous line-rate traffic inconsistent with normal VPS or RDP usage
- Disk I/O, CPU, or memory abuse that degrades service for others
- Use of services primarily for file distribution, mirroring, or streaming
Details regarding acceptable usage are further defined in our Fair Use Policy.
2. Enforcement Actions
If abuse is detected or suspected, ExtaHost may take one or more of the following actions at its sole discretion:
- Immediate service suspension
- Traffic filtering, rate limiting, or null routing
- Permanent service termination
- Account termination
- Reporting activity to upstream providers or authorities where required
No refunds or credits will be issued for services suspended or terminated due to abuse.
3. Zero-Tolerance Activities
The following may result in immediate termination without warning:
- Malware distribution
- DDoS attacks
- Phishing or fraud
- Child sexual abuse material (CSAM)
- Repeated or large-scale abuse incidents
4. Customer Responsibility
Customers are responsible for all activity originating from their services.
Customers are fully responsible for:
- All activity originating from their services
- Securing their systems and credentials
- Content stored, processed, or transmitted using ExtaHost services
Claims of compromised systems do not exempt customers from responsibility.
5. Reporting Abuse
Abuse reports may be received from:
- Automated monitoring systems
- Upstream providers
- Third parties
- Law enforcement agencies
ExtaHost is not obligated to provide detailed evidence prior to enforcement action.
6. Appeals & Communication
If you believe enforcement action was taken in error, you may contact ExtaHost support after securing your service and addressing the issue.
ExtaHost reserves the right to deny appeals where abuse is clear, repeated, or severe.
7. Relationship to Other Policies
This Abuse Policy must be read together with:
Violations of this Abuse Policy may also result in:
- Loss of refund eligibility
- Account termination
- Permanent service bans