Acceptable Use Policy

BunkerVPS does it's best to follow a Law of the Land stance when it comes to content hosted within our services.

This is the BunkerVPS acceptable use policy, for more information specific to each datacenter location, follow their respective links below.


Quick list of use we do not allow, but is not limited to:

Should one of your services violate any of these terms, they may be terminated. BunkerVPS may without notice choose to suspend or close the service in the event of breach of the above terms.

Abuse Definitions

Resource Abuse

1-1-1. Resource Abuse consists of any activity, intentional or otherwise, that consumes sufficient system resources to negatively affect other clients or equipment.

Unsolicited Communication

1-2-1. Any email-based communications sent without the consent of the recepient.

1-2-2. Knowingly permitting or initiating Unsolicited Communications is grounds for immediate termination, and a permanent ban from any future service.

Malicious Content

1-3-1. Any type of script, code, or other file that performs harmful action, either to the user affected or as a bulk action triggered by the user.

1-3-2. Any content that violates the laws of the country it resides in.

1-3-3. Knowingly permitting or hosting Malicious Content is grounds for immediate termination, and a permanent ban from any future service.


Remedial Action

Intentional / Malicious Abuse

2-1-1. Intentional / Malicious usage is defined as any action knowingly performed by the user, or persons user has authorized to access the service, that is categorized in the above Abuse Definitions.

2-1-2. All services on the user's account will immediately be terminated without compensation, save for situations where a court order demands evidence be turned over to law enforcement.

2-1-3. The user will be permanently banned from holding any further service with BunkerVPS and related companies.

Order of Execution During Abuse Offenses

2-2-1. The offending service will be brought offline, and left in a suspended state.

2-2-2. A support ticket will be opened to the service owner detailing the offense and the necessary steps required to resolve the situation.

2-2-3. Once the service owner replies to the ticket acknowledging that they understand the issue and how to correct the problem, the service will be reactivated and the service owner will have 24 hours to prevent any further abuse.

Failure to address abuse cases will result in your services being suspended, and in extreme cases, terminated.

TOR & I2P (Anonymity Networks)

BunkerVPS is a strong believer and supporter of Freedom of Speech and has taken a strong stance against censorship. You're welcome to run Exit, Relay, and Bridge nodes, just follow the rules when doing so.

TOR & I2P Guidelines

3-1-1. Please open a support ticket before running an Exit Node, informing us of your intent. This is to allow us to keep track of abuse complaints that come in and handle them accordingly.

3-1-2. BunkerVPS is extremely fair when it comes to abuse complaints for Tor users. This is not an invitation to start being malicious.

3-1-3. Please apply Reverse DNS to your IP address through the control panel or open a support ticket to have it set, if you're operating an Exit Node as this can help curb many abuse complaints. Something as simple as $network.your-domain.tld is likely sufficient.

3-1-4. If you're operating an Exit Node, please make sure your exit policy blocks the following ports:


  RSS

BunkerVPS provides virtual private servers hosted in secure bunkers and underground datacenters.

BunkerVPS.com © All Rights Reserved.