Last Updated: April 16, 2026

⚠️ Important: Violation of this Acceptable Use Policy may result in immediate service suspension or termination, and may be reported to law enforcement authorities.

This Acceptable Use Policy ("AUP") governs your use of MultihopIX internet services. By using our services, you agree to comply with this policy and all applicable laws and regulations.

1. General Principles

MultihopIX provides internet connectivity services to facilitate legitimate business and personal communications. You are responsible for all activity originating from your connection and must use our services in a manner that is lawful, ethical, and respectful of others.

2. Prohibited Activities

The following activities are strictly prohibited on the MultihopIX network:

2.1 Illegal Activities

  • Child Exploitation: Accessing, transmitting, distributing, or storing any material depicting child sexual abuse or exploitation
  • Copyright Infringement: Unauthorized distribution of copyrighted material, including movies, music, software, or other protected content
  • Illegal Gambling: Operating or participating in illegal online gambling operations
  • Drug Trafficking: Using our services to buy, sell, or distribute illegal drugs or controlled substances
  • Fraud and Identity Theft: Engaging in phishing, identity theft, financial fraud, or other deceptive practices
  • Human Trafficking: Any activity related to human trafficking or exploitation
  • Terrorism: Supporting, promoting, or engaging in terrorist activities

2.2 Network Abuse and Attacks

  • Denial of Service (DoS/DDoS): Launching or participating in attacks designed to overwhelm or disable networks, systems, or services
  • Port Scanning: Unauthorized port scanning, network probing, or vulnerability testing of systems you don't own
  • Hacking and Intrusion: Attempting unauthorized access to computer systems, networks, or accounts
  • Malware Distribution: Creating, distributing, or hosting viruses, worms, trojans, ransomware, or other malicious software
  • Botnets: Operating, controlling, or participating in botnet activities
  • Network Exploitation: Exploiting vulnerabilities in networks or systems without authorization
  • Password Cracking: Attempting to crack, guess, or brute-force passwords or encryption

2.3 Spam and Unsolicited Communications

  • Email Spam: Sending unsolicited bulk email (UCE/UBE) or commercial email without recipient consent
  • Spamming Forums/Comments: Posting unsolicited commercial messages to newsgroups, forums, blogs, or comment sections
  • SMS/Text Spam: Sending unsolicited bulk SMS or text messages
  • VoIP Spam: Making unsolicited bulk voice calls (robocalls) or SPIT (Spam over Internet Telephony)
  • Directory Harvesting: Using automated tools to collect email addresses or contact information
  • Email Header Forgery: Falsifying email headers, sender information, or routing information

2.4 Abusive Behavior

  • Harassment: Stalking, threatening, or harassing individuals or groups
  • Hate Speech: Distributing content that promotes violence or discrimination based on race, religion, ethnicity, gender, sexual orientation, or disability
  • Doxxing: Publishing private or identifying information about individuals without consent
  • Cyberbullying: Using our services to bully, intimidate, or harm others

2.5 Resource Abuse

  • Bandwidth Monopolization: Using excessive bandwidth in a manner that degrades service for other users
  • Server Hosting Violations: Operating servers in violation of your service agreement (residential plans)
  • Proxy/VPN Reselling: Reselling or sharing your connection as a commercial proxy or VPN service without authorization
  • Cryptocurrency Mining: Operating large-scale cryptocurrency mining operations on residential connections

2.6 BGP and Routing Abuse

  • Route Hijacking: Announcing IP prefixes you are not authorized to announce
  • AS Path Manipulation: Falsifying BGP AS paths or origin information
  • Route Leaking: Improperly leaking routes between peers or upstream providers
  • BGP Session Attacks: Attempting to disrupt or hijack BGP sessions
  • Invalid RPKI: Announcing routes that fail RPKI validation without valid justification
  • Prefix Squatting: Announcing unallocated or reserved IP space

2.7 Intellectual Property Violations

  • Copyright Infringement: Sharing, downloading, or distributing copyrighted content without authorization
  • Trademark Violations: Using trademarks in ways that infringe on others' rights
  • Software Piracy: Distributing or using pirated software, keygens, or cracks

3. Acceptable Security Research

We support legitimate security research when conducted responsibly:

  • Security research must be performed only on systems you own or have explicit permission to test
  • Vulnerability disclosure should follow responsible disclosure practices
  • Research should not cause harm, disruption, or data breaches
  • Notify us in advance if your research may generate significant network traffic

4. Email and Communication Standards

If operating email servers or bulk communication services:

  • Maintain valid SPF, DKIM, and DMARC records
  • Implement double opt-in for mailing lists
  • Honor unsubscribe requests immediately
  • Maintain clean mailing lists and remove bounces promptly
  • Do not purchase or rent email lists
  • Include accurate sender information and physical address

5. Server and Service Hosting

For customers authorized to host services:

  • Keep all software and systems updated with security patches
  • Implement appropriate security controls (firewalls, access controls)
  • Monitor your systems for compromise or abuse
  • Respond promptly to abuse complaints
  • Maintain adequate backup and disaster recovery procedures
  • Comply with data protection and privacy regulations

6. Copyright Compliance (DMCA)

MultihopIX complies with the Digital Millennium Copyright Act (DMCA). We will:

  • Respond to valid DMCA takedown notices
  • Forward notices to alleged infringers
  • Terminate repeat offenders' service
  • Maintain a repeat infringer policy

If you receive a DMCA notice, you must either remove the infringing content or file a valid counter-notice.

7. Cooperation with Law Enforcement

MultihopIX cooperates with law enforcement agencies when presented with valid legal process. We may disclose customer information in response to:

  • Valid subpoenas, court orders, or search warrants
  • Emergency situations involving imminent danger
  • National security requests

8. Monitoring and Enforcement

8.1 Network Monitoring

MultihopIX monitors network traffic for:

  • Security threats and attacks
  • Network performance and capacity planning
  • Abuse detection and prevention
  • Quality of service management

We do not monitor the content of your communications except as required by law or to investigate abuse complaints.

8.2 Abuse Reports

We investigate all abuse reports promptly. If you receive an abuse complaint:

  • Respond within 24 hours
  • Investigate and correct the issue
  • Provide evidence of remediation
  • Implement measures to prevent recurrence

8.3 Enforcement Actions

Violations may result in:

  • Warning: First-time minor violations may receive a warning
  • Suspension: Service may be temporarily suspended pending investigation
  • Termination: Serious or repeated violations result in service termination
  • Legal Action: Criminal violations will be reported to authorities
  • Financial Liability: You may be liable for damages caused by your violations

9. Reporting Abuse

To report abuse of MultihopIX services, please contact:

Abuse Department
Email: abuse@multihopix.com

Please include:

  • Date and time of incident (with timezone)
  • Source IP address
  • Full email headers or log files
  • Description of the abuse
  • Any relevant evidence

10. Customer Responsibilities

As a MultihopIX customer, you are responsible for:

  • All activity originating from your connection
  • Securing your network and devices
  • Maintaining strong passwords and authentication
  • Monitoring for unauthorized use
  • Promptly addressing abuse complaints
  • Keeping your contact information current
  • Understanding and complying with this AUP

11. Indemnification

You agree to indemnify and hold MultihopIX harmless from any claims, damages, or expenses arising from your violation of this AUP or your use of our services in an unlawful or abusive manner.

12. Changes to This Policy

We may update this Acceptable Use Policy from time to time. Continued use of our services after changes are posted constitutes acceptance of the modified policy. We will notify customers of material changes via email.

13. Questions and Interpretation

If you have questions about what is or isn't acceptable use, please contact us before engaging in questionable activity. We interpret this policy broadly to protect our network, our customers, and the internet community.

Need Clarification?

If you're unsure whether a planned activity complies with this policy, contact our abuse team before proceeding.

Contact Abuse Team

📋 Related Policies

This Acceptable Use Policy works together with our other policies: