TWOO
Shared Hosting VPS-Server Dedicated Domains Über uns Support
GB EN DE DE TR TR IT IT FR FR
Anmelden
Rechtliches

Abuse Policy

Acceptable use rules and how to report abuse originating from Two-O infrastructure.

Zuletzt aktualisiert: 5 May 2026

Two-O takes abuse of our services seriously. This Abuse Policy ("Policy") defines what constitutes prohibited use of our infrastructure and how we respond to abuse reports. It applies to all customers and supplements our Terms of Service.

1. Prohibited activities

The following activities are strictly prohibited on Two-O infrastructure:

1.1 Illegal content

  • Child sexual abuse material (CSAM) — zero tolerance, immediate termination and law enforcement notification.
  • Content that promotes terrorism, incites violence, or facilitates trafficking.
  • Material that infringes copyright, trademark, or other intellectual property rights.
  • Streaming or distribution of pirated audiovisual content (movies, TV, sports — including IPTV piracy).
  • Sale of regulated goods without proper licensing (firearms, controlled substances, prescription drugs).

1.2 Network abuse

  • Sending unsolicited bulk email (spam) or operating mailing lists without verifiable opt-in.
  • Phishing campaigns or impersonating legitimate organizations.
  • Distributing malware, viruses, ransomware, or other malicious code.
  • Operating botnet command-and-control infrastructure.
  • Conducting unauthorized port scans, vulnerability scans, or penetration tests against systems you do not own.
  • Launching, participating in, or facilitating DDoS attacks.
  • IP address spoofing or fraudulent network advertisements (BGP hijacking).

1.3 Service abuse

  • Cryptocurrency mining on shared hosting plans (allowed only on dedicated servers and Cloud VPS Scale tier with prior written approval).
  • Operating Tor exit nodes on shared infrastructure (allowed on dedicated servers with prior approval and proper documentation).
  • Resource abuse that degrades service for other customers (CPU spikes, fork bombs, runaway processes on shared plans).
  • Fraudulent account creation, including the use of fake identity documents.
  • Reselling our services without an authorized reseller agreement.

2. How we enforce

When a credible abuse report is received or our automated monitoring detects prohibited activity, we follow this escalation:

  1. Notification (most cases): We email the affected customer with details and request remediation within 24–72 hours, depending on severity.
  2. Suspension (serious or unaddressed cases): We suspend the affected service while investigating. Customer is notified and given an opportunity to respond.
  3. Immediate termination (severe cases): CSAM, active phishing campaigns, ongoing DDoS attacks, or repeat offenses result in immediate termination without prior notice.
  4. Law enforcement notification: Where required by law, we report incidents to the appropriate authorities and preserve relevant logs and data.

Termination for abuse forfeits any remaining service period and any refund eligibility under our Refund Policy.

3. Reporting abuse

To report abuse originating from Two-O infrastructure, please email abuse@two-o.net with the following information:

  • IP address or domain of the offending source.
  • Type of abuse (spam, phishing, malware, copyright infringement, etc.).
  • Date and time of the incident in UTC, including timezone.
  • Evidence: log excerpts, full email headers, URLs, screenshots — whatever supports the report.
  • Your contact details for follow-up (we will not share them with the alleged offender unless legally compelled).

We acknowledge all abuse reports within 24 hours and investigate within 72 hours for most cases. Active phishing campaigns and ongoing DDoS attacks receive priority response and are addressed within hours.

4. Copyright (DMCA) notices

For copyright infringement claims, please use our abuse@two-o.net address and include the elements required by the U.S. Digital Millennium Copyright Act (DMCA):

  • Identification of the copyrighted work claimed to have been infringed.
  • Identification of the infringing material (URL, file path, or other location identifier).
  • Your contact information (name, address, phone, email).
  • A statement that you have a good faith belief that the use is not authorized by the copyright owner.
  • A statement, under penalty of perjury, that the information in the notice is accurate and you are the copyright owner or authorized to act on their behalf.
  • Your physical or electronic signature.

Counter-notices may be submitted by the affected customer in accordance with DMCA § 512(g).

5. Repeat infringers

In accordance with DMCA § 512(i), we maintain a policy of terminating accounts of repeat copyright infringers. "Repeat" generally means three or more substantiated DMCA notices within a 12-month period.

6. False or fraudulent reports

Submitting knowingly false abuse reports may result in legal action under § 512(f) of the DMCA (for copyright reports) or applicable laws in your jurisdiction. We document and may publish patterns of fraudulent reporting.

7. Contact

Abuse reports: abuse@two-o.net · For all other inquiries, see our Support page.

TWOO

Europäische Cloud-Infrastruktur, einfach gehalten.

Produkte

Shared Hosting VPS-Server Dedicated Domains Cloud Storage

Unternehmen

Über uns Datacenters Network Support Status

footer.legal

Terms of Service Privacy Policy Refund Policy SLA Imprint Abuse Policy Cookie Policy
Sichere Zahlungen
SSL ENCRYPTED
DSGVO-konform
ISO 27001
PCI DSS

© 2026 Two-O LLC. All rights reserved. 30 N Gould St, Ste R, Sheridan, WY 82801, US.