Purpose
This policy establishes the standards and procedures for monitoring and managing content associated with domains hosted on our DNS infrastructure. Its goal is to protect the integrity, reliability, and lawful operation of our services, while ensuring compliance with applicable laws and industry best practices.
Scope
This policy applies to:
- All customers and end users of our DNS hosting services.
- All domain names, records, and associated metadata hosted within our infrastructure.
- All staff involved in monitoring, reviewing, or escalating DNS abuse or content complaints.
Prohibited Uses
Described prohibited use in this policy is not completed list for all prohibited use cases. For more details please check our Terms of Service too.
For the purposes of Content Monitoring Policy, our DNS hosting services may not be used, directly or indirectly, to support:
3.1 Spam
- Use of hosted domains in unsolicited bulk email (spam).
- Use of DNS records to support spam campaigns (e.g., disposable MX or redirect domains).
- Abuse of our infrastructure for email harvesting, list-selling, or distribution of unsolicited messaging.
3.2 Scams and Fraud
- Phishing or impersonation domains (e.g., fraudulent banking, payment, or identity sites).
- Domains that facilitate financial fraud, advance-fee scams, or deceptive schemes.
- Misuse of DNS records to misdirect users toward malicious or fraudulent destinations.
3.3 Hijacking and Security Abuse
- DNS cache poisoning, zone hijacking, or manipulation of records to compromise security.
- Use of domains to host or distribute malware, botnets, or command-and-control (C2) infrastructure.
- Abuse of recursive or authoritative DNS for denial-of-service (DoS / DDoS) amplification.
3.4 Regional and Jurisdictional Compliance
- Domains or DNS records that host or resolve to content unlawful under applicable regional laws.
- Country-specific restrictions (e.g., gambling, political content, copyrighted material) where legally required.
- Content that violates trade restrictions, embargoes, or export-control laws.
Monitoring Procedures
- Automated Monitoring: Deploy DNS abuse detection tools (spam blocklists, phishing feeds, malware detection, abnormal traffic signatures).
- Manual Review: Investigate reports from trusted sources, regulators, or users.
- Escalation Triggers: Flag domains for immediate action when evidence of active abuse, hijacking, or high-severity scams is detected.
Enforcement Actions
Depending on severity and applicable law, actions may include:
1. Warning notice to the domain holder.
2. Temporary suspension of DNS records or services.
3. Permanent termination of service for repeat or severe abuse.
4. Referral to appropriate authorities where legally required.
Reporting & Transparency
- Provide clear channels for abuse reporting.
- Publish standard response times (e.g., initial acknowledgment within 24 hours, resolution within 72 hours where possible).
- Maintain internal statistics and reports (aggregated statistics on takedowns, suspensions, and legal requests).
Legal & Jurisdictional Obligations
- Comply with local and international laws governing DNS hosting and content regulation.
- Cooperate with law enforcement agencies where required, consistent with due process.
- Respect user privacy and only disclose information under lawful request or as required to mitigate active abuse.
We value your privacy! We use cookies to enhance your browsing experience, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. Cookie Policy.