Terms of Use

These rules define acceptable use of VPSStorages services. Their purpose is to protect the infrastructure, ensure fair resource usage and prevent harmful activities such as mining, abusive bots, DDoS attacks or illegal content.

1. Prohibited activities

The following activities are strictly forbidden on all services and may lead to immediate suspension:

  • Crypto-mining, GPU/CPU mining, mining pools or similar workloads.
  • DDoS tools, botnets, brute-force attacks and mass vulnerability scanning.
  • Phishing, fraud, distribution of malware or other malicious code.
  • Hosting of pirated, illegal or unlicensed content.
  • Spam campaigns (mail, messaging platforms, social networks).
  • Systems generating abnormal or harmful traffic to external targets (scans, floods, abuse).

VPSStorages reserves the right to block traffic or suspend services without prior notice in case of abuse.

2. Allowed but regulated activities

Some high-load or specific use cases are allowed only after prior coordination:

  • Game servers with many players or custom networking requirements.
  • Large API platforms, integration hubs or intensive background processing.
  • Heavy backup, logging or monitoring workloads that generate constant traffic.
  • Custom firewall rules, storage layouts, snapshots or replication policies.

In such cases we may propose a custom VPS / storage plan suitable for the expected load.

3. Client responsibilities

The client is responsible for all software, data and activities inside their VPS:

  • Using strong passwords and secure access methods (SSH keys where possible).
  • Regularly updating operating systems and applications.
  • Monitoring logs for compromise or abuse and reacting in a timely manner.
  • Complying with the laws of the Republic of Bulgaria and the EU, including GDPR and copyright.

VPSStorages is not liable for damage caused by insecure or outdated client software.

4. Resources, traffic and fair use

To keep the platform stable for all users, we apply the following fair-use principles:

  • Long-term resource usage significantly above the plan may require an upgrade.
  • Traffic that looks like attack traffic or abuse may be rate-limited or filtered.
  • Backups are provided according to the plan’s policy, but clients should maintain their own off-site copies.
  • We do not guarantee service availability in scenarios where the client violates these rules.