Acceptable Use Policy
Last update: December 10, 2025.
The following is IX.CM’s Acceptable Use Policy (“AUP”). By using IX.CM’s Hosting Services (“Services”), you agree to comply with this AUP. You also agree to require your end users to comply with this AUP.
IX.CM reserves the right to amend this AUP at any time, with or without notice to you. IX.CM agrees to post any changes to this AUP on the IX.CM Homepage (located at: https://ix.cm/) and you agree to periodically review this AUP as modified from time to time. You agree to be bound to this AUP, as modified from time to time, every time you use or access the Services.
Pursuant to your Hosting Services Agreement, IX.CM may, at its sole discretion, immediately terminate your access to the Services if your conduct violates (or appears to violate) the AUP. In addition, IX.CM may, at its sole discretion, immediately terminate your access to the Services if any of your end users violate the AUP.
1. No Unlawful or Prohibited Use
Section titled “1. No Unlawful or Prohibited Use”As a condition of your use of the Services, you will not use the Services (nor will you permit an end user to use the Services) for any purpose that is unlawful under the laws of the Hong Kong Special Administrative Region (“Hong Kong”) or otherwise prohibited by this AUP.
You may not use the Services (nor will you permit an end user to use the Services) in any manner that could damage, disable, overburden, or otherwise impair any of the Services offered by IX.CM, or any services offered by a third party, or interfere with any other party’s use and enjoyment of any of our Services.
You may not (nor will you permit your end users to) obtain or attempt to obtain any materials or information through any means not intentionally made available through the Services.
2. Use of Services
Section titled “2. Use of Services”The Services are designed to enable you and your end users to communicate with others via the Internet. You agree to use the Services (and to require your users to use the Services) only to post, send, and receive messages and material that is proper and, when applicable, related to the particular Service.
2.1 Prohibited Activities
Section titled “2.1 Prohibited Activities”By way of example, and not as a limitation, you agree that when you (or your end users are) using a Service, you (and your end users) will not:
Network & Proxy Abuse
Section titled “Network & Proxy Abuse”- Provide Public Proxy Services that could result in the blocking of IX.CM IP space or ASN.
- Encrypted Private Proxies are allowed.
- Principle of judgment: IX.CM receives IP SPAM warnings from other networks while the Uplink and Downlink Traffic are equal.
- Use this service to build VPN tunnels (including, but not limited to, L2TP, OpenVPN, PPTP, IPSec, Cisco AnyConnect) to China.
- Host TOR exit nodes.
- Network probing or port scanning tools are only permitted if explicitly authorized by the destination host and/or network. Unauthorized port scanning, for any reason, is strictly prohibited.
Spam & Unsolicited Communications
Section titled “Spam & Unsolicited Communications”- Use the Service in connection with unlawful contests, lotteries, or gambling; pyramid schemes, chain letters, junk email, spamming, or any duplicative or unsolicited messages (commercial or otherwise).
Resource Abuse
Section titled “Resource Abuse”- Occupy a large amount of bandwidth continuously for a long time.
- Use network acceleration modules with unacceptable configurations (including but not limited to: FinalSpeed, Unofficial BBR, etc.).
Harassment & Illegal Content
Section titled “Harassment & Illegal Content”- Defame, abuse, harass, stalk, threaten, or otherwise violate the legal rights (such as rights of privacy and publicity) of others.
- Publish, post, upload, distribute, traffic, or disseminate any defamatory, obscene, or otherwise unlawful content, such as child pornography or virtual child pornography.
- Publish, post, upload, distribute, or disseminate any topic, name, material, or information that incites discrimination, hate, or violence towards one person or a group because of their belonging to a race, a religion, or a nation.
Intellectual Property Violations
Section titled “Intellectual Property Violations”- Upload, or otherwise make available, files that contain images, photographs, software, or other material protected by intellectual property laws, including, by way of example, and not as limitation, copyright or trademark laws (or by rights of privacy or publicity) unless you own or control the rights thereto or have received all necessary consents to do the same.
- Use any material or information, including images or photographs, which are made available through the Services in any manner that infringes any copyright, trademark, patent, trade secret, or other proprietary right of any party.
- Download any file posted by another user of a Service that you know, or reasonably should know, cannot be legally distributed in such manner.
- Falsify or delete any author attributions, legal or other proper notices, or proprietary designations or labels of the origin or source of software or other material contained in a file that is uploaded.
Malicious Activities
Section titled “Malicious Activities”- Upload files that contain viruses, Trojan horses, worms, time bombs, cancelbots, corrupted files, or any other similar software or programs that may damage the operation of another’s property.
- Engage in or facilitate any form of fraud, phishing, impersonation, or deceptive activity, including the creation or distribution of fake websites, emails, or communications intended to mislead others, obtain credentials, or gain unauthorized access, as well as hosting or linking to phishing sites, operating scams, or other fraudulent schemes.
Other Prohibited Conduct
Section titled “Other Prohibited Conduct”- Restrict or inhibit any other user from using and enjoying the Services.
- Violate any code of conduct or other guidelines which may be applicable for any particular Service.
- Harvest or otherwise collect information about others, including e-mail addresses, except as needed to operate your site and as permitted in your site’s privacy policy (if any).
- Violate any applicable laws or regulations, including but not limited to the laws of Hong Kong.
- Create a false identity for the purpose of misleading others.
- Use, download, or otherwise copy, or provide (whether or not for a fee) to a person or entity any directory of users of the Services or other user or usage information or any portion thereof.
- Utilize bots for the purpose of repeatedly and/or automatically acquiring merchandise and anything similar that violates third-party Terms of Service that could result in the blocking of IX.CM IP space or ASN.
- Secondary virtualization for commercial purposes.
- Redistribution and sale using our final products.
2.2 Disclosure & Content Removal
Section titled “2.2 Disclosure & Content Removal”IX.CM reserves the right at all times to disclose any information as IX.CM deems necessary to satisfy any applicable law, regulation, legal process, or governmental request, or to edit, refuse to post, or to remove any information or materials, in whole or in part, in IX.CM’s sole discretion.
IX.CM does not control or endorse the content, messages, or information found in any Service and, therefore, IX.CM specifically disclaims any liability with regard to the Services and any actions resulting from your participation in any Service.
3. Resource Limitation
Section titled “3. Resource Limitation”To ensure the stable operation of services and uphold the principle of fair resource usage, IX.CM establishes the following policies governing the use of computing and network resources.
3.1 CPU Usage
Section titled “3.1 CPU Usage”- In the event any instance uses excessive CPU from activities such as cryptocurrency CPU mining, IX.CM reserves the right to limit the CPU available to your instances in order to maintain a consistent level of performance on all our nodes.
- All products are guaranteed 50% CPU usage by default unless otherwise stated.
- When IX.CM has enough and stable virtualization computing resources in the region, and the client instance’s operating system or software is not crashed, IX.CM accepts long-term and reasonable high-load usage of computing resources.
Note: If the workload or software behavior causes abnormal or excessive CPU consumption due to inefficient or inappropriate program design, IX.CM may take actions to limit CPU max performance in order to protect overall node performance and service stability.
3.2 Load Balancing
Section titled “3.2 Load Balancing”- IX.CM will actively balance VM/Node loads to maximize resource allocation, and will only implement CPU limitation measures when short-term resource expansion is not feasible.
3.3 Network Restrictions
Section titled “3.3 Network Restrictions”- IX.CM reserves the right to restrict VM Internet Ports in cases where such activities affect the overall stability of the network.
4. Termination / Access Restriction
Section titled “4. Termination / Access Restriction”IX.CM has no obligation to monitor the Services. However, IX.CM reserves the right to review materials posted to a Service and to remove any materials in its sole discretion.
IX.CM reserves the right, in its sole discretion, to terminate your access to any or all Services and the related services or any portion thereof at any time, with or without notice, for violating this AUP.
Your rights and obligations upon termination of any Service are governed by the Hosting Terms of Service. Upon termination of the Service, your right to use the Service immediately ceases. IX.CM shall have no obligation to maintain any content upon termination of the Services.
4.1 Enforcement Actions
Section titled “4.1 Enforcement Actions”Depending on the severity of the violation, IX.CM may implement:
| Severity | Action | Duration |
|---|---|---|
| Minor to Moderate | Service suspension or null routing | 7 to 30 days |
| Severe | Immediate service termination | Permanent |
5. No Spam; Damages
Section titled “5. No Spam; Damages”IX.CM will immediately terminate any account which it believes, in its sole discretion, is transmitting or is otherwise connected with any spam or other unsolicited bulk email.