Acceptable Use Policy (AUP)
Effective Date: May 2026
This Acceptable Use Policy (AUP) outlines the strict rules and limitations regarding the use of Endurance Nodes' infrastructure. By utilizing our services, you agree to adhere to these rules absolutely. Endurance Nodes operates with a zero-tolerance policy for hardware abuse, network exploitation, and malicious activities. Violation of any terms in this AUP will result in the immediate suspension or permanent, irreversible termination of your services without notice or refund.
1. General Prohibited Activities
Under no circumstances may our infrastructure be used for the following:
- Malicious Operations: Hosting malware, ransomware, keyloggers, viruses, or participating in botnets.
- Network Attacks: Initiating Denial of Service (DoS/DDoS) attacks, IP spoofing, port scanning, or network sniffing.
- Illegal Content: Hosting, transmitting, or distributing unauthorized copyrighted material (piracy), Child Sexual Abuse Material (CSAM), or any content that violates international laws.
- Phishing and Fraud: Hosting fake login pages, fraudulent websites, or engaging in identity theft operations.
- Email Spam (SMTP Abuse): Using the server to operate open mail relays, sending unsolicited commercial email (spam), or executing mass-mailing scripts. Outbound traffic on default mail ports (such as port 25) is strictly monitored and heavily restricted.
- Cryptocurrency Mining: Any form of crypto-mining, node operating (e.g., Chia, Bitcoin), or utilizing CPU/GPU/Disk resources for blockchain validation.
- Proxies and VPNs: Using the server to bypass network restrictions, hosting Tor exit nodes, public web proxies, or personal VPNs.
2. Resource and Network Abuse
Endurance Nodes provides high-performance hardware, but it is a shared environment. Intentional or negligent abuse that negatively impacts the node or other clients is strictly prohibited.
- Disk I/O Abuse: Generating extreme, continuous read/write operations that physically degrade our NVMe drives.
- Intentional CPU Locking: Running scripts or processes designed to intentionally peg CPU threads at 100% capacity continuously.
- Memory Leaks & Crash Loops: Allowing servers to remain in an infinite crash-and-reboot loop that aggressively consumes hypervisor resources. It is the client's responsibility to read their crash reports and fix their software.
- Network Bandwidth Hoarding: Using the unmetered game network connection for non-gaming high-bandwidth distribution (e.g., serving as a public Content Delivery Network, file-sharing hub, or P2P torrenting).
3. Pterodactyl Panel & Docker Security
Our control panel operates on isolated Docker containers. The following actions against our infrastructure software are strictly forbidden:
- Container Escaping: Attempting to exploit vulnerabilities to bypass container isolation, access the host machine (hypervisor), or view the data of other tenants.
- Symlink Abuse: Creating malicious symbolic links (symlinks) to access directories, configurations, or system files outside of the user's allocated server root directory.
4. Minecraft-Specific Restrictions
To maintain node stability, the following practices are forbidden on all Minecraft servers hosted on our platform:
- Aggressive Chunk Pre-generation: While pre-generating worlds is allowed, running aggressive generation tasks (such as using the 'Chunky' plugin) at extreme speeds without tick delays that starve the node's CPU threads is prohibited.
- Lag Machines: Intentionally building redstone clocks, entity cramming machines, or automated systems designed to crash the server or artificially lower the TPS (Ticks Per Second).
- Malicious Plugins: Installing backdoors, "Force OP" scripts, or unauthorized server-crashing tools.
- EULA Violations: Clients must strictly comply with the Mojang/Microsoft End User License Agreement. We will immediately terminate servers blacklisted by Mojang for severe violations (such as extreme Pay-to-Win mechanics or unauthorized offline-mode distribution).
- Offline-Mode Liability: If a client chooses to disable Mojang authentication (running in 'offline-mode' or 'cracked' status), they assume 100% absolute liability for any security breaches, UUID spoofing, or unauthorized administrative access to their server. Endurance Nodes provides zero support for bypassing authentication plugins.
5. Discord Bot and Application Hosting Restrictions
For clients utilizing our services to host Discord bots or similar automated applications, the following rules apply:
- Mass DMing: Bots designed to scrape user lists and send unsolicited mass Direct Messages (spam) are strictly prohibited.
- Self-Bots: Hosting user-account bots (self-bots) which violate Discord's Developer Terms of Service.
- Token Grabbing: Hosting scripts designed to steal Discord tokens, passwords, or personal user data.
- API Abuse: Intentional rate-limiting abuse against the Discord API or any external third-party API.
6. Hytale and Future Game Integrations
As new game engines and platforms (such as Hytale) are integrated into our hosting environment, clients are strictly bound by the respective Developer Terms of Service, End User License Agreements (EULA), and modding guidelines issued by those studios (e.g., Riot Games / Hypixel Studios). Hosting unauthorized private server emulators or reverse-engineered server software that violates copyright law is forbidden.
7. Database (MySQL/MariaDB) Restrictions
Complimentary databases provided by Endurance Nodes are exclusively for the operation of the hosted game server or bot.
- No External Web Hosting: You may not use our databases to host external, high-traffic websites, forums, or external applications not directly related to your server's data storage.
- Data Scraping: Storing massive datasets scraped from the internet that are unrelated to gaming is prohibited.
- Query Abuse & Connection Exhaustion: Running unoptimized, continuous SQL queries that lock up the shared database service, or intentionally exhausting maximum connection limits.
8. Storage Evasion and Cloud Drive Abuse
The NVMe storage allocated to your plan is strictly for active game server files, configurations, and internal data.
- No Personal Cloud Storage: You may not use your server's FTP/SFTP access as a personal cloud drive (like Google Drive or Dropbox) to store personal photos, videos, or archives.
- Media Streaming: Hosting video streaming services, audio hosting, or large media distribution is strictly forbidden.
- Backup Hoarding: Storing dozens of old, uncompressed local backups on the active NVMe storage to bypass storage limits is prohibited. Backups should be downloaded externally.
9. Enforcement, Monitoring, and IP Blacklisting Liability
Endurance Nodes employs automated monitoring tools to track CPU, RAM, Disk I/O, and network traffic at the hypervisor level. We do not inspect your private files without cause.
If a server triggers an abuse alert (e.g., massive outbound traffic or continuous I/O saturation), our administration reserves the right to immediately suspend the instance and investigate. Furthermore, if a client's malicious actions cause an Endurance Nodes IP address to be placed on a global blacklist (e.g., Spamhaus, anti-DDoS lists, or game server blacklists), the client will be permanently banned and held liable for the damages.