Policy Document
Abuse Reporting Policy
This document outlines the operational, legal, and compliance terms that apply to SideroCloud hosting services and related support processes.
Last updated: Apr 21, 2026
Overview
SideroCloud reviews abuse and compliance reports relating to customer-hosted services. Reports may involve game servers, VPS workloads, websites, downloadable files, panels, proxies, or other infrastructure operated through our network. Abuse reports should be submitted to [email protected]. We aim to respond to abuse reports within 24 hours.
1Report Categories
We accept reports concerning:
- malware, phishing, spam, botnets, brute force activity, and credential theft.
- DDoS activity, intrusion attempts, scanning, exploit traffic, or network attacks.
- fraud, payment abuse, financial scams, impersonation, or deceptive hosted services.
- illegal broadcasting, unauthorized restreaming, or unlawful distribution of media.
- prohibited hosted content, including unlawful adult content and any underage sexual content.
- copyright, DMCA, trademark, and related rights complaints connected to hosted services.
2Information To Include
To review a report efficiently, please include:
- your name and contact information.
- the affected IP address, hostname, URL, server identifier, or other service reference.
- a description of the alleged abuse or violation.
- timestamps, log samples, screenshots, or other supporting evidence.
- for rights complaints, proof of ownership or authority to act.
- for urgent safety issues, a clear explanation of why immediate review is needed.
3Review & Response
We review reports in line with our Terms of Service, Acceptable Use Policy, and applicable law where services are offered, including relevant US and EU compliance obligations. We may request additional information before taking action. Some categories, especially child-safety, illegal content, or active network attacks, may be prioritized for expedited review.
4Outcomes
Depending on the report and available evidence, SideroCloud may warn the customer, restrict service functionality, suspend or terminate services, disable access to specific content, coordinate with upstream providers, or preserve relevant records where required by law or legitimate operational need.