The rules are made in order to protect your data and your server and all customer servers. Due to our experience with the Bind hack we will be closely monitoring all servers and we will regularly access servers to make sure that you have not been hacked.We will access your server if:
Subject to the terms and conditions of this Agreement, UK-2 Ltd will provide to Customer the Web hosting and/or related services described in the plan selected by Customer from UK-2 Ltd then published list of services offered from time to time ("Services"). The specific plan of Services to be provided initially to Customer shall be as selected in the Order and thereafter as established through correspondence between Customer and UK-2 Ltd. Customers must be over 18 years of age. UK-2 Ltd reserve the right to ask for proof of age (in the form of a valid passport or photo driving license) and to carry out checks to verify the information provided.
You are not allowed to port scan anyone other than your own machines or network. If your server has been compromised by a hacker they usually start port scanning other servers and we then get the reports causing us to suspect your server.
Once in a while we will check all the servers and monitor the most active servers as they are most likely to have illegal software or to have been hacked. We perform port scans on the servers and will investigate servers with suspicious ports open (anything over port 10000).
Spammers are rarely hackers and please be aware that we are required by our backbone carriers to police and monitor spamming strictly. If you are deliberately spamming you risk loosing your server.
Due to the high number of servers, IP density is very close. If your server is responding to IP numbers that have not been assigned to you, it will be turned off and we will remove the access to the server until further notice.
You have blocked our test machines from ICMP traffic or any other traffic making it impossible for us to test your server.
You will need to allow access from the following IP addresses:
Please consult the documentation for the firewall you use. If you use iptables on a Linux server, you may be able to use:
iptables -A INPUT -s 126.96.36.199 -j ACCEPT
iptables -A INPUT -s 188.8.131.52 -j ACCEPT
iptables -A INPUT -s 184.108.40.206 -j ACCEPT
We hope that you appreciate that these rules are for your protection and are only enforced to ensure that no-one abuses the services.