RSS Feed
Knowledgebase : General Articles > Abuse activity
Your purchased service could be suspended for the various reasons. In most scenarios after service suspension you will receive notification to email which is related with your Host1Plus account. When you login to Host1Plus Client Area [https://manage.host...
Brute force attack is a method of high hardware resources usage in order to decode one’s encrypted sensitive data such as passwords. The application program proceeds all possible combinations of characters in order to find the correct password and login t...
Strong password creation in order to protect your server from being hacked falls upon your responsibility. If we recognize that your server is being infected due to your generated week password, we preserve the right to suspend your service. Click her...
Botnet attack is an attempt to breach the security of multiple computers in order to gain control over them. After taking the control over these computers, all of the infected machines are connected into one network that can be managed by the hacker remot...
Copyright is a method of reproducing, distributing, publicly displaying or performing a work, protected by a copyright law, without a copyright holder permission. If a copyright violation is recognized within your website, we preserve the right to suspend...
Cryptocurrency mining is an unacceptable resource usage according our ToS. When bitmining, a maximum number of server resources is being exploited due to many calculations processed in order to gain internet crypto currency such as Bitcoin. If you wer...
DDoS attack is an attempt to make a machine or network resources unavailable to its intended users. During an attack, a perpetrator attempts to disrupt a virtual machine or intercept network resources by sending immense amounts of DDoS flood. When a num...
Domain traffic hijacking is an attempt to redirect the traffic from the original destination (your web server) to the one that attacker has set up (attacker’s malicious web server). If a domain is hijacked, website visitors are redirected to a fake webs...
Payment fraud is any fraud that might involve either falsely creating or falsely diverting the payments. Any form of transaction retrievals is being considered as payment fraud. If you made such retrieval, please click here [https://support.host1plus.com/...
Phishing is an email fraud method where perpetrator attempts to gather personal and/or financial information by sending a legitimate-looking email. In most of the cases, email consists of a link redirecting the recipient to an infected website that requir...
Spam is an emailing practice when a perpetrator uses large email lists to force his message on people that would normally would not choose to receive it. If we recognize that you are sending large amounts of emails without any evidence of those recipien...
UDP flood is a type of DoS attack performed in order to make a web server connection unavailable. Connection disturbance is performed by sending large UDP packets to random ports on a targeted host. When a host becomes incapable to answer multiple UDP p...
One user is allowed to have only one account registered with Host1Plus. If we recognize multiple accounts registered by the same person, we preserve the right to suspend his services. Having multiple accounts is unacceptable behavior according to our Term...
If you are unable to send emails from your server, it is possible that your server IP address(es) have been listed in public spam blacklists. You can check your IP status using online tools, such as MxToolbox - https://mxtoolbox.com/blacklists.aspx [https...
If you are unable to send emails from your server, it is possible that your server IP address(es) have been listed in public spam blacklists. This can happen due to various reasons: misconfigured mail service on your server, bulk email sending, low qualit...