1. Scope
This Acceptable Use Policy applies to all uses of the LAN Company protected reverse proxy and DDoS mitigation service, dashboard access, tunnels, and related communications.
2. Core rule
The service may only be used for lawful purposes and in a manner that does not create unacceptable legal, operational, or abuse risk for the operator, upstream providers, or third parties.
3. Strictly prohibited use
- Phishing pages or credential theft operations
- Malware, ransomware, trojans, malicious loaders, or harmful payload distribution
- Botnet command-and-control infrastructure
- Carding, payment fraud, or identity fraud operations
- CSAM or any material involving sexual exploitation of minors
- Mass unsolicited email or SMS campaigns
- Unauthorized scanning, brute-force campaigns, or offensive attacks against third parties
- Using the service as a launch point for DDoS attacks against third parties
- Use in violation of sanctions, export controls, or applicable criminal law
4. Projects requiring review
Certain high-risk sectors may be reviewed manually and accepted or declined case by case. A review does not create any guarantee of service continuity, and the operator may later suspend or terminate service if risk increases or if the project crosses into prohibited conduct.
5. Abuse reporting
Abuse complaints should be sent to abuse@lan1337.com. The operator aims to provide an initial response within 48 hours. Where an abuse issue is substantiated, the operator may require remediation within a stated time window or suspend service immediately where justified.
6. Legal orders and investigations
The operator may act on valid legal orders, lawful requests, or enforcement obligations under applicable law. This may include suspension, termination, or disclosure of limited account data where legally required.
7. Sanctions and restricted jurisdictions
Service is not available to persons or entities located in, ordinarily resident in, or organized under sanctioned or restricted jurisdictions, or to parties acting on their behalf.
8. Enforcement
The operator may investigate suspected breaches of this Policy and may take action including warning, configuration limits, suspension, termination, and refusal of future service. Refunds are not required where service is suspended or terminated for breach.