Zero-Tolerance Policy on Cybercrime

At 3NT, we enforce a strict zero-tolerance policy toward cybercrime, malicious activity, and any abuse of our infrastructure.
We do not tolerate, support, or knowingly host any form of criminal behavior — and we proactively work to detect, prevent, and disrupt such activity.

What We Prohibit
We strictly forbid the use of our infrastructure for:
  • Distribution of malware or operation of command-and-control (C2) servers
  • Deployment of ransomware, phishing kits, spyware, or trojans
  • Running botnets or unauthorized remote access tools
  • Hosting of stolen data, credentials, or personally identifiable information (PII)
  • Spamming, mail bombing, or unsolicited bulk messaging
  • Launching DDoS attacks or offering stress-testing services
  • Cryptocurrency mining without explicit permission
  • Dissemination of illegal content, including CSAM or materials related to human trafficking
  • Any operation designed to evade detection or takedown, including so-called “bulletproof” hosting schemes
Confirmed violations lead to immediate service suspension and, where applicable, notification of relevant authorities.

How We Detect Abuse
We use a multi-layered detection framework, including:
  • Proprietary ML-based behavioral scanners built and maintained in-house
  • Real-time integrations with leading threat intelligence platforms (OTX, Abuse.ch, ThreatFox, etc.)
  • Continuous monitoring and anomaly detection across our network
  • Manual triage and investigation by our dedicated Abuse & Security Team
  • Live updates of threat signatures and IOCs from public and private feeds
Legal Cooperation
We collaborate with global law enforcement and cybersecurity units, including:
  • FBI (United States)
  • NHTCU (Netherlands)
  • BKA (Germany)
  • Guardia Civil (Spain)
  • Gendarmerie Nationale (France)
  • Other official agencies across the UK, EU, and international jurisdictions
When legally required, we provide:
  • Subscriber information
  • Server images
  • Network logs and forensic data
This helps dismantle criminal infrastructure and support victim protection efforts.

Abuse Reporting
If you believe our infrastructure is being misused, please get in touch with our Abuse & Compliance Team at:
📧 abuse@3nt.com
For official inquiries from law enforcement:
📧 legal@3nt.com

We promptly investigate every abuse report and take immediate corrective action when the report is confirmed.

Legal & Ethical Compliance
We operate in full accordance with:
  • UK Computer Misuse Act (1990)
  • EU GDPR and NIS2 Directive
  • US laws governing infrastructure abuse and defamation (where applicable)
  • Acceptable Use Policies of all upstream providers and data centers
We maintain a transparent, ethical, and constantly audited operating environment.

Trusted by Partners, Recognized by Authorities
Our infrastructure is trusted by:
  • Tier 1 network providers
  • IP transit partners
  • Regulated data centers worldwide
We are recognized by law enforcement agencies across the UK, EU, and US for our proactive role in cybercrime investigations, including participation in high-profile global operations.