Acceptable Use Policy

Effective date: January 1, 2025  ·  Last updated: January 1, 2025

This Acceptable Use Policy (“AUP”) governs your use of all proxy services, APIs, and related infrastructure provided by NinjasProxy (“we,” “us,” or “our”). This AUP is incorporated by reference into our Terms of Service. In the event of a conflict, the Terms of Service prevail.

1Permitted Uses

NinjasProxy is built for legitimate, professional use cases. The following activities are explicitly permitted, subject to compliance with applicable law and the destination website’s terms of service:

Web Scraping

Public data collection for research, price comparison, market intelligence, or content aggregation

SEO Monitoring

Rank tracking, SERP analysis, backlink research, and competitor keyword monitoring

Ad Verification

Verifying ad placement, detecting fraud, and ensuring brand safety across geographies

Travel & E-commerce

Fare aggregation, price monitoring, product availability tracking

Social Media Management

Managing multiple legitimate brand or creator accounts with proper platform consent

Sneaker & Retail Automation

Checkout automation for personal use on platforms that permit it

Security Research

Authorized penetration testing, bug bounty research, and threat intelligence

Geo-testing

Testing how websites or apps appear to users in different countries

Permitted use does not grant you the right to violate third-party rights or applicable law. You remain solely responsible for ensuring your use of the Services complies with all applicable legal and contractual obligations.

2Prohibited Uses

The following activities are strictly prohibited and will result in immediate account suspension or termination, potential legal action, and notification of relevant authorities where required by law:

🚫Illegal Content & Activity
  • Accessing, distributing, or transmitting child sexual abuse material (CSAM) or any content that sexually exploits minors — zero tolerance, immediately reported to NCMEC and law enforcement
  • Any activity that constitutes a criminal offence under applicable law
  • Trafficking in controlled substances, weapons, or other regulated goods in violation of applicable law
🎭Fraud & Identity Abuse
  • Phishing, social engineering, or credential harvesting
  • Identity theft or impersonation
  • Account takeover attacks or credential stuffing campaigns
  • Creating fake reviews, artificial social-media engagement, or ad fraud
  • Any activity designed to deceive consumers or businesses for financial gain
📧Spam & Unsolicited Communications
  • Sending unsolicited bulk email (spam) regardless of content
  • Operating open mail relays or email harvesting bots
  • Sending SMS spam or robocalls
  • Any mass unsolicited communication that violates CAN-SPAM, GDPR, CASL, or similar regulations
💥Network Attacks & Disruption
  • Launching or facilitating denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
  • Port scanning, vulnerability scanning, or reconnaissance against systems you do not own or have explicit permission to test
  • Amplification attacks, reflection attacks, or any form of traffic flooding
  • Disrupting or degrading the performance of any network, service, or infrastructure
🔓Unauthorized Access
  • Accessing computer systems, networks, or accounts without authorization
  • Exploiting software vulnerabilities in systems you do not own
  • Bypassing authentication, rate limiting, or access controls of third-party services without permission
  • Operating botnets or controlling compromised machines
⚖️Intellectual Property Violations
  • Reproducing or distributing copyrighted content without authorization at scale
  • Circumventing digital rights management (DRM) systems
  • Scraping and republishing content in a manner that violates copyright law
🔁Resale & Infrastructure Abuse
  • Reselling, sublicensing, or redistributing proxy access to third parties without our prior written consent
  • Using the Services to build a competing proxy service
  • Generating artificial traffic to inflate usage metrics or circumvent usage limits

3Enforcement

We actively monitor for AUP violations using automated systems and manual review. Upon detecting or receiving a credible report of a violation, we may take any or all of the following actions at our sole discretion:

  • Immediately suspend or throttle the offending account or endpoints
  • Permanently terminate the account with no refund of unused credits
  • Preserve and disclose records to law enforcement or regulatory bodies as required by law
  • Pursue civil or criminal remedies for damages caused to NinjasProxy or third parties
  • Block specific IPs, subnets, or traffic patterns network-wide
Zero-tolerance items: CSAM, DDoS infrastructure, and human trafficking will result in immediate permanent termination, forfeiture of all credits, and mandatory reporting to appropriate law enforcement — without exception and without prior warning.

4Reporting Abuse

If you observe traffic originating from our network that violates this AUP or applicable law, please report it to our abuse team. Include:

  • The IP address(es) involved
  • Timestamps (with timezone) of the observed activity
  • A description of the abuse and any supporting logs or evidence

Abuse reports: abuse@ninjasproxy.com

We take all abuse reports seriously and aim to investigate and respond within 24 hours. Where legally required (e.g., CSAM under 18 U.S.C. § 2258A), we will make mandatory reports to the appropriate authorities.

5Changes to This Policy

We may update this AUP at any time to reflect changes in the law, our services, or our risk posture. Material changes will be communicated via email or a prominent notice on our website. Continued use of the Services after the effective date of any change constitutes acceptance of the revised AUP.