Acceptable Use Policy
Effective date: January 1, 2025 · Last updated: January 1, 2025
This Acceptable Use Policy (“AUP”) governs your use of all proxy services, APIs, and related infrastructure provided by NinjasProxy (“we,” “us,” or “our”). This AUP is incorporated by reference into our Terms of Service. In the event of a conflict, the Terms of Service prevail.
1Permitted Uses
NinjasProxy is built for legitimate, professional use cases. The following activities are explicitly permitted, subject to compliance with applicable law and the destination website’s terms of service:
Public data collection for research, price comparison, market intelligence, or content aggregation
Rank tracking, SERP analysis, backlink research, and competitor keyword monitoring
Verifying ad placement, detecting fraud, and ensuring brand safety across geographies
Fare aggregation, price monitoring, product availability tracking
Managing multiple legitimate brand or creator accounts with proper platform consent
Checkout automation for personal use on platforms that permit it
Authorized penetration testing, bug bounty research, and threat intelligence
Testing how websites or apps appear to users in different countries
Permitted use does not grant you the right to violate third-party rights or applicable law. You remain solely responsible for ensuring your use of the Services complies with all applicable legal and contractual obligations.
2Prohibited Uses
The following activities are strictly prohibited and will result in immediate account suspension or termination, potential legal action, and notification of relevant authorities where required by law:
- Accessing, distributing, or transmitting child sexual abuse material (CSAM) or any content that sexually exploits minors — zero tolerance, immediately reported to NCMEC and law enforcement
- Any activity that constitutes a criminal offence under applicable law
- Trafficking in controlled substances, weapons, or other regulated goods in violation of applicable law
- Phishing, social engineering, or credential harvesting
- Identity theft or impersonation
- Account takeover attacks or credential stuffing campaigns
- Creating fake reviews, artificial social-media engagement, or ad fraud
- Any activity designed to deceive consumers or businesses for financial gain
- Sending unsolicited bulk email (spam) regardless of content
- Operating open mail relays or email harvesting bots
- Sending SMS spam or robocalls
- Any mass unsolicited communication that violates CAN-SPAM, GDPR, CASL, or similar regulations
- Launching or facilitating denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks
- Port scanning, vulnerability scanning, or reconnaissance against systems you do not own or have explicit permission to test
- Amplification attacks, reflection attacks, or any form of traffic flooding
- Disrupting or degrading the performance of any network, service, or infrastructure
- Accessing computer systems, networks, or accounts without authorization
- Exploiting software vulnerabilities in systems you do not own
- Bypassing authentication, rate limiting, or access controls of third-party services without permission
- Operating botnets or controlling compromised machines
- Reproducing or distributing copyrighted content without authorization at scale
- Circumventing digital rights management (DRM) systems
- Scraping and republishing content in a manner that violates copyright law
- Reselling, sublicensing, or redistributing proxy access to third parties without our prior written consent
- Using the Services to build a competing proxy service
- Generating artificial traffic to inflate usage metrics or circumvent usage limits
3Enforcement
We actively monitor for AUP violations using automated systems and manual review. Upon detecting or receiving a credible report of a violation, we may take any or all of the following actions at our sole discretion:
- Immediately suspend or throttle the offending account or endpoints
- Permanently terminate the account with no refund of unused credits
- Preserve and disclose records to law enforcement or regulatory bodies as required by law
- Pursue civil or criminal remedies for damages caused to NinjasProxy or third parties
- Block specific IPs, subnets, or traffic patterns network-wide
4Reporting Abuse
If you observe traffic originating from our network that violates this AUP or applicable law, please report it to our abuse team. Include:
- The IP address(es) involved
- Timestamps (with timezone) of the observed activity
- A description of the abuse and any supporting logs or evidence
Abuse reports: abuse@ninjasproxy.com
We take all abuse reports seriously and aim to investigate and respond within 24 hours. Where legally required (e.g., CSAM under 18 U.S.C. § 2258A), we will make mandatory reports to the appropriate authorities.
5Changes to This Policy
We may update this AUP at any time to reflect changes in the law, our services, or our risk posture. Material changes will be communicated via email or a prominent notice on our website. Continued use of the Services after the effective date of any change constitutes acceptance of the revised AUP.