Acceptable Use Policy

Effective Date: March 30, 2026

Welcome to IPPeak. Our mission is to provide a reliable, high-performance residential proxy network for market research, data collection, web crawling, and related use cases.

This Acceptable Use Policy (“AUP”) sets forth the rules governing the use of the services and systems described in IPPeak’s Terms of Service.

IPPeak reserves the right to modify, add, or remove restricted categories and to update this policy at any time to ensure the security and stability of our network.

To maintain the health, stability, and legality of our network—and to ensure all customers achieve the highest possible success rates—all users must comply with this Acceptable Use Policy. By using IPPeak’s platform, technology, and network, you agree to abide by these terms, which are incorporated into and form part of our Terms of Service.

1. General Provisions and Definitions

1.1 Any person or entity using the Company’s services/systems shall be deemed a customer of the Company.

1.2 IPPeak services are strictly designed for lawful and ethical use. We are committed to maintaining a clean proxy pool. As a user, you agree that your use of the services will strictly comply with all applicable local, national, and international laws and regulations, as well as third-party rights.

1.3 The Company and the customer are legally bound by the Terms of Service. This agreement governs the contractual relationship between the Company as the service provider and the customer (any natural or legal person) as the service user, including users who access the system without logging in or creating an account.

1.4 The Company provides various IP proxy infrastructure solutions, including IP addresses for customers to connect to the internet, as well as data collection and proxy management solutions. These services can be accessed and used via the website: https://www.ippeak.com/

1.5 You may contact the Company via email at support@ippeak.com. For matters related to this policy, we recommend contacting us through this email address.

1.6 The Company reserves the right to unilaterally modify and/or update this policy at any time without prior notice. Continued use of the services/systems shall be deemed as acceptance of the latest version of this policy. Customers are responsible for regularly reviewing and evaluating this policy.

1.7 By agreeing to the Terms of Service, you automatically agree to this policy.

1.8 If you do not agree to be bound by this policy in any respect, you must not use or must immediately cease using the services, systems, or any part thereof, including any features and functionalities.

2. Target Platform Accessibility and Policy Changes

The internet is a highly dynamic environment. Third-party websites, platforms, and services frequently update their terms of service, security protocols, and anti-bot mechanisms (such as WAFs, CAPTCHAs, and IP filtering). Therefore, IPPeak users must understand and accept the following:

2.1 No Guaranteed Access: While we strive to maintain a robust residential network, IPPeak does not guarantee uninterrupted access to any specific third-party website or platform.

2.2 Dynamic Blocking: Websites may proactively block IP subnets or change their access policies at any time. IPPeak shall not be held responsible if a specific target website becomes temporarily or permanently inaccessible due to network-related factors.

2.3 User Responsibility: You are responsible for ensuring that your data collection methods comply with the terms of service of the target websites you access.

3. Prohibited Activities and Use Restrictions

The use of IPPeak services for any illegal, fraudulent, malicious, or abusive activities is strictly prohibited. Prohibited activities and content include any actions or materials that violate, offend, or contradict public interest, public morals, public order, public safety, or national security, as well as any actions or content prohibited by applicable laws, regulations, procedures, orders, or requirements.

To protect our network and ensure a high-performance experience for all users, the following types of activities and content are explicitly prohibited or restricted (including but not limited to):

3.1 Network and Infrastructure Abuse

3.1.1 Distribution of cracks, pirated/cracked software, ROM packages, viruses, adware, worms, trojans, malware, spyware, or any other similar malicious software or products, or any computer code, files, or programs intended to interrupt, hijack, limit, damage, or negatively affect the functionality of any computer software, hardware, network, or telecommunications device.

3.1.2 Causing any network resources to become unavailable to their intended users, including but not limited to “Denial of Service (DoS)” or “Distributed Denial of Service (DDoS)” attacks.

3.1.3 Security Circumvention: Attempting to breach, bypass, or test vulnerabilities in any system, network, or authentication process without explicit permission.

3.1.4 Spam: Mass posting of unsolicited messages via email, message boards, IRC, forums, or blog comments.

3.1.5 Causing damage or service disruption to any third-party computer or service.

3.1.6 Use of viruses and malicious programs also includes: promoting, supporting, or assisting in the creation, distribution, or development of malware, viruses, hacking software, and pirated programs; encouraging, advocating, or publishing information on how to illegally access networks, IT devices, or communications without authorization; or providing support services for such activities.

3.1.7 Supporting or inciting attacks against IT or communication networks with the intent to damage or disrupt them.

3.2 Fraud, Deception, Legal and Ethical Violations, and Market Manipulation

3.2.1 Advertising and Click Fraud: Generating fake ad clicks or impressions to drain competitors’ budgets or artificially inflate revenue.

3.2.2 Fake Interactions: Artificially creating likes, comments, shares, reviews, or followers on social media and review platforms.

3.2.3 Account Creation: Using automated scripts to mass-create fake or fraudulent accounts on any platform.

Impersonation and Deception: Pretending to be an authorized user or entity for fraudulent purposes.

3.2.4 SEO Manipulation: Generating artificial search queries or fake clicks to manipulate search engine rankings.

3.2.5 Survey Fraud: Using proxies to complete online surveys or promotions to fraudulently obtain rewards, benefits, or compensation.

3.2.6 Incitement and Criminal Assistance: Inciting, promoting, or providing information on committing crimes or serious offenses, or assisting, supporting, or facilitating such acts, including theft, fraud, robbery, forgery, bribery, homicide, suicide, extortion, threats, rape, commercial scams, property infringement, kidnapping, evading legal compliance, money laundering, smuggling of prohibited content, and other punishable offenses.

3.2.7 Terrorism and Illegal Organizations: Creating, publishing, sharing, or supporting content related to terrorist organizations or any illegal group, association, or entity; or content that aids communication with leaders or members, recruitment, promotion, funding, or actual support of such organizations; or content detailing the construction of incendiary or explosive devices or other tools for terrorist activities.

3.2.8 Incitement Against Nations or Citizens: Inciting, encouraging, or allowing crimes against any country, its citizens, employees, overseas interests, public funds, or public facilities (including embassies, consulates, missions, or affiliated offices).

3.2.9 Unauthorized Access to Financial Information: Illegally altering, publishing, or allowing access to bank statements, accounts, data, credit or electronic card numbers; altering, publishing, or allowing access to personal identification numbers, or accessing passwords for websites or IT systems (e.g., email).

3.2.10 Identity Deception: Impersonating or claiming another person’s identity for the purpose of deceit, fraud, theft, or misappropriation.

3.2.11 Pornography and Nudity: Distribution or promotion of pornographic or explicit content.

3.2.12 Obscene or Corrupting Content: Inciting, supporting, promoting, or publishing content that violates public order, corrupts minors, or advocates destructive principles.

3.2.13 Immoral or Illegal Relations: Promoting, supporting, or disseminating content related to vice, adultery, prostitution, illegal or unethical relationships, human trafficking, or content containing prostitution advertisements.

3.2.14 Firearms, Ammunition, and Explosives: Trading or distributing weapons, ammo, or explosives illegally.

3.2.15 Illegal Drugs: Promoting or assisting in the trade, use, or manufacture of drugs or psychoactive substances without legal authorization, or encouraging their circulation.

3.2.16 Local Legal Variations: What constitutes illegal or prohibited content may vary depending on the location from which you access or use the services/systems. You are solely responsible for ensuring your use complies with applicable laws, rules, and ethical standards.

3.2.17 Protection of Minors and Social Responsibility: Any abuse of minors, hate speech, threats to health or life, extremist activities, dissemination of misinformation or fake news (especially regarding health, safety, or human rights), and incitement to commit similar acts are strictly prohibited and considered violations of this Acceptable Use Policy.

3.3 Unauthorized Data Collection, Intellectual Property, and Privacy Violations

3.3.1 Scraping Non-Public Data: Accessing, collecting, or scraping data behind user logins, paywalls, or authentication mechanisms without authorized access.

3.3.2 Phishing and Identity Theft: Engaging in any activity that steals personal information, financial data, or credentials.

3.3.3 Unauthorized Distribution of IP-Protected Content: Providing or publishing copyrighted movies, photos, images, books, electronic programs, games, encrypted TV or broadcast channels, or other intellectual property without legal authorization.

3.3.4 Circumventing Intellectual Property Protections: Offering tools, information, or methods intended to infringe intellectual property, bypass protective measures (e.g., decoding encrypted videos or channels, ripping disks or electronic programs, or games), or disable systems designed to prevent piracy.

3.3.5 Fraudulent Activity: Implementing, participating in, or promoting any form of fraud, including but not limited to click fraud that generates fake traffic. Any attempt to artificially click pay-per-click ads or other links—manually, via bots, or software—to increase revenue, exhaust advertising budgets, or inflate site audiences is strictly prohibited.

3.3.6 Fabricated Social Activity: Creating and operating fake profiles on social media, posting fake comments, likes, shares, or engaging in romance scams or other similar fraudulent activities.

3.3.7 Unauthorized Surveillance: Using tools to eavesdrop, spy, steal, or publish private information, or tracking, recording, or intercepting communications without proper authorization.

3.3.8 Disclosure of Private Information: Revealing news, photos, or comments about private or family life—even if true—that harms individuals’ public interest or reputation, wealth, or business name, or publishing content intended to threaten, coerce payment, or restrict others’ freedoms.

3.3.9 Unauthorized Access to Personal Information: Allowing illegal access to personal addresses, phone numbers, or sending spam or other disruptive internet content.

3.3.10 Competing or Assisting Competitors: Enhancing, operating, or assisting any service or entity that competes with IPPeak.

3.3.11 Intellectual Property Misuse: Copying, reproducing, duplicating, reselling, or commercially exploiting any part of the service, system materials, or the Company’s intellectual property without authorization.

3.3.12 Account Transfer Restrictions: Accounts may not be transferred to any third party without explicit prior consent from the Company, including selling, gifting, or granting access to unauthorized individuals.

3.3.13 Abuse of Free Trials: Misusing or improperly using any free trial service provided by the Company, including attempting to bypass trial eligibility checks or violating published rules to gain multiple trial periods.

3.4 Automated Content Blocking

3.4.1 Access Restrictions: Websites or pages containing prohibited content may be blocked by your local Internet Service Provider. Additionally, to protect your interests and those of the public, the Company continuously works to make the system/services safer. The Company reserves the right to block access to any website at its discretion while using the system/services.

3.4.2 High-Risk Filtering: To ensure network security, IPPeak proactively filters and blocks access to high-risk categories, including adult/pornographic content, government websites (.gov), banking/financial institutions, and known malicious domains. Users must not attempt to bypass these filters. IPPeak reserves the right to modify these blocking measures at any time.

3.4.3 Discretionary Blocking Rights: The Company reserves the right to add or remove access restrictions to any website/content at its sole discretion. Before using the system/services, you should regularly check for the most current information regarding blocked websites/content.

3.4.4 Reporting and Feedback: The Company encourages users to report any content that violates this Acceptable Use Policy or any websites/data that the Company should consider blocking. Users are also encouraged to share information about any security or technical issues they notice in the system/services. Clients acknowledge and agree that any information shared with the Company is voluntary, and no financial compensation will be provided.

4. Liability and Enforcement Consequences

4.1 User Responsibility: Clients are responsible for exercising reasonable judgment in determining which information, websites, or actions are considered prohibited.

4.2 Indemnification: Except as otherwise specified in this agreement, clients agree to defend, indemnify, and hold harmless IPPeak, its affiliates, and their respective officers, directors, employees, and agents from any and all third-party claims, demands, and liabilities—including reasonable attorneys’ fees—arising from or related to the client’s failure to comply with any and all applicable laws, rules, regulations, or any violation of this Acceptable Use Policy.

4.3 Monitoring and Enforcement: IPPeak actively monitors the health of its network and takes reports of abuse seriously. Any suspected violation of this Acceptable Use Policy will be investigated immediately. During an investigation, IPPeak may temporarily suspend your account. Confirmed violations may result in immediate termination of your IPPeak services without refund. IPPeak reserves the right to take strict action against non-compliant use and will fully cooperate with law enforcement and third-party security companies in investigating potential illegal activities.

5. Miscellaneous

5.1 Policy Updates: Any updates to this Acceptable Use Policy take effect from the date of publication in the system as described in Section 1. Continued use of the services constitutes your agreement to be bound by the updated version of this policy.

5.2 Contact: We encourage you to contact us through the channels specified in this agreement. Sending an email to support@ippeak.com should be considered the primary method of communication.

5.3 Reporting Abuse: A clean and secure network benefits everyone. We strongly encourage users and the public to report any abuse, suspicious activity, or unauthorized scraping originating from our network. Please send all abuse reports—including the offending IP address, timestamp, and target domain—to support@ippeak.com.

Thank you for helping maintain a safe and ethically compliant environment. By continuing to use our services, you acknowledge that you have read, understood, and agree to comply with this Acceptable Use Policy.