Acceptable Use Policy (AUP)

Last updated January 1, 2026

Important: Zero-Tolerance Warning

This Acceptable Use Policy ("AUP") governs the use of the proxy services, APIs, and network infrastructure (collectively, the "Services") provided by WATTENNE INTERNATIONAL LLC ("Company," "we," or "us"). This AUP is incorporated by reference into the Company’s Terms of Service.


WE OPERATE A ZERO-TOLERANCE POLICY. We monitor network metadata (including connection counts, bandwidth velocity, and error rates) to detect abuse. Violations of this AUP will result in immediate account termination WITHOUT REFUND and may result in legal action or referral to law enforcement.

1. The Shared Responsibility Framework & Neutrality

You acknowledge that the Company acts solely as a provider of neutral technical infrastructure ("pipes").

  • No Payload Inspection: We do not inspect, moderate, or view the contents (payloads) of your traffic.

  • Customer Sole Liability: Because we do not monitor your content, you assume 100% legal responsibility for all data transmitted and all destinations accessed through your account.

  • Compliance: You are responsible for ensuring your use of the Services complies with the laws of (i) your jurisdiction, (ii) the jurisdiction of the Company (USA/Wyoming), and (iii) the jurisdiction of the destination server or website.

2. Zero-Tolerance: Criminal & Illegal Activity

You must not use the Services for any activity that is criminal or illegal under applicable law. The following are strictly prohibited:

  • Child Sexual Abuse Material (CSAM): Accessing, distributing, or soliciting CSAM. We report all such activity to the National Center for Missing & Exploited Children (NCMEC).

  • Terrorism & Violence: Promoting terrorism, violent extremism, or trafficking in weapons or humans.

  • Fraud & Financial Crime: Phishing, carding (credit card fraud), bank fraud, money laundering, or accessing compromised financial accounts.

  • Identity Theft: Purchasing, selling, or using stolen credentials, cookies, or digital fingerprints.

  • Cyberattacks: Operating botnets, distributing malware/ransomware, or controlling command-and-control (C2) servers.

3. Zero-Tolerance: Network Abuse & Security Violations

You must not use the Services to attack, interfere with, or degrade the performance of any network, server, or system. Prohibited activities include:

  • DDoS & Flooding: Launching Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, or "stress testing" networks without explicit written consent from the target.

  • Port Scanning: Scanning ports or probing security vulnerabilities on third-party networks.

  • Spam & Unsolicited Communications: Sending unsolicited bulk email (spam), forum spam, comment spam, or violating the CAN-SPAM Act. Usage of Port 25 (SMTP) is strictly blocked.

  • Hacking & Unauthorized Access: Attempting to gain unauthorized access to any system, account, or data (e.g., "brute-forcing," "credential stuffing," or bypassing authentication).

4. Intellectual Property Violations

  • Copyright Infringement: You may not use the Services to download, distribute, or stream copyrighted material without license (e.g., via BitTorrent or P2P networks).

  • DMCA Violations: We process valid DMCA notifications. Repeat infringers will be terminated.

  • Trademark Violations: You may not use the Services to facilitate the sale of counterfeit goods.

5. Web Scraping & Data Collection Standards

While data collection is a legitimate use case, abusive scraping is prohibited. You act as an independent data controller and are solely responsible for the legality of your scraping activities.


5.1 "Legitimate" vs. "Abusive" Scraping

  • Respect for Robots.txt: You agree to respect the robots.txt protocols and standard exclusion headers of target websites where legally required or where failure to do so constitutes a breach of the target’s Terms of Use.

  • Performance Degradation: You must not engage in high-velocity scraping that degrades the performance of the target website (e.g., executing thousands of concurrent requests against a single small server). This is classified as a DoS attack disguised as scraping.

  • Target Terms of Service: You are solely responsible for ensuring your scraping does not violate the Terms of Service (ToS) of the target website. The Company is not a party to your agreement with third-party websites.


5.2 Prohibited Scraping Targets

You must not use the Services to scrape:

  • Government Infrastructure: (e.g., .gov domains, military sites, critical infrastructure).

  • Personal Health Data: (HIPAA-protected data or equivalent).

  • Non-Public Data: Data behind authentication walls where you do not hold a valid account or authorization.

6. Social Media & Ad Tech Abuse

  • Fake Account Creation: Automating the bulk creation of fake accounts on social media, email platforms, or other services.

  • Ad Fraud: Engaging in click fraud, impression fraud, or generating non-human traffic to defraud advertisers or ad networks.

7. Monitoring & Enforcement

7.1 Metadata Monitoring
While we do not inspect payloads, we actively monitor traffic metadata to ensure compliance with this AUP. We analyze connection velocity (requests per second per IP), target diversity, and bandwidth usage patterns (e.g. abnormally high upload/download ratios).


7.2 Consequences of Violation
If we determine, in our sole discretion, that you have violated this AUP:

  • Immediate Termination: Your account and access to the Services will be terminated immediately.

  • No Refund: YOU FORFEIT ANY REMAINING WALLET BALANCE OR DATA PACKAGES. No refunds will be issued for accounts terminated due to AUP violations.

  • Abuse Handling Fees: As outlined in the Terms of Service, we reserve the right to charge an Abuse Handling Fee (minimum $250 USD) to cover the administrative costs of handling complaints (e.g., delisting IPs from blacklists).

8. Reporting Abuse

If you are a third party and believe an IP address belonging to WATTENNE INTERNATIONAL LLC is being used to violate this AUP, please report it immediately with timestamped logs and evidence.


Abuse Contact: [email protected]
All abuse reports are investigated within 24 hours.

How Proxies Can Help Businesses?

How Proxies Can Help Businesses?

This article explains how businesses can expand internationally by using residential proxies. Residential proxies offer benefits like improved localization, unrestricted access to ...

Read now
Shared vs. Dedicated Proxies

Shared vs. Dedicated Proxies

Residential proxies are real IP addresses provided by an ISP to a homeowner or renter that businesses can use to expand their online presence and protect their brand. There are two...

Read now
Enhancing Online Transaction Security

Enhancing Online Transaction Security

Residential proxies are IP addresses assigned to homes, providing a layer of anonymity when accessing the internet. They enhance online security, provide access to geo-restricted c...

Read now

Get Started with Databay Today

Our services provide you with secure and reliable internet access no matter where you are. We do this by acting like a bridge — called a proxy — that helps you connect with over 23 million devices worldwide. This means you can browse the web, access geo-restricted content, and more, all while keeping your connection secure.