Acceptable Use Policy
Last Updated: March 26, 2026
Version: 1.0
This Acceptable Use Policy applies to all products and services provided by B2Proxy. This Policy sets forth the code of conduct and prohibited activities you must adhere to when using our proxy IP services (hereinafter referred to as “the Service”).
By registering for an account, accessing, or using the Service, you acknowledge that you have read, understood, and agree to be bound by this Policy. If you do not agree to any term of this Policy, you shall not use the Service.
It is strictly prohibited to use B2Proxy’s services for any illegal, fraudulent, or abusive activities. Any such suspected use will be investigated.
1. Prohibited Activities Include, but Are Not Limited to
• Unauthorized access to computer systems, networks, or devices (i.e., hacking); execution of denial-of-service attacks (DoS/DDoS); dissemination of viruses, worms, trojan horses, ransomware, or other malicious software.
• Fraudulent activities (including phishing, romance scams), identity theft, credit card fraud, click fraud, or any other form of deception.
• Unauthorized downloading, streaming, or distribution of copyrighted materials (e.g., movies, software, music); sale of counterfeit or infringing goods.
• Any pornographic or explicit content involving the exploitation, abuse, or depiction of minors.
• Content that incites hatred, violence, or discrimination based on race, ethnicity, religion, gender, sexual orientation, disability, or similar characteristics.
• Content that harasses, bullies, defames, threatens, or slanders any individual or group.
• Content that promotes terrorism, violent extremism, or incites the commission of violent acts.
• Port scanning, vulnerability scanning, or other unauthorized probing of servers or networks that do not belong to you.
• Circumventing technical restrictions of websites (e.g., evading IP bans, bypassing anti-crawling mechanisms) in violation of such websites’ terms of service.
• Sending unsolicited bulk messages (spam), chain letters, or using the Service to collect email addresses without the consent of the recipients.
• Creating fake accounts, automated likes, automated comments, generating fake followers, or engaging in click farm activities.
• Repeatedly clicking on pay-per-click (PPC) advertisements to deplete competitors’ budgets or earn illegitimate commissions.
• Eavesdropping, intercepting, or recording private communications.
• Stealing, collecting, or disclosing personally identifiable information, financial information, or medical records of others.
2. Rules for the Use of Proxy IP and Network Resources
The proxy IP and network resource services provided by the Company are intended solely for legitimate network connectivity, technical testing, and commercial purposes. Users shall not use the Service for advertising fraud, traffic fraud, bulk account registration or manipulation, platform data or ranking manipulation, circumvention of platform security mechanisms, or unauthorized large-scale data collection. All proxy usage must comply with applicable laws and regulations, as well as the terms of service of the target websites or platforms.
3. Enforcement Actions
To maintain the security and compliance of the Service, the Company reserves the right to monitor and review user conduct as necessary. If a user is found to be in violation of this Policy, the Company reserves the right to suspend the Service, restrict certain functionalities, terminate the account, delete relevant data, and report to law enforcement authorities when necessary.
4. Policy Updates
We may revise this Policy from time to time to reflect changes in legal, technical, or business requirements. The revised Policy will be posted on this page with an updated “Last Updated” date. Your continued use of the Service after any such revision constitutes your acceptance of the changes.
B2Proxy may proactively block certain web content (such as adult content, government websites, harmful domains, etc.) at its sole discretion. B2Proxy reserves the right to add or withdraw any web content blocking at any time, in its sole discretion.