aegisnode
  • Scan
  • Pricing
  • Trust
  • Registry
  • Insights
  • Dashboard
  • Log in
  • Start free scan

Acceptable use policy

Rules governing the responsible use of Aegisnode's scanning and intelligence services.

Effective: March 21, 2026

1 Authorized scanning only

You may only scan domains and IP ranges you own or have written authorization to scan. You are solely responsible for ensuring you have proper authorization before initiating any scan. Aegisnode reserves the right to request proof of authorization at any time.

2 No weaponization

Reports and scan data may not be used to attack, harass, extort, or otherwise harm the scanned organization or any third party. Intelligence provided by Aegisnode is intended solely for defensive security purposes.

3 No automated abuse

Rate limits apply per tier. Circumventing rate limits through any means — including automated scripts, multiple accounts, or proxy networks — is strictly prohibited.

4 No resale without authorization

Reseller tier is required for commercial redistribution of reports. You may not resell, sublicense, or commercially redistribute Aegisnode reports without an active Reseller or Command-tier subscription with explicit resale authorization.

5 Reporting violations

If you become aware of any violation of this policy, please report it immediately to security@aegisnode.io. Reports may be submitted anonymously.

Consequences of violation

Violation of this policy results in immediate termination of your account without refund. Aegisnode reserves the right to report illegal activity to appropriate law enforcement authorities.

Questions?

For questions about this policy or to report a violation, contact security@aegisnode.io.

aegisnode

Cyber risk intelligence from our own sensor network.

Product

  • Scan
  • Pricing
  • Registry
  • Insights
  • Dashboard

Company

  • Trust
  • Security Policy

Legal

  • Terms of Service
  • Privacy Policy
  • Acceptable Use
© 2026 Aegisnode. All rights reserved.