Acceptable Use Policy
Rules and prohibited activities when using our proxy services.
Effective date: March 10, 2026 Website: fonproxy.io
1. Purpose
This Acceptable Use Policy forms part of our Terms and Conditions. Its purpose is to protect our network, payment relationships, suppliers, IP reputation, customers, and third parties from abuse, harm, and legal risk.
2. General Rule
You may use the services only in a lawful, ethical, authorized, and technically reasonable manner.
Any use that creates abuse complaints, blacklisting, payment disputes, legal exposure, network instability, reputational harm, or risk to us or third parties is prohibited.
3. Prohibited Activities
Without limitation, you must not use the services for:
3.1 Attacks and disruptive conduct
- DDoS
- DoS
- stress testing without explicit written authorization from the target
- brute force attacks
- port scanning at abusive scale
- vulnerability exploitation without authorization
- service disruption or degradation of third-party systems
3.2 Spam and unauthorized communications
- email spam
- SMS spam
- mass unsolicited messages
- comment spam
- social media spam
- ad fraud traffic
- fake lead generation
3.3 Fraud and deception
- phishing
- impersonation
- scam activity
- fake account creation for abuse
- payment fraud
- affiliate fraud
- click fraud
- synthetic identity abuse
- deceptive commercial conduct
3.4 Malware and harmful software
- malware distribution
- botnet activity
- ransomware
- trojans
- spyware
- credential stealers
- malicious payload delivery
- command-and-control traffic
3.5 Unlawful data collection
- unauthorized scraping in violation of law or contractual restrictions
- theft of credentials, cookies, tokens, or personal data
- invasion of privacy
- unlawful interception or monitoring
- collection of data without required permissions
3.6 Circumvention and evasion
- bypassing bans where you have no right to access the target
- evading law enforcement or sanctions
- evading payment fraud controls
- bypassing platform restrictions for unlawful purposes
- hiding abusive conduct
3.7 Unauthorized sharing or resale
- giving access to proxies, credentials, endpoints, sessions, or account resources to third parties unless expressly authorized by us in writing
- re-selling, sub-licensing, pooling, or redistributing the services without permission
- sharing one account between unrelated persons or organizations
3.8 Rights violations
- copyright infringement
- trademark infringement
- unlawful use of third-party data
- unlawful competitive intelligence
- harassment, stalking, threats, or abuse
3.9 Illegal content or activity
- any activity prohibited by applicable law
- any activity that violates court orders, regulatory restrictions, sanctions, or lawful requests
4. Evidence and Cooperation
We may investigate suspected abuse using available technical and account information, including billing data, support records, and retained logs.
Customers must reasonably cooperate with abuse reviews, including by providing explanations, use-case details, authorization evidence, or other requested information.
5. Enforcement
If we determine, in our reasonable discretion, that a violation occurred or is likely, we may:
- suspend or terminate service immediately
- block traffic, countries, ports, endpoints, or accounts
- cancel pending orders
- retain evidence
- refuse reactivation
- deny refunds
- report conduct to payment providers, upstream networks, law enforcement, complainants, or affected third parties
6. Abuse Appeal
A customer whose service was blocked for suspected abuse may send a support request asking for review and possible unblocking. Any restoration is at our sole discretion and may require additional verification or restrictions.
An abuse review or request to unblock does not entitle the customer to any refund where the block resulted from a violation of policy.
7. Information Sharing
If a government body, court, law-enforcement authority, regulator, network provider, abuse desk, or a proved injured side such as a website or service provider submits a substantiated complaint relating to our IPs or services, we may share relevant information necessary to investigate, respond to, or resolve the matter.
8. Logging
To enforce this AUP, we keep limited logs for 14 days, including:
- source IP
- outgoing IP
- package
- country
- destination domain or destination IP
9. No Evasion
Attempts to hide, rotate, fragment, or otherwise disguise abusive conduct do not make the conduct acceptable and may be treated as an aggravating factor.
10. Survival
This AUP survives suspension, termination, account closure, refund denial, and dispute handling where necessary to protect legal rights and investigate misuse.
Service Provider / Data Controller / Merchant