Access & Limits
Fair Usage Policy
Guidelines for responsible proxy pool usage.
Acceptable Use
- Email verification and validation
- SMTP connection routing
- Inbox placement testing
- Deliverability monitoring
Prohibited Use
- Credential stuffing or brute force attacks
- Scraping protected content
- DDoS or flooding attacks
- Illegal activity of any kind