Acceptable Use Policy
Last updated: March 15, 2026
This Acceptable Use Policy (the "AUP" or "Policy") is an integral part of the Terms of Service of the Mirago service (the "Service").
By paying for and using our proxy servers, the User agrees to strictly comply with the rules set forth below. Violation of this Policy will result in immediate account blocking without the right to a refund (in accordance with our Refund Policy).
1. General Provisions
The Service provides access to IP address infrastructure for lawful, safe and ethical use. The User bears sole and full responsibility for any traffic passing through the proxy servers they rent, as well as for any actions taken using those IP addresses.
2. Strictly Prohibited Actions (Zero-Tolerance Policy)
Using the Service's proxy servers for any illegal, harmful or fraudulent purposes is strictly prohibited. Such actions include but are not limited to:
2.1. Spam and Unsolicited Communications
- Sending emails (email spam) that violate the CAN-SPAM Act or its equivalents.
- Using proxies for mass automated messaging on social networks, messengers (Telegram, WhatsApp, Viber, etc.), forums or blog comments (SEO spam).
- Creating and using bot networks to manipulate behavioral ranking factors in ways that harm third-party resources.
2.2. Network Security Threats and Cyberattacks
- Organizing and participating in DDoS (Distributed Denial of Service) attacks.
- Port scanning, vulnerability scanning and network scanning without explicit written permission from the target network owner.
- Brute force (password guessing), credential stuffing (using leaked password databases) and any other unauthorized access attempts to third-party accounts, servers or databases.
- Creating, distributing or hosting malicious software (viruses, trojans, ransomware) and operating botnets (C&C servers).
2.3. Fraud and Financial Crimes
- Carding (using, verifying or selling stolen bank card data).
- Phishing (creating fake pages of banks, payment systems or social networks to steal credentials).
- Interacting with payment gateways, online banks or cryptocurrency exchanges using third-party credentials.
- Intentional ad budget click fraud in contextual advertising networks.
2.4. Violation of Laws
- Viewing, downloading, storing or distributing child pornography (if such activity is detected, the Service is obligated to immediately report it to law enforcement).
- Promoting terrorism, violence, racial or religious hatred.
- Selling narcotics, weapons and other goods whose circulation is prohibited by international law.
2.5. Copyright Infringement
- Using proxies to bypass copyright protection systems and mass distribution of pirated content (movies, music, software).
3. Scraping and Automation (Web Scraping)
We permit the use of our proxies for collecting open data (web scraping), search engine scraping and competitive intelligence, provided that:
- These activities do not violate personal data protection laws.
- The request rate does not create excessive load on the target server, does not lead to its denial of service (is not classified as a DoS attack).
- The target resource does not explicitly prohibit such activities in its robots.txt file or Terms of Use (the User is responsible for complying with the rules of target platforms).
4. Abuse Handling
4.1. The Service regularly monitors public blacklists (Spamhaus, SORBS, etc.) and processes abuse reports received from data centers, providers and copyright holders.
4.2. Upon receiving a complaint about an IP address rented by a User, the Service initiates an internal investigation.
4.3. The Service reserves the right to temporarily suspend a proxy server's operation pending investigation of a violation.
4.4. If a violation is confirmed by logs or the nature of the complaint, the User's account is permanently blocked.
5. Contacts for Abuse Reports
If you witness IP addresses belonging to Mirago being used for spam, phishing or other illegal activities, please notify us immediately. Please attach logs, email headers or other evidence of the violation so we can take prompt action.