Acceptable Use Policy
This policy defines permitted and prohibited uses of ThreatGrid's website, public diagnostic tools, TLINK PRO platform, and managed security services.
Last updated: April 17, 2026. This Acceptable Use Policy applies to all users of threatgrid.tech, TLINK PRO, and ThreatGrid managed security services. Use of ThreatGrid services constitutes acceptance of this policy.
1. Overview
ThreatGrid provides cybersecurity services, threat intelligence tools, and managed security programs to business and professional users. This Acceptable Use Policy ("AUP") establishes the standards of conduct required of all users. Violation of this policy may result in immediate suspension of access, termination of service, and referral to appropriate legal authorities where warranted.
2. Permitted Uses
ThreatGrid services and tools are intended for lawful professional and organizational security purposes. Permitted uses include:
- Security assessment and monitoring of systems, networks, and domains you own or have explicit written authorization to test
- Threat intelligence research and defensive security operations conducted by qualified security professionals
- Evaluating the security posture of your own organization's infrastructure using TLINK PRO diagnostic tools
- Submitting service requests, inquiries, and communications through ThreatGrid intake workflows
- Accessing threat intelligence, reports, and platform outputs as a licensed MSSP client or TLINK PRO subscriber
- Internal business use of ThreatGrid reports, assessments, and deliverables as permitted under your service agreement
3. Prohibited Uses
The following uses are strictly prohibited and constitute a material violation of this policy:
3.1 Unauthorized System Access and Probing
You may not use ThreatGrid tools to probe, scan, enumerate, or assess systems, networks, domains, or IP addresses that you do not own or do not have explicit written authorization to test. Using TLINK PRO tools as a precursor to unauthorized access attempts is prohibited and may constitute a violation of the Computer Fraud and Abuse Act (CFAA) or equivalent laws in your jurisdiction.
3.2 Malicious Use and Weaponization
You may not use ThreatGrid services to support, facilitate, or conduct offensive cyber operations, attacks, data exfiltration, ransomware deployment, or any form of malicious activity targeting third parties. This includes using threat intelligence outputs to identify and exploit vulnerabilities in systems you do not have authorization to access.
3.3 Data Harvesting and Competitive Intelligence
You may not scrape, aggregate, resell, or redistribute data derived from ThreatGrid tools or platform outputs for commercial data resale, competitive intelligence gathering, or any purpose inconsistent with the intent of your service agreement. Automated bulk querying of TLINK PRO tools for data collection purposes is prohibited without express written consent.
3.4 Misrepresentation and Fraud
You may not misrepresent your identity, organizational affiliation, or authorization level when accessing ThreatGrid services, submitting inquiries, or engaging with ThreatGrid personnel. Using ThreatGrid services to facilitate fraudulent activity, impersonation, or social engineering attacks on third parties is prohibited.
3.5 Harmful and Illegal Content
You may not submit, upload, or transmit content that is unlawful, defamatory, threatening, harassing, or that infringes on the intellectual property or privacy rights of any third party through any ThreatGrid communication channel or intake workflow.
3.6 Platform Abuse and Denial of Service
You may not take actions intended to disrupt, degrade, or interfere with ThreatGrid platform availability, including but not limited to automated high-volume querying, credential stuffing, or attempts to circumvent rate limiting, authentication, or access controls.
4. TLINK PRO Tool-Specific Terms
TLINK PRO public diagnostic tools — including DNS Checker, WHOIS Lookup, IP Lookup, SSL/TLS Analyzer, Security Header Analyzer, IP Reputation Checker, and Threat Exposure Scanner — are provided for lawful security assessment of infrastructure you control or are authorized to assess. Results generated by these tools are sourced from publicly available data and ThreatGrid threat intelligence feeds and are provided for informational purposes only. You agree not to use these tools to investigate infrastructure belonging to individuals or organizations without their knowledge and authorization.
5. MSSP and Managed Service Client Obligations
Organizations engaging ThreatGrid under a managed security service agreement are responsible for ensuring that their internal users, contractors, and authorized personnel comply with this AUP. You are responsible for maintaining accurate records of which systems and assets are within scope for ThreatGrid monitoring and assessment activities. Expanding scope without notifying ThreatGrid may result in service disruption or out-of-scope charges.
6. Reporting Violations
If you become aware of a potential violation of this Acceptable Use Policy — including unauthorized use of ThreatGrid tools, misuse of platform access, or abuse of service infrastructure — please report it promptly to security@threatgrid.tech. ThreatGrid takes abuse reports seriously and will investigate all credible reports.
7. Enforcement
ThreatGrid reserves the right to investigate suspected violations of this policy. Upon finding a violation, ThreatGrid may, at its sole discretion: issue a warning, suspend or terminate platform access, terminate service agreements, and/or refer the matter to law enforcement or pursue civil remedies. ThreatGrid is not obligated to provide advance notice before acting on suspected violations that pose an immediate risk to the platform or third parties.
8. Changes to This Policy
ThreatGrid may update this Acceptable Use Policy from time to time to reflect changes in services, applicable law, or operational requirements. Updated versions will be posted to this page with a revised effective date. Continued use of ThreatGrid services following a policy update constitutes acceptance of the revised terms.
9. Contact
Questions about this Acceptable Use Policy or to report potential violations, contact security@threatgrid.tech or write to ThreatGrid at the address listed on our contact page.