Effective Date: March 1, 2026
By accessing Streamnode, you agree to these operational protocols. Use of the platform for offensive cyber operations is strictly prohibited.
Streamnode provides access to real-time threat intelligence feeds, visualization tools, and edge orchestration capabilities. The platform is provided "as is," and while we strive for maximum uptime, we do not guarantee uninterrupted service.
You agree to use Streamnode exclusively for defensive cybersecurity purposes. Utilizing our threat intelligence feeds or edge orchestration tools to conduct offensive cyber operations, unauthorized penetration testing, or any malicious activity will result in immediate termination of your account and potential legal referral.
Operators are responsible for the actions taken via their uplink. This includes the management of API tokens and the deployment of edge blocking rules via our Cloudflare integration.
Subscription tiers are governed by the features listed in the "Intelligence Protocol" documentation. We reserve the right to modify platform features to ensure optimal operational integrity.