Back to Terminal

Terms of Service

Effective Date: March 1, 2026

Engagement Rules

By accessing Streamnode, you agree to these operational protocols. Use of the platform for offensive cyber operations is strictly prohibited.

1. Service Provision

Streamnode provides access to real-time threat intelligence feeds, visualization tools, and edge orchestration capabilities. The platform is provided "as is," and while we strive for maximum uptime, we do not guarantee uninterrupted service.

2. Acceptable Use

You agree to use Streamnode exclusively for defensive cybersecurity purposes. Utilizing our threat intelligence feeds or edge orchestration tools to conduct offensive cyber operations, unauthorized penetration testing, or any malicious activity will result in immediate termination of your account and potential legal referral.

3. User Responsibility

Operators are responsible for the actions taken via their uplink. This includes the management of API tokens and the deployment of edge blocking rules via our Cloudflare integration.

4. Enterprise & PRO Tiers

Subscription tiers are governed by the features listed in the "Intelligence Protocol" documentation. We reserve the right to modify platform features to ensure optimal operational integrity.