v1.8.91-d84675c

IP Ownership Verification

Transparency in IP sourcing, allocation chains, and verification methods for our proxy infrastructure

Last updated: March 16, 2026

1. IP Sourcing

We source proxy IP addresses through reputable providers and maintain documentation for sourcing and assignment where available. Sourcing methods vary by product type and region.

What we aim for: • IP space acquired or leased through legitimate channels • Contracted sourcing with documented provider relationships • Clear assignment records for dedicated plans

What we avoid: • IP space obtained without authorization • IP space with disputed or unclear ownership

If you require detailed sourcing documentation for a compliance review, contact our team and we will provide the appropriate materials for the product you use.

2. Allocation Chain

IP sourcing and assignment typically follows a documented chain of custody between upstream providers, the Operator, and customers. The exact chain varies by product type and provider.

Typical steps include: Step 1: Upstream allocation or lease An upstream provider (datacenter or ISP partner) allocates or leases IP ranges under documented agreements.

Step 2: Operator assignment The Operator assigns IPs to customer accounts for dedicated plans or manages a shared pool for rotating plans.

Step 3: Record keeping Assignment records are maintained for operational support, billing, and abuse response. Where required by law or contract, additional documentation is retained.

If you require chain-of-custody documentation for a specific plan, contact our compliance team.

3. How to Verify Our IPs

Customers and third parties can independently review public registration data for many IP ranges through WHOIS or RDAP tools:

WHOIS Lookup Use the relevant RIR's WHOIS tool to review IP registration details. Look for organization name, NetRange/inetnum, and abuse contact email.

RDAP (Registration Data Access Protocol) RDAP provides structured, machine-readable registration data for many IP ranges.

Abuse Contact Verification Most IP blocks list an abuse contact in the relevant RIR database. This contact typically reflects either the Operator or an upstream provider.

These verification methods are public and do not require special access. If you have questions about a specific IP block, contact our compliance team.

4. IP Management Practices

The Operator maintains IP management practices throughout the lifecycle of each IP address:

Pre-deployment checks: • Reputation checks where available • Validation of assignment readiness

Active monitoring: • Monitoring for abuse signals and reputation changes • Alerts for anomalies that may indicate misuse

Post-service: • IPs may undergo a cooldown period before reassignment • Reassessment before reuse where applicable

These practices are designed to reduce reputation issues and improve stability for customers.

5. Customer IP Assignment

Dedicated assignment (where applicable): Dedicated plans assign IP addresses to a single customer for the duration of their service. Rotating residential plans use shared pools by design.

Operational isolation: Dedicated assignments reduce cross-customer reputation impact. Rotating pools may share IPs across customers over time.

Assignment records: The Operator maintains records of IP assignments and durations for dedicated plans, including: • Customer account identifier • Assigned IP address(es) • Assignment start date and time • Assignment end date and time (if applicable) • IP type (ISP, datacenter, or residential)

These records are available to law enforcement upon receipt of a valid legal instrument, as described in our Law Enforcement Request Guidelines. Customers can view their current IP assignments through the dashboard where supported by the plan type.

6. ISP vs. Residential

The Platform offers multiple categories of proxy IP addresses, each with distinct sourcing and characteristics:

ISP Proxies Typically sourced from ISP partners. Designed for stable sessions and consistent performance. Availability and classification may vary by region.

Residential Proxies Sourced from consenting providers via contracted partners. Generally delivered as a rotating pool with geographic targeting options. Sourcing details and consent documentation are available on request for compliance review.

Regardless of category, IP sourcing varies by product and region, and documentation is available upon request where applicable.

IP transparency is fundamental to responsible proxy infrastructure. We aim to provide documented sourcing and clear assignment records where applicable.

Cookie Preferences

We use cookies to ensure the best experience. You can customize your preferences below. Learn more