Responsible Probing Policy
OpenIPApi uses active probing to classify public IP infrastructure and identify signals such as open proxies, Tor exits, VPN gateways, datacenter networks, TLS metadata and reverse DNS patterns.
Non-invasive checks
Probing is limited to lightweight protocol handshakes (TCP SYN, TLS ClientHello, HTTP HEAD/OPTIONS) and publicly observable metadata (banners, certificates, reverse DNS). We do not retain payloads beyond what is needed for classification.
No exploitation
OpenIPApi does not exploit vulnerabilities, bypass authentication, brute-force services, or access private data. We do not store credentials, do not attempt logins, and do not run vulnerability scanners.
Rate limiting
Probes are rate-limited and distributed across our node network so that no single host or network receives excessive traffic. Re-scans of the same target are spaced over days to weeks.
Opt-out and abuse contact
Network operators who do not wish their public infrastructure to be probed can request exclusion by contacting support@openipapi.com. Include the affected CIDR range and a verifiable role address (e.g. abuse@yourdomain).
Transparency
Network operators can contact our team for clarification about specific probe activity. We are happy to confirm whether observed traffic originates from our infrastructure and to coordinate on legitimate research questions.