OpenIPApi

Responsible Probing Policy

OpenIPApi uses active probing to classify public IP infrastructure and identify signals such as open proxies, Tor exits, VPN gateways, datacenter networks, TLS metadata and reverse DNS patterns.

Non-invasive checks

Probing is limited to lightweight protocol handshakes (TCP SYN, TLS ClientHello, HTTP HEAD/OPTIONS) and publicly observable metadata (banners, certificates, reverse DNS). We do not retain payloads beyond what is needed for classification.

No exploitation

OpenIPApi does not exploit vulnerabilities, bypass authentication, brute-force services, or access private data. We do not store credentials, do not attempt logins, and do not run vulnerability scanners.

Rate limiting

Probes are rate-limited and distributed across our node network so that no single host or network receives excessive traffic. Re-scans of the same target are spaced over days to weeks.

Opt-out and abuse contact

Network operators who do not wish their public infrastructure to be probed can request exclusion by contacting support@openipapi.com. Include the affected CIDR range and a verifiable role address (e.g. abuse@yourdomain).

Transparency

Network operators can contact our team for clarification about specific probe activity. We are happy to confirm whether observed traffic originates from our infrastructure and to coordinate on legitimate research questions.