HomeAcceptable Use Policy

Acceptable Use Policy

LemonClub by ProxyTechnologies LLCEffective: May 1, 2026Last Updated: May 1, 2026
Material Breach Warning

Violation of this Acceptable Use Policy is a material breach of the Terms of Service and may result in immediate suspension or permanent termination of your account, without refund and without prior notice. Where appropriate, we may also report violations to law enforcement, regulators, or affected third parties.

1. Purpose and Scope

This Acceptable Use Policy ("AUP") sets out what you can and cannot do when using the products and services ("Services") provided by ProxyTechnologies Limited Liability Company, doing business as LemonClub ("LemonClub," "we," "us," or "our"). This AUP is incorporated into our Terms of Service by reference. Capitalized terms not defined here have the meaning given to them in the Terms of Service.

Violation of this AUP is a material breach of the Terms of Service and may result in immediate suspension or permanent termination of your account, without refund and without prior notice, in addition to any other remedies available to us at law or in equity. Where appropriate, we may also report violations to law enforcement, regulators, or affected third parties.

You are responsible for the activity of anyone using your account, whether authorized or not.

2. General Prohibitions

You may not use the Services, and you may not allow or assist any third party to use the Services, for any of the following purposes or in any of the following ways:

2.1 Unlawful Activity

Any activity that violates U.S. federal or state law, the law of any jurisdiction your traffic transits or terminates in, or any applicable international law, regulation, sanctions program, or court order. This includes, without limitation:

Fraud, scams, identity theft, money laundering, or terrorist financing;
Drug trafficking, arms trafficking, human trafficking, or any activity that violates trade-sanctions laws administered by OFAC;
Activity that violates U.S. export control laws, including the Export Administration Regulations and the International Traffic in Arms Regulations;
Tax evasion or any activity that violates anti-corruption laws, including the Foreign Corrupt Practices Act;
Distribution, possession, or facilitation of child sexual abuse material ("CSAM"), or any sexual content involving or appearing to involve minors. CSAM activity will be reported to the National Center for Missing and Exploited Children and to law enforcement;
Stalking, harassment, threats of violence, or doxing;
Hate speech, incitement to violence, or content promoting terrorism or violent extremism; and
Any other criminal or tortious activity.
2.2 Network and System Abuse

Any activity that abuses, disrupts, or damages our network, our customers' systems, or any third-party network or system, including:

Denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks of any kind, whether as the source, target, amplifier, or facilitator;
Brute-force attacks against passwords, credentials, two-factor codes, or rate-limited endpoints;
Credential stuffing, password spraying, or large-scale account takeover attempts;
Port scanning, vulnerability scanning, or penetration testing of any system you do not own or have explicit written authorization to test;
Distribution of malware, viruses, ransomware, worms, trojans, spyware, adware, rootkits, keyloggers, or any other malicious code;
Carding, cashout, BIN-attack, account-validation, or fraud-automation activity;
Operating, hosting, or relaying command-and-control infrastructure for malware or botnets;
Phishing, smishing, vishing, or any deceptive communication that impersonates a legitimate person, brand, or institution to obtain credentials, payment information, or other sensitive data;
Spam — sending unsolicited bulk email, SMS, or other unsolicited bulk communications, including any activity that violates the CAN-SPAM Act or similar laws of other jurisdictions; and
Any activity that disrupts, degrades, or interferes with the proper functioning of any network, server, or service.
2.3 Unauthorized Access

Any attempt to gain unauthorized access to any account, system, network, device, or data, including:

Bypassing, defeating, or circumventing authentication, authorization, rate-limiting, anti-bot, anti-fraud, or other access-control mechanisms of any third-party service without permission;
Accessing data not intended for you, including by intercepting, sniffing, or replaying network traffic;
Logging into an account or system that you are not authorized to access; or
Probing, scanning, or testing the vulnerability of any system or network without written authorization from the owner.
2.4 Intellectual Property and Privacy Violations

Any activity that infringes the intellectual property rights or privacy of others, including:

Copyright, trademark, trade-secret, or patent infringement;
Distribution of pirated software, films, music, books, games, or other copyrighted works;
Unauthorized scraping, collection, or processing of personal information in violation of GDPR, CCPA, or other applicable privacy laws;
Doxing or disclosure of another person's private information without their consent;
Surveillance or monitoring of identifiable individuals without their consent or another lawful basis.

3. Restricted Targets and Domains

Regardless of any other permission you may have, you may not use the Services to access, target, or interact with the following categories of websites, networks, or domains:

.gov, .mil, and .edu domains, including any subdomain or country-specific equivalent of a governmental, military, or educational institution;
Banks, credit unions, payment networks, central banks, and other regulated financial institutions, including their online banking portals, account-management systems, and payment APIs;
Domains, networks, or services known to host CSAM or other content that is illegal under U.S. law;
Critical-infrastructure systems (energy, water, healthcare, transportation, telecommunications) of any country;
Dark-web marketplaces selling illegal goods or services; and
Any other domain or network that we, in our reasonable discretion, determine to be off-limits for legal, security, or reputational reasons.

This list is not exhaustive. We may add to or modify the list of restricted targets at any time, with or without notice.

4. Public Web Data Collection (Web Scraping)

We allow the use of the Services for the collection of publicly accessible web content, subject to the following conditions and limitations:

You may only target content that is publicly accessible without authentication. You may not use the Services to access content that is behind a login, paywall, DRM, or any other access-control mechanism, except where you have explicit written authorization from the rights holder;
You must comply with the terms of service, robots.txt, API rate limits, and other published rules of every website or platform you target;
You must not make excessive requests at a volume or frequency that could disrupt the normal operation of any target website or platform;
You acquire no ownership or license rights in any content you collect. All rights remain with the original rights holder. You are solely responsible for obtaining any permissions, licenses, or lawful bases needed for your further use of collected content, including for AI or model training, redistribution, or publication;
You must comply with all applicable privacy and data-protection laws (including GDPR and CCPA) in your collection, storage, and processing of any personal information; and
You must not collect content for the purpose of monitoring or surveilling identifiable natural persons, except where permitted by applicable law.

We may, at our discretion and without prior notice, restrict, throttle, or block traffic to specific destinations to protect the integrity, performance, or reputation of our network, or to comply with legal or third-party requirements.

5. Permitted and Prohibited Use Cases

5.1 Permitted

Subject to this AUP, all applicable laws, and the terms of any third-party services you target, we permit lawful use cases including SEO and SERP monitoring, advertising verification, brand and IP protection, market and pricing research, public-data scraping, sneaker and ticket retail purchasing where lawful, social-media management of accounts you own or are authorized to manage, and similar legitimate commercial and personal uses.

5.2 Prohibited

Without limiting any other section of this AUP, the following are explicitly prohibited:

Scams, romance scams, advance-fee fraud, pig butchering, fake-investment schemes, fake e-commerce stores, and any other deceptive scheme;
Brute-forcing of credentials, captchas, multi-factor authentication, or any other security mechanism;
Click fraud, ad fraud, fake-traffic generation, fake-likes, fake-reviews, or any other manipulation of advertising or rating systems;
Pyramid schemes, multi-level-marketing fraud, or chain letters;
Sale or resale of access to the Services without our written authorization (we do not currently authorize resellers);
Use of the Services to compete with us, including to develop a competing proxy or infrastructure product.

6. Fair Use and Bandwidth

ISP Proxies and Static Proxies are sold without a hard data cap, but they are subject to fair use. Sustained bandwidth consumption above 200 Mbps on a single IP, or any usage that we determine in our reasonable discretion materially impacts the performance, stability, or availability of our network or other customers' Services, constitutes bandwidth abuse.

If we detect bandwidth abuse, we may, at our discretion and without prior notice, automatically rate-limit the affected IP(s) or account. Our team will then contact you to discuss a custom upgrade or higher-bandwidth plan. Continued sustained abuse after we contact you may result in suspension or termination of the affected Service.

Residential Proxies and LemonLive plans are subject to the data quotas stated at the time of purchase.

7. Compliance With Third-Party Terms

When you use the Services to interact with any third-party website, platform, or service, you must comply with that party's terms of service, acceptable use policy, robots.txt, and any other rules they publish. We are not affiliated with, endorsed by, or responsible for any third-party platform. The fact that a destination is reachable through the Services does not mean your use of it is authorized.

You are solely responsible for any consequences of violating a third-party's terms, including account bans, IP blocks, fees, or legal actions taken against you by the third party. We have no obligation to mediate or to provide replacement IPs in such cases.

8. Reporting Violations

If you believe someone is using the Services in violation of this AUP, please report it to legal@lemonclub.io with as much detail as possible, including any logs, timestamps, and IP addresses involved. We investigate reports in good faith and may take action including warning, suspension, or termination of the offending account, but we are not obligated to provide updates to you about the outcome of any investigation.

9. Enforcement and Cooperation With Authorities

We monitor the Services for compliance using both automated systems and manual review. We may, in our sole discretion and without notice, investigate suspected violations, restrict or block traffic, suspend or terminate accounts, retain or disclose information, and cooperate with law enforcement, regulators, courts, payment processors, and affected third parties as required by law or as we deem appropriate to address suspected violations.

Where we receive a valid legal request (subpoena, court order, search warrant, or equivalent), or where we have a good-faith belief that disclosure is necessary to comply with law, prevent imminent harm, or enforce our rights, we may disclose account information, traffic logs, and other data we hold. See our Privacy Policy for details on what we log and how long we retain it.

10. No Refunds for AUP Violations

If your account is suspended or terminated for violating this AUP, you are not entitled to a refund for any prepaid Service, unused subscription period, unused bandwidth, or any other amount, regardless of payment method. This is in addition to any other rights or remedies we have.

11. Changes to This AUP

We may update this AUP from time to time. The current version is always posted at lemonclub.io. Your continued use of the Services after an update constitutes acceptance of the revised AUP. For material changes, we will use reasonable efforts to notify you in advance, for example by email or in-account notification.

12. Contact

Questions, reports, or concerns regarding this AUP:

ProxyTechnologies LLC (d/b/a LemonClub)

1309 Coffeen Avenue STE 10783

Sheridan, Wyoming 82801, USA

Email: legal@lemonclub.io