Warning: All proxy traffic is monitored, captured, and retained. Network activity may be used for data aggregation, security research, and threat intelligence purposes. By continuing, you acknowledge and consent to this monitoring. We are dead serious. IF you use this proxy all of your damn requests are being looked at by mullllllllllltiple people. Some review the logs for educational purposes. Most are likely going to be LE or indep white hats waiting to make a black hat their next blog post. Don't use this proxy. DO NOT USE THIS PROXY. DON'T.
Total Requests [mostly intitiated without authorization] since 8-30-2025
Loading...
Scope of Monitoring
Activities on this proxy and connected services are subject to inspection and logging by authorized personnel and automated systems. Monitoring includes, but is not limited to, metadata, content, protocol behavior, indicators of compromise, and anonymized analytics.
✔ Full request and response metadata, timing, and headers
✔ Content hashing, URL and domain intelligence enrichment
✔ Malware detonation and behavioral analysis (sandboxed)
✔ Threat indicator extraction and sharing within trusted communities
✔ Aggregated statistics for research and defensive purposes
No expectation of privacy. Use of this system constitutes express consent to monitoring, interception, recording, and disclosure for any lawful purpose, including operational assurance, incident response, law‑enforcement cooperation, and intelligence production. Unauthorized use may be subject to administrative, civil, and/or criminal penalties.
Use of this proxy constitutes consent to monitoring and data processing. Timestamp: —