This Acceptable Use Policy ("AUP") governs your use of WhatIP.ca and its services. This policy is designed to protect our users, infrastructure, and the broader Internet community. Violation of this AUP may result in suspension or termination of your access to the Service.
1. Purpose and Scope
WhatIP.ca provides network diagnostic and information tools for legitimate educational, informational, and troubleshooting purposes only. This AUP applies to all users of the Service, whether registered or not, and covers all tools and features provided.
2. Acceptable Uses
You may use WhatIP.ca for:
- Diagnosing and troubleshooting networks and systems you own or manage
- Researching and learning about Internet infrastructure and protocols
- Verifying DNS configurations for domains you control
- Checking email deliverability for mail servers you operate
- Monitoring the reputation and status of your own IP addresses
- Educational purposes in academic or professional settings
- Security research conducted in a responsible and legal manner
- Testing and validating network configurations with proper authorization
3. Prohibited Activities
The following activities are strictly prohibited:
3.1 Illegal Activity
- Any activity that violates Canadian federal or provincial law
- Violation of the Canadian Criminal Code (including hacking, unauthorized access)
- Violation of copyright, trademark, or other intellectual property rights
- Fraud, identity theft, or financial crimes
- Distribution of child sexual abuse material
- Terrorism, violent extremism, or promoting illegal activities
3.2 Unauthorized Network Activity
- Unauthorized port scanning of networks or systems you do not own or have permission to test
- Vulnerability scanning without explicit authorization from the target system owner
- Network reconnaissance for malicious purposes
- Attempting to breach security measures or circumvent access controls
- Accessing data or systems you are not authorized to access
- Exploiting vulnerabilities to gain unauthorized access
3.3 Denial of Service and Network Abuse
- Conducting denial of service (DoS) or distributed denial of service (DDoS) attacks
- Overwhelming any server, network, or service with excessive traffic
- Using the Service to facilitate attacks on third-party systems
- Employing our tools to disrupt, damage, or impair any network or service
- Excessive automated querying that degrades service performance
3.4 Malicious Code and Malware
- Distribution of malware, viruses, trojans, ransomware, or other harmful code
- Using the Service as part of a botnet or command-and-control infrastructure
- Hosting or distributing exploit kits
- Cryptomining without explicit consent
3.5 Privacy Violations and Harassment
- Stalking, doxing, or harassing individuals
- Collecting personal information without consent
- Violating privacy rights protected under PIPEDA or provincial privacy laws
- Using gathered information to threaten, intimidate, or harm others
- Discriminatory or hateful conduct
3.6 Phishing and Social Engineering
- Phishing attacks or attempts to deceive users into revealing credentials
- Impersonation of individuals, organizations, or services
- Social engineering attacks
- Creating fake or misleading websites
3.7 Spam and Unsolicited Communications
- Using information gathered from the Service for spam or unsolicited bulk email
- Harvesting email addresses or contact information
- Violating Canada's Anti-Spam Legislation (CASL)
3.8 Commercial Restrictions
- Reselling or redistributing the Service without authorization
- Using the Service in commercial products without a commercial license
- Scraping or harvesting data for commercial purposes
- Reverse engineering or creating derivative works
3.9 Abuse of Service Resources
- Using automated scripts, bots, or tools to excessively query the Service
- Circumventing rate limits or usage quotas
- Creating multiple accounts to evade restrictions
- Sharing accounts or API keys contrary to Terms of Service
4. Responsibility and Authorization
4.1 Authorization Requirement
Before using our diagnostic tools on any network, system, or domain, you must:
- Own the target system, network, or domain
- Have explicit written authorization from the owner
- Comply with all applicable laws and regulations
- Ensure your use does not violate any third-party rights
4.2 Your Responsibility
You are solely responsible for:
- Ensuring you have proper authorization before using diagnostic tools
- Complying with all applicable laws in your jurisdiction
- Any consequences of your use or misuse of the Service
- Securing your account and preventing unauthorized access
5. Monitoring and Enforcement
5.1 Our Rights
We reserve the right to:
- Monitor usage patterns to detect abuse
- Investigate suspected violations of this AUP
- Suspend or terminate access for violations
- Report illegal activity to law enforcement
- Cooperate with legal investigations
- Preserve evidence of violations
5.2 Enforcement Actions
Violations may result in:
- Warning: First-time minor violations
- Temporary Suspension: Moderate violations or repeated minor violations
- Permanent Termination: Severe violations, illegal activity, or repeated violations
- Legal Action: Reporting to authorities, civil litigation for damages
5.3 No Tolerance for Certain Violations
The following violations result in immediate permanent termination without warning:
- Child sexual abuse material
- Terrorism or violent extremism
- Large-scale DDoS attacks
- Malware distribution affecting significant numbers of systems
- Activities that pose immediate danger to individuals
6. Reporting Violations
If you become aware of activity that violates this AUP, please report it to:
Email: abuse@whatip.ca
Subject: AUP Violation Report
Include:
- Description of the violation
- Evidence (screenshots, logs, URLs)
- Date and time of the incident
- Your contact information (optional but helpful)
7. Security Researchers
We value the security research community. If you discover a security vulnerability in WhatIP.ca:
- Report it responsibly to security@whatip.ca
- Do not publicly disclose the vulnerability before we have patched it
- Do not exploit the vulnerability beyond what is necessary to demonstrate it
- Do not access, modify, or delete other users' data
We will work with you to understand and resolve security issues in good faith.
8. Compliance with Laws
You must comply with all applicable laws and regulations, including but not limited to:
- Criminal Code of Canada: Unauthorized use of computers, mischief in relation to data
- PIPEDA: Personal Information Protection and Electronic Documents Act
- CASL: Canada's Anti-Spam Legislation
- Copyright Act: Intellectual property protections
- Provincial Laws: Applicable provincial legislation
- International Laws: If accessing from outside Canada
9. Modifications to This Policy
We may update this AUP at any time to:
- Reflect changes in legal requirements
- Address new types of abuse or misuse
- Improve clarity and effectiveness
Updated policies are effective immediately upon posting. Continued use constitutes acceptance of changes.
10. Appeals
If your access has been suspended or terminated and you believe this was in error:
- Email appeals@whatip.ca with your account details
- Explain why you believe the action was incorrect
- Provide any relevant evidence
- We will review and respond within 5 business days
Final decisions are at our sole discretion.
11. Contact Information
For questions about this Acceptable Use Policy:
General Inquiries: support@whatip.ca
Abuse Reports: abuse@whatip.ca
Security Issues: security@whatip.ca
Website: https://whatip.ca