Seclookup
Features Use Cases API Pricing Blog
Sign In Get Started

Terms of Service

Last updated: February 14, 2026

Important: Please read these Terms of Service carefully before using SecLookup. By accessing or using our Services, you agree to be bound by these Terms. If you do not agree to these Terms, you must not access or use our Services.

1. Definitions

For the purposes of these Terms of Service:

  • "Services" means the SecLookup threat intelligence platform, including but not limited to domain scanning, DNS enrichment, WHOIS lookups, SSL certificate analysis, malicious domain detection, API access, and all related features accessible via seclookup.com and its subdomains.
  • "User," "You," or "Your" refers to the individual, company, or organization accessing or using the Services.
  • "We," "Us," "Our," or "SecLookup" refers to SecLookup and its operators.
  • "Threat Intelligence Data" means any data, reports, analyses, indicators of compromise (IOCs), domain reputation scores, and other security-related information provided through the Services.
  • "API" means the Application Programming Interface provided by SecLookup for programmatic access to the Services.
  • "Query" means any request submitted to the Services for domain analysis, lookup, or enrichment.
  • "Subscription Plan" means the tier of service selected by the User, which determines access levels, rate limits, and available features.

2. Acceptance of Terms

By creating an account, accessing, or using our Services in any manner, you acknowledge that you have read, understood, and agree to be bound by these Terms of Service and our Privacy Policy. These Terms constitute a legally binding agreement between you and SecLookup.

If you are using the Services on behalf of an organization, you represent and warrant that you have the authority to bind that organization to these Terms, and "you" and "your" will refer to that organization.

3. Description of Services

3.1 Core Services

SecLookup provides a comprehensive threat intelligence platform that offers:

  • Domain Scanning & Analysis: Automated scanning and enrichment of domain names to assess their security posture and potential threats.
  • DNS Intelligence: Comprehensive DNS record lookups including A, AAAA, MX, TXT, NS, CNAME, and SOA records with historical tracking.
  • WHOIS Data: Domain registration information including registrant details, registration dates, and registrar information.
  • SSL/TLS Certificate Analysis: Certificate chain validation, expiration monitoring, and security configuration assessment.
  • Malicious Domain Detection: Integration with multiple threat intelligence feeds to identify domains associated with malware, phishing, spam, botnets, and other malicious activities.
  • Graph-Based Relationship Mapping: Visualization and analysis of relationships between domains, IP addresses, certificates, and threat indicators.
  • API Access: RESTful API for programmatic integration with security tools, SIEM systems, and automated workflows.

3.2 Data Sources

Our threat intelligence is aggregated from multiple sources including:

  • Proprietary scanning infrastructure and honeypots
  • Third-party threat intelligence feeds and partnerships
  • Public DNS and WHOIS databases
  • Certificate Transparency logs
  • Community-contributed indicators
  • Machine learning-based threat detection systems

4. Account Registration and Eligibility

4.1 Eligibility

To use the Services, you must:

  • Be at least 18 years of age or the age of legal majority in your jurisdiction
  • Have the legal capacity to enter into binding contracts
  • Not be prohibited from using the Services under applicable laws
  • Not be located in, or a national or resident of, any country subject to comprehensive sanctions

4.2 Account Requirements

When creating an account, you agree to:

  • Provide accurate, current, and complete registration information
  • Maintain and promptly update your account information
  • Maintain the confidentiality of your login credentials and API keys
  • Immediately notify us of any unauthorized access or security breach
  • Accept full responsibility for all activities under your account
  • Use only one account per individual or organization unless explicitly authorized

4.3 Account Security

You are solely responsible for maintaining the security of your account credentials. SecLookup will never ask for your password via email or other unsolicited communications. We strongly recommend enabling two-factor authentication (2FA) where available.

5. Subscription Plans and Billing

5.1 Plan Tiers

SecLookup offers multiple subscription tiers with varying features, rate limits, and capabilities. Current plans and pricing are available at seclookup.com/pricing. Features and limits are subject to change with reasonable notice.

5.2 Billing Terms

  • Billing Cycle: Subscriptions are billed in advance on a monthly or annual basis, depending on your selected plan.
  • Payment Methods: We accept major credit cards and other payment methods as displayed during checkout.
  • Automatic Renewal: Subscriptions automatically renew at the end of each billing period unless cancelled before the renewal date.
  • Price Changes: We may modify pricing with at least 30 days' notice. Price changes will apply to the next billing cycle after the notice period.
  • Taxes: Prices do not include applicable taxes, which will be added to your invoice as required by law.

5.3 Refund Policy

  • Annual subscriptions are eligible for a pro-rata refund within the first 14 days if you are not satisfied with the Services.
  • Monthly subscriptions are non-refundable but you may cancel at any time to prevent future charges.
  • Refunds for service disruptions or errors will be assessed on a case-by-case basis.
  • No refunds will be provided for violations of these Terms or account terminations due to misuse.

5.4 Free Tier and Trials

Free tier accounts and trial periods are subject to additional limitations on features and rate limits. We reserve the right to modify or discontinue free offerings at any time without notice.

6. API Usage and Rate Limits

6.1 API Access

Access to the SecLookup API is governed by your Subscription Plan. By using the API, you agree to:

  • Comply with all rate limits and usage quotas specified in your plan
  • Keep API keys confidential and not share them with unauthorized parties
  • Rotate API keys periodically and immediately upon suspected compromise
  • Implement proper error handling and respect rate limit responses (HTTP 429)
  • Include appropriate User-Agent headers identifying your application

6.2 Rate Limits

Rate limits vary by subscription tier and are enforced to ensure fair usage and service availability:

Plan Requests/Minute Requests/Day Concurrent Requests
Free 10 100 1
Professional 60 5,000 5
Enterprise 300 50,000 20

Exceeding rate limits may result in temporary throttling, suspension, or termination of access.

6.3 API Versioning

We maintain API versioning to ensure backward compatibility. Deprecated API versions will be supported for a minimum of 12 months after deprecation notice, except in cases of critical security vulnerabilities.

7. Acceptable Use Policy

7.1 Permitted Uses

You may use the Services for lawful purposes including:

  • Security research and threat analysis
  • Protecting your own networks, systems, and users
  • Incident response and forensic investigations
  • Due diligence and risk assessment
  • Integration with security operations and SIEM platforms
  • Compliance monitoring and reporting

7.2 Prohibited Uses

You agree NOT to use the Services to:

  • Conduct malicious activities: Including but not limited to launching cyberattacks, distributing malware, phishing, or any activity that harms computer systems or networks.
  • Unauthorized access: Attempt to gain unauthorized access to our systems, other users' accounts, or third-party systems.
  • Circumvent security: Bypass, disable, or interfere with security features, rate limits, or access controls.
  • Harassment or abuse: Use threat intelligence data to harass, stalk, threaten, or harm individuals.
  • Competitive intelligence: Systematically collect data to build a competing service or product.
  • Unauthorized redistribution: Resell, redistribute, or commercially exploit our data without a valid data licensing agreement.
  • Excessive automated access: Use bots, scrapers, or automated tools that exceed your plan's rate limits or place unreasonable load on our infrastructure.
  • False positive abuse: Submit fraudulent false positive reports or attempt to manipulate our threat detection systems.
  • Violation of laws: Use the Services in any manner that violates applicable local, state, national, or international laws and regulations.
  • Export violations: Use or export the Services in violation of U.S. export control laws or international sanctions.

7.3 Security Research

We support responsible security research. If you discover a security vulnerability in our Services, please report it to [email protected]. We will not take legal action against researchers who:

  • Act in good faith to avoid privacy violations and data destruction
  • Do not access or modify data belonging to other users
  • Report vulnerabilities promptly and do not publicly disclose them before we have addressed them
  • Do not exploit vulnerabilities beyond what is necessary to demonstrate the issue

8. Data Accuracy and Disclaimers

8.1 No Guarantee of Accuracy

While we strive to provide accurate and timely threat intelligence, we make no warranties regarding:

  • The accuracy, completeness, or reliability of any Threat Intelligence Data
  • The absence of false positives (benign domains incorrectly flagged as malicious)
  • The absence of false negatives (malicious domains incorrectly flagged as benign)
  • The timeliness of threat detection or data updates
  • The suitability of the data for any particular purpose

8.2 Use at Your Own Risk

Threat Intelligence Data should be used as one input among many in your security decision-making process. You acknowledge that:

  • Security threats evolve rapidly and no detection system is perfect
  • False positives and false negatives are inherent in threat detection
  • You are solely responsible for decisions made based on our data
  • Critical security decisions should involve human review and multiple data sources

8.3 Third-Party Data

Some threat intelligence data originates from third-party sources. We do not control and are not responsible for the accuracy, reliability, or availability of third-party data. Third-party data is provided "as is" without warranty of any kind.

9. False Positive Reporting

9.1 Reporting Process

If you believe a domain has been incorrectly classified as malicious, you may submit a false positive report through our False Positive Portal. Reports must include:

  • The domain(s) in question
  • Your relationship to the domain (owner, administrator, etc.)
  • Reason for the dispute with supporting evidence
  • Contact information for follow-up

9.2 Review Process

All false positive reports are reviewed by our security team. We aim to process reports within 5-7 business days. Our decision regarding classification is final, though you may submit additional evidence for reconsideration.

9.3 Abuse of Reporting

Submitting fraudulent or abusive false positive reports may result in:

  • Rejection of current and future reports
  • Account suspension or termination
  • Potential legal action in cases of deliberate abuse

10. Intellectual Property

10.1 Our Intellectual Property

All content, features, and functionality of the Services, including but not limited to:

  • Software, code, algorithms, and technical systems
  • User interface designs, graphics, and logos
  • Documentation, text, and written content
  • Proprietary threat intelligence methodologies
  • Database structures and data organization

are owned by SecLookup or our licensors and are protected by copyright, trademark, patent, and other intellectual property laws.

10.2 Limited License

Subject to these Terms, we grant you a limited, non-exclusive, non-transferable, revocable license to access and use the Services and Threat Intelligence Data for your internal business purposes only. This license does not include the right to:

  • Modify, copy, or create derivative works
  • Reverse engineer, decompile, or disassemble our software
  • Remove or alter any proprietary notices or labels
  • Use our trademarks without written permission

10.3 Data Licensing

Commercial redistribution, resale, or syndication of Threat Intelligence Data requires a separate data licensing agreement. Contact [email protected] for licensing inquiries.

11. Service Availability

11.1 Uptime Target

We target 99.9% uptime for the Services, measured monthly. This excludes scheduled maintenance and circumstances beyond our reasonable control.

11.2 Scheduled Maintenance

We will provide at least 48 hours' notice for scheduled maintenance that may impact service availability, except for emergency maintenance required to address security vulnerabilities or critical issues.

11.3 Service Credits

Enterprise customers may be eligible for service credits in the event of extended downtime, as specified in their service agreement. Free and standard plans do not include service level agreements or credits.

12. Limitation of Liability

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW:

12.1 Disclaimer of Warranties

THE SERVICES AND THREAT INTELLIGENCE DATA ARE PROVIDED "AS IS" AND "AS AVAILABLE" WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, OR ACCURACY.

12.2 Limitation of Damages

IN NO EVENT SHALL SECLOOKUP, ITS AFFILIATES, OFFICERS, DIRECTORS, EMPLOYEES, OR AGENTS BE LIABLE FOR:

  • Any indirect, incidental, special, consequential, or punitive damages
  • Loss of profits, revenue, data, or business opportunities
  • Cost of substitute services
  • Damages arising from decisions made based on Threat Intelligence Data
  • Damages resulting from unauthorized access to your account

regardless of the theory of liability (contract, tort, or otherwise), even if we have been advised of the possibility of such damages.

12.3 Maximum Liability

Our total cumulative liability for all claims arising out of or relating to these Terms or the Services shall not exceed the greater of (a) the amount you paid to SecLookup in the twelve (12) months preceding the claim, or (b) one hundred U.S. dollars ($100).

12.4 Essential Purpose

Some jurisdictions do not allow the exclusion of certain warranties or limitation of liability. In such jurisdictions, our liability shall be limited to the maximum extent permitted by law.

13. Indemnification

You agree to indemnify, defend, and hold harmless SecLookup and its affiliates, officers, directors, employees, contractors, and agents from and against any and all claims, damages, losses, liabilities, costs, and expenses (including reasonable attorneys' fees) arising out of or relating to:

  • Your use of the Services
  • Your violation of these Terms
  • Your violation of any applicable laws or regulations
  • Your violation of any third-party rights
  • Any content or data you submit to the Services
  • Any actions taken based on Threat Intelligence Data

14. Termination

14.1 Termination by You

You may terminate your account at any time by contacting us or using the account management features. Upon termination:

  • Your access to the Services will be revoked
  • Any unused subscription period is non-refundable (except as specified in Section 5.3)
  • Your API keys will be invalidated

14.2 Termination by Us

We may suspend or terminate your account immediately, without prior notice or liability, for any reason, including but not limited to:

  • Violation of these Terms or Acceptable Use Policy
  • Suspected fraudulent, abusive, or illegal activity
  • Non-payment of applicable fees
  • At our sole discretion, for any reason or no reason

14.3 Effect of Termination

Upon termination, all licenses granted to you will immediately terminate. Sections 1, 8, 10, 12, 13, and 15-18 shall survive termination.

15. Export Compliance

The Services may be subject to export control laws and regulations. You agree that you will not export, re-export, or transfer the Services or any underlying technology to:

  • Any country subject to comprehensive U.S. sanctions
  • Any person or entity on the U.S. Treasury Department's list of Specially Designated Nationals or the U.S. Department of Commerce's Denied Persons List
  • Any end-user who will utilize the Services for prohibited end-uses

16. Governing Law and Jurisdiction

These Terms shall be governed by and construed in accordance with the laws of the State of Delaware, United States, without regard to its conflict of law provisions. You agree to submit to the exclusive jurisdiction of the courts located in Delaware for the resolution of any disputes arising out of these Terms or the Services.

17. Dispute Resolution

17.1 Informal Resolution

Before initiating any formal dispute resolution, you agree to first contact us at [email protected] and attempt to resolve the dispute informally for at least 30 days.

17.2 Arbitration

If informal resolution is unsuccessful, any dispute shall be resolved by binding arbitration administered by the American Arbitration Association (AAA) under its Commercial Arbitration Rules. The arbitration shall be conducted in English and held in Wilmington, Delaware, or via video conference as agreed by the parties.

17.3 Class Action Waiver

YOU AGREE THAT ANY DISPUTE RESOLUTION PROCEEDINGS WILL BE CONDUCTED ONLY ON AN INDIVIDUAL BASIS AND NOT IN A CLASS, CONSOLIDATED, OR REPRESENTATIVE ACTION. You waive any right to participate in class actions or class-wide arbitration.

17.4 Exceptions

Notwithstanding the above, either party may seek injunctive or other equitable relief in any court of competent jurisdiction to prevent the actual or threatened infringement of intellectual property rights.

18. General Provisions

18.1 Entire Agreement

These Terms, together with the Privacy Policy and any other policies referenced herein, constitute the entire agreement between you and SecLookup regarding the Services and supersede all prior agreements and understandings.

18.2 Severability

If any provision of these Terms is found to be unenforceable or invalid, that provision shall be limited or eliminated to the minimum extent necessary, and the remaining provisions shall remain in full force and effect.

18.3 Waiver

Our failure to enforce any right or provision of these Terms shall not constitute a waiver of such right or provision.

18.4 Assignment

You may not assign or transfer these Terms or your rights hereunder without our prior written consent. We may assign these Terms without restriction.

18.5 Modifications

We reserve the right to modify these Terms at any time. We will provide notice of material changes by posting the updated Terms on our website and updating the "Last updated" date. Your continued use of the Services after such changes constitutes acceptance of the modified Terms.

18.6 Force Majeure

We shall not be liable for any failure or delay in performance due to circumstances beyond our reasonable control, including but not limited to acts of God, natural disasters, war, terrorism, cyberattacks, government actions, or failures of third-party services.

19. Contact Information

If you have any questions about these Terms of Service, please contact us:

  • Email: [email protected]
Seclookup

Real-time threat intelligence platform for security teams.

Product

Features Use Cases Pricing Blog

Developers

API Documentation

Support

Report False Positive Contact Sales

Legal

Privacy Policy Terms of Service

© 2026 Seclookup. All rights reserved.