Terms and conditions

Thank you for using the ThreatSTOP application programming interface, the “ThreatSTOP API”. By using the ThreatSTOP API you are agreeing to the ThreatSTOP Terms of Service (“Terms”). Your license to use the ThreatSTOP API is conditioned upon your agreement and conformant with the Terms. We reserve the right to update and otherwise amend the Terms from time to time without notice. The most recent version of these Terms will be available here.

Authorized users

Use of this API requires an account with access to the API features of the ThreatSTOP products.


Copyright © 2006-2021 ThreatSTOP, Inc. All Rights Reserved

NOTICE: All information contained herein is, and remains the property of ThreatSTOP, Inc. and its suppliers, if any. The intellectual and technical concepts contained herein are proprietary to ThreatSTOP, Inc. and its suppliers and certain aspects thereof are protected by United States Patent No. 8,533,822 and United States Patent No. 8,869,237, and are protected by trade secret or copyright law.

US Government Entities: The ThreatSTOP service, software and documentation, as applicable, are “commercial computer software” and “commercial computer software documentation” developed exclusively at private expense by Threatstop, Inc. (“Threatstop”). Pursuant to FAR 12.212 or DFARS 227 7202 and their successors, as applicable, use, reproduction and disclosure of the software and documentation is governed by the terms of Threatstop’s commercial agreement.


  • Adverse and Excessive Use. You may not use the ThreatSTOP API in a manner that adversely impacts ThreatSTOP’s systems, including but not limited to ThreatSTOP’s servers or other applications. Further we reserve the right to suspend, terminate or throttle your use of the ThreatSTOP API in the event ThreatSTOP deems your use excessive or inappropriate.

  • Keys. You are responsible for protecting the security and privacy of keys and other authentication resources used to access the ThreatSTOP API. If you believe your key has been compromised, please contact ThreatSTOP immediately for assistance.

  • Third Party Access. You may provide access to the API to third party developers (e.g. agencies or partners). You are responsible for ensuring that any third party to whom you provide access abides by the Terms. ThreatSTOP reserves the right to reject third party access to the ThreatSTOP API.

  • Commercial Re-use. You may not resell or use the ThreatSTOP API or any content derived from the ThreatSTOP API for commercial purposes unless ThreatSTOP has provided explicit permission in writing to do so.

  • Throttling and Limits. Your sales agreement will set forth any limits to the frequency and volume of API requests you have agreed to. Your use of the ThreatSTOP API is subject to throttling/rate limiting if it has been determined limits have been exceeded.

  • Support. ThreatSTOP may elect to provide you with support or modifications for the ThreatSTOP API (collectively, “Support”), in its sole discretion, and may terminate such Support at any time without notice to you. ThreatSTOP may change, suspend, or discontinue any aspect of the ThreatSTOP API at any time, including the availability of any ThreatSTOP API. ThreatSTOP may also impose limits on certain features and services or restrict your access to parts or all of the ThreatSTOP API without notice or liability.

  • Fees ThreatSTOP reserves the right to charge fees for use or access of the ThreatSTOP API for uses over a certain rate or for certain commercial uses.

Backward compatibility

  • New releases of the Partner Portal API in the same major version (currently 4.0) will be backward compatible, even if a new release adds new features.
  • When releasing a major new version (e.g. 5.0) with breaking changes, ThreatSTOP will provide at least a 6-month end of life notice.