Restricted Access Policy

To ensure service compliance and prevent abuse and fraud, we will verify user identities in accordance with relevant international Anti-Money Laundering (AML) and Know Your Customer (KYC) regulations.

We offer four types of access policies:

  • Block Policy: In accordance with Thordata Compliance Norms, direct access to certain domain names is currently unavailable.

  • Verification Policy: Short KYC (Know Your Customer) verification is required for specific domain names, and normal access will be granted upon successful verification.

  • Application Policy: An access application must be submitted, and access permissions will be unlocked upon approval of the application.

  • Trusted Domain Access Policy: The system grants unrestricted access to whitelisted trusted domains.

Prevention of Improper Activities

Thordata has a built-in list of restricted access domain names, including but not limited to the following categories:

Category

Description

Government

Domain names of government agencies and public administration platforms worldwide

Military

Domain names related to military institutions and national defense

Finance

Domain names of financial institutions such as banks, payment and securities institutions

Communication

Domain names of mainstream international instant messaging tools

High-Risk Domains

Domains containing malware, phishing content and non-compliant information

circle-info

KYC Verification Process

  • Submit identity information (personal/enterprise qualification certificates);

  • The system automatically verifies basic information (completed within 10 minutes);

  • Manual review will be initiated if the system verification fails;

  • Access permissions to the domain name will be granted upon successful verification.

Contact & Support

FAQ

chevron-rightWhy is identity proof required?hashtag

To ensure service compliance and prevent abuse and fraud, we need to verify user identities in accordance with international Anti-Money Laundering (AML) and Know Your Customer (KYC) regulatory requirements.

chevron-rightWho is required to complete the KYC process?hashtag

All individual and enterprise users who need to use proxy services must complete KYC verification.

chevron-rightWhat information do I need to provide?hashtag

Generally including:

  • Individual users: ID card, facial recognition verification, etc.;

  • Enterprise users: company business license, corporate account information, etc.

chevron-rightHow long does it take for my KYC review to be approved?hashtag

Under normal circumstances, the review will be completed within 1-2 working days after you submit the complete information. Processing time may be slightly extended during peak periods, please wait patiently.

chevron-rightHow will I know if my KYC application has been approved?hashtag

Review results will be sent to your registered email address.

chevron-rightCan I continue to use the service during the KYC review period?hashtag

Yes. You can still use the approved proxy services for unrestricted domain names normally during the review period

Last updated