Your First Plan is on Us!
Get 100% of your first residential proxy purchase back as wallet balance, up to $900.
Your First Plan is on Us!
Get 100% of your first residential proxy purchase back as wallet balance, up to $900.
PROXY SOLUTIONS
Over 60 million real residential IPs from genuine users across 190+ countries.
Reliable mobile data extraction, powered by real 4G/5G mobile IPs.
Guaranteed bandwidth — for reliable, large-scale data transfer.
For time-sensitive tasks, utilize residential IPs with unlimited bandwidth.
Fast and cost-efficient IPs optimized for large-scale scraping.
A powerful web data infrastructure built to power AI models, applications, and agents.
High-speed, low-latency proxies for uninterrupted video data scraping.
Extract video and metadata at scale, seamlessly integrate with cloud platforms and OSS.
6B original videos from 700M unique channels - built for LLM and multimodal model training.
Get accurate and in real-time results sourced from Google, Bing, and more.
Execute scripts in stealth browsers with full rendering and automation
No blocks, no CAPTCHAs—unlock websites seamlessly at scale.
Get instant access to ready-to-use datasets from popular domains.
PROXY PRICING
ALL LOCATIONS Proxy Locations
TOOLS
RESELLER
Get up to 50%
Contact sales:partner@thordata.com
Proxies $/GB
Over 60 million real residential IPs from genuine users across 190+ countries.
Reliable mobile data extraction, powered by real 4G/5G mobile IPs.
For time-sensitive tasks, utilize residential IPs with unlimited bandwidth.
Fast and cost-efficient IPs optimized for large-scale scraping.
Guaranteed bandwidth — for reliable, large-scale data transfer.
Scrapers $/GB
Fetch real-time data from 100+ websites,No development or maintenance required.
Get real-time results from search engines. Only pay for successful responses.
Execute scripts in stealth browsers with full rendering and automation.
Bid farewell to CAPTCHAs and anti-scraping, scrape public sites effortlessly.
Dataset Marketplace Pre-collected data from 100+ domains.
Data for AI $/GB
A powerful web data infrastructure built to power AI models, applications, and agents.
High-speed, low-latency proxies for uninterrupted video data scraping.
Extract video and metadata at scale, seamlessly integrate with cloud platforms and OSS.
6B original videos from 700M unique channels - built for LLM and multimodal model training.
Pricing $0/GB
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Starts from
Docs $/GB
Resource $/GB
EN $/GB
Thordata invites security researchers worldwide to responsibly help identify security vulnerabilities in our products. Verified and valid vulnerability reports may be eligible for cash rewards and official acknowledgment from Thordata.

https://www.thordata.com and its pages (e.g. https://dashboard.thordata.com)
Any services, systems, or infrastructure not explicitly listed above—including internal or related services—are out of scope and are not authorized for security testing.
If you believe a system not listed above may be valuable to test, please contact us before any testing for confirmation.

Thordata considers security research activities, when conducted in good faith, in compliance with this program, and without harm to users or business operations, to be authorized.
Researchers should comply with applicable laws and regulations. Testing must be conducted only with authorized accounts, without accessing, downloading, or disseminating real user data. Stop and report immediately upon discovering vulnerabilities or sensitive data, and ensure testing frequency does not impact system stability.
If a third-party dispute arises from compliant research activities, Thordata will reasonably assist in clarifying that the research was conducted under this program.
Thordata offers tiered cash rewards based on the severity, exploitability, and real-world impact of reported vulnerabilities. Final reward amounts are determined by the Thordata Security Team.

Do not publicly disclose or share vulnerability details until at least 60 days after the vulnerability is confirmed or fully remediated by Thordata.
We typically acknowledge receipt within 3–5 business days and will remain in communication throughout evaluation and remediation.
If you have any questions about this program or whether a research activity is in scope, please contact us at security@thordata.com before testing.
We also welcome suggestions for improving this program.