Help
RSS
API
Feed
Maltego
Contact
Domain > chainbytes.atmconsole.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2019-12-02
3.130.119.143
(
ClassC
)
2026-01-18
167.172.213.47
(
ClassC
)
Port 443
HTTP/1.1 200 OKx-powered-by: Expresscontent-type: text/html; charsetutf-8content-length: 47444etag: W/b954-qWLZ1dwa89CAHGBhAI3tnwj53zovary: Accept-Encodingdate: Sun, 18 Jan 2026 05:55:09 GMTconnection: close !DOCTYPE html>html>head> title>ChainBytes/title> meta charsetUTF-8> meta namedescription contentChainBytes> meta propertyog:site_name contentChainBytes> meta propertyog:image contenthttps://logo.sfo2.digitaloceanspaces.com/Chainbytes-logo.png> meta propertyog:image:type contentimage/png> meta propertyog:image:width content1200> meta propertyog:image:height content630> meta nameviewport contentwidthdevice-width, initial-scale1, shrink-to-fitno> link relicon hrefhttps://logo.sfo2.digitaloceanspaces.com/Chainbytes-favicon.ico /> link hrefhttps://fonts.googleapis.com/css2?familyRoboto:ital,wght@0,100;0,300;0,400;0,500;0,700;0,900;1,100;1,300;1,400;1,500;1,700;1,900&displayswap relstylesheet> script>window.__INITIAL_STATE__ {custom:{organization:{name:ChainBytes,street:someaddres,city:Allentown1,state:null,zip:null,phone:+14155295777,webSite:chainbytes.com,email:null,supportEmail:info@chainbytes.com,logo:https://logo.sfo2.digitaloceanspaces.com/Chainbytes-logo.png,userAgreement:p> b>Chain Bytes Software as a Service Agreement/b> /p>\np> u>Last Modified/u> : December 15, 2021 /p>\np> This Software as a Service Agreement (this \b>Agreement/b>\) is a binding contract between you,\n (\b>Operator/b>\), and CHAIN BYTES, LLC a limited liability company located at 3722 Lehigh Street,\n Suite 408, Whitehall Pennsylvania 18052 (\b>Chain Bytes/b>\). Chain Bytes and Operator may be referred to\n herein collectively as the \b>Parties/b>\ or individually as a \b>Party/b>\. /p>\np> THIS AGREEMENT TAKES EFFECT WHEN YOU CLICK THE \I ACCEPT\ BUTTON BELOW OR BY ACCESSING OR USING THE SERVICES\n (the \b>Effective Date/b>\). BY CLICKING ON THE \I ACCEPT\ BUTTON BELOW OR BY ACCESSING OR USING THE\n SERVICES YOU (A) ACKNOWLEDGE THAT YOU HAVE READ AND UNDERSTAND THIS AGREEMENT; (B) REPRESENT AND WARRANT THAT YOU HAVE\n THE RIGHT, POWER, AND AUTHORITY TO ENTER INTO THIS AGREEMENT AND, IF ENTERING INTO THIS AGREEMENT FOR AN ORGANIZATION,\n THAT YOU HAVE THE LEGAL AUTHORITY TO BIND THAT ORGANIZATION; AND (C) ACCEPT THIS AGREEMENT AND AGREE THAT YOU ARE\n LEGALLY BOUND BY ITS TERMS. /p>\np> IF YOU DO NOT ACCEPT THESE TERMS, YOU MAY NOT ACCESS OR USE THE SERVICE. /p>\nol>\n li>\n p>b>Definitions/b> /p>\n\n p> \b>Aggregated Statistics/b>\ means data and information related to Operators use of Chain Bytes\n Services and that is used in an aggregate and anonymized manner, including but not limited to in compiling\n statistical\n and performance information related to the provision and operation of the Services. /p>\n p>\b>Authorized User/b>\ means Operators employees, consultants, contractors,\n support agents and other agents (a) who are authorized by Operator to access and use the Services under the rights\n granted to Operator pursuant to this Agreement and (b) for whom access to the Services has been granted. Operator\n certifies and acknowledges its sole responsibility for any of its or any of its Authorized Users use of the\n Services. /p>\n p>\b>Dashboard/b>\ means the Chain Bytes cloud-based system for monitoring transactions. /p>\n p>\b>Documentation/b>\ means, without limitation, any and all written, printed,\n recorded, computer-stored, electronically stored, or in any other manner whatsoever maintained or reproduced\n materials, representations, and communications related to the Services provided by Chain Bytes to Operator,\n including\n but not limited to user manuals, handbooks, and guides relating to the Services. /p>\n p>\b>End User/b>\ means any person that conducts a digital currency transaction through Operators\n Teller Machine. /p>\n p> \b>Operator Data/b>\ means any data or other type of content in any form or medium that is submitted,\n posted, communicated or otherwise transmitted by or on behalf of Operator, Authorized User, or End User through\n the\n Services. The term \Operator Data\ shall exclude Aggregated Statistics. /p>\n p>\b>Chain Bytes IP/b>\ means the Teller Machine Software, Dashboard, Documentation,\n and all intellectual property provided or granted access to Operator or Authorized User(s) in connection with the\n Services. \Chain Bytes IP\ shall include Aggregated Statistics and any information, data, or other content\n derived from Chain Bytes monitoring of Operators access to and/or use of the Services but does not include\n Operator Data. /p>\n p>\b>Services/b>\ means Operators permitted use of Teller Machine Software\n and Dashboard during the term of this Agreement pursuant to the provisions provided herein. Chain Bytes and its\n third-party vendors and hosting partners provide the underlying software, network storage, and other related\n technology required to use the Services. /p>\n p> \b>Teller Machine/b>\ means the Bitcoin or other digital currency terminal machine. /p>\n p> \b>Teller Machine Software/b>\ means the software and firmware provided to Operator for\n installation on a Teller Machine in order to receive the Services. /p>\n p>\b>Third-Party Products/b>\ means any product, platform, or service not developed by Chain Bytes\n and that enhances, manipulates, integrates with, interacts with, or otherwise adds functionality to the Services\n or\n Operator Data. /p>\n p>\b>Term/b>\ Means the duration of this Agreement as provided in section 10, to begin on the date\n Operator clicks \I ACCEPT\ and, unless terminated or otherwise amended, to be in effect until 1 year thereafter.\n /p>\n /li>\n li>\n p>b>Access/b> b>and/b> b>Use/b> /p>\n ol>\n li>\n p>u>Provision of Access/u> . Subject to and conditioned on the compliance with all\n terms and conditions of this Agreement and applicable laws, Chain Bytes hereby grants Operator a\n non-exclusive, non-transferable (except in the conditions specified in Section 11.9) right to access and use\n the Services during the Term. /p>\n /li>\n li>\n p>u>Use Restrictions/u> . Operator shall not use the Services for any purposes beyond\n the scope of the access granted in this Agreement. Operator shall not at any time, directly or indirectly (a)\n copy, modify, or create derivative works of the Services or Documentation in any manner; (b) rent, lease,\n lend, sell, license, sublicense, assign, distribute, publish, transmit, broadcast or publicly perform,\n transfer, or otherwise make available to non-Authorized Users the Services or Documentation; (c) reverse\n engineer, disassemble, decompile, decode, adapt, or otherwise attempt to manipulate or gain access to any\n software component of the Services, in whole or in part; (d) remove any proprietary notices from the Services\n or Documentation; (e) attempt to gain or allow unauthorized access to the Services or its related systems or\n networks, or perform unauthorized penetration testing; (f) attempt to derive the Services source code or\n underlying ideas or algorithms; (g) use the Services or Documentation in any manner or for any purpose that\n infringes, misappropriates, or otherwise violates any intellectual property right or other right of any person\n or entity; (h) use the Services or Documentation in any manner or for any purpose that violates any applicable\n law; (i) perform or disclose any benchmarking or availability testing of the Services; (j) perform or disclose\n any performance or vulnerability testing of the Services without Chain Bytes prior written approval;\n (k) perform or disclose network discovery, port and service identification, vulnerability scanning, password\n cracking or remote access testing of the Services; or (l) use or allow use of the Services to harass any\n person; cause damage or injury to any person or property; publish any material that is false, defamatory,\n harassing or obscene; violate privacy rights; promote bigotry, racism, hatred or harm; send unsolicited bulk\n e-mail, junk mail, spam or chain letters; infringe property rights; or otherwise violate applicable laws,\n ordinances or regulations. /p>\n /li>\n li>\n p>u>Access Suspension/u> . Notwithstanding and superseding anything to the contrary in\n this Agreement, Chain Bytes may suspend Operators access to any portion or all of the Services (\\n b>Service Suspension/b> \) if Chain Bytes suspects any of the following: (a) there is a\n threat or attack on any of the Chain Bytes IP; (b) Operator s , Authorized User s , or End\n Users use of the Chain Bytes IP disrupts or poses a security risk to Chain Bytes IP or to any other\n Chain Bytes operator or vendor; (c) Operator, Authorized User or End User is using the Chain Bytes IP for\n fraudulent or illegal activities; (d) Operator is non-compliant with applicable laws (including but not\n limited to by using the Service or Teller Machine for such illegal activities as money laundering or terrorist\n financing); (e) Operator has ceased to continue its ordinary course of business, has made an assignment or\n other disposition of its assets for the benefit of creditors, or has become the subject of any bankruptcy,\n reorganization, liquidation, dissolution, or similar proceeding; (f) Operator has violated any material term\n of this Agreement or other agreement executed by the Parties; (g) Operator has an unusual or material spike or\n increase in the use of the Services that negatively impacts the Service; (h) Chain Bytes provision of\n the Services to Operator or any Authorized User is prohibited by applicable law. Notwithstanding and\n superseding anything to the contrary in this Agreement, Chain Bytes may also suspend Operators access to any\n portion or all of the Services in accordance with Section 3 or on a recommendation made by a compliance agent\n or law enforcement.\n /p>\n /li>\n li>\n p> u>Notice of Suspension/u> . Chain Bytes shall use commercially reasonable efforts to provide notice of any\n Service Suspension to Operator. Operator acknowledges that if a Service Suspension occurs, Chain Bytes will\n have no liability to Operator which includes any liability for loss profits and Operator Data. /p>\n /li>\n li>\n p>u>Aggregated Statistics/u> . Notwithstanding anything to the contrary in this\n Agreement, Chain Bytes may monitor Operators use of the Services and collect and compile Aggregated\n Statistics. As between Chain Bytes and Operator, all intellectual property rights, title, and interest in\n Aggregated Statistics belong to and are retained solely by Chain Bytes. Operator acknowledges that Chain Bytes\n may, among other things, (a) compile statistical and other information related to the performance, operation\n and use of the Services; (b) use data from the Services in aggregated form for security and operations\n management, to create statistical analyses, and/or for research and development purposes ((a) and (b) referred\n to collectively as \b>Service Analyses/b>\); and (c) use Aggregated Statistics to the\n extent and in any manner permitted under applicable law. Chain Bytes may make Service Analyses publicly\n available. /p>\n /li>\n /ol>\n /li>\n li>\n p>b>Operator Responsibilities /b> /p>\n ol>\n li>\n p> u>Operational Responsibilities/u> . With respect to the access and use of the Services, Operator Data, and\n Teller Machine Operator acknowledges and agrees that Operator has additional responsibilities that include but\n are not limited to the following: /p>\n ol type\a\>\n li>\n p> Oversight of and liability for any damages resulting from Operators, Authorized User(s) or\n any other non-End User(s) use of and/or access to the Services, IP, and Documentation resulting,\n directly or indirectly, from access provided by Operator (whether such access or use is permitted by or in\n violation of this Agreement), and ensuring that such use complies with all legal, contractual, and\n confidentiality obligations; /p>\n /li>\n li>\n p> Preventing unauthorized use of Chain Bytes IP, Services, and/or Documentation, resulting from access\n provided to or otherwise obtained by Operator, directly or indirectly, whether such access or use is\n permitted by or in violation of this Agreement; /p>\n /li>\n li>\n p> Preventing any and all acts and omissions of any Authorized Users that would constitute a breach of this\n Agreement; /p>\n /li>\n li>\n p> Any services or sub-contracts Operator or its Authorized User(s) enter into or provide that\n relate to or involve the use of the Services; /p>\n /li>\n li>\n p> Ensuring that power supply, ethernet, and any other servicing or handling requirements necessary for use\n of the Service are always in place for proper functioning of the Services; /p>\n /li>\n li>\n p> Confirming with Chain Bytes that the Teller Machine is up to date with all upgrades, including any\n upgrades which require the purchase of licenses or equipment, regardless of whether Chain Bytes notifies\n Operator of such upgrades. Chain Bytes will in no event be liable for any performance-related issues\n relating to the Teller Machine including but not limited to Operators failure to apply patches to\n the Teller Machine , upgrade or replace equipment, or test compatibility of the Teller Machine Software\n updates or upgrades with its Teller Machine and/or its network; and /p>\n /li>\n li>\n p>Maintaining the operating cash flow necessary to facilitate the transactions on\n the Teller Machine. /p>\n /li>\n /ol>\n /li>\n li>\n p> u>End User Responsibility/u> . With respect to End User access to or use of the Teller Machine, Operator\n acknowledges its responsibility and assumes liability for any and all damages resulting to any party resulting\n from End User access to the Services, whether or not such including but not limited to the following: /p>\n ol type\a\>\n li>\n p> Contracting with and providing all required support to Operators End Users; /p>\n /li>\n li>\n p> Preventing End Users unauthorized use of or access to the Teller Machine and/or Operator Data,\n notwithstanding whether Operator has allowed End Users access to its Teller Machine; /p>\n /li>\n li>\n p> Ensuring all End Users are aware of this Agreements provisions; /p>\n /li>\n li>\n p> Receiving all necessary consents from End User for the receipt, transmission, storage, disposal, use,\n and disclosure of Operator Data and is responsible for any unauthorized creation, collection, receipt,\n transmission, access, storage, disposal, use, or disclosure of information; and /p>\n /li>\n li>\n p> Implementing a notice that will be seen and accepted by all End Users every time an End User accesses\n the Teller Machine, which, at the minimum, may include: (i) the safeguarding of End User information; (ii)\n a disclaimer of any warranties of merchantability or fitness for a particular purpose; (iii) risks\n associated with purchasing, selling or sending virtual currency; (iv) the End User is allowed to buy and\n sell virtual currency under the applicable laws; and (v) any other requirement that Operator has\n acknowledged in this Agreement or should know when operating a Teller Machine. Operator acknowledges that\n Chain Bytes is in no way liable, and Operator is solely liable for any virtual currency transaction that\n occurs on Operators Teller machine. /p>\n /li>\n /ol>\n /li>\n li>\n p> u>Regulatory Responsibility/u> . Operator acknowledges and agrees, in addition to all other terms and\n conditions to this Agreement, that Operator is wholly responsible and Chain Bytes shall not be held liable for\n any violation of economic or other regulations or rules applicable to Operator, Authorized User or End Users.\n /p>\n /li>\n li>\n p> u>Failure to Comply/u> . Operator acknowledges that if it fails to comply with any material term in this\n Section 3, Operators failure will be treated as a material breach of this Agreement entitling Chain\n Bytes to suspend or terminate the Services. u> /u> /p>\n /li>\n /ol>\n /li>\n li>\n p>b>Payment/b> b>and/b> b>Accounting/b> /p>\n ol>\n li>\n p>u>Payment/u> . Operator shall pay Chain Bytes 1% (subject to change) of the total\n transaction volume (the \b>Fee/b>\) without offset or deduction. The Fee shall be paid in Bitcoin\n and be collected automatically. If Operator fails to make any payment when due, without limiting Chain\n Bytes other rights and remedies, (a) Chain Bytes may charge interest on the past due amount at the rate\n of 1.5% per month calculated daily and compounded monthly or, if lower, the highest rate permitted under\n applicable law; (b) Operator shall reimburse Chain Bytes for all reasonable costs incurred by Chain Bytes in\n collecting any late payments or interest, including attorneys fees, court costs, and collection agency fees;\n and (c) if such failure continues for 30 days or more, Chain Bytes may suspend or terminate Operators and its\n Authorized Users access to any portion or all of the Services. /p>\n /li>\n li>\n p>u>Taxes/u> . All Fees and other amounts payable by Operator under this Agreement are\n exclusive of taxes and similar assessments. Operator is responsible for all sales, use, and excise taxes, and\n any other similar taxes, duties, and charges of any kind imposed by any federal, state, or local governmental\n or regulatory authority on any amounts payable by Operator hereunder, other than any taxes imposed on Chain\n Bytes income. /p>\n /li>\n li>\n p> u>Auditing Rights and Required Records/u> . Operator agrees to maintain complete and accurate records in\n accordance with generally accepted accounting principles during the Term and for a period of five (5) years\n after the termination or expiration of this Agreement with respect to matters necessary for accurately\n determining amounts due hereunder. Chain Bytes may, at its own expense, on reasonable prior notice,\n periodically inspect and audit Operators records with respect to matters covered by this Agreement, provided\n that if such inspection and audit reveals that Operator has underpaid Chain Bytes with respect to any amounts\n due and payable during the Term, Operator shall promptly pay the amounts necessary to rectify such\n underpayment, together with interest in accordance with Section 4(a). Operator shall pay for the costs of the\n audit if the audit determines that Operators underpayment equals or exceeds 10% for any quarter. Such\n inspection and auditing rights will extend throughout the Term of this Agreement and for a period of five (5)\n years after the termination or expiration of this Agreement. /p>\n /li>\n /ol>\n /li>\n li>\n p>b>Confidential Information /b> /p>\n ol>\n li>\n p> During the Term (as described in Section 10), either Party may disclose or make available to the other Party\n information about its business affairs, products, confidential intellectual property, trade secrets,\n third-party confidential information, and other sensitive or proprietary information, whether orally or in\n written, electronic, or other form or media/in written or electronic form or media, that is marked,\n designated, or otherwise identified as \confidential\(collectively,\ b>Confidential Information/b>\n \). Confidential Information does not include information that, at the time of disclosure is (a) in the public\n domain; (b) known to the receiving Party at the time of disclosure; (c) rightfully obtained by the receiving\n Party on a non-confidential basis from a third party; or (d) independently developed by the receiving Party.\n The receiving Party shall not disclose the disclosing Partys Confidential Information to any person or\n entity, except to the receiving Partys employees who have a need to know the Confidential Information for the\n receiving Party to exercise its rights or perform its obligations hereunder. Notwithstanding the foregoing,\n each Party may disclose Confidential Information to the limited extent required (a) in order to comply with\n the order of a court or other governmental body, or as otherwise necessary to comply with applicable law,\n provided that the Party making the disclosure pursuant to the order shall first have given written notice to\n the other Party and made a reasonable effort to obtain a protective order; or (b) to establish a Partys\n rights under this Agreement, including to make required court filings. /p>\n /li>\n li>\n p> On the expiration or termination of the Agreement, the receiving Party shall promptly return to the\n disclosing Party all copies, whether in written, electronic, or other form or media, of the disclosing Partys\n Confidential Information, or destroy all such copies and certify in writing to the disclosing Party that such\n Confidential Information has been destroyed. Each Partys non-disclosure obligations with regard to\n Confidential Information are effective as of the Effective Date and will expire five years from the date first\n disclosed to the receiving Party; provided, however, with respect to any Confidential Information that\n constitutes a trade secret (as determined under applicable law), such obligations of non-disclosure will\n survive the termination or expiration of this Agreement for as long as the Confidential Information remains\n subject to such trade secret protection. /p>\n /li>\n /ol>\n /li>\n li>\n p>b>Intellectual/b> b>Property/b> b>Ownership/b> /p>\n ol>\n li>\n p>u>Reservation of Rights/u> . Chain Bytes reserves all rights not expressly granted\n to Operator in this Agreement. Except for the limited rights and authorized use of the Service expressly\n granted under this Agreement, nothing in this Agreement grants, by implication, waiver, estoppel, or\n otherwise, to Operator or others, any intellectual property rights or other right, title, or interest in or to\n the Chain Bytes IP. /p>\n /li>\n li>\n p>u>Chain Bytes IP/u> . Operator acknowledges that, as between Operator and Chain\n Bytes, Chain Bytes owns all right, title, and interest, including all intellectual property rights, in and to\n the Chain Bytes IP and, with respect to Third-Party Products, the applicable third-party provider owns all\n right, title, and interest, including all intellectual property rights, in and to the Third-Party Products.\n /p>\n /li>\n li>\n p> u>Operator Data/u> . Operator acknowledges that, as between Chain Bytes and Operator, Operator owns all\n right, title, and interest, including all intellectual property rights, in and to the Operator Data. Operator\n hereby grants to Chain Bytes a non-exclusive, royalty-free, irrevocable worldwide license to reproduce,\n distribute, and otherwise use and display the Operator Data and perform all acts with respect to the Operator\n Data as may be necessary for Chain Bytes to provide the Services and a non-exclusive, perpetual, irrevocable,\n royalty-free, worldwide license to reproduce, distribute, modify, and otherwise use and display Operator Data\n incorporated within the Aggregated Statistics. For the avoidance of doubt, Chain Bytes is not responsible for\n any liability arising from the collection, transmission or use of Operator Data. /p>\n /li>\n /ol>\n /li>\n li>\n p> b>Disclaimers/b> /p>\n ol>\n li>\n p>u>Chain Bytes Disclaimer/u> . The Chain Bytes IP is provided \as is\ and Chain Bytes\n hereby disclaims all warranties, whether express, implied, statutory, or otherwise. Chain Bytes specifically\n disclaims all implied warranties of merchantability, fitness for a particular purpose, title, and\n non-infringement, and all warranties arising from course of dealing, usage, or trade practice. Chain Bytes\n makes no warranty of any kind that the Chain Bytes IP, or any products or results of the use thereof, will\n meet operators or any other persons requirements, operate without interruption, achieve any intended result,\n be compatible or work with any software, system, or other services, be accurate, complete, free of harmful\n code, bug free, or error free. /p>\n /li>\n li>\n p> u>Third-Party Disclaimer/u> . Chain Bytes does not make any commitments or claims regarding security,\n confidentiality, or performance of any Third-Party Products, and specifically disclaims any liability\n regarding Third-Party Products. To the extent any Third-Party Product accesses, processes, or gathers personal\n data, the applicable third party is Operators direct data processor, and is not acting as a data\n sub-processor of Chain Bytes. /p>\n /li>\n /ol>\n /li>\n li>\n p> b>Indemnification/b> /p>\n ol>\n li>\n p> u>Chain Bytes Indemnification/u> . Chain Bytes shall indemnify, defend, and hold harmless Operator from\n and against losses, damages, liabilities, costs (including reasonable attorney fees) (\Losses\) incurred\n by Operator resulting from any third-party claim, (\Third-Party Claim\) that the Services, or any use\n thereof in accordance with this Agreement, infringes or misappropriates such third-partys U.S.\n intellectual property rights including but not limited to patents, copyrights, or trade secrets, provided that\n Operator promptly notifies Chain Bytes in writing of the claim, cooperates with Chain Bytes, and allows Chain\n Bytes, at Chain Bytes sole discretion, sole authority to control the defense and settlement of such\n claim. /p>\n /li>\n li>\n p> If such claim as provided in Section 8.1 is made or appears possible, Operator agrees to permit Chain Bytes,\n at Chain Bytes sole discretion, to (a) modify or replace the Services, or component or part thereof, to\n make it non-infringing, or (b) obtain the right for Operator to continue use. If Chain Bytes determines that\n neither alternative is reasonably available, Chain Bytes may terminate this Agreement, in its entirety or with\n respect to the affected component of part, effective immediately on written notice to Operator. /p>\n /li>\n li>\n p> This Section 8 will not apply to the extent that the alleged infringement arises from (a) use of the\n Services in combination with data, hardware, equipment, or technology not provided by Chain Bytes; (b)\n modification to the Services not made by Chain Bytes; (c) Operator Data; (d) use of Service in combination\n with Third-Party products or (d) Third-Party Products unrelated to Chain Bytes. /p>\n /li>\n li>\n p> u>Operator Indemnification/u> . Operator shall indemnify, hold harmless, and at Chain Bytes option\n defend Chain Bytes from and against any losses resulting from any Third-Party Claim that the Chain Bytes IP,\n Services, or Documentation, or any use thereof in accordance with this Agreement infringes or misappropriates\n such third partys intellectual property rights. /p>\n /li>\n li>\n p> Operator further agrees to indemnify and hold harmless Chain Bytes from and against any and all Third-Party\n Claims based on or arising from any Operators, Authorized Users, and/or other users (a) negligence or\n willful misconduct; (b) use of the Services in a manner not authorized by this Agreement; (c) use of the\n Services in combination with data, software, hardware, equipment, or technology not provided by Chain Bytes;\n (d) use of the Services in violation of applicable laws or regulations; and/or (e) modifications to the\n Services not made by Chain Bytes. /p>\n /li>\n li>\n p> At Chain Bytes option, Operator shall defend Chain Bytes from and against any and all Third-Party\n Claims, but Operator may not settle any Third-Party Claim against Chain Bytes without Chain Bytes prior\n express consents to the settlement in a signed writing, and further provided that Chain Bytes will have the\n right, at its option, to defend itself against any such Third-Party Claim or to participate in the defense\n thereof by counsel of its own choice. /p>\n /li>\n /ol>\n /li>\n\n li>\n p> b>Limitation of Damages/b> b>./b> Chain Bytes total financial liability for any\n and all claims under this Agreement shall in no event exceed the amount paid during the preceding twelve (12)\n months prior to the claim by Operator to Chain Bytes for the Services provided thereunder. In no event shall Chain\n Bytes be liable to Operator for any consequential, incidental, punitive, special, exemplary, enhanced, or indirect\n damages or losses including any loss of profits, revenue, sales, data, goodwill or reputation, suffered by\n Operator, however caused, and on any theory of liability, regardless of any failure of essential purpose or other\n remedy available under this Agreement, and regardless of whether Chain Bytes was advised of the possibility of\n such losses or damages or such losses or damages were otherwise foreseeable. To the extent that the applicable\n jurisdiction limits Chain Bytes ability to disclaim any implied warranties, this disclaimer shall apply to\n the maximum and broadest extent permitted. /p>\n /li>\n li>\n p>b>Term and Termination. /b> /p>\n ol>\n li>\n p>u>Term/u> . The initial term (\ b>Term\)/b> of this Agreement\n begins on the date you click \I ACCEPT\ (the \b>Effective Date/b>\) and, unless\n terminated earlier pursuant to this Agreements express provisions, will continue in effect until one (1) year\n from such date (the \b>Initial Term/b>\). This Agreement will automatically renew for up to two\n additional successive one-year terms unless earlier terminated pursuant to this Agreements express provisions\n or either Party gives the other Party written notice of non-renewal at least thirty (30) days prior to the\n expiration of the then-current term (each a \b>Renewal Term/b>\and together with the initial\n term, the\b>Term/b>\). /p>\n /li>\n li>\n p>u>Termination/u> . In addition to any other express termination right set forth in\n this Agreement, either Party may terminate this Agreement with thirty (30) days written notice to the\n non-terminating party. /p>\n /li>\n li>\n p>u>Effect of Expiration or Termination/u> . Upon expiration or earlier termination of\n this Agreement, Operator shall immediately discontinue use of the Chain Bytes IP and, without limiting\n Operators obligations under Section 5, Operator shall delete, destroy, or return all copies of the Chain\n Bytes IP and certify in writing to the Chain Bytes that the Chain Bytes IP has been deleted or destroyed. No\n expiration or termination will affect Operators obligation to pay all Fees that may have become due before\n such expiration or termination or entitle Operator to any refund. /p>\n /li>\n li>\n p> u>Survival/u> . This Section and Sections 3, 4, 5, 6, 7, 8, 9, and 11 survive any termination or\n expiration of this Agreement. No other provisions of this Agreement survive the expiration or earlier\n termination of this Agreement. /p>\n /li>\n /ol>\n /li>\n li>\n p>b>Miscellaneous/b> /p>\n ol>\n li>\n p> u>Entire Agreement./u> This Agreement constitutes the sole and entire agreement of the Parties with\n respect to the subject matter of this Agreement and supersedes all prior and contemporaneous understandings,\n agreements, and representations and warranties, both written and oral, with respect to such subject matter.\n /p>\n /li>\n li>\n p> u>Governing Law/u> . This Agreement and all related documents, and all matters related thereto, shall be\n governed by, and construed in accordance with, the laws of the State of Pennsylvania, without giving effect to\n the conflict of laws provisions thereof to the extent such principles or rules would require or permit the\n application of the laws of any jurisdiction other than those of the State of Pennsylvania. /p>\n /li>\n li>\n p>u>Notices/u> . All notices will be in writing and will be deemed to have been given\n when (a) personally delivered; or (b) sent by electronic mail; or (c) sent by a commercial overnight courier.\n You will provide notices to: Chain Bytes LLC, Attention: General Counsel; Address: 3722 Lehigh Street, Suite\n 408, Whitehall Pennsylvania 18052; Email .\n Chain Bytes will provide notices to the name and last known address of the Operator. /p>\n /li>\n li>\n p>u>Force Majeure/u> . In no event shall Chain Bytes be liable to\n Operator or Authorized User, or be deemed to have breached this Agreement, for any failure or delay in\n performing its obligations under this Agreement, if and to the extent such failure or delay is caused by any\n circumstances beyond Chain Bytes reasonable control, including but not limited to acts of God, flood,\n fire, earthquake, government regulation or complete or partial ban of virtual currency or related event,\n explosion, internet interruption, blockchain verification error or any blockchain technology unexpected\n behavior, malfunction or errors, war, terrorism, invasion, riot or other civil unrest, strikes, labor\n stoppages\n or slowdowns or other industrial disturbances, or passage of law or any action taken by a governmental or\n public\n authority. /p>\n /li>\n li>\n p> u>Amendment and Modification; Waiver/u> . No amendment to or modification of this Agreement is effective\n unless it is accepted by Operator or Authorized User by choosing the \I ACCEPT\ found in this Agreement.\n Operators will be notified of any amendment or modification by facsimile, Dashboard notification, or any other\n industry standard when this Agreement has been modified or amended. Chain Bytes may modify this Agreement at\n any\n time, and Operator or Authorized User waives their rights to the use of Chain Bytes Services if an amendment\n or\n modification to this Agreement is not accepted. /p>\n /li>\n li>\n p>u>Nature of Relation Between Parties/u> . Nothing contained in this Agreement shall be\n deemed to constitute either Party or any of its representatives the partner, agent, franchisee, or legal\n representative of the other Party or to create any fiduciary relationship for any purpose whatsoever. Except\n as\n otherwise specifically provided in this Agreement, nothing in this Agreement shall confer on either Party or\n any\n of its representatives any authority to act for, bind, or create or assume any obligation or responsibility on\n behalf of the other Party /p>\n /li>\n li>\n p>u>Severability/u> . If any provision of this Agreement is invalid, illegal, or\n unenforceable in any jurisdiction, such invalidity, illegality, or unenforceability will not affect any other\n term or provision of this Agreement or invalidate or render unenforceable such term or provision in any other\n jurisdiction. Upon such determination that any term or other provision is invalid, illegal, or unenforceable,\n the Parties shall negotiate in good faith to modify this Agreement so as to affect their original intent as\n closely as possible in a mutually acceptable manner in order that the transactions contemplated hereby be\n consummated as originally contemplated to the greatest extent possible. /p>\n /li>\n li>\n p> u>Mandatory Arbitration/u> . ANY CONTROVERSY OR CLAIM ARISING OUT OF OR RELATING TO THIS AGREEMENT WILL BE\n RESOLVED BY BINDING ARBITRATION CONDUCTED BEFORE ONE ARBITRATOR, RATHER THAN IN COURT. The arbitration shall\n be\n administered by the Judicial Arbitration and Mediation Services (\JAMS\) pursuant to JAMS\n Streamlined Arbitration Rules and Procedures, if applicable, or otherwise pursuant to its Comprehensive\n Arbitration Rules and Procedures and in accordance with the Expedited Procedures in those Rules (the \JAMS\n Rules\). Either party may initiate the arbitration. The arbitration will be conducted in Philadelphia,\n Pennsylvania, and judgment on the arbitration award may be entered into any court having jurisdiction\n thereover.\n Payment of all fees will be governed by JAMS Rules. /p>\n /li>\n li>\n p>u>Assignment/u> . Operator may not assign any of its rights or\n delegate any of its obligations hereunder, in each case whether voluntarily, involuntarily, by operation of\n law\n or otherwise, without the prior written consent of Chain Bytes. Any purported assignment or delegation in\n violation of this Section will be null and void. No assignment or delegation will relieve the assigning or\n delegating Party of any of its obligations hereunder. This Agreement is binding upon and inures to the benefit\n of the Parties and their respective permitted successors and assigns. /p>\n /li>\n li>\n p>u>Export Regulation/u> . Operator shall comply with all applicable federal laws,\n regulations, and rules, and complete all required undertakings (including obtaining any necessary export\n license\n or other governmental approval), that prohibit or restrict the export or re-export of the Services or any\n Operator Data outside the U.S. /p>\n /li>\n li>\n p> u>U.S. Government Rights/u> . Each Documentation and the software component that constitute the Services\n is a \commercial item\ as that term is defined at 48 C.F.R. § 2.101, consisting of \commercial computer\n software\ and \commercial computer software documentation\ as such terms are used in 48 C.F.R. § 12.212.\n Accordingly, if Operator is an agency of the U.S. Government or any contractor therefor, Operator only\n receives\n those rights with respect to the Services and Documentation as are granted to all other users, in accordance\n with (a) 48 C.F.R. § 227.7201–48 C.F.R. § 227.7204, with respect to the Department of Defense\n and their contractors, or (b) 48 C.F.R. § 12.212, with respect to all other U.S. Government users and\n their\n contracting entities. /p>\n /li>\n /ol>\n/ol>,userAgreementUpdatedAt:2022-05-26T00:00:00.000Z,baseCurrency:USD,favicon:https://logo.sfo2.digitaloceanspaces.com/Chainbytes-favicon.ico}}} /script> script>window.__CONFIG__ {env:development,isDev:true,basename:,host:localhost,isBrowser:true,apiUrl:https://chainbytes.atmconsole.com:4000,version:1.63.1,branch:dev,port:3000} /script>/head>body> main idroot> style> html { box-sizing: border-box; -webkit-font-smoothing: antialiased; -moz-osx-font-smoothing: grayscale; } *, *::before, *::after { box-sizing: inherit; } body { color: rgba(0, 0, 0, 0.87); margin: 0; font-size: 0.875rem; font-family: Roboto, Helvetica, Arial, sans-serif; font-weight: 400; line-height: 1.43; letter-spacing: 0.01071em; background-color: #fafafa; } .MuiBackdrop-root { top: 0; left: 0; right: 0; bottom: 0; z-index: -1; position: fixed; touch-action: none; background-color: rgba(0, 0, 0, 0.5); -webkit-tap-highlight-color: transparent; } .MuiBackdrop-invisible { background-color: transparent; } .MuiPaper-root { color: rgba(0, 0, 0, 0.87); transition: box-shadow 300ms cubic-bezier(0.4, 0, 0.2, 1) 0ms; background-color: #fff; } .MuiPaper-rounded { border-radius: 4px; } .MuiDialog-scrollPaper { display: flex; align-items: center; justify-content: center; } .MuiDialog-container { height: 100%; outline: none; } .MuiDialog-paper { margin: 48px; position: relative; overflow-y: auto; } .MuiDialog-paperScrollPaper { display: flex; max-height: calc(100% - 96px); flex-direction: column; } .MuiDialog-paperWidthSm { max-width: 600px; } .MuiDialog-paperFullScreen { width: 100%; height: 100%; margin: 0; max-width: 100%; max-height: none; border-radius: 0; } .MuiGrid-container { width: 100%; display: flex; flex-wrap: wrap; box-sizing: border-box; } .MuiGrid-item { margin: 0; box-sizing: border-box; } .MuiGrid-align-items-xs-center { align-items: center; } .MuiGrid-justify-xs-center { justify-content: center; } .MuiGrid-grid-xs-6 { flex-grow: 0; max-width: 50%; flex-basis: 50%; } @media (min-width:960px) { .MuiGrid-grid-md-4 { flex-grow: 0; max-width: 33.333333%; flex-basis: 33.333333%; } } .MuiLinearProgress-root { height: 4px; overflow: hidden; position: relative; } .MuiLinearProgress-colorPrimary { background-color: rgb(193, 225, 251); } .MuiLinearProgress-bar { top: 0; left: 0; width: 100%; bottom: 0; position: absolute; transition: transform 0.2s linear; transform-origin: left; } .MuiLinearProgress-barColorPrimary { background-color: #2196f3; } .MuiLinearProgress-bar1Indeterminate { width: auto; animation: mui-indeterminate1 2.1s cubic-bezier(0.65, 0.815, 0.735, 0.395) infinite; animation-name: MuiLinearProgress-keyframes-mui-indeterminate1; } .MuiLinearProgress-bar2Indeterminate { width: auto; animation: mui-indeterminate2 2.1s cubic-bezier(0.165, 0.84, 0.44, 1) infinite; animation-name: MuiLinearProgress-keyframes-mui-indeterminate2; animation-delay: 1.15s; } @-webkit-keyframes MuiLinearProgress-keyframes-mui-indeterminate1 { 0% { left: -35%; right: 100%; } 60% { left: 100%; right: -90%; } 100% { left: 100%; right: -90%; } } @-webkit-keyframes MuiLinearProgress-keyframes-mui-indeterminate2 { 0% { left: -200%; right: 100%; } 60% { left: 107%; right: -8%; } 100% { left: 107%; right: -8%; } } /style> div roledialog classMuiDialog-root styleposition: fixed; z-index: 1300; right: 0px; bottom: 0px; top: 0px; left: 0px;> div classMuiBackdrop-root MuiBackdrop-invisible aria-hiddentrue styleopacity: 1; transition: opacity 0ms cubic-bezier(0.4, 0, 0.2, 1) 0ms;>/div> div>/div> div classMuiDialog-container MuiDialog-scrollPaper roledocument styleopacity: 1; transition: opacity 0ms cubic-bezier(0.4, 0, 0.2, 1) 0ms;> div classMuiPaper-root MuiPaper-elevation24 MuiDialog-paper MuiDialog-paperScrollPaper MuiDialog-paperWidthSm MuiDialog-paperFullScreen MuiPaper-rounded> div classMuiGrid-root MuiGrid-container MuiGrid-align-items-xs-center MuiGrid-justify-xs-center stylewidth: 100%; height: 100%;> div classMuiGrid-root MuiGrid-item MuiGrid-grid-xs-6 MuiGrid-grid-md-4> div classMuiLinearProgress-root MuiLinearProgress-colorPrimary MuiLinearProgress-indeterminate roleprogressbar> div classMuiLinearProgress-bar MuiLinearProgress-bar1Indeterminate MuiLinearProgress-barColorPrimary> /div> div classMuiLinearProgress-bar MuiLinearProgress-bar2Indeterminate MuiLinearProgress-barColorPrimary> /div> /div> /div> /div> /div> /div> div>/div> /div>/main> script src/static/js/main.23477d65.js>/script>/body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]