For Apple App Store app support, email admin@axiom-cyber.com

Terms of Use / End User License Agreement

ThreatTrace iOS Application

Bundle Identifier: com.axiom-cyber.ThreatTrace

Effective Date: March 16, 2026 | Last Updated: March 16, 2026

Published by Axiom Cyber LLC
12 Vista Cir, Star Valley Ranch, Wyoming 83127-5240, United States

PLEASE READ THIS AGREEMENT CAREFULLY BEFORE DOWNLOADING, INSTALLING, OR USING THE THREATTRACE APPLICATION. BY DOWNLOADING, INSTALLING, OR USING THE APPLICATION, YOU ACKNOWLEDGE THAT YOU HAVE READ, UNDERSTOOD, AND AGREE TO BE BOUND BY THE TERMS AND CONDITIONS OF THIS AGREEMENT.

1. Acceptance of Terms

1.1 Agreement to Terms

This End User License Agreement ("Agreement" or "EULA") is a legally binding contract between you ("User," "you," or "your") and Axiom Cyber LLC, a Wyoming limited liability company ("Axiom Cyber," "Company," "we," "us," or "our"), governing your use of the ThreatTrace mobile application (the "Application" or "App"), including all associated content, features, functionality, updates, patches, bug fixes, and documentation provided by Axiom Cyber LLC.

1.2 Binding Agreement

By downloading, installing, accessing, or using the Application from the Apple App Store or any other authorized distribution channel, you represent and warrant that you are at least eighteen (18) years of age (or the age of legal majority in your jurisdiction) and have the legal capacity to enter into this Agreement. You hereby agree to be bound by all terms and conditions set forth herein. If you are accepting this Agreement on behalf of an organization, you represent and warrant that you have the authority to bind that organization to these terms.

1.3 Rejection of Terms

IF YOU DO NOT AGREE TO ALL OF THE TERMS AND CONDITIONS OF THIS AGREEMENT, YOU MUST NOT DOWNLOAD, INSTALL, OR USE THE APPLICATION. IF YOU HAVE ALREADY DOWNLOADED OR INSTALLED THE APPLICATION AND DO NOT AGREE TO THESE TERMS, YOU MUST IMMEDIATELY DELETE AND REMOVE THE APPLICATION FROM ALL OF YOUR DEVICES AND DISCONTINUE ALL USE. YOUR CONTINUED USE OF THE APPLICATION CONSTITUTES YOUR ONGOING ACCEPTANCE OF THIS AGREEMENT AND ANY AMENDMENTS THERETO.

2. License Grant

2.1 Limited License

Subject to the terms and conditions of this Agreement and your compliance therewith, Axiom Cyber LLC hereby grants you a limited, non-exclusive, non-transferable, non-sublicensable, revocable, and personal license to download, install, and use the Application on Apple-branded devices that you own or control, solely for your personal, non-commercial device security monitoring purposes, and solely as permitted by the Apple App Store Terms of Service (the "Usage Rules").

2.2 Not a Sale

This Agreement constitutes a license, NOT a sale, of the Application. Axiom Cyber LLC retains all right, title, and interest in and to the Application, including without limitation all copies thereof. No ownership rights are transferred to you under this Agreement. All rights not expressly granted herein are reserved by Axiom Cyber LLC.

2.3 Scope of License

The license granted herein is limited to the iOS and iPadOS platforms. Any use of the Application on platforms not authorized by Axiom Cyber LLC constitutes a material breach of this Agreement. The Application is licensed for use on devices owned or controlled by you, as permitted by the Usage Rules set forth in the Apple Media Services Terms and Conditions.

3. Restrictions on Use

3.1 Prohibited Activities

You acknowledge and agree that you shall NOT, directly or indirectly, and shall not permit or authorize any third party to:

  • Reverse Engineer: Reverse engineer, decompile, disassemble, decode, decrypt, or otherwise attempt to derive or gain access to the source code, object code, underlying structure, algorithms, ideas, or concepts of the Application or any portion thereof, except to the extent expressly permitted by applicable law notwithstanding this restriction.
  • Modify: Modify, adapt, alter, translate, tamper with, or create derivative works based upon the Application or any part thereof.
  • Copy or Distribute: Copy, reproduce, duplicate, distribute, publish, display, disseminate, redistribute, sublicense, rent, lease, lend, loan, sell, resell, or otherwise transfer or make available the Application or any portion thereof to any third party.
  • Remove Notices: Remove, obscure, alter, deface, or tamper with any copyright notices, trademark notices, proprietary markings, labels, logos, legal notices, digital watermarks, or other proprietary designations on or within the Application.
  • Competing Development: Use the Application, or any information obtained from or through the Application, for the purpose of developing, marketing, distributing, or operating any competing product, service, or application, or for competitive intelligence or analysis.
  • Automated Access: Use any robot, spider, scraper, crawler, bot, data mining tool, or any automated or manual process to extract, harvest, scrape, collect, monitor, or copy any data, content, information, or material from or through the Application.
  • Circumvent Security: Circumvent, disable, bypass, defeat, interfere with, or otherwise attempt to defeat or circumvent any security features, digital rights management (DRM) mechanisms, technical protection measures, access controls, encryption, authentication mechanisms, license verification, or other protective technologies implemented in or associated with the Application.
  • Illegal Use: Use the Application in any manner that violates any applicable local, state, national, or international law, statute, regulation, ordinance, or treaty, including without limitation any laws relating to data privacy, export controls, or unfair competition.
  • Unauthorized Purpose: Use the Application for any purpose other than personal device security monitoring on your own Apple-branded devices, including but not limited to using the Application to monitor, surveil, or track any third party or any device not owned by you.
  • Benchmarking: Conduct, publish, or distribute any benchmark tests, performance analyses, comparative studies, or similar evaluations of the Application without the prior express written consent of Axiom Cyber LLC.
  • Network Interference: Use the Application in any manner that could damage, disable, overburden, impair, or interfere with any server, network, system, or infrastructure associated with the Application or its services.

3.2 Consequences of Violation

Any breach of the restrictions set forth in this Section 3 shall constitute a material breach of this Agreement and may result in immediate termination of your license, legal action, and pursuit of all available remedies at law or in equity, including but not limited to injunctive relief and monetary damages.

4. Intellectual Property Rights

4.1 Ownership

The Application and all worldwide rights, title, and interest therein are and shall remain the exclusive property of Axiom Cyber LLC. Without limitation, this includes all source code, object code, software, algorithms, detection rules, detection engines, heuristic models, machine learning models, trained data models, neural networks, user interface designs, user experience designs, graphics, icons, visual elements, audio elements, text, documentation, trade dress, and all other components of the Application.

4.2 Intellectual Property Protections

The Application is protected by copyright, trade secret, patent, trademark, and other intellectual property laws of the United States and international treaties, including but not limited to the Berne Convention, the TRIPS Agreement, the WIPO Copyright Treaty, and the Digital Millennium Copyright Act (DMCA). Unauthorized use, reproduction, or distribution of the Application may result in severe civil and criminal penalties.

4.3 Trade Secrets

You acknowledge and agree that the Application contains valuable trade secrets and proprietary confidential information of Axiom Cyber LLC. Without limitation, all detection methodologies, threat analysis algorithms, security scanning techniques, behavioral analysis models, machine learning architectures, model weights, training data, detection signatures, and security heuristics incorporated in the Application constitute trade secrets of Axiom Cyber LLC. You agree to maintain the strict confidentiality of such trade secrets and to not disclose, publish, or otherwise reveal any trade secrets to any third party.

4.4 Trademarks

"ThreatTrace," "Axiom Cyber," the ThreatTrace logo, and all related names, logos, product and service names, designs, and slogans are trademarks or service marks of Axiom Cyber LLC or its affiliates. You may not use such marks without the prior written permission of Axiom Cyber LLC.

4.5 Feedback

If you provide any feedback, suggestions, ideas, enhancement requests, or recommendations regarding the Application ("Feedback"), you hereby assign to Axiom Cyber LLC all right, title, and interest in and to such Feedback, and Axiom Cyber LLC shall be free to use, reproduce, disclose, license, distribute, and otherwise exploit such Feedback without restriction, attribution, or compensation to you.

5. Subscription Terms and Payment

5.1 Freemium Model

The Application operates on a freemium model. Certain basic features are available at no charge. Access to premium features, advanced threat detection capabilities, and enhanced functionality requires an active paid subscription ("Premium Subscription").

5.2 Subscription Pricing

The Premium Subscription is offered at a price of $7.99 USD per month (or the equivalent in your local currency as determined by the Apple App Store). Pricing is subject to change at Axiom Cyber LLC's sole discretion; however, any price change will not affect the current billing cycle and you will be notified of any price changes before your next renewal.

5.3 Auto-Renewal

Your Premium Subscription will automatically renew at the end of each monthly billing period unless you cancel the subscription at least twenty-four (24) hours before the end of the current billing period. Your Apple ID account will be charged for renewal within twenty-four (24) hours prior to the end of the current billing period at the then-current subscription rate.

5.4 Cancellation

You may cancel your Premium Subscription at any time through your Apple ID Account Settings on your device (Settings > [Your Name] > Subscriptions) or through the App Store. Cancellation will take effect at the end of the current billing period, and you will retain access to premium features until that period expires. No partial refunds will be provided for unused portions of a billing period.

5.5 Billing and Payment

All billing and payment processing is handled exclusively by Apple Inc. through the App Store. Axiom Cyber LLC does not directly collect, process, or store any payment information. All payment disputes, chargebacks, and refund requests must be directed to Apple in accordance with Apple's applicable refund policies and procedures.

5.6 Free Trial

If a free trial is offered, you may be required to provide payment information. If you do not cancel before the end of the trial period, your subscription will automatically convert to a paid Premium Subscription and your payment method will be charged accordingly.

6. Disclaimer of Warranties

6.1 As-Is Basis

THE APPLICATION IS PROVIDED ON AN "AS IS," "AS AVAILABLE," AND "WITH ALL FAULTS" BASIS, WITHOUT ANY WARRANTIES OR REPRESENTATIONS OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE. TO THE FULLEST EXTENT PERMITTED BY APPLICABLE LAW, AXIOM CYBER LLC HEREBY DISCLAIMS ALL WARRANTIES, WHETHER EXPRESS, IMPLIED, OR STATUTORY, INCLUDING BUT NOT LIMITED TO ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, NON-INFRINGEMENT, ACCURACY, RELIABILITY, COMPLETENESS, QUIET ENJOYMENT, AND ANY WARRANTIES ARISING OUT OF COURSE OF DEALING, USAGE, OR TRADE PRACTICE.

6.2 No Guarantee of Threat Detection

AXIOM CYBER LLC DOES NOT WARRANT, GUARANTEE, OR REPRESENT THAT THE APPLICATION WILL DETECT ALL SECURITY THREATS, VULNERABILITIES, MALWARE, SPYWARE, STALKERWARE, OR OTHER MALICIOUS SOFTWARE OR ACTIVITIES ON YOUR DEVICE. THE APPLICATION IS NOT A SUBSTITUTE FOR PROFESSIONAL CYBERSECURITY SERVICES, FORENSIC ANALYSIS, OR EXPERT SECURITY CONSULTATION. NO SECURITY PRODUCT CAN GUARANTEE COMPLETE PROTECTION AGAINST ALL THREATS.

6.3 No Warranty of Operation

AXIOM CYBER LLC DOES NOT WARRANT THAT THE APPLICATION WILL OPERATE WITHOUT INTERRUPTION, ERROR, DEFECT, OR DELAY, THAT IT WILL BE COMPATIBLE WITH ALL HARDWARE OR SOFTWARE CONFIGURATIONS, OR THAT ANY ERRORS, BUGS, OR DEFECTS WILL BE CORRECTED. THE ENTIRE RISK AS TO THE QUALITY, PERFORMANCE, AND RESULTS OBTAINED FROM THE APPLICATION RESTS WITH YOU.

6.4 Third-Party Components

The Application may incorporate third-party libraries, frameworks, or components. Axiom Cyber LLC makes no warranties regarding such third-party components and disclaims all liability arising from their use.

7. Limitation of Liability

7.1 Exclusion of Damages

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL AXIOM CYBER LLC, ITS OFFICERS, DIRECTORS, MANAGERS, MEMBERS, EMPLOYEES, AGENTS, CONTRACTORS, AFFILIATES, SUCCESSORS, OR ASSIGNS BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL, EXEMPLARY, OR PUNITIVE DAMAGES OF ANY KIND, INCLUDING BUT NOT LIMITED TO DAMAGES FOR LOSS OF PROFITS, LOSS OF DATA, LOSS OF GOODWILL, LOSS OF BUSINESS OPPORTUNITY, BUSINESS INTERRUPTION, DEVICE DAMAGE, SECURITY BREACHES, PRIVACY VIOLATIONS, PERSONAL INJURY, OR ANY OTHER PECUNIARY OR NON-PECUNIARY LOSS, ARISING OUT OF OR IN CONNECTION WITH THIS AGREEMENT OR THE USE OR INABILITY TO USE THE APPLICATION, REGARDLESS OF THE THEORY OF LIABILITY (WHETHER IN CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY, WARRANTY, OR OTHERWISE) AND EVEN IF AXIOM CYBER LLC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

7.2 Cap on Liability

TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE TOTAL CUMULATIVE LIABILITY OF AXIOM CYBER LLC ARISING OUT OF OR RELATED TO THIS AGREEMENT OR THE APPLICATION, WHETHER IN CONTRACT, TORT, NEGLIGENCE, STRICT LIABILITY, OR ANY OTHER LEGAL OR EQUITABLE THEORY, SHALL NOT EXCEED THE TOTAL AMOUNT ACTUALLY PAID BY YOU TO AXIOM CYBER LLC (THROUGH THE APPLE APP STORE) FOR THE APPLICATION DURING THE TWELVE (12) MONTH PERIOD IMMEDIATELY PRECEDING THE EVENT GIVING RISE TO THE CLAIM, OR FIFTY UNITED STATES DOLLARS ($50.00 USD), WHICHEVER IS GREATER.

7.3 Assumption of Risk

You expressly acknowledge and agree that your use of the Application is at your sole risk. The Application is a security monitoring tool and cannot prevent, block, or remediate all security threats, vulnerabilities, or attacks. You assume all risk and responsibility for any damages or losses resulting from your use of or inability to use the Application, including any harm to your device, data loss, or security compromise.

7.4 Essential Basis of the Bargain

You acknowledge that Axiom Cyber LLC has set its prices and entered into this Agreement in reliance upon the limitations of liability and disclaimers of warranties set forth herein, and that the same form an essential basis of the bargain between the parties. The parties agree that the limitations and exclusions of liability and disclaimers specified in this Agreement will survive and apply even if found to have failed of their essential purpose.

8. Indemnification

8.1 User Indemnification Obligation

You agree to indemnify, defend, and hold harmless Axiom Cyber LLC, its officers, directors, managers, members, employees, agents, contractors, licensors, service providers, affiliates, successors, and assigns (collectively, the "Indemnified Parties") from and against any and all claims, demands, actions, suits, proceedings, liabilities, damages, losses, judgments, awards, costs, and expenses (including reasonable attorneys' fees, expert witness fees, and court costs) arising out of or relating to: (a) your use or misuse of the Application; (b) your violation of this Agreement; (c) your violation of any applicable law, regulation, or rights of any third party; (d) any content or data you transmit through or in connection with the Application; or (e) any negligent or wrongful act or omission by you.

8.2 Indemnification Procedure

Axiom Cyber LLC shall provide you with prompt written notice of any claim subject to indemnification. Axiom Cyber LLC reserves the right, at its own expense, to assume the exclusive defense and control of any matter subject to indemnification by you, in which event you will fully cooperate with Axiom Cyber LLC in asserting any available defenses. You shall not settle any claim without the prior written consent of Axiom Cyber LLC.

9. Data Collection and Privacy

9.1 Privacy Policy

Your use of the Application is also governed by our separate Privacy Policy, which is incorporated herein by reference. By using the Application, you consent to the collection, use, and disclosure of your information as described in the Privacy Policy. The Privacy Policy is available within the Application and on our website.

9.2 Anonymous Telemetry

The Application collects anonymous, aggregated telemetry data for the purposes of improving the Application's threat detection capabilities, enhancing machine learning models, conducting security research, diagnosing errors, and improving the overall user experience. This telemetry data is collected in a manner that does not personally identify you and is used solely for product improvement and security research purposes.

9.3 No Sale of Personal Data

Axiom Cyber LLC does not sell, rent, trade, or otherwise disclose your personal data to third parties for their marketing purposes. Any data sharing is limited to what is described in our Privacy Policy and is conducted in compliance with applicable data protection laws.

9.4 Data Security

While Axiom Cyber LLC implements commercially reasonable security measures to protect data collected through the Application, no method of electronic transmission or storage is 100% secure. Axiom Cyber LLC cannot guarantee the absolute security of your data and shall not be liable for any unauthorized access to or breach of data security.

10. Termination

10.1 Termination by Axiom Cyber LLC

Axiom Cyber LLC may, in its sole and absolute discretion, terminate or suspend your license and access to the Application at any time, with or without cause, and with or without prior notice, including but not limited to situations where Axiom Cyber LLC reasonably believes that you have violated any term or condition of this Agreement.

10.2 Termination by User

You may terminate this Agreement at any time by deleting and removing the Application from all of your devices and ceasing all use thereof.

10.3 Effects of Termination

Upon termination of this Agreement for any reason: (a) all rights and licenses granted to you hereunder shall immediately cease and terminate; (b) you must immediately delete, remove, and destroy all copies of the Application from all of your devices; and (c) you must cease all use of the Application. Termination shall not entitle you to any refund of subscription fees already paid.

10.4 Survival

The following sections shall survive the termination or expiration of this Agreement: Section 3 (Restrictions on Use), Section 4 (Intellectual Property Rights), Section 6 (Disclaimer of Warranties), Section 7 (Limitation of Liability), Section 8 (Indemnification), Section 11 (Export Compliance), Section 12 (Governing Law and Dispute Resolution), Section 13 (Severability), and Section 14 (Entire Agreement).

11. Export Compliance

11.1 Export Laws

You acknowledge and agree that the Application is subject to United States export control laws and regulations, including but not limited to the Export Administration Regulations (EAR) administered by the U.S. Department of Commerce, Bureau of Industry and Security, and economic sanctions regulations administered by the U.S. Department of the Treasury, Office of Foreign Assets Control (OFAC).

11.2 Compliance Obligations

You represent and warrant that: (a) you are not located in, under the control of, or a national or resident of any country to which the United States has embargoed goods or services (including but not limited to Cuba, Iran, North Korea, Syria, and the Crimea, Donetsk, and Luhansk regions); (b) you are not identified on any United States government list of prohibited or restricted parties, including the Specially Designated Nationals List (SDN List), the Entity List, or the Denied Persons List; and (c) you will not use or export the Application in violation of any applicable export laws or regulations.

12. Governing Law and Dispute Resolution

12.1 Governing Law

This Agreement and any dispute or claim arising out of or in connection with it or its subject matter or formation (including non-contractual disputes or claims) shall be governed by, construed, and enforced in accordance with the laws of the State of Wyoming, United States of America, without giving effect to any choice or conflict of law provision, principle, or rule (whether of the State of Wyoming or any other jurisdiction) that would cause the application of the laws of any jurisdiction other than the State of Wyoming.

12.2 Mandatory Binding Arbitration

ANY DISPUTE, CONTROVERSY, OR CLAIM ARISING OUT OF OR RELATING TO THIS AGREEMENT, THE APPLICATION, OR YOUR USE THEREOF, INCLUDING THE DETERMINATION OF THE SCOPE OR APPLICABILITY OF THIS AGREEMENT TO ARBITRATE, SHALL BE RESOLVED EXCLUSIVELY BY FINAL AND BINDING ARBITRATION ADMINISTERED BY THE AMERICAN ARBITRATION ASSOCIATION ("AAA") IN ACCORDANCE WITH ITS CONSUMER ARBITRATION RULES THEN IN EFFECT. THE ARBITRATION SHALL BE CONDUCTED BY A SINGLE ARBITRATOR. THE SEAT AND VENUE OF THE ARBITRATION SHALL BE LINCOLN COUNTY, WYOMING, UNITED STATES. THE ARBITRATOR'S DECISION SHALL BE FINAL AND BINDING AND MAY BE ENTERED AS A JUDGMENT IN ANY COURT OF COMPETENT JURISDICTION. THE ARBITRATOR SHALL HAVE NO AUTHORITY TO AWARD PUNITIVE OR EXEMPLARY DAMAGES.

12.3 Class Action Waiver

YOU AND AXIOM CYBER LLC AGREE THAT EACH PARTY MAY BRING CLAIMS AGAINST THE OTHER ONLY IN YOUR OR ITS INDIVIDUAL CAPACITY AND NOT AS A PLAINTIFF OR CLASS MEMBER IN ANY PURPORTED CLASS, CONSOLIDATED, REPRESENTATIVE, OR MULTI-PARTY ACTION OR PROCEEDING. THE ARBITRATOR MAY NOT CONSOLIDATE MORE THAN ONE PERSON'S CLAIMS AND MAY NOT OTHERWISE PRESIDE OVER ANY FORM OF A REPRESENTATIVE, CLASS, OR COLLECTIVE PROCEEDING. IF THIS CLASS ACTION WAIVER IS FOUND TO BE UNENFORCEABLE, THEN THE ENTIRETY OF THIS ARBITRATION PROVISION SHALL BE NULL AND VOID.

12.4 Venue

To the extent that any dispute is permitted to be brought in court (including any action to compel arbitration or to enforce an arbitration award), you agree that any such action shall be filed exclusively in the state or federal courts located in or serving Lincoln County, Wyoming, United States. You hereby irrevocably consent to the personal jurisdiction and venue of such courts and waive any objection based on inconvenient forum.

12.5 Injunctive Relief

Notwithstanding the foregoing, Axiom Cyber LLC shall have the right to seek injunctive or other equitable relief in any court of competent jurisdiction to prevent the actual or threatened infringement, misappropriation, or violation of its intellectual property rights, trade secrets, copyrights, trademarks, or other proprietary rights, without the requirement of posting a bond or proving actual damages.

13. Severability

If any provision of this Agreement is held by a court of competent jurisdiction or arbitrator to be invalid, illegal, void, or unenforceable for any reason, such provision shall be modified to the minimum extent necessary to make it valid and enforceable, or if it cannot be so modified, it shall be severed from this Agreement. The invalidity or unenforceability of any provision shall not affect the validity or enforceability of the remaining provisions of this Agreement, which shall continue in full force and effect. The remaining provisions shall be construed and enforced as if the invalid or unenforceable provision had not been included.

14. Entire Agreement

14.1 Complete Agreement

This Agreement, together with the Privacy Policy and any applicable Apple App Store Terms of Service, constitutes the entire agreement between you and Axiom Cyber LLC with respect to the Application and supersedes all prior and contemporaneous understandings, agreements, representations, warranties, and communications, whether written or oral, with respect to the subject matter hereof.

14.2 No Oral Modifications

This Agreement may not be amended, modified, or supplemented except by a written instrument signed by an authorized representative of Axiom Cyber LLC. No oral statement, representation, or agreement shall modify or otherwise affect the terms of this Agreement. No waiver of any provision of this Agreement shall be deemed a further or continuing waiver of such provision or any other provision.

14.3 No Third-Party Beneficiaries

Except as expressly provided herein, this Agreement does not create any rights for any third party, and no third party may enforce any provision of this Agreement. Notwithstanding the foregoing, Apple Inc. and its subsidiaries are third-party beneficiaries of this Agreement as it relates to the use of the Application on Apple devices.

15. Changes to Terms

Axiom Cyber LLC reserves the right, at its sole discretion, to modify, amend, update, or replace this Agreement at any time. If we make material changes to this Agreement, we will notify you by posting the updated Agreement within the Application or by other reasonable means. The "Last Updated" date at the top of this Agreement will be revised to reflect the date of the most recent changes. Your continued use of the Application following the posting of any changes constitutes your binding acceptance of such changes. If you do not agree to the modified terms, you must immediately discontinue use of the Application and delete it from all of your devices. It is your responsibility to review this Agreement periodically for changes.

16. Contact Information

If you have any questions, concerns, or inquiries regarding this Agreement or the Application, please contact us using the information below:

Axiom Cyber LLC

Attn: Bryon Bowman

12 Vista Cir

Star Valley Ranch, Wyoming 83127-5240

United States

Email: Bryon@axiom-cyber.com

Phone: +1 (307) 200-2467

BY DOWNLOADING, INSTALLING, OR USING THE THREATTRACE APPLICATION, YOU ACKNOWLEDGE THAT YOU HAVE READ THIS AGREEMENT, UNDERSTAND IT, AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.

© 2026 Axiom Cyber LLC. All rights reserved.

ThreatTrace is a trademark of Axiom Cyber LLC.