All endpoints exceptDocumentation Index
Fetch the complete documentation index at: https://vpn-docs.wxapros.com/llms.txt
Use this file to discover all available pages before exploring further.
/public/* require an API key sent as the X-API-Key
HTTP header. Keys are issued per user, scoped to one or more product
families, and rate-limited per tier.
Header
- Prefix (
wxa_live_<key-id>) — visible in our logs and your dashboard - Secret (
<key-secret>) — bcrypt-hashed at rest, shown to you exactly once at creation
Scopes
When generating a key, select the product scopes it should access. For VPN Intelligence, you need at least thevpn scope.
| Scope | Endpoints unlocked |
|---|---|
vpn | /api/v1/vpn/* (lookup, stats, exports) |
geo | /api/v1/geo/* (sister product) |
recon | /api/v1/recon/* (sister product) |
rank | /api/v1/rank/* (sister product) |
domains | /api/v1/domains/* (sister product) |
Tiers and rate limits
Rate limits are enforced per key. See tiers for the full ladder.| Tier | Sustained req/s | Burst (60 s) | Monthly quota |
|---|---|---|---|
| Free | 10 | 100 | 10,000 |
| Starter | 25 | 250 | 200,000 |
| Pro | 50 | 500 | 1,000,000 |
| Business | 100 | 1,000 | 5,000,000 |
| Enterprise | Negotiated | Negotiated | Unlimited (fair-use) |
HTTP 429 with a Retry-After header
indicating seconds until the next window. See
error handling.
Rotation
Rotate keys at least every 90 days, or immediately if you suspect leakage:- Generate a new key in the dashboard with the same scopes
- Deploy the new key to your applications
- Revoke the old key once traffic has migrated (30-second propagation)
Multiple environments
Generate one key per environment (prod, staging, ci) and tag them in
the dashboard so usage analytics break down cleanly. Keys are not
environment-locked at the API layer; the tagging is for your own audit.
What not to do
- Don’t commit keys to source control. Use environment variables, a
secrets manager, or
.envfiles added to.gitignore. - Don’t share keys across teams. Generate one key per team or service.
- Don’t bypass per-key rate limits by issuing many keys. Distributed request patterns intended to evade quotas violate the Acceptable Use Policy.
Public no-auth endpoints
A subset of read endpoints under/public/* is available without an API
key, with aggressive per-IP rate limits (10 req/min) and a restricted
response shape. These exist for evaluation and self-checks. They are not
suitable for production traffic.