@p @dcc @phnt @dsm @meso @graf "Without authorization" is the key phrase there. I don't mean "Without your target's authorization", I mean "without OUR authorization". Aka open a ticket with a valid use case and ask away.
The reason for this is back in my days working for Linode we'd tag security researcher accounts internally, so when the inevitable pissed off mid-40's sysadmin came knocking after Kevin Mitnick's company banged up their leaky vulnerable IIS 6 servers we'd have a canned response ready to go, and we could validate it wasn't ACTUALLY some asshole using us as their fancy new C2 instance for a botnet or whatever.
(Yes, KnowBe4 was a huge Linode customer circa 2016. It's been almost a decade, I'm sure I can divulge that now, and they're probably sucking AWS cock now anyway.)
(I also remember when that Finnish fuck zeekill/ryan spammed Chris Aker's SSN all over IRC after busting into their "private" OFTC channel. That was funny.)