The WhoisFreaks IP Security API checks any IPv4 or IPv6 address against real-time threat intelligence and returns a composite threat score (0–100), VPN/proxy/Tor/bot classification, proxy type and provider name, geolocation down to district level, ASN, and ISP all in a single JSON or XML response. Free tier with 500 credits, no card required.
The IP Security API, also known as the IP Reputation API, scores inbound traffic in real time. With a single API call, it determines whether an IP address is routing through a VPN, proxy, Tor exit node, or cloud/datacenter range. It also returns a composite threat score based on known attacker databases, spam lists, and bot behavior signals. This API can be integrated into fraud prevention systems, SIEM pipelines, firewall blocklists, and login authentication flows.
A score between 0 - 100 assigned to an IP address to represent the likelihood that it is associated with malicious activity.
Every IP lookup through the IP Security API returns a threat_score value between 0 and 100. This composite score is calculated using multiple risk signals, including:
Product
Use our Bulk Security Lookup endpoint to perform batch lookup of multiple IPs in one go. One request can have up to 100 IPs. Both IPv4 and IPv6 are supported. The Bulk Security Lookup API delivers well-parsed IP details in both JSON and XML formats, including a comprehensive threat score.
Features
Our all-in-one security solution provides everything you need to enhance your security posture and proactively mitigate risks.
Composite threat score flags suspicious IPs by combining VPN, Tor, bot, spam, and other risk signals.
Get an IP’s AS number and organization to identify network provider, possible routes and potential malicious networks.
Detect VPNs and proxies in one check, including connection type and provider, to enable informed access and risk decisions.
Our system supports CSV and MaxMind (MMDB) formats for fast and efficient geolocation and security lookups.
The Security Database provides WHOIS for domains and ASNs, plus subdomains, to support attack-surface mapping.
Includes comprehensive DNS data such as A, AAAA, NS, MX, SOA, SPF, and CNAME records for infrastructure analysis.
The Security API provides IP WHOIS, IP-to-ASN, and ISP-to-IP, email, and organization to IP mapping for threat intelligence.
Provides IP-to-precise geolocation mapping to pinpoint a device’s location for security, compliance, and access control.
Product
The IP Security Database provides daily full snapshots of IP security data in gzipped CSV format, helping cybersecurity services block malicious IPs and deliver actionable IP intelligence to safeguard digital assets.
Use Cases
See how the Security API power real-world threat and anamoly detection.
Fraud Prevention, Ad Traffic Filtering,CAPTCHA Enforcement, Bot Detection.
Helps in ISP-Based Blocking or Throttling, Network Mapping and Attribution.
Attack Surface Management, Phishing Detection, Bug Bounty & Pen Testing.
Real-Time Risk Assessment of domains for Firewall Blocking and Threat Intelligence Dashboards.
Phishing and Brand Protection, B2B Lead Generation and Security Investigations.
Reject logins / transactions originating from VPNs, Tor exits, known botnets, or proxies.
Start using our Security Lookup API to uncover IP threats and phishing domains, stay ahead of attackers, and mitigate risk.
Integrations
The WhoisFreaks IP Security API ships with official Python and Go SDKs so you can embed VPN detection, Tor classification, and composite threat scoring into any authentication flow, payment gateway, or API gateway with minimal code.
Zapier, Make, and n8n let no-code teams route high-risk IP events to Slack, PagerDuty, or Jira based on threat score thresholds without writing a single line.
Security operations teams integrate it into Splunk, Microsoft Sentinel, Elastic, and SOAR playbooks to automate IP blocking, escalation, and investigation workflows triggered by real-time threat classification.
Yes, we have rate limiting on requests being made on all of our paid plans. The requests limit is shown in the following table.
The Table is divided into three types of plans:
| Credits | Live-rpm | Bulk-rpm | Historical/Reverse-rpm |
|---|---|---|---|
| 5000 | 20 | 8 | 3 |
| 15000 | 35 | 12 | 5 |
| 50000 | 80 | 20 | 10 |
| 150000 | 120 | 25 | 15 |
| 450000 | 150 | 35 | 20 |
| 1000000 | 200 | 50 | 25 |
| 3000000 | 300 | 70 | 35 |
| Credits | Live-rpm | Bulk-rpm | Historical/Reverse-rpm |
|---|---|---|---|
| 5000 | 20 | 8 | 3 |
| 15000 | 35 | 12 | 5 |
| 50000 | 80 | 20 | 10 |
| 150000 | 120 | 25 | 15 |
| 450000 | 150 | 35 | 20 |
| 1000000 | 200 | 50 | 25 |
| 3000000 | 300 | 70 | 35 |
In case, the request per minute exceeds, it'll throw an error with HTTP error code of 429.
Elevate your cybersecurity strategy with our all-in-one domain and IP intelligence platform empowering analysts, researchers, and brand owners with real-time WHOIS, DNS, IP, and subdomain insights.