The WhoisFreaks IP Reputation API scores any IPv4 or IPv6 address against real-time threat data and returns a composite threat score (0–100), VPN, proxy, Tor and bot classification, VPN and proxy provider names with confidence scores, district-level geolocation, ASN and ISP. JSON or XML in one call. Free tier: 500 credits, no card.
The IP Reputation API scores any IPv4 or IPv6 address in real time. One call returns a composite threat score (0–100), classification of the IP as VPN, proxy, Tor exit node, residential proxy, relay, anonymous proxy, known attacker, spam source, bot, or cloud or datacenter range, plus VPN and proxy provider names with per-detection confidence scores, ASN with type and date allocated, district-level geolocation with accuracy radius, and ISP.
Common integrations include fraud-prevention checks at signup and checkout, SIEM and SOAR enrichment, firewall and WAF blocklists, and step-up authentication at login.
A score between 0 - 100 assigned to an IP address to represent the likelihood that it is associated with malicious activity.
Every lookup returns a threat_score between 0 and 100. The score combines five risk signals:
Product
The bulk endpoint accepts up to 100 IPv4 or IPv6 addresses per request and returns the full reputation payload (threat score, VPN/proxy/Tor classification, VPN and proxy provider names with confidence scores, ASN, district geolocation) for every IP in one response. JSON or XML. Use it for SOC indicator-batch enrichment, threat-feed processing, and overnight reputation sweeps across SOAR pipelines.
Features
Every successful lookup returns the fields below. All fields appear in the same JSON or XML response.
A single 0–100 number combining VPN, proxy, Tor, spam, botnet, known-attacker, and datacenter signals. Set thresholds (block at 80+, step-up at 50–79, allow under 50) without rules per boolean field.
is_vpn flags commercial VPN traffic and returns vpn_provider_names array (NordVPN, ExpressVPN, Surfshark) plus vpn_confidence_score 0-100 and vpn_last_seen timestamp.
is_proxy with proxy_provider_names array, is_residential_proxy for paid residential traffic, is_relay with relay_provider_name, is_anonymous for header-stripping proxies, plus proxy_confidence_score.
is_tor flags Tor exit-node and relay traffic. Treated as a distinct category because Tor has no provider, no payment record, and a higher malicious-traffic base rate than commercial VPN networks.
is_known_attacker (port scanners, brute-force, DDoS), is_spam (Spamhaus, SpamCop, SORBS feeds), and is_bot (automated traffic behaviour). All pulled from continuously refreshed blocklists.
is_cloud_provider plus cloud_provider name (AWS, GCP, Azure, DigitalOcean, OVH, Hetzner). Score datacenter-origin traffic separately from residential to split server-to-server calls from human users.
as_number, organization, type (HOSTING, ISP, BUSINESS), domain, date_allocated, RIR (ARIN, RIPE, APNIC, LACNIC), network route, is_anycast. Block hosting ASNs and anycast ranges over per-IP rules.
country (ISO 2 and 3, name, official, capital), state_prov, state_code, district, city, latitude, longitude, zipcode, accuracy_radius, confidence rating, is_eu, timezone, currency, country_emoji.
Product
Daily snapshots of the full IP reputation dataset in gzipped CSV. Used by cybersecurity teams, fraud-prevention vendors, and threat-intelligence platforms that need to ingest the entire dataset rather than query individual IPs. See the IP Reputation Database page for schema, refresh cadence, and pricing.
Use Cases
Where teams use the IP Reputation API to decide whether to allow, challenge, or block traffic.
Reject or step-up signups originating from VPNs, anonymous proxies, Tor exits, and known-attacker IPs. Score every new signup IP inline with one API call before account is created.
Block or challenge login attempts when the IP returns a threat_score above your threshold or matches is_known_attacker or is_bot. Pair with device fingerprinting for higher signal.
Feed threat_score, is_tor, is_anonymous, and is_cloud_provider into the fraud-rule engine. Treat all datacenter and Tor traffic as elevated risk on card-not-present checkout flows.
Enrich each inbound IP indicator with composite threat score, VPN/proxy classification, ASN, and geolocation before routing to analysts. Drop or auto-close alerts below thresholds.
Filter datacenter and proxy IPs out of session counts, click-through metrics, and ad impressions. The is_bot and is_cloud_provider flags isolate non-human traffic from human users.
Verify the reputation of inbound and outbound mail server IPs before delivery. Combine threat_score, is_spam, and is_known_attacker to gate sender filtering with DMARC enforcement.
Start using our Security Lookup API to uncover IP threats and phishing domains, stay ahead of attackers, and mitigate risk.
Integrations
Official Python, Go, Node.js, Java, PHP, Ruby, C#, Swift, C++, and cURL clients are published with copy-paste examples for each language. Embed VPN, proxy, and Tor classification into login, signup, checkout, and API-gateway code in under 30 lines.
No-code routing through Zapier, Make, and n8n sends high-threat-score events to Slack, PagerDuty, or Jira based on score thresholds.
Splunk, Microsoft Sentinel, Elastic, and SOAR playbooks ingest threat_score, is_known_attacker, and is_tor as IoC fields to trigger blocking, escalation, and investigation workflows.
Elevate your cybersecurity strategy with our all-in-one domain and IP intelligence platform empowering analysts, researchers, and brand owners with real-time WHOIS, DNS, IP, and subdomain insights.