Logo
Logo

PRODUCTS

TOOLS

IP Security Database– Cyber Threat Intelligence at Scale for Safer Networks

Enable advanced threat protection by integrating IP security datasets into your systems, allowing you to detect malicious IPs, block attackers, and safeguard your network in real time.

IP Security Database

Start ipEnd ipThreat scoreIs torIs proxyProxy typeProxy providerIs anonymousIs known attackerIs botIs spamIs cloud providerCloud provider
155.254.30.80155.254.30.805falsefalseN/AN/AfalsefalsefalsefalsetrueH4Y Technologies LLC
190.28.140.28190.28.140.2845falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
143.55.251.64143.55.251.6445falsetruePROXYZyte ProxytruefalsefalsefalsefalseN/A
95.8.37.9495.8.37.9445falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
5.249.30.835.249.30.8345falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
106.76.252.4106.76.252.445falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
1528+
TLDs
693M+
Active Domains
881M+
Domains Tracked
3567M+
WHOIS Records
4998M+
Host Names
14B+
DNS Records
pricing backgroundEclipse Top RightEclipse Top Left

Products

IP Security Database

The IP Security Database package delivers daily snapshots of IP security details, generated at 5 AM UTC for the previous day. Each snapshot delivers key IP security intelligence, showing whether an IP is spam, a bot, a proxy (with provider details), a cloud service, anonymous, a known attacker, and more.

Features

Threat Score
VPN and Proxy Detection
Bot and Spam Detection
API Access
Image

Features

What theIP Security DatabaseOffers

Delivering daily, actionable cybersecurity intelligence with detailed IP attributes and more.

Feature icon

Threat Score

Our composite threat score combines VPN use, Tor status, bot, spam, and more to instantly flag suspicious IPs.

Feature icon

VPN and Proxy Detection

The Security Database delivers precise VPN and proxy detection, identifying anonymizer types.

Feature icon

Bot and Spam Detection

The security database instantly detects spam and bot IPs, analyzing malicious patterns.

Feature icon

API Access

APIs allow you to check the latest IP security data snapshot status and download it in gzip CSV format.

Products

Custom IP SecuritySolutions
Tailored IP security solutions designed to detect threats and adapt to your unique infrastructure.
Custom IP Security Solution

In a customized IP Security solution, we integrate IP Whois, reverse IP lookup, IP geolocation, and more with the IP security database based on user requirements. All datasets are interconnected to provide a flexible structure, available as CSV files or MaxMind (MMDB) format. Customized solutions are also offered as daily snapshots.

monitoring

Use Cases

IP Security Data in Action

Discover IP Security use cases, from fraud prevention to network protection.

Feature icon

Account & Payment Fraud Detection

Reject or step-up verify logins / transactions originating from VPNs, Tor exits, known botnets, or high-risk proxies.

Feature icon

Streaming & Content Licensing

Enforce geo-rights by denying access when the viewer hides behind VPN, Tor, or residential proxy services.

Feature icon

SOAR / SIEM Automation

Enrich logs with instant IP threat context, auto-open tickets or deploy firewall rules for suspicious traffic.

Feature icon

Regulatory Compliance - KYC

Detect masked or sanctioned-region traffic to trigger enhanced due diligence or auto-deny service.

Feature icon

Network Protection

Safeguard infrastructure by linking IP intelligence with firewalls, intrusion systems, and monitoring tools.

Feature icon

Threat Intelligence

Leverage IP data to uncover malicious actors and strengthen proactive defense strategies across networks.

Request demo background

Protect your business with customized IP Security block fraud, detect threats, and safeguard your network today.

pricing background

Documentation

IP Security Snapshot

Download the IP Security snapshot data for a specific day by using the date parameter. The response is a gzipped CSV file containing IP security details, such as whether the IP is flagged as spam, associated with Tor, a cloud provider, a bot, anonymous, and more. The date of the latest prepared snapshot can be retrieved via the Status API endpoint.

Authorization

You can make authorized requests to our API by passing API key as a query parameter. To get your API key, login to our billing dashboard and get your API key! If your API key has been compromised, you can change it by clicking on reset button in billing dashboard.

Query Parameters

Required
  • apiKey
    Get your API key from our billing dashboard.
  • date
    Use the date parameter in yyyy-MM-dd (2026-01-26) format to get the snapshot of that day.

Request

shellnodejsjavapythonphprubyjscsharpgocswiftjquery
SHELL
Loading request...

Response

Loading response...

Status Codes

Success Codes
  • 200Request is processed successfully.
Failure Codes
  • 400Please pass apiKey param value.
  • 400Please provide the date parameter
  • 400Invalid date parameter
  • 401Api record not found.
  • 401Provided API key is inactive.
  • 401Please buy database subscription.
  • 401Your database subscription plan is inactive.
  • 401You cannot download file.
  • 401You have exceeded the download limit of 20000.
  • 401Suspicious Activity.
  • 404File is not available of this date.
  • 413Please upgrade your plans.

IP Security Snapshot Status

Use the endpoint to get the status of the latest IP Security snapshot. The JSON output contains the snapshot name, creation date, and expected deletion date.

Authorization

You can make authorized requests to our API by passing API key as a query parameter. To get your API key, login to our billing dashboard and get your API key! If your API key has been compromised, you can change it by clicking on reset button in billing dashboard.

Query Parameters

Required
  • apiKey
    Get your API key from our billing dashboard.

Request

shellnodejsjavapythonphprubyjscsharpgocswiftjquery
SHELL
Loading request...

Response

Loading response...

Status Codes

Success Codes
  • 200Request is processed successfully.
Failure Codes
  • 400Please pass apiKey param value.
  • 401Api record not found.
  • 401Provided API key is inactive.
  • 401You cannot download file.
  • 401Your account is deactivated.
  • 401You have exceeded the download limit of 20000.
  • 401Suspicious Activity.
  • 413Please upgrade your plans.
FAQs
Enhance your apps with industry leading web scraping and crawling.
What is IP Security Database?
How can we know when the IP Security Database snapshot is ready for the day?
How does the IP Security Database help in securing the network?

Ready to get started?

Join now and claim 500 credits for free!

Elevate your cybersecurity strategy with our all-in-one domain and IP intelligence platform empowering analysts, researchers, and brand owners with real-time WHOIS, DNS, IP, and subdomain insights.

Sign Up For Free