Enable advanced threat protection by integrating IP security datasets into your systems, allowing you to detect malicious IPs, block attackers, and safeguard your network in real time.
| Start ip | End ip | Threat score | Is tor | Is proxy | Proxy type | Proxy provider | Is anonymous | Is known attacker | Is bot | Is spam | Is cloud provider | Cloud provider |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 155.254.30.80 | 155.254.30.80 | 5 | false | false | N/A | N/A | false | false | false | false | true | H4Y Technologies LLC |
| 190.28.140.28 | 190.28.140.28 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | N/A |
| 143.55.251.64 | 143.55.251.64 | 45 | false | true | PROXY | Zyte Proxy | true | false | false | false | false | N/A |
| 95.8.37.94 | 95.8.37.94 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | N/A |
| 5.249.30.83 | 5.249.30.83 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | N/A |
| 106.76.252.4 | 106.76.252.4 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | N/A |
Products
Features
Delivering daily, actionable cybersecurity intelligence with detailed IP attributes and more.
Our composite threat score combines VPN use, Tor status, bot, spam, and more to instantly flag suspicious IPs.
The Security Database delivers precise VPN and proxy detection, identifying anonymizer types.
The security database instantly detects spam and bot IPs, analyzing malicious patterns.
APIs allow you to check the latest IP security data snapshot status and download it in gzip CSV format.
Products
In a customized IP Security solution, we integrate IP Whois, reverse IP lookup, IP geolocation, and more with the IP security database based on user requirements. All datasets are interconnected to provide a flexible structure, available as CSV files or MaxMind (MMDB) format. Customized solutions are also offered as daily snapshots.
Use Cases
Discover IP Security use cases, from fraud prevention to network protection.
Reject or step-up verify logins / transactions originating from VPNs, Tor exits, known botnets, or high-risk proxies.
Enforce geo-rights by denying access when the viewer hides behind VPN, Tor, or residential proxy services.
Enrich logs with instant IP threat context, auto-open tickets or deploy firewall rules for suspicious traffic.
Detect masked or sanctioned-region traffic to trigger enhanced due diligence or auto-deny service.
Safeguard infrastructure by linking IP intelligence with firewalls, intrusion systems, and monitoring tools.
Leverage IP data to uncover malicious actors and strengthen proactive defense strategies across networks.
Protect your business with customized IP Security block fraud, detect threats, and safeguard your network today.
Ready to get started?
Join now and claim 500 credits for free!
Elevate your cybersecurity strategy with our all-in-one domain and IP intelligence platform empowering analysts, researchers, and brand owners with real-time WHOIS, DNS, IP, and subdomain insights.