IP to Proxy Database

Our IP to Proxy Database is specifically designed to identify IP addresses associated with proxies, VPN servers, Tor nodes, and other anonymizing tools. This vital data is crucial for businesses that need to enhance cyber security measures, prevent fraud, and ensure the integrity of user data. By utilizing our VPN detection and proxy detector features, you can identify and mitigate risks associated with anonymized browsing and unauthorized access. This information allows them to keep strict access controls in place.

Our proxy database actively detects VPN usage, helping you identify potential security threats by flagging IPs linked to anonymous browsing or malicious activities. This information is essential for maintaining robust security protocols, monitoring suspicious network traffic, and enforcing compliance with internal security standards.

The VPN checker features of our database, combined with cyber threat intelligence and cyber security capabilities, allow you to effectively track and respond to potential threats, ensuring your data and systems remain secure. For information related to our IP Geolocation API Database, please Contact our support.

IP Geolocation DB-V Fields Overview

The IP to Organization data combined with IP to Security data forms the complete IP to Proxy database file. This comprehensive dataset includes both organizational details, such as the associated ISP, connection type, and organization name, as well as security-related attributes like threat scores, proxy information, and indicators of malicious activity. Together, both of following tables provide a full representation of each IP range, offering both network and security intelligence in a single file.

In this document, you will go through the basic understanding of IP Geolocation/GeoIP Databases.

You need a valid 'ipgeolocation API key' to download and use this Database. Sign up here and get your free API key if you don’t have one.

Available IP to Organization Data Format

start_ipend_ipcountry_idispconnection_typeorganizationas_number
94.16.124.894.16.124.255114ANEXIA Internetdienstleistungs GmbHN/AANEXIA Internetdienstleistungs GmbH42473
117.1.86.0117.1.88.255242Dai IP cho dich vu HNIADSLViettel Group7552
2003:a:c4d::954c:02003:a:c4d::ffff57Deutsche Telekom AGdial-upDeutsche Telekom AG3320

Available IP to Security Data Format

start_ipend_ipthreat_scoreis_toris_proxyproxy_typeis_anonymousis_known_attackeris_botis_spam
1.0.0.01.0.0.080falsetrueVPNtruetruefalsefalse
162.120.192.96162.120.192.9650falsetrueGOOGLE RELAYtruefalsefalsefalse
2a02:26f7:d258::2a02:26f7:d258::50falsetrueAPPLE RELAYtruefalsefalsefalse

Reference to IP to Proxy Database File

FieldTypeDescriptionCan be empty?
start_ipstringThe start_ip represents the beginning IP address of the range.No
end_ipstringThe end_ip represents the ending IP address of the range.No
country_idintegerThe ID corresponding to the country, referring to the db-country file for detailed information such as country name, languages, codes, and more.No
ispstringThe Internet Service Provider associated with the IP range.No
connection_typestringThe type of internet connection (e.g., DSL, Cable, Fiber) associated with the IP range.Yes
organizationstringThe organization name responsible for managing or owning the IP range.No
as_numberstringThe Autonomous System Number (ASN) that identifies the network routing the IP addresses.No
threat_scoreintegerA numerical value out of 100 representing the threat level associated with the IP range.No
is_torbooleanIndicates whether the IP is part of the Tor network (true/false).No
is_proxybooleanIndicates whether the IP is associated with a proxy server (true/false).No
proxy_typestringSpecifies the type of proxy (e.g., VPN, GOOGLE RELAY, APPLE REPLAY).Yes
is_anonymousbooleanIndicates whether the IP belongs to an anonymous network (true/false).No
is_known_attackerbooleanIndicates if the IP is associated with known malicious activity (true/false).No
is_cloud_providerbooleanIndicates if the IP is associated with some cloud provider (true/false) from a list of providers given in the db-cloud-provider file.No
is_botbooleanIndicates whether the IP is identified as a bot (true/false).No
is_spambooleanIndicates if the IP is involved in spam activities (true/false).No

IP to Proxy Database File Stats

Prefer data in a specific format? We support all the important ones

CSV

Filesize110.25 MB
Fields8
Last updatedYesterday
Entries9,138,634

MMDB

Filesize469.03 MB
Fields20
Last updatedYesterday
Entries9,138,634

Ideal for monitoring network traffic for suspicious activities, preventing fraud, and ensuring compliance with security protocols. This VPN checker capability is essential for businesses that prioritize data security and need to maintain strict access controls. By integrating our IP to Proxy Database into your cyber security framework, you can detect and mitigate risks associated with anonymized browsing and protect your digital assets from potential threats.

Need data in a format not mentioned here? Contact us