IP to Proxy Database
Our IP to Proxy Database is specifically designed to identify IP addresses associated with proxies, VPN servers, Tor nodes, and other anonymizing tools. This vital data is crucial for businesses that need to enhance cyber security measures, prevent fraud, and ensure the integrity of user data. By utilizing our VPN detection and proxy detector features, you can identify and mitigate risks associated with anonymized browsing and unauthorized access. This information allows them to keep strict access controls in place.
Our proxy database actively detects VPN usage, helping you identify potential security threats by flagging IPs linked to anonymous browsing or malicious activities. This information is essential for maintaining robust security protocols, monitoring suspicious network traffic, and enforcing compliance with internal security standards.
The VPN checker features of our database, combined with cyber threat intelligence and cyber security capabilities, allow you to effectively track and respond to potential threats, ensuring your data and systems remain secure. For information related to our IP Geolocation API Database, please Contact our support.
IP Geolocation DB-V Fields Overview
The IP to Organization data combined with IP to Security data forms the complete IP to Proxy database file. This comprehensive dataset includes both organizational details, such as the associated ISP, connection type, and organization name, as well as security-related attributes like threat scores, proxy information, and indicators of malicious activity. Together, both of following tables provide a full representation of each IP range, offering both network and security intelligence in a single file.
In this document, you will go through the basic understanding of IP Geolocation/GeoIP Databases.
You need a valid 'ipgeolocation API key' to download and use this Database. Sign up here and get your free API key if you don’t have one.
Available IP to Organization Data Format
start_ip | end_ip | country_id | isp | connection_type | organization | as_number |
---|---|---|---|---|---|---|
94.16.124.8 | 94.16.124.255 | 114 | ANEXIA Internetdienstleistungs GmbH | N/A | ANEXIA Internetdienstleistungs GmbH | 42473 |
117.1.86.0 | 117.1.88.255 | 242 | Dai IP cho dich vu HNI | ADSL | Viettel Group | 7552 |
2003:a:c4d::954c:0 | 2003:a:c4d::ffff | 57 | Deutsche Telekom AG | dial-up | Deutsche Telekom AG | 3320 |
Available IP to Security Data Format
start_ip | end_ip | threat_score | is_tor | is_proxy | proxy_type | is_anonymous | is_known_attacker | is_bot | is_spam |
---|---|---|---|---|---|---|---|---|---|
1.0.0.0 | 1.0.0.0 | 80 | false | true | VPN | true | true | false | false |
162.120.192.96 | 162.120.192.96 | 50 | false | true | GOOGLE RELAY | true | false | false | false |
2a02:26f7:d258:: | 2a02:26f7:d258:: | 50 | false | true | APPLE RELAY | true | false | false | false |
Reference to IP to Proxy Database File
Field | Type | Description | Can be empty? |
---|---|---|---|
start_ip | string | The start_ip represents the beginning IP address of the range. | No |
end_ip | string | The end_ip represents the ending IP address of the range. | No |
country_id | integer | The ID corresponding to the country, referring to the db-country file for detailed information such as country name, languages, codes, and more. | No |
isp | string | The Internet Service Provider associated with the IP range. | No |
connection_type | string | The type of internet connection (e.g., DSL, Cable, Fiber) associated with the IP range. | Yes |
organization | string | The organization name responsible for managing or owning the IP range. | No |
as_number | string | The Autonomous System Number (ASN) that identifies the network routing the IP addresses. | No |
threat_score | integer | A numerical value out of 100 representing the threat level associated with the IP range. | No |
is_tor | boolean | Indicates whether the IP is part of the Tor network (true/false). | No |
is_proxy | boolean | Indicates whether the IP is associated with a proxy server (true/false). | No |
proxy_type | string | Specifies the type of proxy (e.g., VPN, GOOGLE RELAY, APPLE REPLAY). | Yes |
is_anonymous | boolean | Indicates whether the IP belongs to an anonymous network (true/false). | No |
is_known_attacker | boolean | Indicates if the IP is associated with known malicious activity (true/false). | No |
is_cloud_provider | boolean | Indicates if the IP is associated with some cloud provider (true/false) from a list of providers given in the db-cloud-provider file. | No |
is_bot | boolean | Indicates whether the IP is identified as a bot (true/false). | No |
is_spam | boolean | Indicates if the IP is involved in spam activities (true/false). | No |
IP to Proxy Database File Stats
Prefer data in a specific format? We support all the important ones
CSV
Filesize | 110.25 MB |
---|---|
Fields | 8 |
Last updated | Yesterday |
Entries | 9,138,634 |
MMDB
Filesize | 469.03 MB |
---|---|
Fields | 20 |
Last updated | Yesterday |
Entries | 9,138,634 |
Ideal for monitoring network traffic for suspicious activities, preventing fraud, and ensuring compliance with security protocols. This VPN checker capability is essential for businesses that prioritize data security and need to maintain strict access controls. By integrating our IP to Proxy Database into your cyber security framework, you can detect and mitigate risks associated with anonymized browsing and protect your digital assets from potential threats.
Need data in a format not mentioned here? Contact us