Reveal hidden threats with our Security Pro Database. Instantly detect proxies, VPNs, anonymous traffic, and residential proxy usage. Boost fraud prevention, enhance security, and protect your infrastructure and sensitive data with accurate, up-to-date IP risk and reputation insights.
Last Updated
Today
Fields
10
Entries
2,231,824
Download
| Start ip | End ip | Threat score | Is tor | Is proxy | Proxy type | Proxy provider | Is anonymous | Is known attacker | Is bot | Is spam | Is cloud provider | Cloud provider |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1.227.92.137 | 1.227.92.137 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | |
| 1.232.33.147 | 1.232.33.147 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | |
| 4.2.86.105 | 4.2.86.105 | 5 | false | false | false | false | false | false | true | Level 3 Parent, LLC | ||
| 2.98.203.4 | 2.98.203.4 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | |
| 2.81.124.157 | 2.81.124.157 | 45 | false | true | PROXY | Oxy Labs | true | false | false | false | false | |
| 2.102.25.100 | 2.102.25.100 | 45 | false | true | PROXY | Evomi Proxy | true | false | false | false | false | |
| 4.1.159.0 | 4.1.159.255 | 5 | false | false | false | false | false | false | true | Level 3 Parent, LLC | ||
| 2.88.90.0 | 2.88.90.14 | 5 | false | false | false | false | false | false | true | Saudi Telecom Company JSC | ||
| 4.1.213.6 | 4.1.213.8 | 5 | false | false | false | false | false | false | true | Level 3 Parent, LLC |
Identify risky IPs using threat scores, proxy detection, and anonymity flags to block fraud attempts before they reach your systems.
Detect residential and data center proxies to prevent ad fraud and ensure your ads are seen by real users in valid locations.
Stop credential stuffing, fake sign-ups, and suspicious logins by detecting VPNs and filtering traffic from high-risk and anonymous IP addresses.
Block unauthorized scraping or access to premium content by identifying masked IPs from bots, proxies, and automation tools.
Protect checkout and transaction pages by analyzing IP risk levels and stopping payments from known malicious or anonymized sources.
Prevent misuse of APIs by detecting suspicious IP behavior, including high-frequency access or masked identities via proxies and VPNs.
Reduce form spam, fake reviews, and comment abuse by blocking IPs flagged for spam or known to use anonymity networks.
The Security Threat Database helps identify high-risk IPs associated with anonymity, proxy use, and malicious activity to strengthen protection across your digital infrastructure.
13
23.9M
Yesterday
158.35 MB
377.29 MB
The Residential Proxy Database provides masked IPs taken from residential networks, often used for automation. It enables safer engagement with real users.
4
6.9M
Yesterday
51.01 MB
249.26 MB
Identify the hosting provider of any cloud IP address with our reliable database. Secure your website from bots, scrapers, and fraud.
3
16.5M
Yesterday
101.58 MB
12.87 MB
Access ready-made bundles that combine the Security Pro Databases with our other data feeds—delivering full coverage, effortless integration, and greater value in one package.
24
31.2M
Yesterday
501.76 MB
1.38 GB
These are our database product families. Pick a tier to see its databases; you can buy individual datasets, bundle multiple, or request custom
Multi-source datasets refreshed daily, with rigorous QA and versioned releases.
Comprehensive IPv4 and IPv6 coverage across regions with consistent schemas and versioned releases.
Plug-and-play in MMDB, CSV, and JSON with stable schemas and changelogs.
Purchase databases individually, bundle them, or combine multiple for full coverage
Reliable IP to location and ISP databases for personalization, targeting, and network optimization.
View Sample DataGranular geolocation databases with ASN, company, WHOIS, and abuse contact details for deeper network intelligence.
Explore Field ListThreat intelligence databases that detect proxies, VPNs, Tor, bots, residential proxies, and hosting IPs to stop fraud.
See Threat CoverageOur proxy checker tool lets you try it for free a few times. You can quickly see if an IP address is a proxy, VPN, or Tor, and find out its type and risk.
Loading...
Get the latest in geolocation tech, straight to your inbox.