real time updates
The continuously updated data set accurately reflects the real-time status of the Internet.
Compatible adaptation
Enables frictionless integration with an enterprise’s existing architecture
Compliant use
All sensitive IP data is stored locally
NAME | Database | CSV | TXT |
---|---|---|---|
is_proxy | | | |
risk_label | | | |
risk_score | | | |
risk_level | | | |
Proxy, Tor, VPN, and Relay Indicators
Identify IP roles such as VPN, proxy, Tor node, and private relay (Apple Relay, Cloudflare, etc.).
Detect Hosting Providers
Detect IPs associated with data centers, cloud services, bots, and scrapers to prevent critical and suspicious traffic.
Detect Residential Proxies
Tracks IP location (IPv4/IPv6) and provides detailed IP information, including proxy service type, last seen date, and percentage of active days.
Device Activity Monitoring
Detects traffic suspected of VPN behavior to determine whether suspicious behavior such as multiple location access or frequent IP switching occurs.
Identify Anycast IPs
Detect IP mappings of multiple servers around the world to obtain precise geographic location intelligence.
Identify Service Providers
Accurately locate the service names of VPN, proxy, and transit to help complete data insights.
WHOIS Data Insights
Verify that the IP belongs to a hosting provider by combining IP registration details and the WHOIS database.
Detect VPN Configurations
Verify active VPN configurations by detecting open ports and analyzing VPN-related files.
Unparalleled accuracy
IPnews' database uses data-driven high-precision positioning technology to accurately locate IPv4/IPv6 locations.
Real-time updates
We regularly update our database with the latest information, giving you real-time access to the latest data.
Real-time updates
We regularly update our database with the latest information, giving you real-time access to the latest data.
Data collection
Use detection networks and proprietary algorithms, combined with third-party verification, to collect relevant data extensively.
Data collection
Use detection networks and proprietary algorithms, combined with third-party verification, to collect relevant data extensively.
Data collection
Use detection networks and proprietary algorithms, combined with third-party verification, to collect relevant data extensively.
What is IP geolocation?
How does IP geolocation work?
How is IP geolocation used?
What IP risks can be identified?
How often is IP geolocation data updated?