👨💻Threat Detector
We provide detailed and accurate Timezone data, adjusted for DST where applicable.
Sample Response
Field | Description |
---|---|
is_abuser | is true if the IP address is a known source of abuse i.e. spam, harvesters, registration bots and other nuisance bots etc |
is_attacker | is true if an IP address is a known source of malicious activity, i.e. attacks, malware, botnet activity etc |
is_bogon | Boolean indicating whether the IP Address is a Bogon: an unassigned, unaddressable IP address. |
is_cloud_provider | Boolean indicating whether the IP address is used for hosting purposes (e.g. a node from Akamai, Cloudflare, Google Cloud Platform, Amazon EC2, and more). |
is_proxy | Boolean indicating whether the IP Address is a known proxy. It includes HTTP/HTTPS/SSL/SOCKS/CONNECT and transparent proxies. |
is_relay | Boolean indicating whether the IP Address is a known relay. Relay IP addresses are not designed to bypass geo-controls but instead pool multiple users behind the same IP. At this time, only Apple Private Relay IP addresses are detected. |
is_tor | Boolean indicating whether the IP Address is a Tor relay: exit relay node, middle relay node or a bridge. |
is_tor_exit | Boolean indicating whether the IP Address is a Tor exit relay node. |
is_vpn | Returns |
is_anonymous | Boolean with |
is_threat | Boolean with |
Last updated