IpForensics
HomeGoto Dashboard
  • 📖Introduction
  • Protocols
    • HTTP Json Protocol
    • Response headers
    • Error Codes
  • Features
    • Pay-As-You-Go
    • API Security
    • HTTPS
  • Api Response Data
    • 📶Mobile Carrier
    • 🏥ASN
    • 📊General
    • ⏲️Timezone
    • 💵Currency
    • 👨‍💻Threat Detector
    • 🌐Company
    • 🌏Geolocation
    • 🌍Advance Geolocation
    • 💻Device Information
    • ✈️IATA/ICAO
  • API
    • 🚀Intro
    • 📊IP & Threat Intelligence API
      • Single Lookup
      • Origin Lookup
    • 💹Exchange Rate API
      • Currency Endpoint
      • Live Rate Endpoint
      • Historical Rate Endpoint
      • Currency Conversion Endpoint
      • Currency Swap Endpoint
  • Code Implantation
    • Block Automated Visits From Hosting Providers
    • Block VPN/Proxy and Tor users
    • Redirect by Country and Location Offers
    • Content Personalisation
    • Get the location from an IP Address in Javascript
    • How to get a client's IP address using JavaScript
    • HTML5 Geolocation with IpForensics fallback
    • Blocking Users by Country
    • Detecting Users Currency or Currency Personalisation
    • Preventing Free Trial Abuse
    • Device-Based Ads and App Binary
    • Detect Users Device/Computer and Operating System
    • Detect visitors from EU countries
    • How to detect and prevent credit card fraud
    • How to convert amounts to website visitor currency
  • MISC
    • Changelog
    • FAQs
    • Troubleshooting
    • API Status
    • Rate Limits
Powered by GitBook
On this page

Was this helpful?

  1. Code Implantation

Preventing Free Trial Abuse

PreviousDetecting Users Currency or Currency PersonalisationNextDevice-Based Ads and App Binary

Last updated 2 years ago

Was this helpful?

IpForensics might be used to protect your app from trial abuse or from users trying to get around country restrictions by using Tor or proxies.

Below is a Javascript code snippet that could be used to forbid account creation to anonymous users (i.e. users detected as using Tor, a proxy, or a VPN):

// Getting the anonymity status from the user's IP
$.get("https://ipforensics.net/api/v1/origin?apikey=APIKEY", function (response) {
  if (response.meta_data.threat_detector.is_anonymous || response.meta_data.threat_detector.is_vpn || response.meta_data.threat_detector.is_tor || ...) {
    alert("You are not allowed to create an account.");
    }
}, "jsonp");

You can chain multiple checks

response.meta_data.threat_detector.is_anonymous || response.meta_data.threat_detector.is_vpn || response.meta_data.threat_detector.is_tor || ...

IpForensics also offers the option of blocking users whose IP's have been reported repeatedly by admins across the Internet for malicious activity or spam. For this purpose, you can respectively use the fields is_attacker and is_abuser.

Always reference the for complete response result

API endpoint