IpForensics
HomeGoto Dashboard
  • ๐Ÿ“–Introduction
  • Protocols
    • HTTP Json Protocol
    • Response headers
    • Error Codes
  • Features
    • Pay-As-You-Go
    • API Security
    • HTTPS
  • Api Response Data
    • ๐Ÿ“ถMobile Carrier
    • ๐ŸฅASN
    • ๐Ÿ“ŠGeneral
    • โฒ๏ธTimezone
    • ๐Ÿ’ตCurrency
    • ๐Ÿ‘จโ€๐Ÿ’ปThreat Detector
    • ๐ŸŒCompany
    • ๐ŸŒGeolocation
    • ๐ŸŒAdvance Geolocation
    • ๐Ÿ’ปDevice Information
    • โœˆ๏ธIATA/ICAO
  • API
    • ๐Ÿš€Intro
    • ๐Ÿ“ŠIP & Threat Intelligence API
      • Single Lookup
      • Origin Lookup
    • ๐Ÿ’นExchange Rate API
      • Currency Endpoint
      • Live Rate Endpoint
      • Historical Rate Endpoint
      • Currency Conversion Endpoint
      • Currency Swap Endpoint
  • Code Implantation
    • Block Automated Visits From Hosting Providers
    • Block VPN/Proxy and Tor users
    • Redirect by Country and Location Offers
    • Content Personalisation
    • Get the location from an IP Address in Javascript
    • How to get a client's IP address using JavaScript
    • HTML5 Geolocation with IpForensics fallback
    • Blocking Users by Country
    • Detecting Users Currency or Currency Personalisation
    • Preventing Free Trial Abuse
    • Device-Based Ads and App Binary
    • Detect Users Device/Computer and Operating System
    • Detect visitors from EU countries
    • How to detect and prevent credit card fraud
    • How to convert amounts to website visitor currency
  • MISC
    • Changelog
    • FAQs
    • Troubleshooting
    • API Status
    • Rate Limits
Powered by GitBook
On this page

Was this helpful?

  1. Features

HTTPS

PreviousAPI SecurityNextMobile Carrier

Last updated 2 years ago

Was this helpful?

The IpForensics API supports HTTP and HTTPS protocols. Although HTTP is kept for legacy reasons, we recommend calling all endpoints with HTTPS to ensure privacy, security and best performances.

Please also note that data sent using HTTPS is secured via Transport Layer Security protocol (TLS), which provides three key layers of protection:

  1. Authentication โ€” proves that your users communicate with the intended website. It protects against man-in-the-middle attacks and builds user trust, which translates into other business benefits.

  2. Encryption โ€” encrypting the exchanged data to keep it secure from eavesdroppers. That means that while the user is browsing a website, nobody can "listen" to their conversations, track their activities across multiple pages, or steal their information.

  3. Data integrity โ€” data cannot be modified or corrupted during transfer, intentionally or otherwise, without being detected.

For security reasons, you need to use at least TLS 1.2 to communicate with the IpForensics API in a secure way. Certificate generation is currently managed by Cloudflare. The cipher suites supported depending on the versions of TLS are described on the next page:

Cipher suites ยท Cloudflare SSL/TLS docsCipher suites ยท Cloudflare SSL/TLS docs
Logo