History

Check IP Address

Perform an IP fraud rating assessment using leading anti-fraud systems

The report is generated after querying popular anti-fraud systems used by corporations to assess users for fraud potential or suspicious activities.

Banknote

Save up to $600 on checks

Get all the tools for professional security assessment, anonymity, and leak detection

More details

Cost of checking: $0.15

Arrow Icon

Rating


Main data

Source IP address


Fraud rating


Penalties for abuses (48 hours)


Detected as Proxy

IP address data

Country


City


Provider

Number of checks

Number of IP address checks in the last 60 days


Number of IP subnet checks in the last 60 days

Arrow Icon

Black lists


IPQualityScoreIPQualityScore

The data was obtained from the anti-fraud system IPQS

VPN service

IP is part of a well-known VPN network


VPN connection

Active VPN connection established


TOR node

IP is part of the TOR output node


TOR connection

Active TOR connection established


Used by a malicious actor

Incidents of abuse or suspicious activity have been detected


Used for automation (Abuse Velocity)

Frequency of IP address usage in web action automation scenario


Used by bots

The IP address is used by bots


Web crawler (search bot)

Googlebot, Bingbot, Yandex, Facebook, etc.

Other sourcesCyberYozh Logo

The data is compiled from several responses of anti-fraud systems

Personal identity concealment

The user is defined as anonymous


Participates in attacks

DDOS, malware, botnet activity and others


Data center

The IP belongs to a datacenter, including cloud providers


Bogon Network (spoofed IP address)

IP addresses are non-routable on the Internet


iCloud Private Relay

The IP belongs to the iCloud Private Relay service (the real IP of the user is hidden)


Blacklist (OSINT)

From open data sources (118 lists)

Other sourcesIPQualityScore

Geolocation

IP


Is EU


City


Region


Region Code


Country Name


Country Code


Continent Name


Continent Code


Latitude


Longitude


Postal


Calling Code


Emoji Flag


Emoji Unicode

Timezone

Emoji Flag


Abbr


Offset


Is dst


Current Time

Currency

Name


Code


Symbol


Native


Plural

Threat Intelligence

is Tor


is Proxy


is Anonymous


is Known Attacker


is Known Abuser


is Threat


is Bogon

Basic ASN

ASN


Name


Domain


Route


Type

IPQualityScoreIPQualityScore

Proxy


Host


ISP


Organization


ASN


Country Code


City


Region


Timezone


Latitude


Longitude


Is Crawler


Connection Type


Recent Abuse


Abuse Velocity


Bot Status


Vpn


Tor


Active Vpn


Active Tor


Mobile


Fraud Score


Request ID


Operating System


Browser


Device Brand


Device Model


Transaction Details

Frequently Asked Questions

What is the Fraud Score of an IP address and how does it affect the trust rating of web services?

This is a metric that evaluates the likelihood of a given IP address being associated with fraudulent or suspicious activity.

It is calculated by analyzing historical data, including past fraud incidents, IP change frequency, and connection type and settings (e.g., VPN or Proxy usage).

The impact on the trust rating of web services is that IP addresses with high Fraud Score (above 75 points) may be automatically blocked when trying to log in to banking systems, online stores and other web services, or require additional verification during registration/authorization (CAPTCHA, confirmation by phone number and others).


What are the dangers of Proxy status detection for your IP?

If your address is detected as a Proxy, it may make web services suspicious, as these IPs are often used to bypass geographic restrictions or anonymize Internet activity. This may result in blocking or restricting access to services.


How does a VPN service differ from a VPN connection under IP verification?

A VPN service provides the infrastructure, including servers and software, to create secure and anonymous connections over the internet.

On the other hand, a VPN connection is an active network session of a user that uses this infrastructure to mask the user's real IP address.

VPN connections can make it difficult to authenticate true location and other data, making it more difficult for anti-fraud systems to determine the source of traffic, and therefore increase Fraud Score.


What is Abuse Velocity?

This is a parameter that measures how quickly and often a particular IP address or device is targeted by complaints (online services) or detected in abusive (abusive) activity.

This metric helps antifraud systems identify IP addresses and devices that may be involved in large-scale or recurring fraudulent transactions, which increases their risk and can lead to blacklisting.

The values can be: high, medium, low or none

If your level is high or medium, you risk losing your account to web automation.


How do antifraud systems blacklist IP addresses?

Anti-fraud systems continuously collect and analyze large amounts of Internet traffic data to generate blacklists of IP addresses that may be associated with fraudulent or suspicious activity.

  1. Data collection: systems collect information from a variety of sources, including user and web service complaints, collaboration with other organizations, and public and private databases on fraudulent activity.
  2. Activity analysis: Collected data is analyzed to identify patterns and trends that may indicate fraud. This includes assessing behavioral patterns such as frequent IP address changes, short sessions or activity at unusual time frames, and applying machine learning algorithms to identify potential risks.
  3. Continuous update: Lists are regularly updated to reflect the latest threats and fraud techniques. This keeps the data up-to-date and allows security systems to respond quickly to new challenges.
  4. Integration and Action: Generated lists are integrated into customer security systems such as web services and banking systems. They are used to automatically block access to IP addresses on the list or to initiate additional checks and verifications when suspicious activity is detected.

What sources of IP address are there?

Residential: These are owned by individuals and are typically used for home Internet connections. They are rarely considered suspicious as they are most often associated with regular Internet users.

Corporate: these addresses may indicate Internet use in office buildings or large companies, which makes the address more suspicious.

Mobile: IP addresses allocated by mobile operators for connection via mobile devices. These addresses may change frequently and may be associated with geographically mobile users.

Data Center: These addresses are often used for hosting websites, cloud services, or virtual private networks (VPNs). They can be suspicious because they are often used to anonymize the source of traffic or for automated tasks such as data scraping or bot activity.

Education: IP addresses belonging to educational institutions such as schools or universities.


How does country, city of IP address affect the behavior of anti-fraud systems and web services?

The country and city associated with an IP address can significantly affect the processing of user requests by anti-fraud systems.

IP addresses from countries or regions with high levels of fraudulent activity may be subject to more stringent scrutiny. For example: Nigeria, Russia, China, Ukraine, Brazil and others.

Also, different countries have different laws and regulations regarding internet activity, which is also taken into account in the analysis.


What is a web crawler (search engine robot)?

Web crawlers are programs that automatically navigate the Internet, collecting data from web pages.

This data is used to index content in search engines, which helps users find relevant information.

Crawlers can also be used to monitor changes to sites or to gather statistics.


What is Bogon Network?

Bogon Network consists of IP addresses that should not be used on the Internet because they are not assigned for active use.

The use of such addresses in transactions or requests may be a sign of fraudulent activity, as they are often used to create the illusion of legitimacy.


Am I breaking any laws by making an anti-fraud request?

We pay over $12,000 monthly for the use of anti-fraud systems.

When you make checks on our platform you are doing the same action as Google, Amazon, Microsoft and other world leaders.

All checks are carried out within legitimate procedures and in compliance with confidentiality and data protection policies.