Check IP Address
Perform an IP fraud rating assessment using leading anti-fraud systems
The report is generated after querying popular anti-fraud systems used by corporations to assess users for fraud potential or suspicious activities.
Save up to $600 on checks
Get all the tools for professional security assessment, anonymity, and leak detection
More detailsCost of checking: $0.15
Rating
Main data
Source IP address
—
Fraud rating
—
Penalties for abuses (48 hours)
—
Detected as Proxy
—
IP address data
Country
—
City
—
Provider
—
Number of checks
Number of IP address checks in the last 60 days
—
Number of IP subnet checks in the last 60 days
—
Black lists
IPQualityScore
The data was obtained from the anti-fraud system IPQS
VPN service
—
IP is part of a well-known VPN network
VPN connection
—
Active VPN connection established
TOR node
—
IP is part of the TOR output node
TOR connection
—
Active TOR connection established
Used by a malicious actor
—
Incidents of abuse or suspicious activity have been detected
Used for automation (Abuse Velocity)
—
Frequency of IP address usage in web action automation scenario
Used by bots
—
The IP address is used by bots
Web crawler (search bot)
—
Googlebot, Bingbot, Yandex, Facebook, etc.
Other sources
The data is compiled from several responses of anti-fraud systems
Personal identity concealment
—
The user is defined as anonymous
Participates in attacks
—
DDOS, malware, botnet activity and others
Data center
—
The IP belongs to a datacenter, including cloud providers
Bogon Network (spoofed IP address)
—
IP addresses are non-routable on the Internet
iCloud Private Relay
—
The IP belongs to the iCloud Private Relay service (the real IP of the user is hidden)
Blacklist (OSINT)
—
From open data sources (118 lists)
Other sources
IP
—
Is EU
—
City
—
Region
—
Region Code
—
Country Name
—
Country Code
—
Continent Name
—
Continent Code
—
Latitude
—
Longitude
—
Postal
—
Calling Code
—
Emoji Flag
—
Emoji Unicode
—
Emoji Flag
—
Abbr
—
Offset
—
Is dst
—
Current Time
—
Name
—
Code
—
Symbol
—
Native
—
Plural
—
is Tor
—
is Proxy
—
is Anonymous
—
is Known Attacker
—
is Known Abuser
—
is Threat
—
is Bogon
—
ASN
—
Name
—
Domain
—
Route
—
Type
—
IPQualityScore
Proxy
—
Host
—
ISP
—
Organization
—
ASN
—
Country Code
—
City
—
Region
—
Timezone
—
Latitude
—
Longitude
—
Is Crawler
—
Connection Type
—
Recent Abuse
—
Abuse Velocity
—
Bot Status
—
Vpn
—
Tor
—
Active Vpn
—
Active Tor
—
Mobile
—
Fraud Score
—
Request ID
—
Operating System
—
Browser
—
Device Brand
—
Device Model
—
Transaction Details
—
Frequently Asked Questions
What is the Fraud Score of an IP address and how does it affect the trust rating of web services?
This is a metric that evaluates the likelihood of a given IP address being associated with fraudulent or suspicious activity.
It is calculated by analyzing historical data, including past fraud incidents, IP change frequency, and connection type and settings (e.g., VPN or Proxy usage).
The impact on the trust rating of web services is that IP addresses with high Fraud Score (above 75 points) may be automatically blocked when trying to log in to banking systems, online stores and other web services, or require additional verification during registration/authorization (CAPTCHA, confirmation by phone number and others).
What are the dangers of Proxy status detection for your IP?
If your address is detected as a Proxy, it may make web services suspicious, as these IPs are often used to bypass geographic restrictions or anonymize Internet activity. This may result in blocking or restricting access to services.
How does a VPN service differ from a VPN connection under IP verification?
A VPN service provides the infrastructure, including servers and software, to create secure and anonymous connections over the internet.
On the other hand, a VPN connection is an active network session of a user that uses this infrastructure to mask the user's real IP address.
VPN connections can make it difficult to authenticate true location and other data, making it more difficult for anti-fraud systems to determine the source of traffic, and therefore increase Fraud Score.
What is Abuse Velocity?
This is a parameter that measures how quickly and often a particular IP address or device is targeted by complaints (online services) or detected in abusive (abusive) activity.
This metric helps antifraud systems identify IP addresses and devices that may be involved in large-scale or recurring fraudulent transactions, which increases their risk and can lead to blacklisting.
The values can be: high, medium, low or none
If your level is high or medium, you risk losing your account to web automation.
How do antifraud systems blacklist IP addresses?
Anti-fraud systems continuously collect and analyze large amounts of Internet traffic data to generate blacklists of IP addresses that may be associated with fraudulent or suspicious activity.
- Data collection: systems collect information from a variety of sources, including user and web service complaints, collaboration with other organizations, and public and private databases on fraudulent activity.
- Activity analysis: Collected data is analyzed to identify patterns and trends that may indicate fraud. This includes assessing behavioral patterns such as frequent IP address changes, short sessions or activity at unusual time frames, and applying machine learning algorithms to identify potential risks.
- Continuous update: Lists are regularly updated to reflect the latest threats and fraud techniques. This keeps the data up-to-date and allows security systems to respond quickly to new challenges.
- Integration and Action: Generated lists are integrated into customer security systems such as web services and banking systems. They are used to automatically block access to IP addresses on the list or to initiate additional checks and verifications when suspicious activity is detected.
What sources of IP address are there?
Residential: These are owned by individuals and are typically used for home Internet connections. They are rarely considered suspicious as they are most often associated with regular Internet users.
Corporate: these addresses may indicate Internet use in office buildings or large companies, which makes the address more suspicious.
Mobile: IP addresses allocated by mobile operators for connection via mobile devices. These addresses may change frequently and may be associated with geographically mobile users.
Data Center: These addresses are often used for hosting websites, cloud services, or virtual private networks (VPNs). They can be suspicious because they are often used to anonymize the source of traffic or for automated tasks such as data scraping or bot activity.
Education: IP addresses belonging to educational institutions such as schools or universities.
How does country, city of IP address affect the behavior of anti-fraud systems and web services?
The country and city associated with an IP address can significantly affect the processing of user requests by anti-fraud systems.
IP addresses from countries or regions with high levels of fraudulent activity may be subject to more stringent scrutiny. For example: Nigeria, Russia, China, Ukraine, Brazil and others.
Also, different countries have different laws and regulations regarding internet activity, which is also taken into account in the analysis.
What is a web crawler (search engine robot)?
Web crawlers are programs that automatically navigate the Internet, collecting data from web pages.
This data is used to index content in search engines, which helps users find relevant information.
Crawlers can also be used to monitor changes to sites or to gather statistics.
What is Bogon Network?
Bogon Network consists of IP addresses that should not be used on the Internet because they are not assigned for active use.
The use of such addresses in transactions or requests may be a sign of fraudulent activity, as they are often used to create the illusion of legitimacy.
Am I breaking any laws by making an anti-fraud request?
We pay over $12,000 monthly for the use of anti-fraud systems.
When you make checks on our platform you are doing the same action as Google, Amazon, Microsoft and other world leaders.
All checks are carried out within legitimate procedures and in compliance with confidentiality and data protection policies.