IP Security Database – Cyber Threat Intelligence at Scale for Safer Networks

Enable advanced threat protection by integrating IP security datasets into your systems, allowing you to detect malicious IPs, block attackers, and safeguard your network in real time.

IP Security Database

Start ipEnd ipThreat scoreIs torIs proxyProxy typeProxy providerIs anonymousIs known attackerIs botIs spamIs cloud providerCloud provider
155.254.30.80155.254.30.805falsefalseN/AN/AfalsefalsefalsefalsetrueH4Y Technologies LLC
190.28.140.28190.28.140.2845falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
143.55.251.64143.55.251.6445falsetruePROXYZyte ProxytruefalsefalsefalsefalseN/A
95.8.37.9495.8.37.9445falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
5.249.30.835.249.30.8345falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
106.76.252.4106.76.252.445falsetruePROXYEvomi ProxytruefalsefalsefalsefalseN/A
pricing backgroundEclipse Top RightEclipse Top Left

Products

IP Security Database

The IP Security Database package delivers daily snapshots of IP security details, generated at 5 AM UTC for the previous day. Each snapshot delivers key IP security intelligence, showing whether an IP is spam, a bot, a proxy (with provider details), a cloud service, anonymous, a known attacker, and more.

Features

Threat Score
VPN and Proxy Detection
Bot and Spam Detection
API Access
Image

Features

What the IP Security Database Offers

Delivering daily, actionable cybersecurity intelligence with detailed IP attributes and more.

Feature icon

Threat Score

Our composite threat score combines VPN use, Tor status, bot, spam, and more to instantly flag suspicious IPs.

Feature icon

VPN and Proxy Detection

The Security Database delivers precise VPN and proxy detection, identifying anonymizer types.

Feature icon

Bot and Spam Detection

The security database instantly detects spam and bot IPs, analyzing malicious patterns.

Feature icon

API Access

APIs allow you to check the latest IP security data snapshot status and download it in gzip CSV format.

Products

Custom IP Security Solutions

Tailored IP security solutions designed to detect threats and adapt to your unique infrastructure.

Custom IP Security Solution

In a customized IP Security solution, we integrate IP Whois, reverse IP lookup, IP geolocation, and more with the IP security database based on user requirements. All datasets are interconnected to provide a flexible structure, available as CSV files or MaxMind (MMDB) format. Customized solutions are also offered as daily snapshots.

monitoring

Use Cases

IP Security Data in Action

Discover IP Security use cases, from fraud prevention to network protection.

Feature icon

Account & Payment Fraud Detection

Reject or step-up verify logins / transactions originating from VPNs, Tor exits, known botnets, or high-risk proxies.

Feature icon

Streaming & Content Licensing

Enforce geo-rights by denying access when the viewer hides behind VPN, Tor, or residential proxy services.

Feature icon

SOAR / SIEM Automation

Enrich logs with instant IP threat context, auto-open tickets or deploy firewall rules for suspicious traffic.

Feature icon

Regulatory Compliance - KYC

Detect masked or sanctioned-region traffic to trigger enhanced due diligence or auto-deny service.

Feature icon

Network Protection

Safeguard infrastructure by linking IP intelligence with firewalls, intrusion systems, and monitoring tools.

Feature icon

Threat Intelligence

Leverage IP data to uncover malicious actors and strengthen proactive defense strategies across networks.

Request demo background

Protect your business with customized IP Security block fraud, detect threats, and safeguard your network today.

pricing background

Documentation

IP Security Snapshot

Download the IP Security snapshot data for a specific day by using the date parameter. The response is a gzipped CSV file containing IP security details, such as whether the IP is flagged as spam, associated with Tor, a cloud provider, a bot, anonymous, and more. The date of the latest prepared snapshot can be retrieved via the Status API endpoint.

Authorization

You can make authorized requests to our API by passing API key as a query parameter. To get your API key, login to our billing dashboard and get your API key! If your API key has been compromised, you can change it by clicking on reset button in billing dashboard.

Query Parameters

Required
  • apiKey
    Get your API key from our billing dashboard.
  • date
    Use the date parameter in yyyy-MM-dd (2026-01-26) format to get the snapshot of that day.

Request

shellnodejsjavapythonphprubyjscsharpgocswiftjquery
SHELL
Loading request...

Response

Loading response...

Status Codes

Success Codes
  • 200  Request is processed successfully.
Failure Codes
  • 400  Please pass apiKey param value.
  • 400  Please provide the date parameter
  • 400  Invalid date parameter
  • 401  Api record not found.
  • 401  Provided API key is inactive.
  • 401  Please buy database subscription.
  • 401  Your database subscription plan is inactive.
  • 401  You cannot download file.
  • 401  You have exceeded the download limit of 20000.
  • 401  Suspicious Activity.
  • 404  File is not available of this date.
  • 413  Please upgrade your plans.

IP Security Snapshot Status

Use the endpoint to get the status of the latest IP Security snapshot. The JSON output contains the snapshot name, creation date, and expected deletion date.

Authorization

You can make authorized requests to our API by passing API key as a query parameter. To get your API key, login to our billing dashboard and get your API key! If your API key has been compromised, you can change it by clicking on reset button in billing dashboard.

Query Parameters

Required
  • apiKey
    Get your API key from our billing dashboard.

Request

shellnodejsjavapythonphprubyjscsharpgocswiftjquery
SHELL
Loading request...

Response

Loading response...

Status Codes

Success Codes
  • 200  Request is processed successfully.
Failure Codes
  • 400  Please pass apiKey param value.
  • 401  Api record not found.
  • 401  Provided API key is inactive.
  • 401  You cannot download file.
  • 401  Your account is deactivated.
  • 401  You have exceeded the download limit of 20000.
  • 401  Suspicious Activity.
  • 413  Please upgrade your plans.

FAQs

FAQs about the IP security database - risk signals, reputation fields, and how indicators are updated.

What is IP Security Database?

The IP Security Database is a cybersecurity resource that provides detailed information about IP addresses. It identifies whether an IP is associated with bots, spam, known attackers, cloud providers, or other categories. By offering these insights, the database helps strengthen cybersecurity defenses, secure networks against malicious activity, and block harmful IP addresses effectively.

How can we know when the IP Security Database snapshot is ready for the day?

You can check the status endpoint to see if the latest snapshot has been prepared. Once it is available, the IP Security Snapshot API can be used to download the data and keep your cybersecurity defenses up to date.

How does the IP Security Database help in securing the network?

The IP Security Database enhances cybersecurity by providing detailed information about IP addresses, such as whether they are linked to spam, bots, VPNs, proxies, anonymous sources, or known attackers. With this intelligence, organizations can identify and block malicious IPs attempting to access their networks. By integrating the database into security systems, it becomes easier to prevent unauthorized traffic, reduce exposure to threats, and maintain a secure and reliable network environment.

Ready to get started?

Join now and claim 500 credits for free!

Elevate your cybersecurity strategy with our all-in-one domain and IP intelligence platform empowering analysts, researchers, and brand owners with real-time WHOIS, DNS, IP, and subdomain insights.

Sign Up For Free