
This framework started as a customer conversation. While helping a client interpret IPinfo’s VPN, I realized something: many teams face the same challenge. They see VPN or hosting flags in their data, but aren’t sure how to translate them into meaningful, context-aware actions. This thought evolved into the framework below.
When it comes to classifying traffic, binary decisions rarely work. Block all VPNs, and you’ll frustrate remote employees and privacy-conscious users. Allow everything that isn’t datacenter-based, and sophisticated VPN or automation traffic will slip through.
The goal of this framework isn’t to decide between “block all” or “allow all.” It’s to understand what the signals are actually telling you, so you can make decisions that reflect your business context, user base, and risk tolerance.
Important note: Every organization’s situation is different. What follows is a guiding framework, not a prescription. It’s designed to help you interpret IPinfo’s signals in a structured way, then adapt them to your own use case.
IPinfo's Plus provides three key signals that, when combined, create a nuanced picture of traffic origins:
These signals combine to create five distinct categories of traffic, each with different characteristics and implications for your security and business policies.
Signals:
What it is: These are IPs in datacenter or hosting networks where we detect VPN protocols, but we haven't identified a specific commercial VPN provider. This typically includes self-hosted VPNs running on VPS instances, newly-launched VPN services not yet in our database, or unknown VPN infrastructure.
Examples:
Characteristics: These IPs often indicate deliberate infrastructure setup. Users in this category have typically made an active choice to configure their own VPN rather than using a commercial service, which can signal different intent depending on your use case.
Signals:
What it is: IPs where we see VPN activity but they're not associated with hosting providers or known commercial services. These are often legitimate privacy use cases.
Examples:
Characteristics: This is where most false positives occur when organizations apply blanket VPN blocks. This category represents users who are typically protecting their privacy in legitimate contexts rather than attempting to evade detection or violate policies.
Signals:
What it is: Traditional commercial VPNs operating from datacenter infrastructure. These are the well-known consumer VPN services running servers in hosting facilities.
Examples:
Characteristics: These users are deliberately masking their location using mainstream commercial services. Their intent varies widely: from privacy protection to geographic restriction bypass to fraud attempts. The name field provides visibility into which specific provider is being used, which can inform your policy decisions.
Delve into different types of anonymous IPs and how to detect them.
Signals:
What it is: IPs from datacenters or hosting providers where we don't specifically detect VPN protocols. This is the most diverse category.
Examples:
Characteristics: This category requires the most nuanced interpretation because datacenter IPs serve many legitimate purposes. Legitimate services and automation exist alongside potentially problematic actors. The key is that hosting infrastructure alone doesn't indicate VPN usage, many legitimate business operations originate from datacenters.
Signals:
What it is: This category includes commercial and peer-to-peer (P2P) VPN services operating from ISP or residential networks instead of datacenters. Rather than using centralized hosting, these VPNs route traffic through volunteer or leased residential nodes, often blending in with ordinary consumer traffic.
Examples:
Why it matters: These networks intentionally avoid hosting-based detection by appearing as normal consumer traffic. From a classification perspective, this category represents an early form of the same principle later expanded by Residential Proxy networks: routing traffic through consumer or ISP-based IP space to appear as ordinary residential users. Residential proxy systems take this idea further, industrializing and automating it at scale across millions of devices.
Characteristics
The appropriate response to each category depends entirely on your specific business requirements, risk tolerance, and user base. A streaming platform enforcing content licensing has different needs than a SaaS application serving remote workers, which differs from a fraud prevention system.
When interpreting these signals for your use case, consider:
Business Context. What is your primary concern? Geographic licensing compliance? Fraud prevention? Bot management? Data quality? Different concerns weight these categories differently.
User Base. Do you serve international travelers? Remote workers? Privacy-conscious users? Your legitimate user patterns should inform how you interpret each category.
Risk Tolerance. How much false positive rate is acceptable? High-security environments may accept more false positives than consumer-facing platforms.
Layered Signals. These VPN/hosting signals work best when combined with other indicators: account history, behavioral patterns, device fingerprints, and transaction characteristics.
Before implementing any policies, analyze your traffic distribution. Understanding your baseline helps you make informed decisions.
Even when not taking action, logging which category each IP falls into provides valuable insights for:
A known, trusted account exhibiting commercial VPN signals tells a different story than a brand-new account with self-hosted VPN in a datacenter.
If your policies result in blocking or additional verification, clear communication helps users understand what's happening and reduces support burden.
Track metrics like:
Compare features across IPinfo's IP privacy detection products.
These five categories provide a framework for interpretation, but different scenarios often require nuance:
The signals provide context: how you use that context depends on your specific requirements and risk profile.
Effective interpretation of VPN and hosting signals isn't about binary classification: it's about understanding context. By recognizing the five distinct categories created by IPinfo's three core signals (is_hosting, is_vpn, service), you can distinguish between:
It’s also important to recognize how these categories continue to evolve. Commercial and P2P VPNs operating from ISP-based networks paved the way for today’s residential proxy ecosystems, which scale the same concept through distributed consumer devices.
As anonymization infrastructure becomes more decentralized, continuous measurement and interpretation become essential for maintaining accuracy.
The right interpretation depends on your use case while the foundation remains the same: IPinfo provides the data and evidence; how you interpret and act on it should reflect your specific business context, user base, and risk tolerance.
Explore IPinfo Plus for detailed privacy detection data.

Daniel Quandt leads the solutions engineering team at IPinfo, where he helps customers get the most out of internet data. Before IPinfo, he worked in data science in the hospitality industry.