Privacy Detection API
Our Privacy Detection API detects various methods used to mask a user's true IP address, including VPN detection, proxy detection, tor, relay usage, or a connection via a hosting provider, which could potentially be used to tunnel traffic, and mask the true IP address.
We needed to further contextualize Internet scanners, crawlers, and bots. Origin networks, data centers, ASNs, and countries are a huge component of that. We were looking for a faster, more developer-friendly alternative to existing geo-IP providers. A close friend of mine hit the IPinfo API with cURL, and I saw all the information we needed.
Billion API requests last month
Accurate & up-to-date
privacy detection data
We perform custom full internet wide scans to detect almost 10 million active VPNs. This is combined with data on public SOCKS and HTTP proxies, tor exit nodes, and our own IP usage type classification to determine which IP ranges belong to hosting providers. The data is updated regularly, so the results are always fresh.
- Hosting service
Want to leverage the power of raw datasets? Try our Downloadable Database.
Our database downloads contain the same accurate IP address information available with our APIs. These downloads are available in any format (eg. CSV, JSON, MMBD) with additional options to customize the fields.Read about data downloads
Made for developers
Trusted by enterprises
Our database is built, maintained, and supported by our in-house team of developers and engineers. These data experts are ready to troubleshoot problems, build unique use cases, and create additional enterprise solutions.
Our API integrations merge the power of IPinfo’s proprietary IP address database with other industry-leading platforms. Use your IP WHOIS data at scale with our supported integrations, such as Snowflake, Splunk, Maltego, and beyond.
We offer libraries for the most commonly used programming languages and frameworks. Check out our documentation to facilitate easier setup.
Frequently Asked Questions
How do Anonymous or Masked IPs work?
IP address users can mask their identity by using a VPN, a proxy, tor nodes, relay usage, or hosting providers.
What is a VPN, proxy, or tor node?
How does Apple Private Relay work?
Apple Private Relay hides some IP details but is still geo-aware. This means you can use the geolocation details for website personalization, streaming restrictions, threat intelligence, and more.
How do you differentiate between location-aware and masked IPs?
Our API response has a separate classification for Apple Private Relay to help users differentiate between geo-aware and masked IPs.
A few ways to use our
Privacy Detection API
- Filter malicious traffic by blocking bots and spammers
- Prevent web scraping by blocking proxies and requests from servers
- Enforce content access restrictions by detecting VPNs
- Fight fraud by flagging users who are masking their identity