VPN & Proxy Detection API
This API project is no longer maintained.
Our VPN and proxy detection API currently is currently free to any user for the time being. Although we plan to limit our API usage in the near future, we will soon be upgrading our server resources based on API plans.
Every 15 minutes our database is collecting data from various sources, where we detect and block VPN, proxies & Tor Nodes. All of our information are checked and verified by our system, while mismatched information are then verified manually. We strive to provide our clients with the most accurate information possible in order to protect their businesses.
Since our API is currently free to use, all of our server resources are being shared with other users. So, while our API currently does not limit API usage, we strongly encourage users to limit their API usage to a 1000 request a day.
Purpose of a VPN & Proxy Detection API?
Our API will detect IP addresses that are known for fraud, spam, and abuse, most commonly used with either a proxy, VPN, or Tor Node. The API would be perfect for sites who are interested in detecting the threat level of a specific user or by blacklisting users who are using either a proxy or VPN.
How are VPN & Proxies Detected?
Through our system, VPN are usually detected by commonly known hosting companies or data centers, where the system usually block the whole network range or even the whole network of the VPN, since majority of the time, VPN, are IP addresses are usually sequential or other VPN, proxies, or bots are runned on the hosting company's servers.
Like detecting VPN, the system also detect proxies by seeing if the proxy is hosted in a data center. But, in majority of the cases a proxy is usually not hosted by a hosting company, which makes it harder to detect. In order to combat this issue, our system gather fresh proxies from various sources, where the proxy are then stored in our database. In order to prevent false positives, especially for ISP who rotate their IP addresses, every few days our system checks to see if our proxy connection is still valid. If the proxy connection is still valid, the proxy is kept into our database, if the proxy has not been connecting for at least three months, the proxy information is then dropped from our database.