A Glimpse into the latest PX11 Proxy Detection Database released by IP2Location.com
The global leader in IP address geolocation technology, IP2Location, today announced the release of the IP2Proxy PX11 — IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat-Residential-Provider Database.
In the journey of providing high quality proxy information database, IP2Location continues to craft, analyze and process all data sources to improve the accuracy. We are seeing a strong growth and surge in the daily time spent on the internet over the past few years. With the growing concern of online security and data theft, technology is moving towards helping the internet users to retain their privacy. Consequently, proxy servers have become prevalent in most of the online activities.
Anonymous proxy servers are intermediate servers meant to hide the real identity or IP address of the requestor. Studies found that a large number of anonymous proxy users are generally responsible for online credit card fraud, forums and blogs spamming. Hackers are always on the lookout for ways to attack and commit cybercrime. The goal of IP2Proxy is typically to provide a solution that online users may use to detect suspicious traffics and prevent anonymous proxy usage.
One additional data field has been introduced in the new PX11, named Provider — name of VPN provider if available. IP2Proxy database comprises other information such as country, region or state, city, ISP, domain, usage type, ASN, last seen and threat. This product is derived based on a proprietary detection algorithm in parallel with evaluation of anonymous open proxy servers which are actively in use.
All of the databases are available in a highly optimized and flexible database format which is the binary format and CSV format that supports both IPv4 and IPv6 IP addresses. IP2Proxy is also available in web service and batch service too. Web services are widely used for exchanging data between applications or systems and interoperable over any programming language or operating system.
IP2Proxy Proxy Detection:
· PX1: IP-Country information
· PX2: IP-ProxyType-Country information
· PX3: IP-ProxyType-Country-Region-City information
· PX4: IP-ProxyType-Country-Region-City-ISP information
· PX5: IP-ProxyType-Country-Region-City-ISP-Domain information
· PX6: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType information
· PX7: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN information
· PX8: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen information
· PX9: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat Database
· PX10: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat-Residential Database
· [*NEW*] PX11: IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat-Residential-Provider Database
Proxy types supported:
- VPN: Anonymizing VPN services. These services offer users a publicly accessible VPN for the purpose of hiding their IP address.
- TOR: Tor Exit Nodes. The Tor Project is an open network used by those who wish to maintain anonymity.
- DCH: Hosting Provider, Data Center or Content Delivery Network. Since hosting providers and data centers can serve to provide anonymity, the Anonymous IP database flags IP addresses associated with them.
- PUB: Public Proxies. These are services which make connection requests on a user’s behalf. Proxy server software can be configured by the administrator to listen on some specified port. These differ from VPNs in that the proxies usually have limited functions compared to VPNs.
- WEB: Web Proxies. These are web services which make web requests on a user’s behalf. These differ from VPNs or Public Proxies in that they are simple web-based proxies rather than operating at the IP address and other ports level.
- SES: Search engine robots. These are search engine spiders or BOT engines that crawl or scrape a website.
- RES: Residential proxies. These services offer users proxy connections through residential ISP with or without the consents of peers to share their idle resources.
The threat data:
SPAM: Email and forum spammer. If the proxy has been detected as a source of email spam or forum spam, you will see this value in the threat column.
SCANNER: Network security scanner. When you see this value in the threat data, you should be more alert as someone or an organization is probing your server and network for vulnerabilities.
BOTNET: Malware infected devices. Botnets are often used for various nefarious tasks such as performing a Distributed Denial of Service (DDoS) attacks on servers owned by governments, militaries or big organizations.
The Provider: Name of VPN provider if available.
For further information, please visit https://www.ip2location.com/database/px11-ip-proxytype-country-region-city-isp-domain-usagetype-asn-lastseen-threat-residential-provider