New PX9 & PX10 IP2Proxy Proxy Detection packages to battle in high-threat environment

IP2Proxy PX9 & PX10 includes detection of threat and residential proxies
By: IP2Location
SARASOTA, Fla. - July 21, 2020 - PRLog --, today is excited to announce the new release of PX9 – PX10 for IP2Proxy Proxy Detection Database which are available in IP2Proxy web services and batch services too.

Proxy servers can allow access to sites that might normally restrict you based on IP address range. New proxies popping up every day has become one of the most challenging tasks for organizations in securing their networks. The rise of anonymous proxies makes the detection even more difficult and challenging.

There is a new column called threat released in PX9 IP2Proxy™ IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat Database which contains a description of the types of detected threats from the listed proxies. This makes PX9 a vital tool in the arsenal of any webmaster, server administrator, forum operator, etc. It comprises information such as country, region or state, city, ISP, domain, usage type, ASN, last seen and threat - the newly added column which will return SPAM/SCANNER/BOTNET.

PX10 IP2Proxy™ IP-ProxyType-Country-Region-City-ISP-Domain-UsageType-ASN-LastSeen-Threat-Residential Database is the most comprehensive package which includes detection of residential proxies, making it a highly indispensable tool in the online merchants' fraud detection routine. By checking the proxy_type field for the value RES, they can easily filter out these IP addresses.

The threat data:
SPAM: Email and forum spammer. If the proxy has been detected as a source of email spam or forum spam, you will see this value in the threat column.
SCANNER: Network security scanner. When you see this value in the threat data, you should be more alert as someone or an organization is probing your server and network for vulnerabilities.
BOTNET: Malware infected devices.  Botnets are often used for various nefarious tasks such as performing a Distributed Denial of Service (DDoS) attacks on servers owned by governments, militaries or big organizations.

IP2Proxy is generally being used to detect suspicious traffics and determine if is behind proxy via IP address. Users can host it in their local database servers and get unlimited IP lookup queries for better cost and performance. Instead of database, you can also consider the hosted web service for proxy checking in real time. Web services are widely used today for communication and exchanging data between any disparate applications or platforms. It's seamless integration of services ensures greater experience for everyone.

Visit for more information.

Tags:Proxy Detection
Location:Sarasota - Florida - United States
Account Email Address Verified     Account Phone Number Verified     Disclaimer     Report Abuse
Hexasoft Development Sdn. Bhd. PRs
Trending News
Most Viewed
Top Daily News

Like PRLog?
Click to Share