IP Address Data for Privacy Detection
Overview
This dataset detects various methods used to mask a user’s true IP address. Full, custom internet-wide scans are consistently performed to detect almost 10 million (and counting) active VPNs. This is combined with data on public SOCKS and HTTP Proxies, TOR exit nodes, and IPinfo’s IP address classification capabilities to determine which IP ranges belong to hosting providers.
Data Information | Value |
---|---|
Refresh Cadence | Monthly |
Geographic Coverage | Global |
Schema
Name | Description |
---|---|
START_IP_INT | Starting IP address of an IP address range |
END_IP_INT | Ending IP address of an IP address range |
JOIN_KEY | Special variable to facilitate join operation |
START_IP | Starting IP address of an IP address range |
END_IP | Ending IP address of an IP address range |
HOSTING | Indicates a hosting IP address most of the time based on a data center. Indicative of bots, scrapers, or hosting services |
PROXY | Usage of a proxy IP address |
TOR | IP address originated from the Onion router (TOR) |
VPN | Virtual Private Network (VPN) service IP address |
RELAY | Traffic relays are often provided by CDN companies such as Akamai, Fastly, Cloudflare etc. This service indicates the use of Apple’s private relay |
SERVICE | Name of the IP privacy service provider |
Updated about 1 month ago