What are IP Threats in Geolocation?

3 min. readlast update: 01.24.2024

Threats section in Geolocation shows an anonimity and threats report on the IP address used by the Applicant to complete the Widget process. If any Threats are detected, a 'Yes' will show up in the Details column near the detected Threat:

Information about each of the Threat types:

  • Tor – the IP address is associated with a node on the Tor network. The Tor (The Onion Router) browser enables anonymous access to the internet. While it can have legitimate uses, it is often associated with illicit activity as it provides access to the dark web.
  • VPN – the IP address belongs to a known VPN service.
  • Datacenter – the IP address belongs to a datacenter (including all cloud providers). VPN and Proxy service providers are often providing datacenter IP addresses. Can be useful for detecting automated/bot traffic.
  • iCloud Relay – the IP address belongs to Apple's iCloud Private Relay service.
  • Proxy – the IP address is a known proxy (including HTTP/HTTPS/SSL/SOCKS/CONNECT and transparent proxies). Proxy service masks user's true IP address and provides a different one for browsing the internet.
  • Anonymous – shows Yes if Tor, VPN or Proxy was detected.
  • Known Attacker – the IP address is a known source of malicious activity, i.e. attacks, malware, botnet activity etc. If such information is found, the website, where the IP address was reported, is also linked in the 'Blocklists' section at the bottom of the table.
  • Known Abuserthe IP address is a known source of abuse, i.e. spam, harvesters, registration bots, other nuisance bots, etc. If such information is found, the website, where the IP address was reported, is also linked in the 'Blocklists' section at the bottom of the table.
  • Threat – shows Yes if ‘Known Abuser’ or ‘Known Attacker’ was detected.
  • Bogon – the IP address is a bogon. A bogon is an illegitimate IP address that falls into a set of IP addresses that have not been officially assigned to an entity by an internet registration institute. Many ISPs and end-user firewalls filter and block bogons, because they have no legitimate use, and usually are the result of accidental misconfiguration or malicious intent. Bogons are commonly used by hackers or spammers when initiating a distributed denial-of-service (DDoS) attack, as bogon packets cannot be traced back to an actual host or source.
  • Blocklists – hyperlinks to to websites where the IP address was reported as Attacker or Abuser. If no such information was detected, the Blocklists line does not appear on the Threats report.
Was this article helpful?