Installing IP2Location HTTP Module in IIS server-wide

This user guide will list out the steps to install the IP2Location HTTP Module in IIS server-wide. Pre-requisite: .NET 3.5 framework MUST be installed before trying the steps below. Get the module from https://github.com/ip2location/ip2location-httpmodule Download BIN database file at https://www.ip2location.com/database/ip2location Create a new folder and extract out all the files from […]

What is IP2Location BIN data file?

Intro IP2Location geolocation data comes in 2 different data file formats. One is the Comma Separated Values (CSV) file format which users can use to set up a relational or NoSQL database, such as SQL Server, MySQL, Oracle, MongoDB and so on, for geolocation lookup. The other format is the […]

Benefits of using IPv6

Intro Internet Protocol version 6 (IPv6) is the latest version of the protocol that we use in our daily lives whenever we go online to browse the Internet. Our computers communicate with web servers and other computers using this protocol. There are quite a few benefits to using IPv6 versus […]

How to detect data center IP address ranges?

Intro Data centers function primarily as hosting providers so that individuals or organizations can set up their own servers to serve contents like web servers and email servers. They are flexible enough that you can also run various software and services on them for additional functionalities. One such functionality is […]

How to automate IP2Location BIN database download

This tutorial will show you how to automate the IP2Location BIN database download and it works for both the IP2Location LITE and the commercial BIN database. By automating the download process, you no longer need to worry about missing out on any of the monthly BIN database updates. Below is […]

How to use IP2Location GeoLocation with Nginx

Geolocation is important, regardless of whether you are a marketer, online business owner, advertiser and so on. We need geolocation information to help us to learn more about our clients. For example, where are they coming from, what is their time zone, are they visiting via a proxy and many […]

How to use IP2Proxy with Nginx

Malicious activities usually done via an anonymous proxy where the perpetrator’s identity was hidden from tracking. You can easily fall prey to the fraudsters unless with the right tools to detect a proxy. You need to a way to easily tell if a visitor is coming from a non-proxy traffic, […]