#

Introduction #
IP2Location is pleased to announce the release of the IP2Proxy PX9 and PX10 packages. These 2 packages cater to the users who are security-conscious and also online merchants looking to detect fraudulent purchases.
What’s new in IP2Proxy PX9 package? #
With the release of the IP2Proxy PX9 packages, there is a new column called threat which contains a description of the types of detected threats from the listed proxies. This makes PX9 a vital tool in the arsenal of any webmaster, server administrator, forum operator, etc. The threat data can be one of the following:
SPAM: A “SPAM” value in the threat column indicates that the proxy is a known source of email or forum spam. This classification provides immediate value to mail server operators, forum administrators, and bloggers by allowing them to intercept malicious traffic at the edge. Blocking these IPs at the connection level eliminates the need to scan individual emails or posts, stopping spam before it enters your system.
SCANNER: A “SCANNER” value signals that an individual or organization is actively probing your server and network for vulnerabilities. While this sometimes indicates a legitimate penetration test, you should treat it as a high-priority alert. Encountering this value justifies further investigation and a thorough security audit to ensure your network remains resilient against potential exploits.
BOTNET: “BOTNET” identifies an IP address associated with a hijacked computer controlled by a central malicious server. Organized crime syndicates and hacker groups build these networks through phishing and exploitation to execute large-scale attacks. These hijacked systems often perform Distributed Denial of Service (DDoS) attacks against government, military, or enterprise infrastructure. You can mitigate these risks by proactively blocking IP addresses marked with this value.
Why should you choose IP2Proxy PX10? #
While PX9 can give you very good data from a security perspective, PX10 goes a step further by allowing you to detect the elusive residential proxy servers. This type of proxy servers is notoriously difficult to detect as they are actually computers being used by normal day to day folks. It could be a home computer being used by a student or housewife. It could also be any computer in a SOHO environment.
Sometimes the owners of these computers are not even aware that their machine is being used as a proxy. The proxy software could have been bundled with another software that they are using. Or it could also be one of their browser plugins.
As an online merchant, these residential proxies caused a lot of headache as fraudsters tend to use them while making purchases with stolen credit cards. This means the merchant will get saddled with lots of chargeback requests eventually. The potentially crippling financial losses means that merchants must be able to detect whenever a customer is making a purchase using a residential proxy server.
Fortunately, IP2Proxy PX10 includes detection of residential proxies, making it a highly indispensable tool in the online merchants’ fraud detection routine. By checking the proxy_type field for the value RES, they can easily filter out these IP addresses.
Conclusion #
IP2Proxy‘s threat intelligence and residential proxy data are essential in today’s high-risk digital landscape. Without these insights, server administrators and online merchants remain vulnerable to sophisticated malicious actors. Visit our website at https://www.ip2location.com/database/ip2proxy to compare our full range of IP2Proxy solutions and secure your infrastructure.
