Skip to main content

Analyze IP

POST 

/ip/analyze

The Analyze IP endpoint provides comprehensive insights into a specified IP address, leveraging AI-driven analysis to deliver actionable intelligence. This includes connection type identification, detailed geolocation data, WHOIS information, trusted provider verification, up-to-date blocklist reports, and a robust risk assessment. Compatible with both IPv4 and IPv6, this endpoint is designed to empower businesses with precise and reliable IP data.

Features:

  • Connection types: Detects connection types such as wired, mobile, enterprise, satellite, vpn, cloud-provider, open-proxy, or Tor.
  • Geo location: Delivers detailed insights such as country, city, timezone, language preferences, and additional location-based information to enhance regional understanding.
  • WHOIS: Provides main details including RIR, ASN, organization, and abuse/admin/technical contacts.
  • Trusted Provider Recognition: Identifies if the IP is part of a known trusted provider (e.g., ZTNA - Zero Trust Network Access).
  • Blocklist Reports: Retrieves up-to-date blocklist statuses, active reports, and the latest detections.
  • Risk Report: Delivers an AI-driven normalized score (200-1000) to evaluate IP risk, supported by predefined thresholds.

Example Request Body:

{
"ip": "192.168.0.1",
"enableAI": true
}

Authentication & Security

  • API Key: Access to the API requires an API key, which must be included in the request headers. Businesses can generate unlimited API keys directly from their account, offering flexibility and ease of use.
  • ACL Rules: Enhance security with Access Control Lists (ACL), allowing you to restrict API access from specific IP addresses or ranges. This feature provides an additional layer of protection by ensuring only authorized IPs can interact with the API.
  • No Query Parameters: As a precautionary measure, our API avoids the use of query parameters for all operations, including authentication and handling Personally Identifiable Information (PII). This approach minimizes security risks by preventing sensitive data from being exposed in access logs, browser history, cached URLs, debugging tools, or inadvertently shared URLs. All sensitive information is securely transmitted through headers or the request body.

Request

Responses

The IP analysis is successful.