🚀 Big News: Socket Acquires Coana to Bring Reachability Analysis to Every Appsec Team.Learn more

IP2Proxy

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

IP2Proxy

Python API for IP2Proxy database. It can be used to query an IP address if it was being used as open proxy, web proxy, VPN anonymizer and TOR exits.

3.5.1

Network access

Supply chain risk

This module accesses the network.

Found 1 instance in 1 package

Maintainers
1

IP2Proxy Python Library

PyPI PyPI - Python Version PyPI - Downloads

This library allows user to query an IP address if it was being used as VPN servers, open proxies, web proxies, Tor exit nodes, search engine robots, data center ranges, residential proxies, consumer privacy networks, and enterprise private networks. It lookup the proxy IP address from IP2Proxy BIN Data file. This data file can be downloaded at

For more details, please visit: https://www.ip2location.com/ip2proxy/developers/python

Developer Documentation

To learn more about installation, usage, and code examples, please visit the developer documentation at https://ip2proxy-python.readthedocs.io/en/latest/index.html.

Proxy Type

Proxy TypeDescription
VPNAnonymizing VPN services.
TORTor Exit Nodes.
PUBPublic Proxies.
WEBWeb Proxies.
DCHHosting Providers/Data Center.
SESSearch Engine Robots.
RESResidential Proxies [PX10+]
CPNConsumer Privacy Networks. [PX11+]
EPNEnterprise Private Networks. [PX11+]

Usage Type

Usage TypeDescription
COMCommercial
ORGOrganization
GOVGovernment
MILMilitary
EDUUniversity/College/School
LIBLibrary
CDNContent Delivery Network
ISPFixed Line ISP
MOBMobile ISP
DCHData Center/Web Hosting/Transit
SESSearch Engine Spider
RSVReserved

Threat Type

Threat TypeDescription
SPAMSpammer
SCANNERSecurity Scanner or Attack
BOTNETSpyware or Malware

Support

Email: support@ip2location.com. URL: https://www.ip2location.com

FAQs

Did you know?

Socket

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Install

Related posts