
Research
Security News
The Landscape of Malicious Open Source Packages: 2025 Mid‑Year Threat Report
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Python API for IP2Proxy database. It can be used to query an IP address if it was being used as open proxy, web proxy, VPN anonymizer and TOR exits.
Network access
Supply chain riskThis module accesses the network.
Found 1 instance in 1 package
This library allows user to query an IP address if it was being used as VPN servers, open proxies, web proxies, Tor exit nodes, search engine robots, data center ranges, residential proxies, consumer privacy networks, and enterprise private networks. It lookup the proxy IP address from IP2Proxy BIN Data file. This data file can be downloaded at
For more details, please visit: https://www.ip2location.com/ip2proxy/developers/python
To learn more about installation, usage, and code examples, please visit the developer documentation at https://ip2proxy-python.readthedocs.io/en/latest/index.html.
Proxy Type | Description |
---|---|
VPN | Anonymizing VPN services. |
TOR | Tor Exit Nodes. |
PUB | Public Proxies. |
WEB | Web Proxies. |
DCH | Hosting Providers/Data Center. |
SES | Search Engine Robots. |
RES | Residential Proxies [PX10+] |
CPN | Consumer Privacy Networks. [PX11+] |
EPN | Enterprise Private Networks. [PX11+] |
Usage Type | Description |
---|---|
COM | Commercial |
ORG | Organization |
GOV | Government |
MIL | Military |
EDU | University/College/School |
LIB | Library |
CDN | Content Delivery Network |
ISP | Fixed Line ISP |
MOB | Mobile ISP |
DCH | Data Center/Web Hosting/Transit |
SES | Search Engine Spider |
RSV | Reserved |
Threat Type | Description |
---|---|
SPAM | Spammer |
SCANNER | Security Scanner or Attack |
BOTNET | Spyware or Malware |
Email: support@ip2location.com. URL: https://www.ip2location.com
FAQs
Python API for IP2Proxy database. It can be used to query an IP address if it was being used as open proxy, web proxy, VPN anonymizer and TOR exits.
We found that IP2Proxy demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A look at the top trends in how threat actors are weaponizing open source packages to deliver malware and persist across the software supply chain.
Security News
ESLint now supports HTML linting with 48 new rules, expanding its language plugin system to cover more of the modern web development stack.
Security News
CISA is discontinuing official RSS support for KEV and cybersecurity alerts, shifting updates to email and social media, disrupting automation workflows.