Proxy Detection Integration in iPrism

 

With fraudsters using proxies to hide their identity, and a variety of reasons for them to do so, it’s important that your website’s detection tools detect proxy activity. Proxies can be detected by inspecting IP packet headers or identifying patterns indicative of tunneling protocols. More advanced methods such as device fingerprinting go a step further by collecting data about a user’s operating system, browser, and connection and comparing it against known fingerprints to identify mismatches that may signal proxy usage.

iPrism enables you to proxy detection integration detect proxy settings via our integrated proxy detection feature that analyzes, scores, and blocks unrated pages accessed by your employees. This eliminates the need for IT to spend hours manually monitoring and blocking sites that could be used by fraudsters to circumvent your network’s Internet security.

Proxy Verification API: Validate IP Authenticity and Prevent Abuse

Another method of detecting proxy use is by analyzing an IP address against public lists of known proxies and VPN services. iDenfy’s API and hosted solution both incorporate this technology to quickly compare an IP against public databases. Alternatively, some web applications use geolocation information to flag IP addresses that are suspected of being proxies (e.g. in iGaming where proxies are frequently used).

For the most precise detection, advanced tools such as deep packet inspection (DPI) examine network traffic at a deeper level by reading and interpreting the contents of each individual packet. This enables them to spot complex configurations that may be more difficult to detect with less sophisticated software.