Databases of hosting companies, data centers, proxies, bots and satellites.
I already represented here several months ago our geolocation project WIPmania . Now we are opening the promised databases of IP addresses (“service codes”), behind which are “users” with an undetectable location.
A “normal” user most likely does not go to the Internet through an anonymous proxy or his VPN installed on, say, a server in China. Similarly, servers are not always used only for peaceful purposes, but also for scanning, spam, or fraud.
The main idea of service codes is to define
Determining the addresses included in the service codes will be useful and interesting to almost every server with Internet access, from blogs and forums to online stores and bank servers for
And here you can find the technical details
A “normal” user most likely does not go to the Internet through an anonymous proxy or his VPN installed on, say, a server in China. Similarly, servers are not always used only for peaceful purposes, but also for scanning, spam, or fraud.
The main idea of service codes is to define
- First of all, of all hosting companies and, accordingly, requests from servers located in all data centers of the world,
- hidden server sites (commonly used by spammers and card frauders),
- free, anonymous, private and private proxies, SOCKS proxies, web anonymizers,
- TOR Network servers,
- search bots, aggregators, hidden search bots and hit bots,
- satellite providers
- mobile clients using international proxies (as an example: Opera Mini)
Corporate, university, and similar proxies and NAT networks are not included in the databases, since their users are usually local.
Determining the addresses included in the service codes will be useful and interesting to almost every server with Internet access, from blogs and forums to online stores and bank servers for
- fight against credit card fraud, with cheating in ad networks,
- fight against deface, with hacking servers,
- protect servers and content from anonymous access,
- the ability to detect theft of content,
- as additional assistance in the fight against spam and hooliganism
- against unauthorized mass server scans if the requestor pretends to be a regular user.
And here you can find the technical details