
IP2Proxy
Your AI agent checks every visitor's IP against IP2Proxy's detection service, instantly identifying VPNs, TOR nodes, anonymous proxies, and datacenter IPs. Suspicious visitors get flagged or blocked before the conversation begins. Legitimate customers pass through without friction.




Eleven data packages, one API call. Your AI agent classifies visitor IPs across proxy types, usage categories, and threat levels during every customer interaction.
IP2Proxy
Your AI agent screens every visitor's IP before engaging, catching proxy-based fraud and bot traffic while keeping the experience seamless for genuine customers.
A user attempts to log in from an IP flagged as a TOR exit node, 3,000 miles from their usual location. Your AI Agent checks the IP through IP2Proxy, detects the anonymizing connection, and triggers a step-up authentication challenge before granting access. The legitimate account holder stays protected. The attacker hits a wall before they can do any damage.
A high-value order comes through from an IP identified as a datacenter proxy. Your AI Agent flags the transaction, informs the buyer that additional verification is required, and routes the order to your fraud review team with the full IP2Proxy report attached. Chargebacks from proxy-based fraud drop significantly, and genuine customers pass through checkout without delay.
Your lead generation form receives 50 submissions in an hour. Your AI Agent runs each submitter's IP through IP2Proxy. Twelve are VPN connections, eight come from datacenters, and three are search engine bots. The agent filters these out and forwards only the 27 legitimate leads to your sales team. Lead quality improves and your reps stop chasing phantom prospects.

IP2Proxy
FAQs
IP2Proxy detects anonymous proxies, open proxies, VPNs, TOR exit nodes, search engine spiders, residential proxies, and datacenter IPs. The specific proxy types returned depend on your data package level (PX1 through PX11). Higher packages provide more granular classification and additional metadata like threat score and provider name.
PX1 provides basic proxy detection (is it a proxy: yes/no). Higher packages add proxy type, country, region, city, ISP, domain, usage type, ASN, last seen date, threat score, and provider name. PX11 returns the complete dataset. Choose based on how much detail your fraud prevention logic requires.
Tars requires your IP2Proxy API key, which you obtain from your IP2Proxy account. Enter the key in the Tars Tools configuration. All lookups are authenticated with this key and the selected package level determines the data returned.
No. Tars queries IP2Proxy's API in real time during each conversation. The proxy detection results are used to make security decisions within the current interaction and are not stored in Tars afterward. Your IP2Proxy query credits are consumed according to your plan.
Yes. IP2Proxy classifies proxy types separately. A VPN connection returns a different proxy type code than a TOR exit node. Your agent can apply different policies for each, such as allowing VPN users to proceed with extra verification while blocking TOR traffic entirely.
Yes. The API accepts both IPv4 and IPv6 addresses. Your agent can check any visitor IP regardless of the protocol version. If no IP is provided in the request, the API defaults to checking the server's own IP address.
IP2Proxy's web service returns results in milliseconds. The detection happens transparently during the conversation without any noticeable delay to the visitor. Your agent receives the proxy classification before the customer finishes typing their first message.
If the IP is not found in IP2Proxy's database, the API returns a non-proxy classification. Your agent treats these as legitimate traffic by default. You can configure fallback behavior such as allowing access but logging the interaction for later review.
Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security
At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.