IP2Proxy

Stop fraudsters hiding behind proxies before they reach your team

Your AI agent checks every visitor's IP against IP2Proxy's detection service, instantly identifying VPNs, TOR nodes, anonymous proxies, and datacenter IPs. Suspicious visitors get flagged or blocked before the conversation begins. Legitimate customers pass through without friction.

Chosen by 800+ global brands across industries

Proxy and VPN detection in real time

Eleven data packages, one API call. Your AI agent classifies visitor IPs across proxy types, usage categories, and threat levels during every customer interaction.

Detect VPN Usage

A visitor connects through a commercial VPN. Your AI agent identifies the VPN provider, flags the connection type, and applies your configured policy. High-risk transactions get escalated while casual browsing continues uninterrupted.

Identify TOR Exit Nodes

TOR traffic often signals anonymity-seeking behavior. Your agent detects TOR exit nodes instantly through IP2Proxy's API and can block, challenge, or monitor these visitors based on your security posture and risk tolerance.

Flag Anonymous Proxies

Open and anonymous proxies are common tools for fraud. Your agent queries IP2Proxy to detect these proxy types, retrieves the ISP and domain behind the connection, and determines whether the traffic originates from a known abuse source.

Spot Datacenter IPs

Datacenter IPs rarely belong to real customers. When your agent detects datacenter-originated traffic through IP2Proxy, it can require additional verification steps like CAPTCHA or email confirmation before proceeding with the conversation.

Classify Residential Proxies

Residential proxies mimic legitimate users by routing traffic through home ISPs. IP2Proxy's advanced packages expose these harder-to-detect proxies, giving your agent visibility into traffic that other detection methods miss entirely.

Assess Threat Level

Higher IP2Proxy packages return threat scores, last-seen timestamps, and provider attribution. Your agent combines these signals to make nuanced decisions, allowing low-threat proxy users through while blocking high-risk connections automatically.

IP2Proxy

Use Cases

Fraud prevention that works silently

Your AI agent screens every visitor's IP before engaging, catching proxy-based fraud and bot traffic while keeping the experience seamless for genuine customers.

Account Takeover Prevention at Login

A user attempts to log in from an IP flagged as a TOR exit node, 3,000 miles from their usual location. Your AI Agent checks the IP through IP2Proxy, detects the anonymizing connection, and triggers a step-up authentication challenge before granting access. The legitimate account holder stays protected. The attacker hits a wall before they can do any damage.

E-Commerce Fraud Screening at Checkout

A high-value order comes through from an IP identified as a datacenter proxy. Your AI Agent flags the transaction, informs the buyer that additional verification is required, and routes the order to your fraud review team with the full IP2Proxy report attached. Chargebacks from proxy-based fraud drop significantly, and genuine customers pass through checkout without delay.

Bot Detection for Lead Quality

Your lead generation form receives 50 submissions in an hour. Your AI Agent runs each submitter's IP through IP2Proxy. Twelve are VPN connections, eight come from datacenters, and three are search engine bots. The agent filters these out and forwards only the 27 legitimate leads to your sales team. Lead quality improves and your reps stop chasing phantom prospects.

Try
IP2Proxy

IP2Proxy

FAQs

Frequently Asked Questions

What types of proxies can the AI agent detect through IP2Proxy?

IP2Proxy detects anonymous proxies, open proxies, VPNs, TOR exit nodes, search engine spiders, residential proxies, and datacenter IPs. The specific proxy types returned depend on your data package level (PX1 through PX11). Higher packages provide more granular classification and additional metadata like threat score and provider name.

How do IP2Proxy's data packages differ from PX1 to PX11?

PX1 provides basic proxy detection (is it a proxy: yes/no). Higher packages add proxy type, country, region, city, ISP, domain, usage type, ASN, last seen date, threat score, and provider name. PX11 returns the complete dataset. Choose based on how much detail your fraud prevention logic requires.

What authentication does Tars need for IP2Proxy?

Tars requires your IP2Proxy API key, which you obtain from your IP2Proxy account. Enter the key in the Tars Tools configuration. All lookups are authenticated with this key and the selected package level determines the data returned.

Does Tars store proxy detection results?

No. Tars queries IP2Proxy's API in real time during each conversation. The proxy detection results are used to make security decisions within the current interaction and are not stored in Tars afterward. Your IP2Proxy query credits are consumed according to your plan.

Can the agent differentiate between a VPN user and a TOR user?

Yes. IP2Proxy classifies proxy types separately. A VPN connection returns a different proxy type code than a TOR exit node. Your agent can apply different policies for each, such as allowing VPN users to proceed with extra verification while blocking TOR traffic entirely.

Does IP2Proxy support both IPv4 and IPv6 lookups?

Yes. The API accepts both IPv4 and IPv6 addresses. Your agent can check any visitor IP regardless of the protocol version. If no IP is provided in the request, the API defaults to checking the server's own IP address.

How quickly does IP2Proxy return detection results?

IP2Proxy's web service returns results in milliseconds. The detection happens transparently during the conversation without any noticeable delay to the visitor. Your agent receives the proxy classification before the customer finishes typing their first message.

What happens when IP2Proxy cannot determine if an IP is a proxy?

If the IP is not found in IP2Proxy's database, the API returns a non-proxy classification. Your agent treats these as legitimate traffic by default. You can configure fallback behavior such as allowing access but logging the interaction for later review.

How to add Tools to your AI Agent

Supercharge your AI Agent with Tool Integrations

Don't limit your AI Agent to basic conversations. Watch how to configure and add powerful tools making your agent smarter and more functional.

Privacy & Security

We’ll never let you lose sleep over privacy and security concerns

At Tars, we take privacy and security very seriously. We are compliant with GDPR, ISO, SOC 2, and HIPAA.

GDPR
ISO
SOC 2
HIPAA

Still scrolling? We both know you're interested.

Let's chat about AI Agents the old-fashioned way. Get a demo tailored to your requirements.

Schedule a Demo