Follow Us! ThumbsUp
info@seon.io+44 20 8089 2900
;
Proxy & VPN Detection via API: How to Detect Fraudulent IPs;

Fraudsters do their best to hide their connection details with proxies. How do you catch them in the act?

With proxy detection. Let’s look at various methods and use cases.

What Is Proxy Detection?

Proxy detection is a process where businesses attempt to understand how users connect to their websites. It is particularly useful for catching bad agents who spoof their connection details in order to commit fraudulent activities.

Proxies aren’t only used by fraudsters. Privacy enthusiasts rely on them to connect to the web. Plus, proxies can increase network speed by saving bandwidth or compressing traffic. 

Web developers and marketers regularly rely on proxies to view online content from different geolocations. They are also a popular cybersecurity tool to filter out malicious websites or to block malware and spyware. 

How Do Fraudsters Use Proxies & VPNs?

How Fraudsters Use Proxies

Proxies can anonymize or spoof connection details, which is why fraudsters have every incentive to use them. Let’s look at a concrete example:

  1. A fraudster is based in Portugal.
  2. They have access to several stolen Australian credit card numbers.
  3. They purchase an item online.
  4. The online store flags the transaction as suspicious.

This is where proxies come in. The Portuguese fraudster wants to make it look like they are indeed connecting from Australia to try their next batch of stolen credit cards without triggering any defense mechanisms.

The same logic applies to bot attacks and multi-accounting. If a fraudster wants to keep accessing a website, they need to make it look like they are using different devices, identities – and, more importantly, IP addresses. 

Want to get a glimpse of what SEON can tell from just your IP? Enter it in the field below:

 

But what types of proxies do fraudsters use, and how? Let’s take a look.

Learn How Fraud Detection APIs Help you Protect your Business

Learn how APIs work, their benefits, and how they compare to manual data

Find out More

5 Types of Proxies Used by Fraudsters 

Fraudsters take control of how your site sees their IP addresses using the following tools.

1. Datacenter Proxies

A datacenter proxy gives fraudsters an IP address belonging to a data center company. For instance, AWS (Amazon Web Services) has a range of IP addresses. Anyone who connects via an AWS data center will be assigned an IP in that range.

If you know the IP address ranges of data centers it becomes very easy to detect these kinds of proxies. Datacenter proxies act more like a “wall” which hides the original IP address but still points to a certain company.

In that sense, datacenter proxies are less valuable for fraudsters than residential proxies.

2. Residential Proxies

A residential proxy uses IPs provided by an Internet Service Provider (ISP). Each residential proxy has a physical location that can be selected manually or at random. 

Residential proxies are harder to detect than data centers and tend to be more trusted. They are used by legitimate humans and belong to well-known ISPs, such as Comcast or AT&T. 

This makes them highly in-demand and therefore not cheap to acquire. Fraudsters either have to pay a premium or find illegitimate ways to acquire these IP addresses (through malware or a botnet, for instance). 

However, recent years have seen a rise in the number of services offering residential proxies online. There are also financial incentives for people to resell their residential IPs, which complicates detection even further.

3. Mobile Proxies

Mobile proxies also assign IP addresses – specifically, IP addresses that belong to mobile data network carriers.

A notable difference is that network carriers do not assign just one IP per device, often rotating or cycling through several IPs depending on availability.

Mobile Proxy

This means that when the network’s load is high, several different users and devices will have the same IP, making it easier for fraudsters to hide.

Do keep in mind that mobile proxies simulate mobile devices; they do not need to be used on mobile phones or tablets necessarily. From there, fraudsters can use proxy software providers or even SIM card farms to rotate between various IP addresses. 

4. Virtual Private Networks (VPNs)

While a virtual private network isn’t technically a proxy, it does serve the same purpose. The main difference is that a proxy redirects all your device’s traffic while a VPN works on an application level. 

However, just like with proxies, the IP is hidden and traffic is rerouted through remote servers instead of their official ISP. VPNs can also be residential or from data centers. 

TOR

5. Tor Network

Not technically a proxy, but Tor, or The Onion Router, also hides fraudsters’ IP addresses. However, because the exit nodes are public, they are fairly easy to detect. 

Detecting Tor IPs is easy, but you shouldn’t assume that you’re dealing with a fraudster based on that information alone.

It’s better to calculate an IP fraud score to determine whether you should block the action or not and combine this with other information. 

Proxy Type Comparison Table

Residential ProxyVPNMobile ProxyTorDatacenter proxy
Assigned IP typeResidential IP, assumed to be provided by a land-based traditional ISPStatic, non-uniqueMobile IP, assumed to be provided by mobile networkThe end node’s IPDatacenter IP
Proxy detectabilityMedium-hard to identify as a proxyEasy to identify as a proxy (known addresses)Almost impossible to identify as a proxyModerately easy to identify (lists of known end nodes)Easy to detect
(known addresses)
UniquenessCan request a dedicated IP, if neededCan request a dedicated IP, if availableCan never be unique or private (IP address is always shared with others)Cannot be unique (exit nodes ever-changing and shared with others)Can request a dedicated IP, if available
IP reputationVaries by residential proxy typeMedium IP reputation Best IP reputationLow IP reputationLow IP reputation

For good as well as bad users, different types of proxies have different benefits.

11 Proxy Detection Techniques

Example of proxy detection results

As we’ve seen above, some proxies are more valued by fraudsters than others. A lot of it has to do with how easily they can be detected.

Here are the detection methods at your disposal.

Ping Test

A ping test is a method to measure the minimum time to send the smallest possible amount of data.

However, ping tests do not return results with proxies. If a ping test does not return results, it could be a strong indicator that you’re dealing with a proxy.

Latency Measurements

A logical way to establish that a user relies on some kind of tunneling protocol is to create a latency test.

In theory, if their connection appears slower than expected, they are probably using a proxy. This can be done by measuring two latencies and comparing them:

  • latency from browser to web server: measured using JavaScript from the browser
  • latency from an external IP to a web server: measured using a TCP/IP handshake

The geographical delay that has originated from the proxy is a clear indicator that you’re not dealing with a direct connection.

WebRTC Test

WebRTC enables direct peer-to-peer communication between users (for instance, voice or video chats). However, the protocol does not always go through proxies, even if you have one in place.

In Google Chrome, for instance, WebRTC will still use your original IP address. Researchers also found that 19 out of 100 VPNs accidentally leak the original IP addresses via WebRTC. 

This is a goldmine for proxy detection. Using a simple HTML code, you can display the original IP address as seen by WebRTC. 

TCP/IP Fingerprint Test

An interesting technique that works both for proxy detection and device fingerprinting. The idea is to compare the operating system advertised by the browser’s User-Agent and the one you get using a TCP/IP check. 

If the results aren’t consistent, you may get two strong signals: that the user is spoofing the user agent, and that they’re probably connecting via some kind of proxy. 

Open Port Scan

Proxies tend to leave open ports. If you know which port that tends to be, you can infer that you’re dealing with a certain proxy. 

For instance, some providers resell hacked SSH connections where port 22 is always open. Other well-known proxy open ports, such as 3128 or 1080, can also indicate you’re on the right track. 

Datacenter IP Test

Sometimes, the simplest way to check if you’re dealing with a proxy is to ask politely. And this asking is really about checking whether the IP falls within an officially published range. 

Companies such as AWS or Digitalocean do publish their IP ranges, which is probably the easiest way to know if you’re dealing with a connection originating from their data centers. 

Needless to say, checking every IP manually is time-consuming, which is where an API will come in handy

DNS Leak Test

A DNS leak is considered a serious privacy and security flaw. Put simply, it allows an ISP to log and track every single website and app you use.

But in the context of proxy detection, there is a silver lining. It means you can check whether the IP really belongs to the corresponding ISP. 

In other words, if the DNS leak points to a UK ISP but the official IP points to Serbia, you can confidently infer that you’re dealing with a proxy connection.

HTTP Proxy Headers Test

Every header HTTP request can contain valuable information about a connection. In our proxy hunting case, in particular, that information comes in the form of additional requests made by the proxy. 

By measuring the number of HTTP header requests, you can look for suspicious patterns that may point to proxy use. 

Blacklists Check

Blacklists, or blocklists, aren’t always the most reliable methods to identify proxies (in the iGaming world, for instance, it is a well-known secret that some vendors were using shared blacklists to block competitors from accepting their most valuable players).

Still, it’s a simple enough line of defense, provided you manage to identify bad proxy IPs in the first place.

Timezone Test (Browser vs Timezone)

This is yet another interesting technique that overlaps with what we call device fingerprinting.

By comparing the IP timezone against the browser timezone, you can identify mismatches that may point to proxy usage. 

Browser-Based Port Scanning

Browser-based port scanning is a somewhat controversial method, but it has one key advantage: being able to detect Tor usage. 

We know, for instance, that Tor always uses the ports 9050 and 9150, so browser scanning can let us know when you’re dealing with a privacy enthusiast (or a potential fraudster). 

How SEON Does Proxy & VPN Detection via API

At SEON, proxy detection comes from our IP Lookup module. We use a combination of the techniques mentioned above, including WebRTC checks, ping tests, DNS leak tests, and more.

The key is that SEON gives you an idea of whether you are likely to deal with a fraudster or not. That likeness is gauged using a fraud score or risk score

This is how it will look from your end. 

As you can see in this test, we detected that this particular IP pointed to a VPN and a data center. The fraud score is fairly low because there are many more factors to take into account (note, though, that SEON’s fraud scoring is fully customizable so it can be tweaked to suit your risk appetite). 

Here is the same event, where you can see a combination of risk rules relating to the IP, but also the email address: 

You can get the results via API calls, but also using a simple manual check or even a Google Chrome extension.

The results are nearly instantaneous, no matter how many IPs pass through your website on a daily basis.

Improve the Way You Tackle Fraud

SEON Fraud APIs are highly configurable to match your unique business needs

Book a Demo

Sources

  • Incolumitas.com: Detecting Proxies and VPNs With Latency Measurements 
  • webrtcH4cKS: So your VPN is leaking because of Chrome’s WebRTC…
  • Nem.ec: eBay is port scanning visitors to their website – and they aren’t the only ones

Share article

See a live demo of our product

Click here

Author avatar
Tamas Kadar
CEO


Get our latest newsletter

Join over 6000 companies in getting the latest fraud-fighting tips