Fraudsters do their best to hide their connection details with proxies. How do you catch them in the act? With proxy detection. Let’s look at various methods and why it’s crucial for your business.
Want to get a glimpse of what SEON can tell from just your IP? Enter it in the field below to test our free proxy and VPN detection tool:
What Is Proxy Detection?
Proxy detection is a process where businesses attempt to understand how online users connect to their websites. It is beneficial for catching harmful agents who spoof their connection details in order to commit fraudulent activities.
Proxies aren’t only used by fraudsters. Privacy enthusiasts rely on them to connect to the web. Plus, proxies can increase network speed by saving bandwidth or compressing traffic.
Web developers and marketers regularly rely on proxies to view online content from different geolocations. They are also a popular cybersecurity tool to filter out malicious websites or block malware and spyware. Still, proxy detection and VPN detection online is vital for fraud prevention and cybersecurity.
Why Proxy Detection is Important For Your Business
Understanding how users connect to your website is the best way to guess their intentions. Proxies indicate a will to hide connection details. This can be to access a website that is geoblocked, or, more worryingly, to fool your fraud prevention measures.
In that sense, proxy detection is important because it helps us answer the following questions:
- Is the user truly where they say they are?
- Are they trying to connect to a service they shouldn’t be able to access?
- Are they using suspicious technology designed to change their IP address?
- Are they likely to be a fraudster or cybercriminals?
The last question can only be answered by combining proxy detection with other methods, such as risk scoring, identity verification, or behavior analysis. And answering that question can help businesses reduce risk, improve compliance, and lower the cost of fraud.
Use Cases for Proxy Detection and Fraud Prevention
Proxy usage doesn’t always point to fraud. But if it does, it’s because of the following types of attacks:
- Multi-accounting and bonus abuse: a fraudster creates multiple accounts using different email addresses and phone numbers. They also need proxies to generate a new IP address for each account.
- Payment and chargeback fraud: the criminal has access to stolen credit card numbers. They still need to be able to hide their traces, or select an IP address that matches the card’s issuing country.
- Identity fraud: the fraudster wants to create a new account with, say, a Mexican neobank. They have access to stolen IDs from the region, and need to use a VPN to find a local IP address. If they are successful, this could lead to all kinds of exploits, from loan fraud to money laundering.
There is also the issue of account takeover, where a fraudster will log onto one of your customer’s accounts. The most sophisticated fraudsters will attempt to recreate the legitimate account holder’s behavior, which could be done by finding an IP address that doesn’t arouse suspicions.
How Do Fraudsters Use Proxies?
Proxies can anonymize or spoof connection details, which is why fraudsters have every incentive to use them. VPNs tend to only change the IP address, but we’ll use both terms interchangeably here. Let’s look at a concrete example:
- A fraudster is based in Portugal.
- They have access to several stolen Australian credit card numbers.
- They purchase an item online.
- The online store flags the transaction as suspicious.
This is where proxies come in. The Portuguese fraudster wants to make it look like they are indeed connecting from Australia to try their next batch of stolen credit cards without triggering any defense mechanisms.
The same logic applies to bot attacks and multi-accounting. If a fraudster wants to keep accessing a website, they need to make it look like they are using different devices, identities – and, more importantly, IP addresses.
But what types of proxies do fraudsters use, and how? Let’s take a look.
Learn how APIs work, their benefits, and how they compare to manual data
Find out More
5 Types of Proxies Used by Fraudsters
Fraudsters take control of how your site sees their IP addresses using the following tools.
1. Datacenter Proxies
A data center proxy gives fraudsters an IP address belonging to a data center company. For instance, AWS (Amazon Web Services) has a range of IP addresses. Anyone who connects via an AWS data center will be assigned an IP in that range.
If you know the IP address ranges of data centers it becomes very easy to detect these kinds of proxies. Datacenter proxies act more like a “wall” that hides the original IP address but still points to a certain company.
In that sense, data center proxies are less valuable for fraudsters than residential proxies.
2. Residential Proxies
A residential proxy uses IPs provided by an Internet Service Provider (ISP). Each residential proxy has a physical location that can be selected manually or at random.
Residential proxies are harder to detect than data centers and tend to be more trusted. They are used by legitimate humans and belong to well-known ISPs, such as Comcast or AT&T.
This makes them highly in demand and, therefore, not cheap to acquire. Fraudsters either have to pay a premium or find illegitimate ways to acquire these IP addresses (through malware or a botnet, for instance).
However, recent years have seen a rise in the number of services offering residential proxies online. There are also financial incentives for people to resell their residential IPs, which complicates detection even further.
3. Mobile Proxies
Mobile proxies also assign IP addresses – specifically, IP addresses that belong to mobile data network carriers.
A notable difference is that network carriers do not assign just one IP per device, often rotating or cycling through several IPs depending on availability.
This means that when the network’s load is high, several different users and devices will have the same IP, making it easier for fraudsters to hide.
Do keep in mind that mobile proxies simulate mobile devices; they do not need to be used on mobile phones or tablets necessarily. From there, fraudsters can use proxy software providers or even SIM card farms to rotate between various IP addresses.
4. Virtual Private Networks (VPNs)
While a virtual private network isn’t technically a proxy, it does serve the same purpose. The main difference is that a proxy redirects all of your device’s traffic, while a VPN works on an application level.
However, just like with proxies, the IP is hidden and traffic is rerouted through remote servers instead of their official ISP. VPNs can also be residential or from data centers.
5. Tor Network
Not technically a proxy, but Tor, or The Onion Router, also hides fraudsters’ IP addresses. However, because the exit nodes are public, they are fairly easy to detect.
Detecting Tor IPs is easy, but you shouldn’t assume that you’re dealing with a fraudster based on that information alone.
It’s better to calculate an IP fraud score to determine whether you should block the action or not and combine this with other information.
Proxy Type Comparison Table
|Residential Proxy||VPN||Mobile Proxy||Tor||Datacenter proxy|
|Assigned IP type||Residential IP, assumed to be provided by a land-based traditional ISP||Static, non-unique||Mobile IP, assumed to be provided by mobile network||The end node’s IP||Datacenter IP|
|Proxy detectability||Medium-hard to identify as a proxy||Easy to identify as a proxy (known addresses)||Almost impossible to identify as a proxy||Moderately easy to identify (lists of known end nodes)||Easy to detect |
|Uniqueness||Can request a dedicated IP, if needed||Can request a dedicated IP, if available||Can never be unique or private (IP address is always shared with others)||Cannot be unique (exit nodes ever-changing and shared with others)||Can request a dedicated IP, if available|
|IP reputation||Varies by residential proxy type||Medium IP reputation||Best IP reputation||Low IP reputation||Low IP reputation|
For good as well as bad users, different types of proxies have different benefits.
11 Proxy Detection Techniques
Example of proxy detection results
As we’ve seen above, some proxies are more valued by fraudsters than others. A lot of it has to do with how easily they can be detected.
Here are the detection methods at your disposal.
A ping test is a method to measure the minimum time to send the smallest possible amount of data.
However, ping tests do not return results with proxies. If a ping test does not return results, it could be a strong indicator that you’re dealing with a proxy.
A logical way to establish that a user relies on some kind of tunneling protocol is to create a latency test.
In theory, if their connection appears slower than expected, they are probably using a proxy. This can be done by measuring two latencies and comparing them:
- latency from an external IP to a web server: measured using a TCP/IP handshake
The geographical delay that has originated from the proxy is a clear indicator that you’re not dealing with a direct connection.
WebRTC enables direct peer-to-peer communication between users (for instance, voice or video chats). However, the protocol does not always go through proxies, even if you have one in place.
In Google Chrome, for instance, WebRTC will still use your original IP address. Researchers also found that 19 out of 100 VPNs accidentally leak the original IP addresses via WebRTC.
This is a goldmine for proxy detection. Using a simple HTML code, you can display the original IP address as seen by WebRTC.
TCP/IP Fingerprint Test
An interesting technique that works both for proxy detection and device fingerprinting. The idea is to compare the operating system advertised by the browser’s User-Agent and the one you get using a TCP/IP check.
If the results aren’t consistent, you may get two strong signals: that the user is spoofing the user agent, and that they’re probably connecting via some kind of proxy.
Open Port Scan
Proxies tend to leave open ports. If you know which port that tends to be, you can infer that you’re dealing with a certain proxy.
For instance, some providers resell hacked SSH connections where port 22 is always open. Other well-known proxy open ports, such as 3128 or 1080, can also indicate you’re on the right track.
Datacenter IP Test
Sometimes, the simplest way to check if you’re dealing with a proxy is to ask politely. And this asking is really about checking whether the IP falls within an officially published range.
Companies such as AWS or Digitalocean do publish their IP ranges, which is probably the easiest way to know if you’re dealing with a connection originating from their data centers.
Needless to say, checking every IP manually is time-consuming, which is where an API will come in handy.
DNS Leak Test
A DNS leak is considered a serious privacy and security flaw. Put simply, it allows an ISP to log and track every single website and app you use.
But in the context of proxy detection, there is a silver lining. It means you can check whether the IP really belongs to the corresponding ISP.
In other words, if the DNS leak points to a UK ISP but the official IP points to Serbia, you can confidently infer that you’re dealing with a proxy connection.
HTTP Proxy Headers Test
Every header HTTP request can contain valuable information about a connection. In our proxy hunting case, in particular, that information comes in the form of additional requests made by the proxy.
By measuring the number of HTTP header requests, you can look for suspicious patterns that may point to proxy use.
Blacklists, or blocklists, aren’t always the most reliable methods to identify proxies (in the iGaming world, for instance, it is a well-known secret that some vendors were using shared blacklists to block competitors from accepting their most valuable players).
Still, it’s a simple enough line of defense, provided you manage to identify bad proxy IPs in the first place.
Timezone Test (Browser vs. Timezone)
This is yet another interesting technique that overlaps with what we call device fingerprinting.
By comparing the IP timezone against the browser timezone, you can identify mismatches that may point to proxy usage.
Browser-Based Port Scanning
Browser-based port scanning is a somewhat controversial method, but it has one key advantage: being able to detect Tor usage.
We know, for instance, that Tor always uses ports 9050 and 9150, so browser scanning can let us know when you’re dealing with a privacy enthusiast (or a potential fraudster).
How SEON Does Proxy & VPN Detection via API
At SEON, proxy detection comes from our IP Lookup module. We use a combination of the techniques mentioned above, including WebRTC checks, ping tests, DNS leak tests, and more.
The key is that SEON gives you an idea of whether you are likely to deal with a fraudster or not. That likeness is gauged using a fraud score or risk score.
This is how it will look from your end.
As you can see in this test, we detected that this particular IP pointed to a VPN and a data center. The fraud score is fairly low because there are many more factors to take into account (note, though, that SEON’s fraud scoring is fully customizable so it can be tweaked to suit your risk appetite).
Here is the same event, where you can see a combination of risk rules relating to the IP, but also the email address:
You can get the results via API calls, but also using a simple manual check or even a Google Chrome extension.
The results are nearly instantaneous, no matter how many IPs pass through your website on a daily basis.
SEON Fraud APIs are highly configurable to match your unique business needs
Ask an Expert
Hackers can use a variety of techniques to bypass proxy detection, from built-in browser tools to paid residential proxies and VPNs.
Proxy detection can be extremely accurate if you rely on more than one detection technique at once. Because proxies always modify the connection details in one way or another, a webRTC test or latency test can reveal when a proxy is in use.
Yes, proxy detection is possible based on a variety of techniques, such as webRTC tests or open port pings. The idea is to look for suspicious delays in data delivery compared with a standard connection.
Showing all with `` tag
Speak with a fraud fighter.
Tamás Kádár is the Chief Executive Officer and co-founder of SEON. His mission to create a fraud-free world began after he founded the CEE’s first crypto exchange in 2017 and found it under constant attack. The solution he built now reduces fraud for 5,000+ companies worldwide, including global leaders such as KLM, Avis, and Patreon. In his spare time, he’s devouring data visualizations and injuring himself while doing basic DIY around his London pad.
Sign up for our newsletter
The top stories of the month delivered straight to your inbox