Provider Overview:
IPinfo's industry-leading IP address data is now available directly in Snowflake and includes…
1. Enterprise-Grade Accuracy: Industry leading data accuracy with daily update options, underpinned by a global validation system that includes over 300 trace route networks.
2. Universal Access: Easily accessible via The Marketplace by anyone in the organization, reducing the engineering burden of traditional set up processes and simplifying procurement.
3. Highly Performant and Scalable: Ready to use UDF/UDTFs for data optimization meaning blazingly-fast queries only take a few seconds to run regardless of how many IPs are being queried.
IP Privacy Detection Data Overview:
This data set detects various methods used to mask a user’s true IP address. Full, custom internet-wide scans are consistently performed to detect almost 10 million (and counting) active VPNs. This is combined with data on public SOCKS and HTTP Proxies, TOR exit nodes, and IPinfo’s IP address classification capabilities to determine which IP ranges belong to hosting providers. The data is updated regularly, so the results are always up-to-date.
This data set includes the following:
▸ IP intelligence showing if an IP address is associated with a masking service including VPNs, Proxies, TOR usage, Relays, or a connection via a hosting provider, which could potentially be used to tunnel traffic, and mask the true IP address.
▸ Check out the Data Dictionary for more information on tables and fields included in this listing.
Example data enrichment use cases:
IP address data has broad applicability across industry verticals for the majority of internet data use cases. The most significant and popular use cases currently align to cybersecurity, fraud prevention and content protection, with some examples below:
1. Fraud Detection & Prevention: Enrich fraud detection models with granular insights on IP addresses associated with IP masking services, to improve threat scoring and guard against even the most sophisticated of modern-day attacks.
2. Identity & Access Management: System compromise often occurs from the use of IP masking services. Identify anomalies (e.g. VPN or TOR usage) by enriching network traffic logs to catch unusual login attempts &/or BOT attacks early, and mitigate security breaches.
3. Content Protection: Enforce access controls and maintain compliance by detecting if a user is circumventing content policies via an IP masking service. Also useful to prevent web scraping and piracy attempts.
Conditions:
Access to the data provided in this public listing is licensed for internal purposes only; commercial usage and resale are strictly prohibited. In the event of a breach, IPinfo will retain the right to terminate access at their sole discretion.
How to get started?:
Get started immediately with a no obligation FREE 30 day trial activated directly on The Marketplace.
We strongly advise you to leverage the IPinfo Snowflake Documentation: https://ipinfo.io/developers/integrations#snowflake to get up and running quickly and to support throughout using the data.
Also check out the IPinfo Snowflake Community site for further guidance: https://community.ipinfo.io/docs?tags=snowflake
Contact us:
Do you need more data types, want to discuss customization, or have any other questions? Reach out to our data experts at snowflake@ipinfo.io