Blog

Deep dives into IP intelligence, threat behavior, and the solutions that help teams detect and respond.

Latest Articles

03.31.2025

Introducing Next Generation IP Geolocation for Enhanced Security Insights

12.19.2024

Astrill VPN and DPRK Remote Worker Fraud

11.20.2024

The Threat of Residential Proxies to Sanctions Compliance

02.22.2024

CloudRouter: 911 Proxy Resurrected

12.26.2023

Christmas in July: A Finely Wrapped Malware Proxy Service

Pattern
06.26.2023

Taking a Bite Out of Fraud: How Spur "Dog Foods" Monocle to Put a Leash on Fake Signups

05.17.2023

Identifying the Nexus of Scaled Ad Fraud

10.17.2022

I Don't Like Big Gateways (and I Cannot Lie)

09.27.2022

Big Socks to Fill: Tracking the Next 911RE

08.16.2022

The Market for Clean IP Addresses: The Good, the Bad, and the Ugly

11.17.2020

Iranian APT Utilizing Commercial VPN Services

Pattern

Expose Hidden Risks Across Your Enterprise Network

Detect anonymized infrastructure, validate user access, and accelerate incident response with Spur’s high-fidelity IP enrichment.