Suspicious Origins: How a Bank Uses IP Intelligence to Manage Proxy-Driven Risk

Hear how a Spur customer manages proxy-driven risk in a real-world banking environment. The discussion focuses on practical lessons learned when working with anonymized traffic such as VPNs and residential proxies — including how teams evaluate signals, separate noise from actionable risk, and apply IP intelligence in ways that reduce risk without introducing unnecessary friction.

What’s covered

  • How a bank security team evaluates anonymized traffic signals across authentication, transaction, and investigation workflows
  • Common VPN and residential proxy patterns, and how teams distinguish benign from elevated-risk activity
  • How IP intelligence is ingested, enriched, and surfaced to analysts in day-to-day operations
  • Practical considerations for turning proxy detection into consistent, repeatable decisioning
  • Lessons learned from implementing and refining proxy-driven risk controls over time

Why this is relevant

  • See how peers handle anonymized traffic without relying solely on static IP reputation
  • Learn how teams balance security outcomes with user experience when risk is elevated
  • Understand how proxy and VPN signals appear in real analyst workflows
  • Leave with practical ideas you can adapt to your own environment, regardless of tooling

Further Reading


See the Difference Between Raw Data & Real Intelligence

Start enriching IPs with Spur to reveal the residential proxies, VPNs, and bots hiding in plain sight.